On 2018-05-08 21:41, Canek Peláez Valdés wrote:
> > So are there currently any languages (currently in use/supported)
> > designed to avoid the problems with C and other languages?
> I think Go and Rust would fit the bill.
Ocaml, and (if you're married to C-like syntax) its new skin Reason,
back
I believe the vulkan sdk provides that
On Tue, May 8, 2018, 7:34 PM Alan Grimes wrote:
> After playing Rise of The Tombraider using Vulkan on Gentoo I got
> inspired to try to poke with some source code. I downloaded vkQuake from
> github and tried to build it. It couldn't find ...
>
> Uh, where
After playing Rise of The Tombraider using Vulkan on Gentoo I got
inspired to try to poke with some source code. I downloaded vkQuake from
github and tried to build it. It couldn't find ...
Uh, where are the headers? What package are they in? =(
--
Please report bounces from this address to a...
On Tue, May 8, 2018 at 5:41 PM Canek Peláez Valdés wrote:
> On Tue, May 8, 2018 at 4:33 PM
wrote:
> >
> > So are there currently any languages (currently in use/supported)
designed to avoid the problems with C and other languages?
> >
> > Something with strong types and provisions for automati
On Tue, May 8, 2018 at 4:33 PM wrote:
>
> So are there currently any languages (currently in use/supported)
designed to avoid the problems with C and other languages?
>
> Something with strong types and provisions for automatic input validation
beyond typing, i.e. range limitation?
>
> Something
So are there currently any languages (currently in use/supported) designed to
avoid the problems with C and other languages?
Something with strong types and provisions for automatic input validation
beyond typing, i.e. range limitation?
Something that compiles, something that doesn't self op
On Tue, May 8, 2018 at 4:19 AM Martin Vaeth wrote:
> Rich Freeman wrote:
> >
> > Higher-level languages will probably become nearly immune to Spectre
just
> > as most are nearly immune to buffer overflows.
> Quite the opposite: Higher-level languages *always* do some checks
> for array-length e
On Tuesday, 8 May 2018 00:00:04 BST Bill Kenworthy wrote:
> Hi all,
>
> how does one set an environment variable for Apache mod_wsgi on gentoo?
>
> I am using the radicale wsgi module and it requires the config file to
> be passed in from the environment to be set in the environment. The
> d
Rich Freeman wrote:
>
> Higher-level languages will probably become nearly immune to Spectre just
> as most are nearly immune to buffer overflows.
Quite the opposite: Higher-level languages *always* do some checks
for array-length etc, and it is the _checks_ which are vulnerable.
You can only mak
9 matches
Mail list logo