Skip navigation
Help

P

warning: Creating default object from empty value in /var/www/vhosts/sayforward.com/subdomains/recorder/httpdocs/modules/taxonomy/taxonomy.pages.inc on line 33.

Awesome paper on how particular synchronization mechanisms scale on multi-core architectures: Everything You Always Wanted to Know About Synchronization but Were Afraid to Ask.

The goal is to pick a locking approach that doesn't degrade as the number of cores increase. Like everything else in life, that doesn't appear to be generically possible:

None of the nine locking schemes we consider consistently outperforms any other one, on all target architectures or workloads. Strictly speaking, to seek optimality, a lock algorithm should thus be selected based on the hardware platform and the expected workload

Abstract:

This paper presents the most exhaustive study of synchronization to date. We span multiple layers, from hardware cache-coherence protocols up to high-level concurrent software. We do so on different types architectures, from single-socket – uniform and nonuniform – to multi-socket – directory and broadcastbased – many-cores. We draw a set of observations that, roughly speaking, imply that scalability of synchronization is mainly a property of the hardware.

Some Findings:

0
Your rating: None
Original author: 
John Walker

As much as E3 can generate that sad feeling in your socks, it’s important to remember that our world of gaming is FAR bigger and more interesting than that awful corporate circlejerk. And what better example to land before my eyes than Sarah Crossman’s Master Reboot. From concept to art style to the wonderful trailer, it’s a breath of fresh, creepy air. Created with the desire to explore the concept of life after death in the form of saved, explorable memories, this is a first-person “psychological puzzle adventure”, and it looks splendid.

(more…)

0
Your rating: None
Original author: 
(author unknown)

Sugar Pie DeSanto - Go Go Power

Album: The Complete Chess Singles 1961 - 1966

(via aburinho:)

0
Your rating: None

New submitter kju writes "The security blog of Verizon has the story of an investigation into unauthorized VPN access from China which led to unexpected findings. Investigators found invoices from a Chinese contractor who had actually done the work of the employee, who spent the day watching cat videos and visiting eBay and Facebook. The man had Fedexed his RSA token to the contractor and paid only about 1/5th of his income for the contracting service. Because he provided clean code on time, he was noted in his performance reviews to be the best programmer in the building. According to the article, the man had similar scams running with other companies."

Share on Google+

Read more of this story at Slashdot.

0
Your rating: None

dead space 3 screen 725x454

The Dead Space series is fundamentally about jump scares: the monster that bursts out of the wall or impales your favorite character, the hallucination that disappears when you turn your head. So it's supremely fitting that Dead Space 3's Kinect controls will respond to your reflexive swearing. In an interview with CVG, executive producer Steve Papoutsis says that certain voice commands will take advantage of the common reactions to horror games. "There are commands where you might be in a certain situation," he says, "and you might yell a specific expletive and it might behave in a way that you want it to." People will "need to figure out" those commands, but given the typical speed with which "secrets" travel these days, they'll...

Continue reading…

0
Your rating: None