Video & On-Demand

Fundamentals of Type-Dependent Code Reuse - Mark Isaacson - NDC Oslo 2015

From NDC Oslo 2015:

Fundamentals of Type-Dependent Code Reuse

by Mark Isaacson

About the video:

This talk surveys different code reuse problems that can be solved by leveraging type information. Mark talks about how you can optimize your algorithms so that certain types use a "fast path", all while hiding that complexity from your users. He also talks about various ways to create "opt-in" functions for your classes. The talk is accessible to novices but builds gradually to complex ideas, including a theoretical C++17 "Mixer" class that allows users to add arbitrary functions to any type, including ints, on an instance by instance granularity.

CppCast Episode 43: Compiler Explorer with Matt Godbolt

Episode 43 of CppCast the only podcast for C++ developers by C++ developers. In this episode Rob and Jason are joined by Matt Godbolt to discuss the online Compiler Explorer project.

CppCast Episode 43: Compiler Explorer with Matt Godbolt

by Rob Irving and Jason Turner

About the interviewee:

Matt is a developer at trading firm DRW. Before that he's worked at Google, run a C++ tools company, and spent over a decade in the games industry making PC and console games. He is fascinated by performance and created GCC Explorer, to help understand how C++ code ends up looking to the processor. When not performance tuning C++ code he enjoys writing emulators for 8-bit computers in Javascript.

CppCast Episode 42: Intel Tamper Protection with Marc Valle

Episode 42 of CppCast the only podcast for C++ developers by C++ developers. In this episode Rob and Jason are joined by Marc Valle to discuss Intel's Tamper Protection Toolkit which can be used to protect your C++ application from reverse engineering and tampering.

CppCast Episode 42: Intel Tamper Protection with Marc Valle

by Rob Irving and Jason Turner

About the interviewee:

Marc Valle is the technical lead for the Intel (R) Tamper Protection Toolkit. His professional interests include tamper protection, reverse engineering, compilers, security, and privacy. In his free time he can be found staring at the black line at the bottom of the pool preparing for his next competition.