Implementing a key-value store, part 1: Linear Hashing | Dark Hacker News