サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
衆院選
codahale.com
29 Nov 2011 About a week ago, I mentioned in passing to an old co-worker on Twitter that Yammer was moving some of our stack from Scala to Java. A few days later, Donald Fischer (the CEO of Typesafe) emailed me at my personal account, asking for more details. He CC’ed Martin Odersky, the lead designer of Scala and Typesafe’s Chief Architect. Given that the two people best-situated to improve Scala
A blog about programming, I guess.
07 Oct 2010 I’ve seen a number of distributed databases recently describe themselves as being “CA” –that is, providing both consistency and availability while not providing partition-tolerance. To me, this indicates that the developers of these systems do not understand the CAP theorem and its implications. A Quick Refresher In 2000, Dr. Eric Brewer gave a keynote at the Proceedings of the Annual
31 Jan 2010 Use bcrypt Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Why Not {MD5, SHA1, SHA2, SHA3, etc}? These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish for stor
A Lesson In Timing Attacks (or, Don’t use MessageDigest.isEquals) 13 Aug 2009 Timing attacks are pretty horrible from the perspective of someone trying to write a secure cryptosystem. They work against a programmer’s best instincts—don’t do extra work—to give an attacker with access to a Statistics 101 textbook a good solid grip on your application’s guts. How the hell does that work? In short, a
このページを最初にブックマークしてみませんか?
『Coda Hale writes things. | codahale.com』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く