Adrian Colyer

@adriancolyer

Author: , Venture Partner with Accel Partners, London after many years as CTO for SpringSource and then apps at VMware, Pivotal

Romsey, England
Joined March 2009

Tweets

You blocked @adriancolyer

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @adriancolyer

  1. Jun 9

    Pesky intermittent bugs in your Node.js app? Here's what might be causing them & how Node.fz can help you find them.

  2. Retweeted
    Jun 8

    Happy to have discovered a few weeks ago (). Really enjoyable. Thanks, .

  3. Retweeted
    Jun 9

    Today, I discovered my node module cinovo-logger-file mentioned in a paper presented by morning paper

  4. Retweeted
    Jun 7

    I wrote a blog post on BA failure: “An Imaginary Apology Letter From Your Airline CEO”: Thx for your advice, all!

  5. Jun 9

    Analysing the causes of concurrency bugs in Node.js, and flushing them out with Node.fz:

  6. Jun 9

    "Node.fz: fuzzing the server-side event-driven architecture" Davis et al., 2017

  7. Jun 8

    Congratulations to on their series B: great team with a great product and a great vision.

  8. Jun 8

    Addressing previously overlooked categories of synchronization performance issues w. SyncPerf can lead to big gains!

  9. Jun 8

    The five categories of synchronization performance bugs, how you can fix them, and how SyncPerf helps you find them:

  10. Jun 8

    "SyncPerf: Categorizing, detecting, and diagnosing synchronization performance bugs" Alam et al. 17

  11. Jun 7

    Design trade-offs when using RDMA, and a client-polling based solution that gets the best out of them.

  12. Jun 7

    Sometimes RDMA RPCs are better, other times 1-sided RDMA calls. The RFP mechanism gives the best of both worlds:

  13. Jun 7

    "RFP: When RPC is faster than server-bypass with RDMA" Su et al., EuroSys'17

  14. Retweeted
    Jun 6

    Using Spring Boot? At Atomist we'd love to learn about your process and share our ideas about automation.

  15. Jun 6

    SGX enclaves still need protection from memory safety attacks, SGXBounds to the rescue!

  16. Jun 6

    All that hardware protection, and SGX still leaves you vulnerable to memory safety attacks! SGXBounds to the rescue:

  17. Jun 6

    "SGXBounds: memory safety for shielded execution" Kuvaiskii et al. EuroSys'17

  18. Jun 5
  19. Jun 5

    Combining Byzantine Fault Tolerance with an Intel SGX-based trusted subsystem for 1 million operations/sectond:

  20. Jun 5

    "Hybrids on steroids: SGX-based high-performance BFT" Behl et al., EuroSys'17

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·