In today’s world of multicore computing, it’s important to make sure that your multithreaded applications scale. A longstanding approach for making the most of multiple processors is to arrange for different resources to be protected by different synchronization objects, or locks. A drawback of this approach is that a bug in your threading model can lead to a deadlock.
Related Posts
Never forget that as soon as any information is published on a public website, it doesn’t actually belong to you anymore
Avira Survey Finds Computer Users Don’t Feel Safe on Social Media Sites “This survey was very interesting because it demonstrated that even though social media sites are very popular among the general population, computer users from all over the world have the same concerns,” said Sorin Mustaca, data security expert at Avira.“They are wary of […]
Share this:
- Click to share on LinkedIn (Opens in new window) LinkedIn
- Click to share on Facebook (Opens in new window) Facebook
- Click to share on Telegram (Opens in new window) Telegram
- Click to share on X (Opens in new window) X
- Click to share on Threads (Opens in new window) Threads
- Click to share on Mastodon (Opens in new window) Mastodon
- Click to share on Bluesky (Opens in new window) Bluesky
- More
The wrong way of being in the news
“70 Romanian Phishers & Fraudsters Arrested On March 4th, FBI Director Robert Mueller was given a speech on Cybercrime to the RSA conference where he mentioned that: And we have worked with the Romanian National Police to arrest more than 100 Romanian nationals in the past 18 months. Four years ago, several American companies threatened […]
Share this:
- Click to share on LinkedIn (Opens in new window) LinkedIn
- Click to share on Facebook (Opens in new window) Facebook
- Click to share on Telegram (Opens in new window) Telegram
- Click to share on X (Opens in new window) X
- Click to share on Threads (Opens in new window) Threads
- Click to share on Mastodon (Opens in new window) Mastodon
- Click to share on Bluesky (Opens in new window) Bluesky
- More
Products of big security companies flagged as deceptors by Appesteem
Appesteem maintains the Deceptor list, a list of programs who do not respect their requirements. The deceptor list contains most of the time emergent products who want to make $$$ very fast by using some gray-area techniques. I personally have never seen a product of any established company in this list. To my surprize, […]
Share this:
- Click to share on LinkedIn (Opens in new window) LinkedIn
- Click to share on Facebook (Opens in new window) Facebook
- Click to share on Telegram (Opens in new window) Telegram
- Click to share on X (Opens in new window) X
- Click to share on Threads (Opens in new window) Threads
- Click to share on Mastodon (Opens in new window) Mastodon
- Click to share on Bluesky (Opens in new window) Bluesky
- More
You must be logged in to post a comment.