days
0
-62
-8
hours
0
-3
minutes
-3
-8
seconds
-5
-4
search

Christos Kotselidis

Christos Kotselidis
Christos Kotselidis is an Assistant Professor at The University of Manchester and a Senior Architect at KTM Innovation. He is currently leading the TornadoVM and MaxineVM projects as part of the EU funded projects E2Data an ACTiCLOUD. His work focuses on chip design, embedded systems, micro-architecture, hw/sw co-designed CPUs and VMs, Compilers, Virtual Machines and Garbage Collection. In the past he worked as a Principal Member of Technical Staff at Oracle Labs and as a Senior Research Scientist at Intel Labs.

All Posts by this author

Answering key ML questions

What is Data Annotation and how is it used in Machine Learning?

What is data annotation? And how is data annotation applied in ML? In this article, we are delving deep to answer these key questions. Data annotation is valuable to ML and has contributed immensely to some of the cutting-edge technologies we enjoy today. Data annotators, or the invisible workers in the ML workforce, are needed more now than ever before.

Interview with Jonas Bonér, CEO and Founder of Lightbend

“Akka Serverless is really the first of its kind”

We chatted with Jonas Bonér, CEO and Founder of Lightbend about Akka Serverless and what makes it so different from other architectures. Jonas explains how data is kept secure in Akka Serverless and what limitations it removes with its data-centric backend application architecture.

Exploring Kubernetes native object storage

Kubernetes-Managed Object Storage for the Win

Kubernetes is incredibly valuable for DevOps and IT teams because it treats infrastructure as code, delivering full scale automation to both stateful and stateless components of the software stack. If you only use Kubernetes for the applications, you are only tapping a fractional amount of the value. Let’s explore this a little deeper.

Creating Artificial General Intelligence

Developing AGI: Where We Are and What the Future Holds

#AI

How do you create Artificial General Intelligence (AGI)? No one precisely knows. If we wait for a complete understanding with robust mathematical models of AGI, we may never get started. Given that, a more experimental and iterative development approach is in order.

Simulate, diagnose, and solve

Chaos Engineering – Stackoverflow Error

This article is part of a tutorial series by Ram Lakshmanan, in which you will learn how to simulate various performance problems. You will learn how to simulate a StackOverflow error, find out how to diagnose it, and most importantly, how to solve the problem.

Great code is documented code

4 reasons to invest in knowledge sharing and documentation

As tedious as it may be, though, knowledge sharing and documentation should be a basic part of the software development cycle. Doing so takes time, but it’s worth it. Why is it so important to have strong knowledge sharing and documentation of code? This article will example four key reasons.

How Scriptless Testing Works

An introduction to scriptless testing

Scriptless testing offers some immediate benefits to three common testing roles in most organisations: business testers, developers and test engineers. Once scriptless is introduced among these three groups, organisations can achieve up to 85 to 90 per cent test automation coverage on each and every regression cycle.

Profile: Jennifer Pankratz, Storywriter, Gamedesigner and PR worker at Piranha Bytes

Women in Tech: “Every change needs pioneers, tolerance, and time”

Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Jennifer Pankratz, Storywriter, Gamedesigner and PR worker at Piranha Bytes.

Interview with Kevin Bocek, Venafi

“The impact of poor machine identity management can be devastating”

Kevin Bocek discussed security with us, including the impact of a successful software supply chain attack, what security best practices we should all follow, and the difference between human and machine identity. Kevin shares his knowledge from over 16 years of experience in IT security.

Achieving high-level security

Enhance your secrets management strategy with Puppet + HashiCorp Vault

Securing sensitive data (called “secrets”) — such as passwords, machine credentials, and API keys — is not always simple to manage manually, especially at an enterprise scale. This article explores the importance of secrets management, and how Puppet and HashiCorp Vault adds an extra layer of protection as you continue to build out your cybersecurity strategy.