Bounding data races in space and time – part II
Bounding data races in space and time Dolan et al., PLDI’18
Yesterday we looked at the case for memory models supporting local data-race-freedom (local DRF). In today’s post we’ll push deeper into the paper and look at a memory model which does just that.
Consider a memory store which maps locations to values. For non-atomic locations it’s not enough just to store a single memory value at the location. Instead non-atomic locations are mapped to histories H, where a history is a finite map from timestamps to values, and timestamps are totally ordered.
Every thread has a frontier, F, which is a map from non-atomic locations to timestamps.
Intuitively, each thread’s frontier records, for each nonatomic location, the latest write known to the thread. More recent writes may have occurred, but are not guaranteed to be visible.
For atomic locations, the memory store records a pair (F,x), with a single data value x rather than a history. F is a frontier, which will be merged with the frontiers of threads that operate on the location. This is expressed in the rules READ-AT and WRITE-AT in the operational semantics below. The READ-AT rule, for example, should be Continue reading
Extreme had predicted the Brocade assets would generate over $230 million in annual revenue and that the Avaya assets would generate a minimum of $200 million in revenue in fiscal 2018.
Fortinet bragged today that it was the only vendor with security capabilities to receive an SD-WAN recommended rating in the first NSS Labs software-defined wide area networking test report.
The platform will be integrated into VMware's Telco NFV portfolio. This will add automated service assurance capabilities to support virtual network function deployments.
On the sidelines at Black Hat, a Microsoft exec said the Tech Accord is an example of how the company works with other technology vendors to advance security.
Cisco Senior Vice President Christine Heckart has left the company. The marketing executive hailed from Brocade.
The project is an open source monitoring tool, which is now seen as table stakes for cloud native and container deployments.
There are many reasons to deploy a network virtualization overlay. But the biggest advantage to an NV overlay is that it can extend the capabilities of legacy networks.