this post was submitted on 11 Feb 2025
342 points (95.0% liked)

Technology

74180 readers
5598 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] tyler@programming.dev 66 points 6 months ago (27 children)

This is incredible, but why does the article end by stating that this might not have any immediate applications? Shouldn’t this immediately result in more efficient hash tables in everyday programming languages?

[–] lemmyng@lemmy.ca 0 points 6 months ago (1 children)

I haven't read the Tiny Pointers article yet, but the OP article implies that the new hash tables may rely on them. If so, then the blocker could be the introduction (or lack thereof) of tiny pointers in programming languages.

[–] tyler@programming.dev 3 points 6 months ago

Tiny Pointers was the paper that the student read to get the idea. The paper he co-authored was "Optimal Bounds for Open Addressing Without Reordering"

load more comments (25 replies)