In this blog, we are going to understand how can we easily build fault tolerant stateful services with kafka. Kafka provides us with concept of partitions which can be used for syncing writes among different replicas making sure that primary and replicas are in almost same state.
In this blog post, we are going to talk about spectre vulnerability and how does this vulnerability affect current systems all around the globe. As already discussed in previous blog posts, the processor uses speculative execution along with branch predictor to speculatively execute instructions for better utilization of CPU cycles.
One of the core security features of the modern operating system is to provide isolation between the different processes running on a system and make sure that one process should not be able to see the data used by another process.
In this blog series, we will go through one of the biggest security vulnerabilities of recent times i.e. Spectre and Meltdown. This article is mostly centered around understanding the concepts which will be necessary for then understanding the internals of these two vulnerabilities.
In this blog post, we are going to talk about potential advantages of using custom execution plan of a query rather than using the traditional iterator model in which execution is composed of many operators.
In this blog post, we are going to understand the impact of functions calls in an application and what JIT does to reduce its impact.
JIT ( Just in Time ) is certainly one of the most interesting features of JVM. This feature makes sure that we are able to run our code with machine level optimizations.
Java Unsafe APIs provides various low-level APIs which could be used by programmers but we should be very careful when to use these APIs. These APIs provide a way to access off heap memory in java.
This thought paper tries to reason about how can we combine encryption and compression in a single operation and get away with traditional way of first compressing and then encrypting the compressed data to create the final encrypted and compressed data.
In this blog post our main goal is to understand the differences with downloading data from S3 with and without using AWS-SDK.