Concurrency control

Safe semantics

Safe semantics is a computer hardware consistency model. It describes one type of guarantee that a data register provides when it is shared by several processors in a parallel computer or in a network of computers working together. (Wikipedia).

Safe semantics
Video thumbnail

Internet Safety

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist The Internet

Video thumbnail

Internet Safety: Your Browser's Security Features

In this video, you’ll learn more about your browser's security features. Visit https://www.gcflearnfree.org/internetsafety/your-browsers-security-features/1/ for our text-based lesson. This video includes information on: • Using browser security to check web addresses and identify securit

From playlist Internet Tips

Video thumbnail

Does it really matter what browser I choose?

You have a choice of browsers to select from. What makes a browser more - or less - secure? Learn some ways to assess a browser's security.

From playlist Internet Safety

Video thumbnail

Why you should actually read the URL & be careful with free Wi-Fi

What does that “HTTPS” in a URL mean? Why should you consider what Wi-Fi you’re using?

From playlist Internet Safety

Video thumbnail

Facebook: Understanding Privacy

In this video, you’ll learn more about how Facebook privacy works. Visit https://www.gcflearnfree.org/facebook101/understanding-facebook-privacy/1/ for our text-based lesson. This video includes information on: • Understanding basic privacy settings • Sharing and privacy • Facebook privac

From playlist Internet Safety

Video thumbnail

How to stay safe online shopping

Online shopping involves sharing credit card or other private financial information. Learn how to choose secure websites to ensure that your information stays safe!

From playlist Internet Safety

Video thumbnail

Is It Better to Be Polite or Frank?

We live in an age that thinks highly of frankness and directness. But there are – nevertheless – a few reasons why politeness remains a hugely important quality. If you like our films, take a look at our shop (we ship worldwide): https://goo.gl/hMBQQs FURTHER READING “For most of hu

From playlist RELATIONSHIPS

Video thumbnail

GoGaRuCo 2013 - Thread Safety First by Emily Stolfo

Concurrency in Ruby is hard and our thread-unsafe code often works by accident. We are not used to thinking about concurrency because of the GVL but there are different implementations of Ruby with their own semantics that can unearth concurrency bugs. We have to get more accustomed to wri

From playlist GoGaRuCo 2013

Video thumbnail

27c3: Code deobfuscation by optimization (en)

Speaker: Branko Spasojevic Optimization algorithms present an effective way for removing most obfuscations that are used today. Much of the compiler theory can be applied in removing obfuscations and building fast and reliable deobfuscation systems. By understanding traditional optimizati

From playlist 27C3: We come in peace

Video thumbnail

Sandboxing Ruby: The Good, the Bad, and the Fugly by Eric Allam

You might never find the need to sandbox ruby, but trying to sandbox ruby is fun. We get to dive deep into the internals of Ruby and learn all the ways running ruby code securely can fail. We'll walk through some different approaches and how they can be broken: - REGEX to the Rescue - Thre

From playlist Ruby Conference 2011

Video thumbnail

Introduction to Dense Text Representations - Part 1

Dense Text Representation are a powerful tool for many NLP applications including clustering and semantic search. Content Part 1: - Definition of Dense Text Representation - Definition Semantic Similar - Applications: Clustering, Search, Bitext-Mining, Multi-modal search, Zero- & Few-Shot

From playlist Introduction to Dense Text Representation

Video thumbnail

RailsConf 2019 - Cleaning house with RSpec Rails 4 by Sam Phippen

RailsConf 2019 - Cleaning house with RSpec Rails 4 by Sam Phippen _______________________________________________________________________________________________ Cloud 66 - Pain Free Rails Deployments Cloud 66 for Rails acts like your in-house DevOps team to build, deploy and maintain yo

From playlist RailsConf 2019

Video thumbnail

27c3: Defense is not dead (en)

Speaker: Andreas Bogk Why we will have more secure computers - tomorrow The security model of our current computer architectures - kernel in ring 0, processes in ring 3 - goes back to the early 70s. However, science hasn't stopped. This talk is going to look into the state of the art in

From playlist 27C3: We come in peace

Video thumbnail

CERIAS Security: Attribute-Based Access Control 2/6

Clip 2/6 Speaker: William Winsborough · George Mason University Basing authorization on attributes of the resource requester provides flexibility and scalability that is essential in the context of large distributed systems. Logic programming provides an convenient, expressive, and we

From playlist The CERIAS Security Seminars 2004

Video thumbnail

Foundations - Seminar 1B

Will Troiani continues to introduce first order languages, interpretations and theories. You can join this seminar from anywhere, on any device, at https://www.metauni.org. This video was filmed in Deprecation (https://www.roblox.com/games/8164849103/Deprecation) on 7/1/22. This is a re-

From playlist Foundations seminar

Video thumbnail

RustConf 2021 - Move Constructors: Is it Possible? by Miguel Young de la Sota

Move Constructors: Is it Possible? by Miguel Young de la Sota A "self-referential" type is one that holds a reference into itself; async Futures are the most common self-referential types in Rust today. However, they can't be moved without invalidating the reference, so they're pinned on

From playlist RustConf 2021

Video thumbnail

How To Protect Your Online Privacy With A Threat Model | Tutorial 2022

Privacy tutorial with a threat model methodology. This will help you achieve strong privacy consistently and reliably. Support independent research: https://www.patreon.com/thehatedone Privacy tools are inconsistent. The inventory of recommended countermeasures changes all the time. On t

From playlist Security by compartmentalization - learn to protect your privacy effectively

Related pages

Regular semantics | Byzantine fault | Synchronous circuit | Consistency model | Atomic semantics