Beyond Wall-TimePerformance optimisation of a software system revolve around the wall-time of its the execution. Although this is an essential metric, it…Dec 10Dec 10
Forensic Analysis of Convolutional Neural Networks (CNNs)Deep neural networks are infamously known as the “black box” due to their opaque decision-making. However this is quite the opposite when…Dec 10Dec 10
Loop Optimizations IIIf you’re a game developer, operating system developer, system-architecture IT professional, real-time system designer, or just a hobbyist…Aug 4, 2023Aug 4, 2023
Loop Optimizations IIf you’re a game developer, operating system developer, system-architecture IT professional, real-time system designer or just a hobbyist…Aug 3, 2023Aug 3, 2023
Implementing Polymorphism (behind the scenes)Despite the general opinion it is not a Dr.Strange kind of magic. As a matter of fact it’s quite simple and clever way of exploiting the…Sep 26, 2022Sep 26, 2022
Coding Hardware and Hardware Description LanguagesIn our daily life, we use programming languages to structure a program that’s going to be executed by a hardware. Did you know it’s also…Apr 19, 2022Apr 19, 2022
Spring Boot Auto Configuration(The Magic explained #theory)Spring boot is taught under the umbrella of titles of “fast programming” and “auto configuration”. If you check the definition of spring…Dec 9, 20211Dec 9, 20211
DockerFiles in a NutshellDockerFiles are used to build images and any image that runs on a computer is called container. Thus you may deduce that DockerFile is just…Oct 19, 2021Oct 19, 2021
Essences of The Container TechnologyBefore diving into The Docker and any other “container” technologies it is essential for us to understand the demand for that technology…Oct 8, 2021Oct 8, 2021
How To Write A Simple In Memory Cache In JavaGreetings folks! This time, i would like to write about something that very simple yet quite crucial for an applications performance…Aug 8, 20212Aug 8, 20212