Hacker News
- PCIe vs. CXL for Memory and Storage https://www.synopsys.com/designware-ip/technical-bulletin/cxl2-3-storage-memory-applications.html 20 comments
- Swift: Close to greatness in programming language design https://www.synopsys.com/blogs/software-security/swift-programming-language-design-part-3/ 2 comments
- How I sped up one of our test suites by 17.5x by explicitly defining Elixir protocol implementations https://www.synopsys.com/blogs/software-security/tinfoil-define-protocol-implementations/ 3 comments programming
- Bcrypt implementation flaw in BouncyCastle https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/ 14 comments netsec
- Bcrypt implementation flaw in BouncyCastle https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/ 14 comments crypto
- Forging a SHA-1 MAC using a length-extension attack in Python https://www.synopsys.com/blogs/software-security/forging-sha-1-mac-using-length-extension-attack-python/ 8 comments crypto
- Swift: Close to greatness in programming language design, Part 1 | Synopsys https://www.synopsys.com/blogs/software-security/swift-programming-language-design-part-1/ 10 comments swift
- Swift: Close to greatness in programming language design, Part 1 | Synopsys https://www.synopsys.com/blogs/software-security/swift-programming-language-design-part-1/ 30 comments programming