In this blog post, we are going to talk about spectre vulnerability and how does this vulnerability affect current systems all around the globe. As already discussed in previous blog posts, the processor uses speculative execution along with branch predictor to speculatively execute instructions for better utilization of CPU cycles.
One of the core security features of the modern operating system is to provide isolation between the different processes running on a system and make sure that one process should not be able to see the data used by another process.
In this blog series, we will go through one of the biggest security vulnerabilities of recent times i.e. Spectre and Meltdown. This article is mostly centered around understanding the concepts which will be necessary for then understanding the internals of these two vulnerabilities.
In this blog post, we are going to talk about potential advantages of using custom execution plan of a query rather than using the traditional iterator model in which execution is composed of many operators.
In this blog post, we are going to understand the impact of functions calls in an application and what JIT does to reduce its impact.
JIT ( Just in Time ) is certainly one of the most interesting features of JVM. This feature makes sure that we are able to run our code with machine level optimizations.
Java Unsafe APIs provides various low-level APIs which could be used by programmers but we should be very careful when to use these APIs. These APIs provide a way to access off heap memory in java.