In this blog post, we are going to talk about spectre vulnerability and how does this vulnerability affect current systems all around the globe. As already discussed in previous blog posts, the processor uses speculative execution along with branch predictor to speculatively execute instructions for better utilization of CPU cycles.
Category: Technology
Understanding Spectre and Meltdown Vulnerability – Part 2
One of the core security features of the modern operating system is to provide isolation between the different processes running on a system and make sure that one process should not be able to see the data used by another process.
Understanding Spectre and MeltDown Vulnerabilities – Part 1
In this blog series, we will go through one of the biggest security vulnerabilities of recent times i.e. Spectre and Meltdown. This article is mostly centered around understanding the concepts which will be necessary for then understanding the internals of these two vulnerabilities.
Exploring Code Generation with Janino
In this blog post, we are going to talk about potential advantages of using custom execution plan of a query rather than using the traditional iterator model in which execution is composed of many operators.
JIT Optimizations – Method Inlining
In this blog post, we are going to understand the impact of functions calls in an application and what JIT does to reduce its impact.
JIT Optimizations – Method Compilations
JIT ( Just in Time ) is certainly one of the most interesting features of JVM. This feature makes sure that we are able to run our code with machine level optimizations.
Java Unsafe APIs
Java Unsafe APIs provides various low-level APIs which could be used by programmers but we should be very careful when to use these APIs. These APIs provide a way to access off heap memory in java.
Thought Paper – What if we combine compression with encryption ??
This thought paper tries to reason about how can we combine encryption and compression in a single operation and get away with traditional way of first compressing and then encrypting the compressed data to create the final encrypted and compressed data.
Understanding Linux Internals for Data Transfer – Part 3
In this blog post our main goal is to understand the differences with downloading data from S3 with and without using AWS-SDK.
Understanding Linux Internals for Data Transfer – Part 2
In this blog post our main goal is to understand the differences with downloading data from S3 with and without using AWS-SDK.