CodyinShiftLeft BlogDevSecOps Must Break AppSec’s Sisyphean CurseThe modern security landscape is one of ever evolving threats and challenges. Modern software engineers, Ops, IT infra, and SecOps often…Jan 3, 2018Jan 3, 2018
CodyAVX512 considered harmfulWith the next AVX-512 instruction and its new EVEX encoding standard to allow access to the massive 512bit registers. It also comes a…Nov 13, 2017Nov 13, 2017
CodyThe death rattle of Moore’s LawThe number of components on an integrated circuit shall double every 2 years. — Gordon Moore (1963)Feb 6, 2017Feb 6, 2017
CodyMoving before we BorrowMove semantics are the very start of Rust’s Borrow Checker System. If you want to learn the borrow checker you must move before you can…Jan 20, 2017Jan 20, 2017
CodyThe upcoming GHz WarsIn the early 90’s there was the MegaHertz Wars. Power PC chips vs Intel Chips. Intel Chips were amazingly fast. Reaching speeds…Dec 26, 2016Dec 26, 2016
CodyWTF is a SIMD, SMT, SIMTThese are terms that are tossed around a lot in High-Performance Programming. I’m going to attempt to demystify these terms. By the end of…Oct 17, 2016Oct 17, 2016
CodyThe TOR fork is VaporwareI’ve talked a lot about the TOR fork if you follow me on Twitter. This is the last thing I’m going to say on it. My goal is to summarize my…Aug 22, 2016Aug 22, 2016