Remove Benchmarking Remove Conference Remove Hardware Remove Programming
article thumbnail

CheriABI: enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment

The Morning Paper

Last week we saw the benefits of rethinking memory and pointer models at the hardware level when it came to object storage and compression ( Zippads ). The protections are hardware implemented and cannot be forged in software. At hardware reset the boot code is granted maximally permissive architectural capabilities.

C++ 61
article thumbnail

What Adrian Did Next?—?Part 2?—?Sun Microsystems

Adrian Cockcroft

I became the Sun UK local specialist in performance and hardware, and as Sun transitioned from a desktop workstation company to sell high end multiprocessor servers I was helping customers find and fix scalability problems. We had specializations in hardware, operating systems, databases, graphics, etc.

Tuning 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Speed of Time

Brendan Gregg

Was there some other program consuming CPU, like a misbehaving Ubuntu service that wasn't in CentOS? As a Xen guest, this profile was gathered using perf(1) and the kernel's software cpu-clock soft interrupts, not the hardware NMI. CLI tools The Cassandra systems were EC2 virtual machine (Xen) instances. But I'm not completely sure.

Speed 126
article thumbnail

The Speed of Time

Brendan Gregg

Was there some other program consuming CPU, like a misbehaving Ubuntu service that wasn't in CentOS? As a Xen guest, this profile was gathered using perf(1) and the kernel's software cpu-clock soft interrupts, not the hardware NMI. CLI tools The Cassandra systems were EC2 virtual machine (Xen) instances.

Speed 52
article thumbnail

The Speed of Time

Brendan Gregg

Was there some other program consuming CPU, like a misbehaving Ubuntu service that wasn't in CentOS? As a Xen guest, this profile was gathered using perf(1) and the kernel's software cpu-clock soft interrupts, not the hardware NMI. CLI tools The Cassandra systems were EC2 virtual machine (Xen) instances. But I'm not completely sure.

Speed 40
article thumbnail

A peculiar throughput limitation on Intel’s Xeon Phi x200 (Knights Landing)

John McCalpin

Dr. Damon McDougall gave a short presentation on this study at the IXPUG 2018 Fall Conference ( pdf ) — I originally wrote these notes to help organize my thoughts as we were preparing the IXPUG presentation, and later decided that the extra details contained here are interesting enough for me to post it. cmpl $1000000000, %eax.

Latency 40