Remove Code Remove Exercise Remove Network Remove Systems
article thumbnail

Understanding, detecting and localizing partial failures in large system software

The Morning Paper

Understanding, detecting and localizing partial failures in large system software , Lou et al., Partial failures ( gray failures ) occur when some but not all of the functionalities of a system are broken. Here are the key findings: Partial failures appear throughout the release history of each system, 54% within the last three years.

Systems 98
article thumbnail

Seamlessly Swapping the API backend of the Netflix Android app

The Netflix TechBlog

On the Android team, while most of our time is spent working on the app, we are also responsible for maintaining this backend that our app communicates with, and its orchestration code. Image taken from a previously published blog post As you can see, our code was just a part (#2 in the diagram) of this monolithic service.

Latency 233
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system

The Morning Paper

50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system Reardon et al., Side-channels are typically an unintentional consequence of a complicated system. Each app was then executed on a physical mobile phone equipped with a custom OS and network monitor. USENIX Security Symposium 2019.

Systems 74
article thumbnail

How to Assess MySQL Performance

HammerDB

Instead, focus on understanding what the workloads exercise to help us determine how to best use them to aid our performance assessment. Therefore, before we attempt to measure our database performance, we should know the system or cloud instance to be tested in detail. Operating System: Ubuntu 22.04

article thumbnail

Fallacy #5: Topology doesn't change

Particular Software

Decommissioning Public102 was an exercise in the mundane, gradually transitioning tiny service after tiny service to new homes over the course of weeks, as the development schedule allowed. Unfortunately, the network operations had a cruel surprise for us. You create a new server with the same software and add it to the load balancer.

article thumbnail

BPF Theremin, Tetris, and Typewriters

Brendan Gregg

In the video I explained how I arrived at tracing __iwl_dbg() in this way, and how you can follow a similar approach for tracing unfamiliar code. This is not my best code, since I hacked it in a hurry, but here it is: #!/usr/bin/python usr/bin/python # # iwlstrength.py iwl wifi stregth as audio # For Linux, uses BCC, eBPF.

C++ 52
article thumbnail

BPF Theremin, Tetris, and Typewriters

Brendan Gregg

In the video I explained how I arrived at tracing __iwl_dbg() in this way, and how you can follow a similar approach for tracing unfamiliar code. This is not my best code, since I hacked it in a hurry, but here it is: #!/usr/bin/python usr/bin/python # # iwlstrength.py iwl wifi stregth as audio # For Linux, uses BCC, eBPF.

C++ 52