Tags: code

binary-1538717_1920.png

PGP
Learn how to generate a 4096-bit RSA master key in this PGP tutorial.

Protecting Code Integrity with PGP — Part 2: Generating Your Master Key

In this article series, we're taking an in-depth look at using PGP and provide practical guidelines for developers working on free software projects. In the previous article, we provided an introduction to basic tools and concepts. In this installment, we show how to generate and protect your...
Read 1 Comments

What is LLVM? The Power Behind Swift, Rust, Clang, and More

LLVM makes it easier to not only create new languages, but to enhance the development of existing ones. It provides tools for automating many of the most thankless parts of the task of language creation: creating a compiler, porting the outputted code to multiple platforms and architectures, and...
Read 0 Comments

pgp-security.jpg

PGP
If you write code that goes into public source repositories, you can benefit from the practical PGP guidelines provided in this series.

Protecting Code Integrity with PGP — Part 1: Basic Concepts and Tools

In this article series, we take an in-depth look at using PGP to ensure the integrity of software. These articles will provide practical guidelines aimed at developers working on free software projects and will cover the following topics: PGP basics and best practices How to use PGP with Git...
Read 0 Comments

Julia vs R vs Python: Simple Optimization

In this post, I will try to compare and contrast Julia, R, and Python via a simple maximum likelihood optimization problem which is motivated by a problem from the credit risk domain and is discussed in more detail in this post. TL;DR For such a simple optimization problem, R, Julia, and Python/...
Read 0 Comments

Mitigating Known Security Risks in Open Source Libraries

This is an excerpt from Securing Open Source Libraries, by Guy Podjarny. Read the preceding chapter or view the full report. There are several ways to fix vulnerable packages, but upgrading is the best choice. If that is not possible, patching offers a good alternative. The following sections...
Read 0 Comments

How Programmers Learn to Code

HackerRank recently published the results of its 2018 Developer Skills Report, in which it asked programmers when they started coding. 39,441 professional and student developers completed the online survey from 16 October to 1 November 2016, with over 25% of the developers surveyed writing their...
Read 0 Comments

A Step-by-Step Guide to Git

If you've never used Git, you may be nervous about it. There's nothing to worry about—just follow along with this step-by-step getting-started guide, and you will soon have a new Git repository hosted on GitHub. Before we dive in, let's clear up a common misconception: Git isn't the same thing as...
Read 0 Comments

How Debuggers Really Work

A debugger is one of those pieces of software that most, if not every, developer uses at least once during their software engineering career, but how many of you know how they actually work? During my talk at linux.conf.au 2018 in Sydney, I will be talking about writing a debugger from scratch......
Read 0 Comments

Source{d} Applies Machine Learning to Help Companies Manage Their Code Bases

If you go to GitHub, the most popular developer platform today, and search for a piece of code, it is a plain-text search. “It’s like how we used to search on the web in 1996,” said Eiso Kant, CEO and co-founder at source{d}, a startup focused on applying machine learning on top of source code. “We...
Read 0 Comments

What is Agile Methodology? Modern Software Development Explained

Every software development organization today seems to practice the agile software development methodology, or a version of it. Or at least they believe they do. Whether you are new to application development or learned about software development decades ago using the waterfall software development...
Read 0 Comments

Pages

Click Here!