Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Hash-Based Bisect Debugging in Compilers and Runtimes

Hash-based bisect debugging in compilers and runtimes

Duff's Device and Coroutines (2008)

C and C++ Prioritize Performance over Correctness

Timeline of the xz open source attack

The xz attack shell script

Russ Cox: C and C++ Prioritize Performance over Correctness

UTF-8: Bits, Bytes, and Benefits (2010)

Go Changes

Go Testing by Example [video]

Open source supply chain security at Google [video]

Running the "Reflections on Trusting Trust" Compiler

How To Build a User-Level CPU Profiler

Research Unix Sixth Edition (WASM)

Using uninitialized memory for fun and profit (2008)

C and C++ prioritize performance over correctness

Coroutines for Go

Storing Data in Control Flow

QArt Codes

Version SAT (2016)

Research Rsc: Opting in to Transparent Telemetry (Transparent Telemetry, Part 4)

Transparent telemetry for open-source projects

Lessons from the Debian/OpenSSL Fiasco (2008)

The Magic of Sampling, and Its Limitations

The design of transparent telemetry

Version SAT (by Russ Cox, on why dependency resolution is NP-hard in the general case, and which practical solutions exist)

Go Proposals

Go’s Version Control History

What NPM Should Do Today to Stop a New Colors Attack Tomorrow

Minimal Boolean Formulas

More →