Split your metadata from your files, and suddenly your sluggish document system becomes fast, scalable and surprisingly cheap to run.
Abstract: To investigate side-channel vulnerabilities in the microarchitecture of multicore processors and develop effective protection strategies, we analyze the primitives of the transient attack ...