Introducing postgres.new, the in-browser Postgres sandbox with AI assistance.
Pythoné¢é£ã®ãã¼ã«ãã³ãã¨ãã¦ç¥ãããAnacondaã¯ãExcelä¸ã§ç´æ¥Pythonã³ã¼ããå®è¡ã§ããæ°æ©è½ãAnaconda Codeããå«ãExcelã®ã¢ããªã³ãã¼ã«ãAnaconda Toolbox in Excelãããããªãã¯ãã¼ã¿ã¨ãã¦å ¬éãã¾ããã You can now run Python directly in Excel locally w/ the new Anaconda Code add-in! Public beta is live! Faster performance, flexible data handling, editable initialization, & customizable environments. Read more in our blog & follow @anacondainc: https://t.co/9LAy
Easy to UseLeveraging the power and portability of WebAssembly, Extism is an off-the-shelf plug-in system just a library import away. Ship in days, not weeks or months. Secure by DefaultDon't worry about what some plug-in code might do to your program. Extism is built with security as a core principle, and fully sandboxes the execution of all plug-in code. Available EverywhereOur flexible architec
Sandboxing and Workload Isolation Author Name Thomas Ptacek @tqbf @tqbf Workload isolation makes it harder for a vulnerability in one service to compromise every other part of the platform. It has a long history going back to 1990s qmail, and we generally agree that itâs a good, useful thing. Despite a plethora of isolation options, in the time I spent consulting for technology companies I learned
Binaryen is a compiler and toolchain infrastructure library for WebAssembly, written in C++. It aims to make compiling to WebAssembly easy, fast, and effective: Easy: Binaryen has a simple C API in a single header, and can also be used from JavaScript. It accepts input in WebAssembly-like form but also accepts a general control flow graph for compilers that prefer that. Fast: Binaryen's internal I
ã¯ããã« æè¿ãNode.jsã¨Denoã®éçºè ã§ããRyan DahlãããJavaScript Containersã¨ããè¨äºãæ¸ãã¦ãããã¨ãç¥ã£ãã Webã¨ã®è¦ªåæ§ã®é«ãããµã¼ãã¼ãµã¤ãã§æ±ããããä¸ãJavaScriptãã¦ããã¼ãµã«ã¹ã¯ãªããã¨ãã¦æ´»èºããã ãããããã¦ãã³ã³ããã©ã³ã¿ã¤ã ãLinuxã³ã³ããã®æ½è±¡ã¬ã¤ã¤ã¼ã¨ãã¦ããããã«ãJavaScriptçéã§ã¯æ¢åã®WebAPIãã®ãã®ãæ½è±¡åã®æå©ãã¨ãªãã§ããããã¿ãããªè¶£æ¨ã®å 容ã ã£ãã å½¼ãChromeã®V8 JavaScript Engineã使ã£ã¦Node.jsãèªçãããåãé ãJavaScriptã®å¯è½æ§ãä¿¡ãã¦æ¹æ³ã模索ãã人ããããAlon Zakaiããã ã Alon(以éãæ¬ç§°ç¥)ã¯WebAssemblyããã®èãã®å ã«ãªã£ã asm.js ã JavaScriptã³ã³ãã¤ã© Emscripte
Wasmã¯ãªãã»ãã¥ã¢ãªã®ãï¼ ååWasmã®ãã¤ããªãèªãã§ã¿ãããå®è¡æã«ã©ã®ããã«ã»ãã¥ã¢ã«å®è¡ãã¦ããã®ãæ°ã«ãªã£ãã®ã§èª¿ã¹ã¦ã¿ãã ã¨ããããä»åãå ¬å¼ããã¥ã¡ã³ããè¦ãªããæ´çãã¤ã¤ãå®éã®ã³ã¼ããç¡çãªã辿ããããªã¨ããã¯wasmerã®å®è£ ãåèã«è¦ã¦ããããã¨æãã Wasmã®ç®æãã»ãã¥ãªã㣠ã¨ããããå ¬å¼ã®è¨è¼ãè³æ»ã§èªè§£ãã¦ããã The security model of WebAssembly has two important goals: (1) protect users from buggy or malicious modules, and (2) provide developers with useful primitives and mitigations for developing safe applications, within the
WebAssemblyã¯Webãã©ã¦ã¶ä¸ã§å¹ççãã¤å®å ¨ã«ã³ã¼ããå®è¡ããããã«éçºãããæè¡ã§ããæ§ã ãªãã©ãããã©ã¼ã ã§ã®å®è¡ããC++ãRustãªã©ã®ããã°ã©ãã³ã°è¨èªã§éçºãå¯è½ã§ããæ¬æ¸ã¯WebAssemblyã®æè¡çãªåçãåä½ãã©ã®ãããªãã¨ãå¯è½ãªã®ããåºç¤ãããã£ããå¦ã¶ãã¨ãã§ãããã¤å®è·µçãªéçºãã¯ããã¯ã«ã¾ã§è¸ã¿è¾¼ãã éçºè åãã®è§£èª¬æ¸ã§ããããã°ã©ãã³ã°è¨èªã¯ä¸»ã«C++ãåãæ±ãã¾ããç°¡åãªä¾ãã解説ãã¯ãããåçãªã³ã¯ã並åå¦çããããã°ã¨ãã£ãè¤éãªè©±é¡ã解説ããæ§æã«ãªã£ã¦ãããWebAssemblyã¢ã¸ã¥ã¼ã«ã®éçºãå©ãã1åã§ãã 訳è ã¾ããã ã¯ãã㫠第Ié¨ãWebAssemblyã®åæ© 1ç« ãWebAssemblyã¨ã®éé 1.1ãWebAssemblyã®æ¦è¦ 1.1.1ãWebAssemblyã®å身asm.js 1.1.2ãasm.jsããWeb
ã¡ã³ããã³ã¹
ã©ã³ãã³ã°
ãç¥ãã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}