Thursday, February 14, 2019

[Links of the Day] 14/02/2019: golang fast HTTP , virtio shared file-system, enclave application

  • FastHTTP : like net/http but up to 10x faster . Zero memory allocation on a fast path. When you really really need to go fast and the standard golang lib is not enough.
  • Virtio-fs : shared file system build on top of the virtio framework. Finally a good way of sharing files and data between the host and the guest VM or between guests [git].
  • Asylo : I recently came across the concept of enclave applications. An enclave is a special execution context where code can run protected from even the OS kernel, with the guarantee that even a user running with root privileges cannot extract the enclave’s secrets or compromise its integrity. It relies on Intel SGX or ARM trustzone security hardware feature to protect the runtime operation of the process. This might be the next security level for highly regulated industries that want to deploy in a public cloud environment which will completely eliminate a lot of the conundrum that they currently face.

Tuesday, February 12, 2019

[Links of the Day] 12/02/2019 : Product management search engine, BI made easy, Test Fuzzing infrastructure

  • Product Management Search Engine: product management is a rather important part of the R&D lifecycle. Now you have a search engine for article and documentation in that specific domain.
  • Blazer : easily create charts and dashboard to share. 
  • ClusterFuzz: google fuzzing infrastructure. Fuzz testing at scale, when coupled with OSS-fuzz you end up with a fantastic tool for finding bugs in code especially buffer overflow.

Tuesday, February 05, 2019

[Links of the Day] 05/02/2019 : git absorb, Interactive SICP, Geek gone criminal mastermind

  • git-absorb: git commit --fixup, but automatic.
  • interactive SICP : interactive versions of Structure and Interpretation of Computer Programs. If you want to dig even further this book is interesting as it is beautiful to read.
  • Techy gone criminal mastermind: a long read on how the (maybe) coder behind the TrueCrypt software became a drug lord. OK.. looks like he started really early down the criminal tech path: Lulu told me that when Le Roux was 15 or 16, in the late 1980s, the local police raided the family home and arrested Paul for selling pornography online.