Doug Schaefer overviews the Arduino C++ IDE for Eclipse and discusses plans to take the IDE beyond just Arduino and into other microcontroller boards such as the ESP8266 IoT platform.
Aaron Turon explains Rust's core notion of “ownership” and shows how Rust uses it to guarantee thread safety, how Rust avoids some of the pitfalls of C++ without compromising on performance.
In this panel users of C++, Rust, and Go talk about how they picked their language of choice, what problems remain, what was impossible to do with VM-based languages and much more.
Peter Sommerlad covers compile-time computations available in C++14: constexpr functions and constants, literal types, variable templates, variadic templates and what can be expected in the future.
Axel Naumann introduces the use of C++ for storing and analyzing petabytes of C++ objects at CERN, and more generally in High Energy Physics.
Elena Laskavaia explains how to write a simple C/C++ checker to find errors in code with Code Analysis Framework (codan) and the AST introspection APIs of the CDT.
Dominic Robinson reflects on several concurrency models, trying to assess which is more pleasant to work with.
Alessandro Pignotti introduces Duetto, a C++ compiler that enables developers to write full client-server Web applications in standard C++ and to port existing C++ codebases to the Web.
Martin Thompson focuses on the evolution of Java in contrast with C/C++, covering the cultural challenges of performance limits and how to collaborate with industry experts and organize teams.
Roger Orr solves a problem with different levels of complexity trying to answer what the complexity notation actually means and why it is important in practice.
Hosted by Erik Meijer, who runs the Cloud Programmability Team at Microsoft, the panelists answer questions on C/C++ and Java performance, contrasting the virtues of native vs. managed code.
Jordan DeLong overviews the past, current and near future "good parts" of C++'s functional side through the colored lens of his biases.
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR
Increase security on compromised platforms with Intel® SGX.
An Intel technology for application developers who are seeking to protect select code and data from disclosure or modification.
A Developer’s Perspective.
Developers have long been constrained by the security capabilities that major platform providers have exposed for application development. How Bromium and wolfSSL employ Intel® SGX to create more secure, next-generation solutions.
Learn more about the Intel SGX SDK, a collection of APIs, libraries, documentation, sample source code, and tools that allows software developers to create and debug Intel SGX enabled applications in C/C++.
Protect Application Code, Data, & Secrets from Attack.
Developers can partition their application into CPU hardened “enclaves” or protected areas of execution that increase security even on compromised platforms.
Intel Software Guard Extensions (SGX) for Dummies.
At its root, Intel® SGX is a set of new CPU instructions that can be used by applications to set aside private regions of code and data.