Eleanor McHugh discusses writing virtual machines using hardware emulation, including code snippets in Go and C.
Cliff Click takes a look at Java vs C performance. He discusses both languages' strong and weak points and the programming context surrounding language choices.
Daniel Pezely discusses the 10 fold performance increase of a Lisp and C system after rewriting it in Erlang, outlining where issues existed before and the design and implementation of the new system.
Elena Laskavaia explains how to write a simple C/C++ checker to find errors in code with Code Analysis Framework (codan) and the AST introspection APIs of the CDT.
Gil Tene introduces org.ObjectLayout, a new Java package designed specifically to enable JVMs to optimize memory layout for arrays and objects matching the performance of arrays of structs in C.
Robert Martin argues that Clojure is a replacement for C with its simple syntax and minimal semantics.
Wesley Chow presents Chartbeat's real-time analytics platform and how able to handle the requests in a cost efficient manner using a custom written analytics engine in C and Lua.
Martin Thompson focuses on the evolution of Java in contrast with C/C++, covering the cultural challenges of performance limits and how to collaborate with industry experts and organize teams.
Roger Orr solves a problem with different levels of complexity trying to answer what the complexity notation actually means and why it is important in practice.
Hosted by Erik Meijer, who runs the Cloud Programmability Team at Microsoft, the panelists answer questions on C/C++ and Java performance, contrasting the virtues of native vs. managed code.
Clayton Bauman introduces Babel, an open source language implemented in C, targeted for cloud computing. Other features: interpreted, untyped stack-based, postfix, supports arrays, lists and hashes.
Olve Maudal details machine code generated by snippets of both legal and illegal C code, discussing it in the context of ISO/IEC 9899 standard (the C standard).
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR
Increase security on compromised platforms with Intel® SGX.
An Intel technology for application developers who are seeking to protect select code and data from disclosure or modification.
A Developer’s Perspective.
Developers have long been constrained by the security capabilities that major platform providers have exposed for application development. How Bromium and wolfSSL employ Intel® SGX to create more secure, next-generation solutions.
Learn more about the Intel SGX SDK, a collection of APIs, libraries, documentation, sample source code, and tools that allows software developers to create and debug Intel SGX enabled applications in C/C++.
Protect Application Code, Data, & Secrets from Attack.
Developers can partition their application into CPU hardened “enclaves” or protected areas of execution that increase security even on compromised platforms.
Intel Software Guard Extensions (SGX) for Dummies.
At its root, Intel® SGX is a set of new CPU instructions that can be used by applications to set aside private regions of code and data.