Hacker News
- How to turn an ordinary gzip archive into a database https://rushter.com/blog/gzip-indexing/ 3 comments
- How to track and display profile views on GitHub https://rushter.com/blog/github-profile-markdown/ 108 comments
- Memory Management in Python https://rushter.com/blog/python-memory-managment/ 33 comments
- How Numba and Cython speed up Python code https://rushter.com/blog/numba-cython-python-optimization/ 45 comments
- Optimization tricks in Python: lists and tuples https://rushter.com/blog/python-lists-and-tuples/ 43 comments
- Python's GIL implemented in pure Python https://rushter.com/blog/python-gil-thread-scheduling/ 18 comments
Lobsters
- Clipboard API for browsers is inconsistent https://rushter.com/blog/clipboard-api/ 2 comments web
- Public SSH keys can leak your private infrastructure https://rushter.com/blog/public-ssh-keys/ 11 comments security
- Garbage collection in Python: things you need to know https://rushter.com/blog/python-garbage-collector/ 11 comments python
- Shady economics of proxy services https://rushter.com/blog/proxy-services/ 5 comments netsec
- How masscan works https://rushter.com/blog/how-masscan-works/ 6 comments netsec
- [deleted by user] https://rushter.com/blog/python-code-isolation/ 2 comments netsec
- Clipboard API for browsers is inconsistent https://rushter.com/blog/clipboard-api/ 8 comments programming
- Clipboard API for browsers is inconsistent https://rushter.com/blog/clipboard-api/ 5 comments webdev
- How to turn an ordinary gzip archive into a database https://rushter.com/blog/gzip-indexing/ 3 comments commandline
- How to turn an ordinary gzip archive into a database https://rushter.com/blog/gzip-indexing/ 41 comments programming
- Public SSH keys can leak your private infrastructure https://rushter.com/blog/public-ssh-keys/ 79 comments netsec