Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
more mad's comments
login
mad
on March 24, 2010
|
parent
|
context
|
next
[–]
| on:
Ask HN: I use and love Python. What's the best boo...
In what sort of workload was a custom allocator the biggest performance win?
mad
on Dec 30, 2008
|
parent
|
context
|
prev
|
next
[–]
| on:
Sotirov and Applebaum's (redacted) Internet vulner...
Some more hints:
http://events.ccc.de/2008/12/30/the-cat-is-out-of-the-bag/
mad
on Dec 14, 2008
|
parent
|
context
|
prev
|
next
[–]
| on:
Four Reasons Why Parallel Programs Should Have Ser...
Here you go:
http://www.acmqueue.com/modules.php?name=Content&pa=show...
The issue is that STMs have a lot of book-keeping overhead in addition to the locking.
mad
on Dec 12, 2008
|
parent
|
context
|
prev
[–]
| on:
Stop Sharing Your Twitter Credentials
Wasn't this a targeted attack against a security blogger?
tptacek
on Dec 12, 2008
|
parent
[–]
Yes. Under normal circumstances, the attackers would have silently harvested all the victim's accounts and sold them in Estonia.
Consider applying for YC's Summer 2025 batch! Applications are open till May 13
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: