About:

The metadata provided does not contain specific information about the author. The site is named 'NRK's Homepage', which suggests that the author or the site name is NRK. Further details about the author are not available in the given metadata.

Website:

Specializations:

Incoming Links:

Outgoing Links:

Jesse Squires
Subscribe to RSS:
The text discusses the implementation of an immediate mode option parser in C, which is smaller and simpler than getopt. It explains the usage and implementation details of the parser, highlighting its small code size and ease of ...
The text discusses different ways to implement a macro in C that takes an expression as an argument and verifies if it is a constant expression, returning the same value. It explores various methods and their pros and cons, includ...
The author discusses their experience with the advent of code challenge in 2024 and their journey with the BQN array language. They talk about the challenges they faced, the setup process, and the resources that helped them. They ...
The article introduces ChibiHash, a small and fast 64-bit hash function that is portable, unencumbered, and non-cryptographic. It provides benchmarks against other similar hash functions and explains the design overview of the fun...
The article discusses the LZW compression scheme and the author's clone of the ancient compress(1) tool called nix-compress. It focuses on the high level choices made while writing nix-compress, particularly the decompressor using...
The article discusses the performance of strlcpy and how CPUs can defy common sense. It compares the openbsd and glibc implementations of strlcpy and explains the importance of cache misses and dependencies in CPU performance.
The text discusses the creation of a branchless utf8 decoder utilizing the pext or 'parallel extract' instruction. It explains the process of decoding utf8, the interface, loading the bytes, determining the length, extracting the ...
The author participated in the Advent of Code 2023 event and documented some of the new and interesting things they learned. They discuss the puzzles, the language of choice, and the lessons learned from each day's puzzle. They al...
The text provides a gentle introduction to static analyzers for C, focusing on easily accessible tools with zero or near zero setup and a focus on producing the least amount of false-positives. It discusses the importance of compi...
The post discusses the implementation and performance of hash-based trees and tries as search data structures. It compares binary hash trees, hash-table of hash trees, and hash array mapped trie, and introduces the concept of simp...
The text discusses the implementation of a data structure called Treap in C, which is a tree-like structure with fast insertion and lookups. The author explains the basic treap implementation and then simplifies and improves it st...
The text discusses the practice of setting free-ed pointers to NULL and its effectiveness in catching use-after-free errors. It explains that setting a single pointer to NULL does little to prevent these errors and suggests using ...
The text discusses the development of a lock-free single element generic queue using C11 atomics and lock-free algorithms. It outlines the issues with a naive version and the process of fixing data race, uninitialized reads, and r...
The article discusses the need to wait for an event with a timeout when using x11. It explains the common methods people use to achieve this and their downfalls, and then introduces the X Synchronization Extension Protocol as a so...
The author shares their experience in writing their first library, libz1, which is a set of single header libraries. They discuss the challenges of designing and documenting the library, as well as the specific libraries included ...
The text discusses the isdigit function and its multiple implementations in C standard library. It compares different versions of the function and analyzes their performance characteristics. The author asserts that they only care ...
The article discusses the author's experience of being banned from GitHub without any explanation, and the negative impact it had on the author and other developers. It also highlights the lack of trust in GitHub due to various co...
The author discusses the inefficiency of strlcpy(3) and why they are not a fan of it. They explain that strlcpy is inefficient and not a good solution for copying strings. They provide alternative solutions such as memccpy(3), mem...

0C: Stop writing f()

2022-05-07

The text explains the difference between f() and f(void) in C, and why it's important to use f(void) to avoid undefined behavior and stack corruption. It also discusses the history of the old style declaration and how to avoid it ...
The text explains how to send git patches using neomutt, as many projects still use mailing lists for development. It provides a step-by-step guide on generating a patch and sending it via neomutt, with additional tips and tricks....
The author discusses the process of making their website open source, including the history, switching to markdown, compiling/building, and website hosting. They also express uncertainty about the future direction of the website.
The text explains how to view git log interactively inside vim without using any plugins. It provides a shell function to run glo, and explains the remapping of K to view commit diff, opening git log inside a vim terminal buffer, ...