並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 8 件 / 8件

新着順 人気順

cryptography python package versionsの検索結果1 - 8 件 / 8件

  • 0.8.0 Release Notes ⚡ The Zig Programming Language

    Tier 4 Support § Support for these targets is entirely experimental. If this target is provided by LLVM, LLVM may have the target as an experimental target, which means that you need to use Zig-provided binaries for the target to be available, or build LLVM from source with special configure flags. zig targets will display the target if it is available. This target may be considered deprecated by

    • The Go Programming Language and Environment – Communications of the ACM

      Go is a programming language created at Google in late 2007 and released as open source in November 2009. Since then, it has operated as a public project, with contributions from thousands of individuals and dozens of companies. Go has become a popular language for building cloud infrastructure: Docker, a Linux container manager, and Kubernetes, a container deployment system, are core cloud techno

      • xvw.lol - Why I chose OCaml as my primary language

        This article is a translation, the original version is available here. I started using the OCaml language regularly around 2012, and since then, my interest and enthusiasm for this language have only grown. It has become my preferred choice for almost all my personal projects, and it has also influenced my professional choices. Since 2014, I have been actively participating in public conferences d

        • Ubuntu 24.04 LTS (Noble Numbat) Release Notes

          Noble Numbat Release Notes Table of Contents Introduction New features in 24.04 LTS Known Issues Official flavours More information Introduction These release notes for Ubuntu 24.04 LTS (Noble Numbat) provide an overview of the release and document the known issues with Ubuntu and its flavours. For details of the changes applied since 24.04, please see the 24.04.2 change summary. Support lifespan

          • Secure Node.js Applications from Supply Chain Attacks

            This isn’t another AI-generated blog post about generic security practices. It contains detailed instructions on protecting Node.js applications from supply-chain attacks and describes best practices for security in any programming language. According to the GitHub report, The state of open source and rise of AI in 2023, JavaScript and TypeScript are the #1 and #3 most popular languages hosted on

              Secure Node.js Applications from Supply Chain Attacks
            • Announcing new Jupyter contributions by AWS to democratize generative AI and scale ML workloads | Amazon Web Services

              Artificial Intelligence Announcing new Jupyter contributions by AWS to democratize generative AI and scale ML workloads Project Jupyter is a multi-stakeholder, open-source project that builds applications, open standards, and tools for data science, machine learning (ML), and computational science. The Jupyter Notebook, first released in 2011, has become a de facto standard tool used by millions o

                Announcing new Jupyter contributions by AWS to democratize generative AI and scale ML workloads | Amazon Web Services
              • 16 years of CVE-2008-0166 - Debian OpenSSL Bug

                On May 12th 13th, 2008, Debian Linux announced the discovery of a severe security vulnerability in its OpenSSL package. A patch in Debian's and Ubuntu's OpenSSL packages broke the random number generator, effectively limiting the number of possible keys to a few ten thousand plausible variations. To celebrate the sixteenth anniversary of this discovery, I am hereby disclosing that many DKIM setups

                  16 years of CVE-2008-0166 - Debian OpenSSL Bug
                • research!rsc: Hash-Based Bisect Debugging in Compilers and Runtimes

                  Setting the Stage Does this sound familar? You make a change to a library to optimize its performance or clean up technical debt or fix a bug, only to get a bug report: some very large, incomprehensibly opaque test is now failing. Or you add a new compiler optimization with a similar result. Now you have a major debugging job in an unfamiliar code base. What if I told you that a magic wand exists

                  1