Concurrency control

Software lockout

In multiprocessor computer systems, software lockout is the issue of performance degradation due to the idle wait times spent by the CPUs in kernel-level critical sections. Software lockout is the major cause of scalability degradation in a multiprocessor system, posing a limit on the maximum useful number of processors. To mitigate the phenomenon, the kernel must be designed to have its critical sections as short as possible, therefore decomposing each data structure in smaller substructures. (Wikipedia).

Video thumbnail

Open Source vs. Closed Source Software

In this video, you’ll learn more about the differences between open-source software and closed-source software. Visit https://edu.gcfglobal.org/en/basic-computer-skills/ for more technology, software, and computer tips. We hope you enjoy!

From playlist Technology Trends

Video thumbnail

Protect Your Computer from Malware | Federal Trade Commission

Malware is short for "malicious software." It includes viruses and spyware that get installed on your computer or mobile device without your consent. These programs can cause your device to crash and can be used to monitor and control your online activity. Learn more about how to avoid, d

From playlist Recommended videos

Video thumbnail

Timeboxing for Programmers

Everyone who has ever programmed has gotten stuck on a problem. I used to try my best to solve it myself because I'm too stubborn to ask for help. I want to figure it out myself. However, this isn't the best way to go about things. When working on my own projects, I should turn to Stack Ov

From playlist Software Engineering

Video thumbnail

The GAS Gets Away

Here are the URLs for today's 5 GAS (Genuinely Approachable Sudoku) puzzles: GAS 431 – Killer! By clover https://tinyurl.com/4v4e3t6f https://f-puzzles.com/?id=2qbf6s6z Normal sudoku rules apply. Digits in cages cannot repeat and must sum to the total given. GAS 432 – Lockout Lines by Sam

From playlist All the GAS - Genuinely Approachable Sudokus

Video thumbnail

Jumping Jack Flash, It's a Gas, gas, GAS

Here are the URLs for today's five Genuinely Approachable Sudoku (GAS) puzzles: GAS 201 – Thermwhich by Clover: https://tinyurl.com/3xxaw4fe Normal sudoku rules apply. Digits along a thermometer must strictly increase, starting from the round bulb. A value outside of the grid is a sandwic

From playlist All the GAS - Genuinely Approachable Sudokus

Video thumbnail

Intro to Reverse Engineering

Security is always a concern as our products ship, especially in today's world of cracking attempts. But, what enables the crackers to be able to break into systems? Oftentimes, the answer is that they reverse engineer your product. In this tutorial, we will examine the techniques used by

From playlist Software Development

Video thumbnail

A Gassive Attack

This video has been reloaded - with the obstructive advert amended! Here's where you can find today's five GAS (Genuinely Approachable Sudoku) puzzles: GAS 281 – 22/7 Gas Edition by Philip: https://tinyurl.com/ync59rbs Normal sudoku rules apply. And that’s it! GAS 282 – Quadruples by Sam:

From playlist All the GAS - Genuinely Approachable Sudokus

Video thumbnail

Computer Basics: Protecting Your Computer

There are many different online threats that you need to be aware of. In this video, we're going to show you some of these threats and talk about how to protect the files and personal data that you have stored on your computer. We hope you enjoy! For more info, check out our written less

From playlist Starting out with Technology

Video thumbnail

Software’s Role In The Fight Against Climate Change

Climate Change is the most important problem of our age. Whatever it takes to alleviate the worst of the problems that we are causing to our climate, it is going to be on a very broad front, so how can software help? So how does software affect climate change? What would "green software en

From playlist Software Engineering

Video thumbnail

Azure Interview Questions & Answers | Azure QnA | Azure Training | Edureka | Azure Rewind - 3

🔥Azure Certification: https://www.edureka.co/microsoft-certified-azure-solution-architect-certification-training This Edureka Azure Tutorial will give you a gist of the kind of questions that you may face in your interviews on Microsoft Azure. The concepts explained here are essential for

From playlist Edureka Live Classes 2020

Video thumbnail

We Need Your Advice!

Today's sudoku is a tour de force from zetamath called Cacophony. And there's even a given digit so it shouldn't be too difficult, should it?! Give it a try at the following link: https://app.crackingthecryptic.com/sudoku/j7H9pphNm7 Rules: Normal sudoku rules apply. Along a thermomet

From playlist zetamath puzzles!

Video thumbnail

The Computer Chronicles - UNIX (1985)

Special thanks to archive.org for hosting these episodes. Downloads of all these episodes and more can be found at: http://archive.org/details/computerchronicles

From playlist The Computer Chronicles 1985 Episodes

Video thumbnail

Firmware Security: Why It Matters and How You Can Have It

A system is only as secure as the least secure component it depends on. Hardening the kernel is a vital part of developing a secure operating system, but if the firmware underneath the kernel is insecure then attackers have an opportunity to sidestep your security and compromise you anyway

From playlist Security

Video thumbnail

NOTACON 7: "Thinking Outside the Mushroom Kingdom": Homebrew VS Piracy in Video Games

Speaker: Sidepocket The hot subject in today's gamer media is the increasing threat of piracy. Companies losing millions of dollars each year has forced the industry to put a choke hold on anyone who does anything with their systems outside of the norm. What the industry is unaware of is

From playlist Notacon 7

Video thumbnail

CERIAS Security: The dark side of software engineering and how to defend against it 5/5

Clip 5/5 Speaker: Cassio Goldschmidt If you create an application that runs on one or more computers connected to a network such as the internet, your code will be attacked. Consequences of compromised systems often include loss of trust, reputation and revenue. Software will always hav

From playlist The CERIAS Security Seminars 2009

Video thumbnail

Super Famicom on the SNES? Nakitek Game Saver+ Review

I ended up with a few Super Famicom games, but only have a US-release SNES to play them on. Let's take a look at a product that lets you get around Nintendo's region lockout! ----------------------------------------­------------------------------------- Please consider supporting my work

From playlist Tech Reviews

Video thumbnail

Source Boston 2010: Making Penetration Testing Mainstream 5/7

Clip 5/7 Speaker: HD Moore, Metasploit/Rapid7 For more information and presentation slides click here: http://bit.ly/8XJ1tm

From playlist SOURCE Boston 2010

Video thumbnail

What Are Reactive Systems?

Reactive Systems use a high-performance software architecture. They are resilient under stress, and their reactive design allows them to scale elastically to meet demand. The reactive design approach allows the creation of more complex, more flexible systems and forms the basis for some of

From playlist Software Engineering

Video thumbnail

Cybersecurity Tutorial | Cyber Security Training for Beginners | Edureka | Cyber Security Live - 1

🔥Edureka Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training This Edureka video on "Cyber Security Tutorial" gives an introduction to the Cyber Security world and talks about its basic concepts. You get to know different kinds of attacks in today's IT world

From playlist Edureka Live Classes 2020

Related pages

Critical section | Communication channel | Lock (computer science) | Serializability | Scalability | Amdahl's law | Scheduling (computing)