You are here |
projectf.io | ||
| | | |
coredumped.dev
|
|
| | | | In this post, we are going to take a deep dive into pointer tagging, where metadata is encoded into a word-sized pointer. Doing so allows us to keep a compact representation that can be passed around in machine registers. This is very common in implementing dynamic programming languages, but can really be used anywhere that additional runtime information is needed about a pointer. We will look at a handful of different ways these pointers can be encoded and see how the compiler can optimize them for diff... | |
| | | |
blog.maxgio.me
|
|
| | | | Profiling the CPU allows us to analyze the program's performance, identify bottlenecks, and optimize its efficiency. Have you ever wondered what happens behind the scenes when you run a program and how to account for CPU time for the actual program functions? And even more, how to write such a tool to profile the program? Even though great open-source projects provide continuous profiling with vast support for compiled, JITed, and interpreted, languages, with or without debug info, with or without frame ... | |
| | | |
www.c64os.com
|
|
| | | | ||
| | | |
blog.adnansiddiqi.me
|
|
| | Image Source What Is Application Security? Application security is the practice of protecting computer systems and applications from threats and vulnerabilities. This includes measures to prevent unauthorized access, modification, use, destruction, disruption, or disclosure of an application or its data Application security is important because applications are often the primary targets of cyber attacks. Hackers |