
Blog
An Insight Into the AdaCore Ecosystem

Mar 19, 2026
Kyriakos Georgiou
Hardware-Driven Security: Can CHERI Fix the "Blind Spots" of Software Testing?
This work combines fuzz testing with CHERI hardware. Unlike heuristic-based sanitizers, CHERI uses hardware-enforced capabilities - pointers with…
Read More

Jun 06, 2011
Gem #107: Preventing Deallocation for Reference-counted Types

May 23, 2011
Gem #106: Lady Ada Kisses Python — Part 2

May 09, 2011
Gem #105: Lady Ada Kisses Python — Part 1

Apr 26, 2011
Gem #104: Gprbuild and Configuration Files — Part 1

Apr 11, 2011
Gem #103: Code Archetypes for Real-Time Programming — Part 5

Mar 28, 2011
Gem #102: SOAP/WSDL client part

Mar 14, 2011
Gem #101: SOAP/WSDL server part

Feb 28, 2011
Gem #100: Reference Counting in Ada - Part 3: Weak References

Feb 14, 2011
Gem #99: Reference Counting in Ada - Part 2: Task Safety

Jan 31, 2011
Gem #98: High Performance Multi-core Programming - Part 2

Jan 17, 2011
Gem #97: Reference Counting in Ada - Part 1

Dec 06, 2010


