All Shared Links
-
Satoshi Nakamoto originally named it a “Timestamp Server” (as stated: “The solution we propose begins with a timestamp server”). This paper argues that what is commonly called “blockchain” is actually...
Satoshi Nakamoto originally named it a “Timestamp Server” (as stated: “The solution we propose begins with a timestamp server”). This paper argues that what is commonly called “blockchain” is actually a “proof-of-work-chain” comprising two essential, inseparable parts: (1) the proof-of-work mechanism and (2) the chaining process. Together, these form a consensus mechanism. Separating these two aspects fundamentally affects the entire network, raising the question of whether the chaining process (what we call “blockchain”) remains effective without proof-of-work.
-
The classic paper on memory systems by Ulrich Drepper. A comprehensive guide covering CPU caches, memory hierarchies, virtual memory, NUMA systems, and how understanding these concepts is essential for writing...
The classic paper on memory systems by Ulrich Drepper. A comprehensive guide covering CPU caches, memory hierarchies, virtual memory, NUMA systems, and how understanding these concepts is essential for writing performant code.
-
OpenAI’s engineering blog on how they scaled PostgreSQL to handle 800 million ChatGPT users. A detailed look at real-world database scaling at massive scale, covering the challenges and solutions they...
OpenAI’s engineering blog on how they scaled PostgreSQL to handle 800 million ChatGPT users. A detailed look at real-world database scaling at massive scale, covering the challenges and solutions they implemented.
-
Redis is more than just a cache. It’s a data structure server that can be used for caching, message queues, real-time analytics, session storage, and more. Understanding its full capabilities...
Redis is more than just a cache. It’s a data structure server that can be used for caching, message queues, real-time analytics, session storage, and more. Understanding its full capabilities opens up many use cases.
-
A self-paced course on Redis internals by reimplementing core features in Go. Covers event loops, serialization protocols, persistence mechanisms, pipelining, eviction strategies, and transactions.
A self-paced course on Redis internals by reimplementing core features in Go. Covers event loops, serialization protocols, persistence mechanisms, pipelining, eviction strategies, and transactions.
-
Rarimo turns a physical passport into an anonymous digital identity onchain.
Rarimo turns a physical passport into an anonymous digital identity onchain.
Uses zero-knowledge proofs to verify you possess a valid government-issued passport without revealing your name, age, nationality, or other personal information.
-
A detailed analysis of the race condition that led to Flexcoin’s bankruptcy. A real-world case study demonstrating the critical importance of understanding concurrency and proper synchronization in financial systems.
A detailed analysis of the race condition that led to Flexcoin’s bankruptcy. A real-world case study demonstrating the critical importance of understanding concurrency and proper synchronization in financial systems.
-
A 90-minute guide to modern processor microarchitecture. A concise introduction to the main design aspects of modern CPU architecture, covering pipelining, superscalar execution, out-of-order processing, and more.
A 90-minute guide to modern processor microarchitecture. A concise introduction to the main design aspects of modern CPU architecture, covering pipelining, superscalar execution, out-of-order processing, and more.
-
MISRA C is a set of software development guidelines for the C programming language developed by the Motor Industry Software Reliability Association (MISRA). Its aims are to facilitate code safety,...
MISRA C is a set of software development guidelines for the C programming language developed by the Motor Industry Software Reliability Association (MISRA). Its aims are to facilitate code safety, security, portability and reliability in the context of embedded systems, specifically those systems programmed in ISO C.
-
Designer with interesting work. Worth following for design inspiration and insights.
-
Useful reality-check lens for rollups and “L2” claims: are users actually inheriting Ethereum’s security, or is it closer to a hosted chain?
Useful reality-check lens for rollups and “L2” claims: are users actually inheriting Ethereum’s security, or is it closer to a hosted chain?
“We are a public goods company dedicated to providing onchain transparency.”
Transparency only helps if people (and systems) routinely look at it—otherwise unsafe assumptions can sit unchallenged.
-
How Uber models and stores financial transactions at scale (data model, ledger-like thinking, and operational constraints).
-
An illustrated primer on hash-based signatures. Explains quantum-resistant cryptography in an accessible way, covering how these signatures work and why they’re important for post-quantum security.
An illustrated primer on hash-based signatures. Explains quantum-resistant cryptography in an accessible way, covering how these signatures work and why they’re important for post-quantum security.
-
FastAPI is written in Python, and when microseconds matter, you don’t want to rely on Python.
-
Eytzinger binary search - a cache-friendly variant of binary search that takes advantage of CPU cache behavior. While maintaining O(log n) time complexity, it improves performance by optimizing memory access...
Eytzinger binary search - a cache-friendly variant of binary search that takes advantage of CPU cache behavior. While maintaining O(log n) time complexity, it improves performance by optimizing memory access patterns.
-
Walkthrough of designing a double-entry accounting system: core concepts, data model, and the kinds of invariants you want the system to enforce.
-
Smart-contract analysis tooling.
-
YouTube playlist on building a virtual machine from scratch in C. A hands-on tutorial that covers the fundamentals of how virtual machines work, from instruction sets to memory management.
YouTube playlist on building a virtual machine from scratch in C. A hands-on tutorial that covers the fundamentals of how virtual machines work, from instruction sets to memory management.
-
A talk on the architecture patterns and systems thinking behind modern financial institutions.
-
Algorithms optimized for modern hardware. Covers cache-aware algorithms, SIMD vectorization, and techniques for writing high-performance code that takes advantage of modern CPU features.
Algorithms optimized for modern hardware. Covers cache-aware algorithms, SIMD vectorization, and techniques for writing high-performance code that takes advantage of modern CPU features.