Cookie Consent by Free Privacy Policy Generator Aktuallisiere deine Cookie Einstellungen ๐Ÿ“Œ CG, WG, W3C, Deeptiโ€”Wasm standardization with Deepti Gandluri


๐Ÿ“š CG, WG, W3C, Deeptiโ€”Wasm standardization with Deepti Gandluri


๐Ÿ’ก Newskategorie: Video | Youtube
๐Ÿ”— Quelle: youtube.com

Author: Chrome for Developers - Bewertung: 14x - Views:221

In this episode, Tom interviews Deepti Gandluri, the Chair of the WebAssembly Community Group at the W3C. You will hear about the difference between the W3C WebAssembly Community Group and Working Group, how Wasm is standardized, how Deepti got into WebAssembly, and the challenges the WebAssembly team at Google faces being part of the Chrome team. Deepti also discusses her favorite Wasm features, how the Community Group might react to a browser-specific proposal, how WASI might work given browser security constraints, and new Wasm features she's excited about in the context of AI. Chapters: 0:00 - Introducing Deepti 2:44 - WebAssembly Community Group vs. WebAssembly Working Group 8:15 - The WebAssembly phases/stages process 12:39 - Is Wasmโ€™s standardization more about the โ€œhowโ€ than the โ€œwhyโ€? 19:38 - Wasmโ€™s standardization run out of the Chrome team 22:13 - Deeptiโ€™s favorite abandoned, in-progress, and finished Wasm features 32:07 - Browser-only Wasm features 35:05 - WASI file system and the browser 42:33 - Wasm and AI 53:57 - Wasm, but not Resources: Episode 1 with Alon Zakai โ†’ https://goo.gle/4bpFxwV Deepti, Chair of the Community Group: โ†’ https://goo.gle/3yBtjmm Deepti, member of the Working Group โ†’ https://goo.gle/3K8NKJU WebAssembly Summit opening keynote โ†’https://goo.gle/3WVyQP7 WebAssembly Community Group โ†’ https://goo.gle/3KaOrCM WebAssembly Working Group โ†’ https://goo.gle/3VbI48B WebAssembly W3C Process GitHub โ†’ https://goo.gle/3Kd5p3a TC39 process document โ†’ https://goo.gle/4bL3fno File System Access API โ†’ https://goo.gle/3UT5uOE Web Serial API โ†’ https://goo.gle/3WP92nq V8 Wasm source code in Chromium โ†’ https://goo.gle/4bNiUTa WebAssembly active proposals โ†’ https://goo.gle/44TBd72 WebAssembly inactive proposals โ†’ https://goo.gle/4btU6je Wasm feature detection proposal โ†’ https://goo.gle/3K9E95B JavaScript promise integration proposal โ†’ https://goo.gle/3yxfkOM JavaScript promise integration origin trial proposal โ†’ https://goo.gle/4aA8Mff WasmGC proposal โ†’ https://goo.gle/4asI6gI WasmGC โ†’ https://goo.gle/3WR7GZw WASI file system โ†’ https://goo.gle/3ylByD1 Stringref proposal โ†’ https://goo.gle/4awO68b Built-in Strings proposal โ†’ https://goo.gle/3wJ6Fbg Deepti's Google I/O talk โ†’ https://goo.gle/4boQOOk Relaxed SIMD proposal โ†’ https://goo.gle/4bNATss Half precision (FP16) proposal โ†’ https://goo.gle/3wA9rjd Memory64 proposal โ†’ https://goo.gle/3wA9rjd #WebAssembly #Wasm #ASMjs #Emscripten #Standards, #Standardization Speaker: Thomas Steiner

...



๐Ÿ“Œ CG, WG, W3C, Deeptiโ€”Wasm standardization with Deepti Gandluri


๐Ÿ“ˆ 167.61 Punkte

๐Ÿ“Œ Vuln: radare2 '/format/wasm/wasm.c' Heap Buffer Overflow Vulnerability


๐Ÿ“ˆ 35.74 Punkte

๐Ÿ“Œ radare2 WASM File wasm.c wasm_dis() memory corruption


๐Ÿ“ˆ 35.74 Punkte

๐Ÿ“Œ Binaryen 1.38.22 wasm/wasm-binary.cpp processFunctions() denial of service


๐Ÿ“ˆ 35.74 Punkte

๐Ÿ“Œ Binaryen 1.38.22 wasm/wasm-binary.cpp processFunctions() memory corruption


๐Ÿ“ˆ 35.74 Punkte

๐Ÿ“Œ Binaryen 1.38.22 wasm/wasm.cpp getFunctionOrNull denial of service


๐Ÿ“ˆ 35.74 Punkte

๐Ÿ“Œ Binaryen 1.38.22 WASM File wasm-binary.cpp getType() denial of service


๐Ÿ“ˆ 35.74 Punkte

๐Ÿ“Œ CVE-2023-27114 | radare2 5.8.3 p/wasm/wasm.c wasm_dis memory corruption (ID 21363)


๐Ÿ“ˆ 35.74 Punkte

๐Ÿ“Œ radare2 WASM File wasm.c wasm_dis() Pufferรผberlauf


๐Ÿ“ˆ 35.74 Punkte

๐Ÿ“Œ IBM Embraces Knative To Drive Serverless Standardization


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ Standardization of C language


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ The cloud sets off the next wave of standardization


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ Streamlining your Developer Experience through CI/CD standardization


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ Setup Eslint + Prettier for code standardization in React


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ EFF Resigns From Web Consortium In Wake of EME DRM Standardization


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ ISO (International Organization for Standardization) is Anti-Christian. Here's the Hidden Proof!


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ Zigbee Alliance and DiiA bring standardization and system interoperability to the IoT luminaires space


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ Mosyle integrates with Okta and Ping Identity to enforce security standardization for Mac devices


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ QuSecureโ€™s QuProtect Platform Supports Post-Quantum Cryptography Algorithms Selected by NIST Today for Standardization


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ Current status on post-quantum cryptography and ongoing standardization and implementations/protocol


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ Leveraging Standardization and Automation to Facilitate DevOps Testing in Multi-Code Environments


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ Updates on NISTโ€™s Interagency International Cybersecurity Standardization Working Group


๐Ÿ“ˆ 25.25 Punkte

๐Ÿ“Œ Browser-Games: Unreal Engine 4.16 unterstรผtzt Wasm und WebGL 2.0


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ Google: Chrome gibt PNaCL zugunsten von Wasm auf


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ Wasm-Pack: Mozilla packt Rust-Software fรผr NPM


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ Doom 3 ported to WASM and running in the browser


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ radare2 1.3.0 Web Assembly File wasm.c consume_init_expr denial of service


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ radare2 2.0.0 wasm.c wasm_dis memory corruption


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ Javascript: Node.js 14 bringt native Wasm-Schnittstelle und LTS


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ Binaryen 1.38.22 wasm-binary.cpp readUserSection denial of service


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ Binaryen 1.38.22 wasm-binary.cpp visitCall denial of service


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ Binaryen 1.38.22 wasm-s-parser.cpp parseExpression denial of service


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ Binaryen 1.38.22 wasm-s-parser.cpp skipWhitespace() memory corruption


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ radare2 1.3.0 Web Assembly File wasm.c consume_init_expr Denial of Service


๐Ÿ“ˆ 17.87 Punkte

๐Ÿ“Œ EOS Node Remote Code Execution Vulnerability โ€” EOS WASM Contract Function Table Array Out of Bounds


๐Ÿ“ˆ 17.87 Punkte











matomo