I’m currently working on a digital logic DSL in Nim that is called Polished, because it provides a polish digital logic design experience. I need to decide whether or not to do compile-time or runtime elaboration of the DSL as compile-time execution in Nim run’s on the nimVM.
The nimVM is known for being on the slow side; I wanted to know just how slow, so I decided to do some testing with BigInt in both nimVM and Python, but first some background:…
In this post, I compare some languages I’ve worked with based on features that are important to me, then at the end, I decide my favorite language.
I don’t really keep a timer on how long I spend writing code, but I’d feel pretty comfortable claiming that I spent the following amount of time in the following various languages.
Language Programming Hours C > 100 C++ < 100 Python > 1000 Scala > 200 Nim > 100 Java > 50 Rust 2 weeks V-lang .…
Some brief thoughts on backdoors and security.
What are Backdoors? From MalwareBytes.com
“A backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.”
Backdoors are often installed by software or hardware makers as a deliberate means of gaining access to their technology after the fact.…
Seeing is Believing Without the design files for your computer processor, how do you know that:
A. it does only what you tell it to
B. it respects your privacy
As of the time of writing, there are currently no modern auditable computer processors on the market.
Backdoors An easy way to prove your system doesn’t have backdoors is to release it’s designs for extensive auditing.
Auditing Auditing designs can sometimes take a lot of time, and a lot of capital.…