Basics of What , Why and Hows of Data at Rest and Data in Transit Encryption
In this blog post, we are going to understand how does the throughput of a service varies when we change the number of threads doing the tasks in a service
Recently I came across this interesting blog article. It really struck me that RAM sitting on our systems has to be refreshed again and again in a timely fashion to ensure that the contents stored by the memory cells are intact. According to Wikipedia, each bit in DRAM is stored as a presence or absence of electric … Continue reading Could there be a data loss in DRAM while system is up ??
How can Full GC cycles on one JVM could impact the latencies on other JVMS sharing the common MySQL RDS
Know more about the knobs which parquet offers to tweak it with respect to your application so as to attain maximum benefits of parquet
Using PREPARE and COMMIT operations to make sure we achieve exactly once write or updates for non idempotent requests.
In this blog, we are going to understand how can we easily build fault tolerant stateful services with kafka. Kafka provides us with concept of partitions which can be used for syncing writes among different replicas making sure that primary and replicas are in almost same state.
In this blog post, we are going to talk about spectre vulnerability and how does this vulnerability affect current systems all around the globe. As already discussed in previous blog posts, the processor uses speculative execution along with branch predictor to speculatively execute instructions for better utilization of CPU cycles.
One of the core security features of the modern operating system is to provide isolation between the different processes running on a system and make sure that one process should not be able to see the data used by another process.
In this blog series, we will go through one of the biggest security vulnerabilities of recent times i.e. Spectre and Meltdown. This article is mostly centered around understanding the concepts which will be necessary for then understanding the internals of these two vulnerabilities.