recentpopularlog in

ianweatherhogg : jvm   286

« earlier  
First Steps with Rust and JNI · daschl writes. sometimes.
This post explains how to call into Rust code from Java (JNI) - simple but just enough to get you started.
java  jni  jvm  rust  c  ffi 
february 2018 by ianweatherhogg
JVM memory model - Coding Geek
I’ll present the heap, the stack, the constant pool and more. Those memory areas are designed to store the data used by a program or by the JVM itself.
jvm  memory  model 
september 2017 by ianweatherhogg
Solr Distributed Search and the Stale Check
Analysis of Solr’s distributed search and how the Apache HTTP client stale check affects it.
dtrace  jvm  java  solr 
august 2017 by ianweatherhogg
Performance Testing · real-logic/Aeron Wiki
Aeron - Efficient reliable UDP unicast, UDP multicast, and IPC message transport
java  jvm  flag  configuration  benchmark  profiling  4* 
november 2016 by ianweatherhogg
Ethan's Tech Blog | Which is faster, string interpolation or addition in python?
Ever wonder if string addition is faster than interpolation? Or if it's the other way around? In this post I show you just how to find out for yourself, and of course, which is faster
string  performance  byte  code  python  c  lowlevel  algorithm  onotation  jvm  java  comparison  4* 
may 2016 by ianweatherhogg
Java Garbage Collection 101 – Polyglot Programmer's Blog
Do you have an interview tomorrow and want to refresh your knowledge on garbage collection? Or maybe you are new to this topic and just want to start somewhere? Either way, this is a place for you. In this post, I will go from fundamentals to the practical implementations and will introduce you to several GC buzzwords.
jvm  java  memory  model  garbagecollection 
february 2016 by ianweatherhogg
Garbage Collection Bootcamp 1.0 - DZone Performance

Table Of Contents
What is Garbage CollectionTuning Garbage CollectionThe Garbage CollectorsChoosing a Collector

What is Garbage...
java  jvm  flag  garbagecollection 
january 2016 by ianweatherhogg
Effective Cryptography in the JVM - Terse Systems
Cryptography is hard. But it doesn’t have to be. Most cryptographic errors are in construction, in the joints of putting together well known …
java  jvm  cryptography  security 
january 2016 by ianweatherhogg
Closing the Open Door of Java Object Serialization - Terse Systems
TL;DR This is a long blog post, so please read carefully and all the way through before you come up with objections as to why it’s not so …
security  java  jvm  serialization 
january 2016 by ianweatherhogg
The Right Way to Use SecureRandom - Terse Systems
How do you generate a secure random number in JDK 1.8? It depends. The default: 1
2
3
SecureRandom random = new SecureRandom();
byte[] values = new …
java  jvm  security  random  number 
january 2016 by ianweatherhogg
An Easy Way to Secure Java Applications - Terse Systems
One of the things that stands out in the Java Serialization exploit is that once a server side Java application is compromised, the next step is to …
java  jvm  security  manager  play  scala 
january 2016 by ianweatherhogg
Self-Protecting Sandbox using SecurityManager - Terse Systems
TL:DR; Most sandbox mechanisms involving Java’s SecurityManager do not contain mechanisms to prevent the SecurityManager itself from being …
java  jvm  security  manager  scala  play 
january 2016 by ianweatherhogg
Scala Debugger
API and tooling for the JVM using Scala.
scala  debug  lowlevel  api  java  interface  jvm  flag 
december 2015 by ianweatherhogg
How to Detect Java Memory Leaks | Toptal
While Java’s garbage collector does its best, even the most experienced programmers fall prey to memory leaks. Learn why they occur—and how to fix them.
java  memory  leak  model  garbagecollection  jvm  remote  connection  host  5*  visual  vm 
september 2015 by ianweatherhogg
coderplay/perfj
perfj - PerfJ is a wrapper of linux perf for java programs.
github  java  performance  jvm  optimization  flag 
june 2015 by ianweatherhogg
Blog Archive - Terse Systems
Blog Archive 2014 Exposing Akka Actor State with JMX
Aug 19 2014 posted in akka, jmx, scala Composing Dependent Futures
Jul 10 2014 posted in scala …
blogs  java  jvm  ssl  certificate  play  scala  jmx  akka  cluster  sbt  plugin  future  5* 
march 2015 by ianweatherhogg
Exposing Akka Actor State with JMX - Terse Systems
I’ve published an activator template of how to integrate JMX into your Akka Actors. Using this method, you can look inside a running Akka …
scala  akka  jvm  jmx  helloworld  4* 
march 2015 by ianweatherhogg
Fixing Hostname Verification - Terse Systems
This is the fourth in a series of posts about setting up Play WS as a TLS client for a “secure by default” setup and configuration …
play  scala  java  jvm  security  ssl  certificate  4* 
march 2015 by ianweatherhogg
Stock Price Prediction With Big Data and Machine Learning - Eugene Zhulenev
Apache Spark and Spark MLLib for building price movement prediction model from order log data. The code for this application app can be found on …
spark  trading  data  stream  processing  order  book  finance  statistics  machine  learn  5*  jvm  flag  performance  optimization 
november 2014 by ianweatherhogg
In the future could Scala compile into different bytecodes? : scala
It looks like Apple's new Swift has some similarities to Scala - no semicolons, support for some Functional programming, worksheets, lambda expression...
reddit  scala  javascript  byte  code  jvm  java  node  module 
june 2014 by ianweatherhogg
A Case Study of JVM HotSpot Flags | Java.net
Java.net is the source for Java Technology Collaboration.
jvm  flag  4* 
january 2014 by ianweatherhogg
« earlier      
per page:    204080120160

Copy this bookmark:





to read