Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
High performance server architecture (atyp.us)
7 points by bootload on Dec 16, 2007 | hide | past | favorite | 1 comment



"An example of a copy that's disguised rather than hidden is a hash function, which has all the memory-access cost of a copy and also involves more computation."

A hash function requires reading all the input, but it only writes to a constant-sized region of memory, unlike a memory copy. I'd say this difference makes the comparison pretty inaccurate.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: