Blog Archive
Go
- January 2026 - Why Transaction Logs Matter: The Problem Stream Solves
- December 2025 - Building Torus: Architecture Decisions and Trade-offs
- December 2025 - Finger Tables and O(log N) Routing: Chord’s Magic
- December 2025 - The Ring and Consistent Hashing: Chord’s Foundation
- December 2025 - Why Distributed Hash Tables Matter: The Problem Space
- December 2025 - The Invisible Man: How Go’s Standard Library Tricks the Compiler
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 3)
- December 2025 - Part 5: The Garbage Collector Tax (Pointers vs. Values)
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 2)
- December 2025 - Part 4: The Hidden Headers (Strings, Slices, Interfaces, and Maps)
- December 2025 - Part 3: The Hardware Reality (CPU Caches and False Sharing)
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 1)
- December 2025 - Part 2: Structs, Padding, and “Wasted” Bytes
- December 2025 - Part 1: The Fundamentals of Memory
- December 2025 - Cryptographic Security: Constant-Time Byte Comparison
Security
Cryptography
Memory
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 3)
- December 2025 - Part 5: The Garbage Collector Tax (Pointers vs. Values)
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 2)
- December 2025 - Part 4: The Hidden Headers (Strings, Slices, Interfaces, and Maps)
- December 2025 - Part 3: The Hardware Reality (CPU Caches and False Sharing)
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 1)
- December 2025 - Part 2: Structs, Padding, and “Wasted” Bytes
- December 2025 - Part 1: The Fundamentals of Memory
Performance
- December 2025 - The Invisible Man: How Go’s Standard Library Tricks the Compiler
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 3)
- December 2025 - Part 5: The Garbage Collector Tax (Pointers vs. Values)
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 2)
- December 2025 - Part 3: The Hardware Reality (CPU Caches and False Sharing)
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 1)
- December 2025 - Part 2: Structs, Padding, and “Wasted” Bytes
- December 2025 - Part 1: The Fundamentals of Memory
Optimization
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 3)
- December 2025 - Part 2: Structs, Padding, and “Wasted” Bytes
Unsafe
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 3)
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 2)
- December 2025 - Breaking the Glass: A Deep Dive into Go’s Unsafe Package (Part 1)
Concurrency
Internals
- December 2025 - The Invisible Man: How Go’s Standard Library Tricks the Compiler
- December 2025 - Part 4: The Hidden Headers (Strings, Slices, Interfaces, and Maps)
GarbageCollector
Compiler
DistributedSystems
- December 2025 - Building Torus: Architecture Decisions and Trade-offs
- December 2025 - Finger Tables and O(log N) Routing: Chord’s Magic
- December 2025 - The Ring and Consistent Hashing: Chord’s Foundation
- December 2025 - Why Distributed Hash Tables Matter: The Problem Space
DHT
- December 2025 - Building Torus: Architecture Decisions and Trade-offs
- December 2025 - Finger Tables and O(log N) Routing: Chord’s Magic
- December 2025 - The Ring and Consistent Hashing: Chord’s Foundation
- December 2025 - Why Distributed Hash Tables Matter: The Problem Space
Networking
Chord
- December 2025 - Finger Tables and O(log N) Routing: Chord’s Magic
- December 2025 - The Ring and Consistent Hashing: Chord’s Foundation
Algorithms
- December 2025 - Finger Tables and O(log N) Routing: Chord’s Magic
- December 2025 - The Ring and Consistent Hashing: Chord’s Foundation