aarti guptainsoftware under the hoodUnder the hood system calls : Debugging, INT, SIGTRAPEver wondered how debuggers work?? Gdb, strace, …etc…Here is more about them and why you should not use them in production facing systems!Dec 24, 2018Dec 24, 2018
aarti guptaJava 8 completable futures : cheat sheetBasic methods: supports the traditional future api and you can checkDec 24, 2018Dec 24, 2018
aarti guptainsoftware under the hoodUnder the hood memory: Know your memory(and caches!)Random Access Memory(RAM)Feb 8, 20181Feb 8, 20181
aarti guptainsoftware under the hoodUnder the hood CPU Utilization, CPI and Load AveragesWhat really is CPU Utilization?Feb 8, 2018Feb 8, 2018
aarti guptainsoftware under the hoodUnder the hood OS: Demand Paging, Page Faults and Working SetLinux is an on demand memory system. The malloc() call immediately returns virtual memory, which is only promoted to real memory later when…Feb 6, 2018Feb 6, 2018
aarti guptainsoftware under the hoodUnder the hood attacks: Spectre and Meltdowntaken with permission of the author from https://twitter.com/gsuberland/status/948907452786933762 as this is the best explanation I have…Jan 5, 2018Jan 5, 2018
aarti guptainsoftware under the hoodUnder the hood definitions: Memory model and memory barriersWhat is a memory modelJan 3, 2018Jan 3, 2018
aarti guptainsoftware under the hoodUnder the hood JVM: SafepointsA safepoint is a range of execution where the state of the executing thread is well described. Safepoints are a common JVM implementation…Dec 31, 2017Dec 31, 2017