 Back To Basics Lifetime Management0 码力 | 66 页 | 8.43 MB | 6 月前3 Back To Basics Lifetime Management0 码力 | 66 页 | 8.43 MB | 6 月前3
 Libraries: A First Step Toward Standard C++ Dependency Management1October 3, 2023 2 Libraries: A First Step Toward Standard C++ Dependency Management Bret Brown, C++ Infrastructure Lead, Bloomberg Bill Hoffman, CTO, KitwareHello! Welcome! Bret Brown C++ Infrastructure portable as the code they contain! ● ✓ Projects should be “cattle,” not “pets”! 7Why dependency management? 8Consensus: Managing dependencies == way too hard Q: Which of these do you find frustrating names: jsonlogConfig.cmake Jsonlog-config.cmake # ... CMake gives you some dependency management tips here ... 13 Aside: Coloring and bolding added for emphasisMotivation: What would we design0 码力 | 82 页 | 4.21 MB | 6 月前3 Libraries: A First Step Toward Standard C++ Dependency Management1October 3, 2023 2 Libraries: A First Step Toward Standard C++ Dependency Management Bret Brown, C++ Infrastructure Lead, Bloomberg Bill Hoffman, CTO, KitwareHello! Welcome! Bret Brown C++ Infrastructure portable as the code they contain! ● ✓ Projects should be “cattle,” not “pets”! 7Why dependency management? 8Consensus: Managing dependencies == way too hard Q: Which of these do you find frustrating names: jsonlogConfig.cmake Jsonlog-config.cmake # ... CMake gives you some dependency management tips here ... 13 Aside: Coloring and bolding added for emphasisMotivation: What would we design0 码力 | 82 页 | 4.21 MB | 6 月前3
 Casdoor · An Open Source UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform supportingOv Over erview view Casdoor is a UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform based on OAuth 2.0, OIDC, SAML, and CAS. Casdoor serves both the web UI and the login requests separate architecture, developed by Golang. It supports high concurrency, provides a web-based UI for management, and supports localization in 10+ languages. 2. Casdoor supports third-party application login and it supports extending third-party login with plugins. 3. Casdoor supports authorization management based on Casbin. It supports ACL, RBAC, ABAC, and RESTful access control models. 4. Casdoor provides0 码力 | 825 页 | 58.31 MB | 1 年前3 Casdoor · An Open Source UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform supportingOv Over erview view Casdoor is a UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform based on OAuth 2.0, OIDC, SAML, and CAS. Casdoor serves both the web UI and the login requests separate architecture, developed by Golang. It supports high concurrency, provides a web-based UI for management, and supports localization in 10+ languages. 2. Casdoor supports third-party application login and it supports extending third-party login with plugins. 3. Casdoor supports authorization management based on Casbin. It supports ACL, RBAC, ABAC, and RESTful access control models. 4. Casdoor provides0 码力 | 825 页 | 58.31 MB | 1 年前3
 Hyperledger Fabric 2.0.1 Documentationmining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 760 页 | 10.21 MB | 1 年前3 Hyperledger Fabric 2.0.1 Documentationmining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 760 页 | 10.21 MB | 1 年前3
 The Roles of Symmetry And Orthogonality In DesignOrthogonality In Design cppcon 2021 Either you keep self improving, or it's time to move into management. --Niall Douglas 30-Sep-2021 https://old.reddit.com/r/cpp/comments/pye3iv/c_commi ttee_dont Orthogonality In Design cppcon 2021 Symmetry In C++ Code • C++’s most common symmetry example: Resource Management ... { Bar b; //...do stuff with b } Enter the block, object is created Leave the block, Orthogonality In Design cppcon 2021 Symmetry In C++ Code • C++’s most common symmetry example: Resource Management ... { Bar b; //...do stuff with b } Enter the block, object is created Leave the block,0 码力 | 151 页 | 3.20 MB | 6 月前3 The Roles of Symmetry And Orthogonality In DesignOrthogonality In Design cppcon 2021 Either you keep self improving, or it's time to move into management. --Niall Douglas 30-Sep-2021 https://old.reddit.com/r/cpp/comments/pye3iv/c_commi ttee_dont Orthogonality In Design cppcon 2021 Symmetry In C++ Code • C++’s most common symmetry example: Resource Management ... { Bar b; //...do stuff with b } Enter the block, object is created Leave the block, Orthogonality In Design cppcon 2021 Symmetry In C++ Code • C++’s most common symmetry example: Resource Management ... { Bar b; //...do stuff with b } Enter the block, object is created Leave the block,0 码力 | 151 页 | 3.20 MB | 6 月前3
 Hyperledger Fabric 2.0.1 Documentationmining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable con- sensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 533 页 | 8.37 MB | 1 年前3 Hyperledger Fabric 2.0.1 Documentationmining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable con- sensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 533 页 | 8.37 MB | 1 年前3
 Hyperledger Fabric 2.0 Documentationmining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 821 页 | 10.22 MB | 1 年前3 Hyperledger Fabric 2.0 Documentationmining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 821 页 | 10.22 MB | 1 年前3
 Hyperledger Fabric 1.4 Documentation
mining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 678 页 | 10.02 MB | 1 年前3 Hyperledger Fabric 1.4 Documentation
mining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 678 页 | 10.02 MB | 1 年前3
 Hyperledger Fabric 1.4.8 Documentationmining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 699 页 | 9.02 MB | 1 年前3 Hyperledger Fabric 1.4.8 Documentationmining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 699 页 | 9.02 MB | 1 年前3
 Hyperledger Fabric 1.4.9 Documentationmining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 701 页 | 9.02 MB | 1 年前3 Hyperledger Fabric 1.4.9 Documentationmining or to fuel smart contract execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed architecture. Whether it is pluggable consensus, pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed consensus protocols that do not require costly mining. Additionally, in such a permissioned context, the risk of a participant intentionally introducing malicious code through a smart contract is diminished.0 码力 | 701 页 | 9.02 MB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100














 
  
 