Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is a great article. I also recommend K&R Chapter 8 if people wanna know more. Do the exercises and it’ll just click.


I want to learn more about next steps, such as virtual memory. Should Ch 8 of K&R be the next step? I started reading the chapter and I think the whole chapter is about UNIX system calls.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: