Remove Google Remove Network Remove Open Source Remove Presentation
article thumbnail

Is MongoDB Open Source? Is Planet Earth Flat?

Percona

We’re equally convinced on both counts, but in this blog article, we’re focusing on why MongoDB is not open source. Let’s start with this: MongoDB is accurately referred to as source-available software. To be clear, we are rock-solid in our stance that MongoDB is not open source.

article thumbnail

What is cloud application security?

Dynatrace

If your app runs in a public cloud, such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP), the provider secures the infrastructure, while you’re responsible for security measures within applications and configurations. However, open source software is often a vector for security vulnerabilities.

Cloud 182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

10 open-source Kubernetes tools for highly effective SRE and Ops Teams

Abhishek Tiwari

Here we present a list of 10 open-source Kubernetes tools to make your SRE and Ops teams more effective to achieve their service level objectives. Some of the interesting features included in Cabin, Seamless support for Google Kubernetes Engine (GKE). Kube-ops-view. You can scale deployments with a finger scroll.

article thumbnail

Compression Methods in MongoDB: Snappy vs. Zstd

Percona

In this blog, we will discuss both data and network-level compression offered in MongoDB. We will discuss snappy and zstd for data block and zstd compression in a network. When this data block is read, it decompresses it in memory and presents it to the incoming request. Snappy is a compression library developed by Google.

Storage 105
article thumbnail

What is Log4Shell? The Log4Shell vulnerability explained (and what to do about it)

Dynatrace

The vulnerability was first reported to the Apache Foundation (an open-source project) on November 24 by security researcher Chen Zhaojun of Alibaba, China’s largest e-commerce company, after an attack was documented on December 9 and affected servers of the game Minecraft. When was the vulnerability in the Log4j 2 library discovered?

Internet 262
article thumbnail

Protect your organization against zero-day vulnerabilities

Dynatrace

A zero-day vulnerability can become endemic when it’s present in a system for an extended amount of time and is more complex to protect against. half of all corporate networks. Operation Aurora was a series of cyberattacks in 2009 that specifically targeted major enterprises, including Google, Adobe Systems, Yahoo, and more.

Java 192
article thumbnail

What is Kubernetes?

Dynatrace

Although Kubernetes simplifies application development while increasing resource utilization, it is a complex system that presents its own challenges. What challenges does it present, and how can you overcome them? Who manages the networking aspects? Kubernetes forged by the rise of Google. But what is Kubernetes exactly?