 
      
    | You are here | nicolas-hahn.com | ||
| | | | | erik.doernenburg.com | |
| | | | | At work I'm seeing more and more embedded software; over the past few years in, among others, coffee machines, forklifts, and cars. Embedded software needs... | |
| | | | | roscidus.com | |
| | | | | This post evaluates the programming languages ATS, C#, Go, Haskell, OCaml, Python and Rust to try to decide which would be the best language in which ... | |
| | | | | blog.startifact.com | |
| | | | | A discussion of what patterns occur in software framework design. | |
| | | | | blog.redcrowlab.com | |
| | | Much of the time people engage in short term security testing such as penetration tests, vulnerability assessments, code reviews, etc. Often these are 1-2 weeks with some period for reporting. The approach to conducting these sorts of projects typically includes the following types of steps: * Heavy reliance on automated tools | ||