Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 7 years ago.
Improve this question
I am a new user of C# (for work), coming from C++ development. I'm used to knowing more or less how data is laid out, and how many levels of pointer indirection there are, as these things can be very important for performance.
I know I'm supposed to just relax and have a good time hammering out business software and not think about these details on the clock, but is there good documentation for this for C# somewhere?
I know there is compilation to IR, and then JIT to native code, so I guess I am asking about how C# source relates to the native x86-64 code.
Related
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 3 years ago.
Improve this question
If I had a confuserex application with the most amount of obfuscation added (max preset) how would I deobfuscate it?
It is orders of magnitude easier to obfuscate something, the to de-obfuscate it. This question has a high likelyhood of having nefarious intent. And any practical help would just result in future obfuscation being way more agressive. A scenario worse for performance, debugging and reliability of hte obfuscated software.
About the only theoretical way I could think off, would having something like Visual Studioes/.NET JiT level code optimisation. They are capable of swapping out constructst for totally different, quicker ones. A optimsaition for speed. This would be a optimisation towards readability. But even that will not be able to recover names obfuscated with some placeholder name. But I do not want to think this any further.
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 7 years ago.
Improve this question
Someone can explain how Collections.Concurrent library are work ?
How we get the thread-safe ?
Is their performance are good ?
You can inspect the concurrent collections implementation by yourself here (this is for ConcurrentDictionary<TKey,TValue>, other collections you can find using the left navigation pane) and get the exact picture of how they work.
The implementation depends on the collection type. It uses volatile, SpinWait, Interlocked and lock.
More information about performance is available in this paper.
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 8 years ago.
Improve this question
I am near release date for my Excel Add-In and I want to have only one limitation hardcoded in the code. My aim is for people to download and use the tool for free but have a limitation that potentially encourages them to buy the unlimited version. I know that there isn't a truly secure way to add that limitation but I was wondering what is the best way of achieving it. The limitation is simply a hardcoded value that I store in the Properties section of my app. Any ideas how I can make it a bit more secure?
Closed. This question needs details or clarity. It is not currently accepting answers.
Want to improve this question? Add details and clarify the problem by editing this post.
Closed 8 years ago.
Improve this question
Wondering if I can create a heater/ coin miner combo that only turns on when the heater in my house is also on.
Is that possible? What are the limitations of this type of concept?
The best thing is to leave the fan blowing, while you don't need the temparature in the processor, but in the room. Therefore the fan needs to blow it into your room. Not to say that your processor needs cooling in order to maintain a reasonable life time.
As an collatoral benèfit the fans consumes power, and thus generates also (a little) heat.
Closed. This question is opinion-based. It is not currently accepting answers.
Want to improve this question? Update the question so it can be answered with facts and citations by editing this post.
Closed 6 years ago.
Improve this question
I want to know the scope of the sufficient impact of the RUP methodology. i know it would be so efficient in on IS Systems such as MIS and HIS and so on but when you want to design and develop a system such as Control Monitoring System, is it be so sufficient as good as IS system. I mean when most challenges on such systems would be technical not rational, relational and informational that RUP is focussed on, is that be still so efficient as well. and if isn't, what methodologies you suggest instead of that?
The defence industry often uses some variant of MIL-STD-498 or its successor IEEE 12207. These are more technically oriented than RUP and less concerned with, well, selling consultants for Rational quite frankly.