Programming like it’s 1977

128 bytes of RAM, no operating system, and limited types of sprites

Programming like it’s 1977
10 minutes by Adam Tornhill

Earlier this year I started a new hobby: writing games on the Atari VCS. The Atari VCS – or Atari 2600 as later versions were labeled – is a curious piece of hardware. It's heavily constrained with its 128 bytes of RAM, no operating system, and limited types of sprites.

WorkOS is a modern identity platform for auth as well as complex enterprise features like SSO, SCIM, and RBAC. It provides modular and easy-to-use APIs, helping hundreds of high-growth companies like Vercel, Webflow, and Perplexity become Enterprise Ready. Integration is simple, and you can enjoy free User Management up to 1,000,000 MAUs.

Why do CPUs have multiple cache levels?
15 minutes by Fabian Giesen

The short version is that the various cache levels have very large variations in how they are designed; they are subject to different constraints and fulfill different purposes. As a rule of thumb, as you climb up the levels of the cache hierarchy, the caches get larger, slower, higher density (more bits stored per unit area), consume less power per bit stored, and gain additional tasks.

Making a Postgres query 1,000 times faster
19 minutes by Alejandro García Montoro

Learn how we discovered what was slowing down large database queries, and what we did to make Postgres queries 1000x faster.

Microservices are very popular nowadays. It's a great architectural style that helps to scale the system and the organization. Many successful companies use microservices (e.g. Netflix, Spotify, etc). Therefore, it's normal that most companies are using or planning to use it. But some miss the added costs it brings.

The main problem with soft deletion is that you’re systematically misleading the database. This is most obvious in the case of foreign key constraints. If it’s important to your data integrity that some column in one table references a row that exists in another table, a foreign key constraint instructs the database to enforce that by, among other things, preventing the deletion.

how did you like this issue?

Login or Subscribe to participate in polls.


Would you like to become a sponsor and advertise in one of the issues? Check out our media kit and get in touch.