Bookmarks (18600)

  • screenshot

    In C, how do you know if the dynamic allocation succeeded?

    In the C programming language, we allocate memory dynamically (on the heap) using the malloc function....

  • Don’t reopen namespace std

    Today (in two different contexts) I saw people reopening namespace std in order to introduce a...

  • Migrations: migrating attributes, pt. II

    What is this substack about? Here are the highlights from the first 25 issues.Welcome to the...

  • Language Design Is Not Just Solving Puzzles

    All Things Pythonic Language Design Is Not Just Solving Puzzles by Guido van van Rossum February...

  • screenshot

    When to Use Each of the Git Diff Algorithms

    git diff is a Git command to show changes between the working tree and the index...

  • Borrowing Trouble: The Difficulties Of A C++ Borrow-Checker

    Authors: danakj@chromium.org, lukasza@chromium.org, palmer@chromium.orgPublication Date: 10th September 2021IntroductionA common question raised when comparing C++ and Rust...

  • What are you doing this week? | Lobsters

    What are you doing this week? Feel free to share! Keep in mind it’s OK to...

  • screenshot

    A 16 Year History of the Git Init Command

    Git is a fascinating project and offers a lot of interesting nuggets to learn from. At...

  • An alternative approach to rate limiting (2017)

    A few weeks ago at Figma, we experienced our first-ever spam attack. This proved the value...

  • screenshot

    Getting to know Fuchsia, Google's open-source operating system | Codemagic Blog

    Written by Souvik BiswasGoogle’s unique open-source operating system is known as Fuchsia. Google started developing Fuchsia...

  • Static Analysis: An Introduction - ACM Queue

    September 16, 2021Volume 19, issue 4 PDF Queue Focus The fundamental challenge of software engineering is...

  • A step-by-step analysis of a new version of Darkside Ransomware (v. 2.1.2.3) – CYBER GEEKS

    Summary Darkside ransomware is the malware family responsible for the Colonial Pipeline attack on May 7...

  • Panic Blog » A Prototype Original iPod

    October 23rd, 2021 If you can believe it, the iPod is 20 years old, today. Now,...

  • screenshot

    The Design and Evolution of OCB - Journal of Cryptology

    The key steps for proving OCB secure are establishing the security of the \(\Theta \)CB construction...