The author outlines existing text search methods in Postgres, highlighting their advantages and limitations. They discuss traditional search engines like Apache Solr and Elasticsearch, as well as newer ones built on Tantivy and Rust. The focus is on ParadeDB, an extension that enhances Postgres with advanced search and analytics capabilities. The author demonstrates how to […]
Read more »
This article is all about the hands-on experience with the AMD EPYC 9575F Turin processor, focusing on the memory subsystem changes. The 9575F boasts high memory read bandwidth of 52 GB/s, write bandwidth of 48 GB/s, and add bandwidth of 95 GB/s. One unique feature is the GMI3-W with 2 GMI links to the IO […]
The Boo programming language is built with Windows .NET 4.5 and Visual C++ Build Tools. Mac/Linux users need Mono 4.2.x and Bash Build Tools. A bootstrap script helps install required tools into the build-tools directory for easy execution. The build scripts can specify the version of Mono to use, and targets for building and testing […]
Streaming replication in PostgreSQL allows for maintaining a real-time replica of a primary database on standby servers by continuously sending Write-Ahead Log (WAL) records. This minimizes latency and enhances high availability and scalability. Standby servers connect to the primary, request WAL streaming, and apply records to their copies. This process supports synchronous and asynchronous modes, […]
The phone ban at Öldutún School, implemented in 2019, has been well-received by both students and parents according to headmaster Valdimar Víðisson. Although the ban’s direct impact on literacy and interest in reading has not been separately studied, the school has seen improved culture and decreased cyberbullying. Research by Kristján Ketill Stefánsson suggests that more […]
Daniel, a 15-year-old bug hunter, discovered a vulnerability in Zendesk that allowed attackers to access support tickets from Fortune 500 companies. Despite reporting the bug to Zendesk’s bug bounty program, they rejected it initially. Daniel escalated the issue by demonstrating how the bug could lead to a full Slack takeover, replicating a past exploit with […]
The Norwegian Nobel Committee has awarded the Nobel Peace Prize for 2024 to the Japanese organization Nihon Hidankyo, a group of atomic bomb survivors from Hiroshima and Nagasaki. These survivors, known as Hibakusha, are recognized for their efforts in advocating for a world free of nuclear weapons and sharing their stories to highlight the catastrophic […]
Deadcheck is an automated dead man’s switch that operates independently of its hosting infrastructure. Users can set up checks that must be periodically confirmed, triggering alerts or actions if not confirmed within the specified time. Deadcheck utilizes external services for final triggers, ensuring functionality even if the hosting infrastructure is down. This decoupling from hosting […]
The author reflects on the ease of learning CUDA once they discovered it’s essentially C++ with some additional features. However, coming in with C++ habits could lead to suboptimal code, as lessons in memory coalescing reveal. The majority of performance in a modern PC lies in specialized hardware like GPUs, with specialized chips for machine […]
This experimental Lisp compiler, written in uLisp, compiles Lisp functions into RISC-V machine code. The compiler can run on a Raspberry Pi Pico 2 or another RP2350-based board. It eliminates the need for a tokenizer or parser, as Lisp programs have a consistent structure. The compiler uses Common Lisp subset supported by uLisp and RISC-V […]