You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert
CF Bolz-Tereick wrote some excellent posts in which they introduce a small IR and optimizer and extend it with allocation removal. We also did a live stream together in which we did some more heap optimizations. In this blog post, I’m going to write a small abtract interpreter for the Toy IR and then show how we can use it to do some simple optimizations. It assumes that you are familiar with the
Do you write Elixir but sometimes miss the benefits of type safety we have in other languages? If the answer is "yes", you may want to take a look at Gleam. It is a relatively young language that runs on top of the BEAM platform, which means it can be added as an enhancement to an Elixir codebase without you having to rewrite everything. In this article, we will add Gleam code to an Elixir project
In the previous post, I described the goal of Rust’s Pin type and the history of how it came to exist. When we were initially developing this API in 2018, one of our explicit goals was the limit the number of changes we would make to Rust, because we wanted to ship a “minimum viable product” of async/await syntax as soon as possible. This meant that Pin is a type defined in the standard library, w
Give Me the Green Light Part 1: Hacking Traffic Control Systems In this series of blog posts I’ll be discussing my finding dealing with traffic controllers and other traffic systems. I had hoped to present the information at DefCon but my CFP wasn’t accepted. This multi part series will start with my attempt at responsible disclosure, finding vulnerabilities in traffic controllers, sourcing hardwa
1. 利用者が主体となった「機密コンピューティング」の活用 1-1. クラウドの責任共有モデルの範囲では対処しきれないリスク 世間一般に言うクラウドコンピューティングはそのセキュリティ(機密性・完全性・可用性)の維持において、その構成要素ごとにクラウド事業者が運用責任を負う部分と利用者が担保する箇所を分ける、いわゆる「責任共有モデル (shared responsibility model)」(参考:クラウドコンピューティングのためのセキュリティガイダンス v4.01)の下、はじめて成立するサービスです。 そのクラウドコンピューティングの中でも IaaS 型クラウドサービスは、貸し出されたコンピュータ上で動作する OS、ミドルウェア、ソフトウェアなどの選定、セットアップ、アップデートを利用者にて実施いただくモデルであり、その性質からも該当コンピュータ上で生成・保存された利用者データの漏洩・
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く