- "Some anti-virus vendors are using techniques to bypass Kernel Patch Protection by injecting a hypervisor which they use to intercept syscalls and make assumptions about memory locations — memory locations which are now changing with the Meltdown fixes."
- This is Lily, a programming language that I've been working on (mostly solo) for 6 and a half years now.
- The State of Atom’s Performance
- PowerShell Core 6.0: Generally Available (GA) and Supported!
- Writing a C Compiler, Part 5
- Handling of CPU bugs disclosure 'incredibly bad': OpenBSD's de Raadt
- JavaScript Markdown WYSIWYG Editor
- What the Four Color Theorem Can Teach Us About Writing Software
- Let's Encrypt - Security Issue with tls-sni-01 and Shared Hosting Infrastructure
- Measuring OS X Meltdown Patches Performance
- Top 5 Reasons for Ruby-ists to Use Crystal
- A fast React alternative, compatible with IE8 and React 16.
- Nginx Tutorial #2: Performance
- What is the deal with GraphQL?
- Lesser known C# features - Part 2
- Meltdown Proof-of-Concept - repository with several applications, demonstrating the Meltdown bug
- How to keep up to date as a C# developer (some good links)
- Always put side effects last, a lesson learned in systems design
- The Why of Go: a look at the historical context around the technical decisions of the Go
- The gaming console isn't dead yet. And the Nintendo Switch proves it
- is an invite to a group on github (if they are part of a following group) the same as saying hello ?
- Database sharding explained in plain English
You are subscribed to email updates from programming. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment