A higher order estimate of the optimum checkpoint interval for restart dumps

A higher order estimate of the optimum checkpoint interval for restart dumps - Daly 2004 TL;DR: if you know how long it takes your system to create a checkpoint/snapshot (δ), and you know the expected mean-time between failures (M), then set the checkpoint interval to be √(2δM) - δ. OK, I grant that today's paper … Continue reading A higher order estimate of the optimum checkpoint interval for restart dumps

Applying the Universal Scalability Law to organisations

How to Quantify Scalability: The Universal Scalability Law (USL) - Gunther Update: corrected sign in USL equation - many thanks to Rob Fielding for pointing out the error. TL;DR: The Universal Scalability Law, Little's Law, and Kingman's Formula can tell you a lot about the behaviour of your systems, and also your organisation. From these … Continue reading Applying the Universal Scalability Law to organisations

Asynchronized Concurrency: The Secret to Scaling Concurrent Search Data Structures

Asynchronized Concurrency: The Secret to Scaling Concurrent Search Data Structures - David et al. 2015 Linked Lists, Hash Tables, Skip Lists, Binary Search Trees... these data structures are core to many programs. This paper studies such search data structures, supporting search, insert, and remove operations. In particular, the authors look at concurrent versions of these … Continue reading Asynchronized Concurrency: The Secret to Scaling Concurrent Search Data Structures

Sirius: An open end-to-end voice and vision personal assistant and its implications for future warehouse scale computers

Sirius: An Open end-to-end Voice and Vision Personal Assistant and its Implications for Future Warehouse Scale Computers - Hauswald et al. 2015 Welcome back to The Morning Paper! I hope you managed to catch-up on same of your backlog over the last two weeks since normal service is resumed as of today. To kick things … Continue reading Sirius: An open end-to-end voice and vision personal assistant and its implications for future warehouse scale computers

Information-Flow Analysis of Android Applications in DroidSafe

Information-Flow Analysis of Android Applications in DroidSafe - Gordon et al. 2015 This is the first of three papers we'll be looking at this week from the NDSS'15 conference that took place earlier this month. DroidSafe is a tool that looks for potential leaks of sensitive information in Android applications. And it works incredibly well! … Continue reading Information-Flow Analysis of Android Applications in DroidSafe