Trending Articles

article thumbnail

Navigating the Divide: Distinctions Between Time Series Data and Relational Data

DZone

I have coded many applications, both client and web, over my career, and I understand the importance of building a well-developed application from the ground up. Therefore, I found it important to write a piece based on my understanding of time series data versus relational data as someone with a unique understanding of both. Relational Data The main objective of relational data is to maintain an accurate representation of the current state of the world with respect to its objects and the relati

Database 302
article thumbnail

Dynatrace SaaS release notes version 1.267

Dynatrace

We have released Dynatrace version 1.267. To learn what’s new, have a look at the release notes. The post Dynatrace SaaS release notes version 1.267 appeared first on Dynatrace news.

202
202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Handle Secrets in Kubernetes

DZone

Kubernetes has become the de facto standard for container orchestration, enabling organizations to build, deploy, and scale modern applications with efficiency and agility. As more organizations adopt Kubernetes, the need for proper security and management of sensitive data within these environments becomes paramount. One crucial aspect of ensuring a secure Kubernetes infrastructure is the effective management of secrets, such as API keys, passwords, and tokens.

article thumbnail

The path to achieving unprecedented productivity and software innovation through ChatGPT and other generative AI

Dynatrace

With the launch of ChatGPT, an AI chatbot developed by OpenAI, in November 2022, large language models (LLMs) and generative AI have become a global sensation, making their way to the top of boardroom agendas and household discussions worldwide. GPT (generative pre-trained transformer) technology and the LLM-based AI systems that drive it have huge implications and potential advantages for many tasks, from improving customer service to increasing employee productivity.

Software 244
article thumbnail

Debugging a FUSE deadlock in the Linux kernel

The Netflix TechBlog

Tycho Andersen The Compute team at Netflix is charged with managing all AWS and containerized workloads at Netflix, including autoscaling, deployment of containers, issue remediation, etc. As part of this team, I work on fixing strange things that users report. This particular issue involved a custom internal FUSE filesystem : ndrive. It had been festering for some time, but needed someone to sit down and look at it in anger.

Code 229
article thumbnail

Understanding Linux IOWait

Percona

I have seen many Linux Performance engineers looking at the “IOWait” portion of CPU usage as something to indicate whenever the system is I/O-bound. In this blog post, I will explain why this approach is unreliable and what better indicators you can use. Let’s start by running a little experiment – generating heavy I/O usage on the system: sysbench --threads=8 --time=0 --max-requests=0 fileio --file-num=1 --file-total-size=10G --file-io-mode=sync --file-extra-flags=direct

Cache 143
article thumbnail

Article: Magic Pocket: Dropbox’s Exabyte-Scale Blob Storage System

InfoQ

A horizontally scalable exabyte-scale blob storage system which operates out of multiple regions, Magic Pocket is used to store all of Dropbox’s data. Adopting SMR technology and erasure codes, the system has extremely high durability guarantees but is cheaper than operating in the cloud.

Storage 124

More Trending

article thumbnail

Log forensics: Finding malicious activity in multicloud environments with Dynatrace Grail

Dynatrace

Log forensics—investigating security incidents based on log data—has become more challenging as organizations adopt cloud-native technologies. Organizations are increasingly turning to these cloud environments to stay competitive, remain agile, and grow. But as organizations rely more on cloud environments, data and complexity have proliferated. Teams struggle to maintain control of and gain visibility into all the applications, microservices and data dependencies these environments generate.

Metrics 231
article thumbnail

ABAC on SpiceDB: Enabling Netflix’s Complex Identity Types

The Netflix TechBlog

By Chris Wolfe , Joey Schorr , and Victor Roldán Betancort Introduction The authorization team at Netflix recently sponsored work to add Attribute Based Access Control (ABAC) support to AuthZed’s open source Google Zanzibar inspired authorization system, SpiceDB. Netflix required attribute support in SpiceDB to support core Netflix application identity constructs.

Cache 199
article thumbnail

Proof of Concept: Horizontal Write Scaling for MySQL With Kubernetes Operator

Percona

Historically MySQL is great in horizontal READ scale. The scaling, in that case, is offered by the different number of Replica nodes, no matter if using standard asynchronous replication or synchronous replication. However, those solutions do not offer the same level of scaling for writes operation. Why? Because the solutions still rely on writing in one single node that works as Primary.

Database 117
article thumbnail

Using anti-requirements to find system boundaries

Particular Software

We all love building greenfield projects. 1 But inevitably, starting a new project involves lots of meetings with business stakeholders to hash out initial requirements and canonical data models. Those are…not so fun. When one of those meetings occurs after a carb-heavy lunch, it’s easy for your mind to drift away…back to those university lectures about entity design.

Systems 98
article thumbnail

Dynatrace delivers flexible and scalable Kubernetes native synthetic private locations

Dynatrace

Many organizations today are utilizing Kubernetes to orchestrate their containers’ deployment, scaling, and management. The benefits of this approach include faster deployment, easier and more effective management, cost reduction, and more. Because it’s critical that operations teams ensure that all internal resources are available for their users, synthetic monitoring of those resources is important.

article thumbnail

Easy Way to Start Contributing to Open Source With PMM Documentation

Percona Community

If you are a user of Percona Monitoring and Management and noticed any typo or inaccurate information in its documentation, you can easily correct it yourself in the repository following detailed instructions in README.md. But if you are not experienced in open source contributions, you may still feel uneasy about following those steps. This post is for you!

article thumbnail

MySQL Connection Security With Connection Control Plugins

Percona

As a database administrator, have you ever been in a situation when your database confronted a brute force attack? A brute force attack can be launched against a user account in MySQL. MySQL replies with success or error based on supplied credentials, and the time required for the verification is almost the same in either case. Hence, an attacker can launch a brute force attack against a MySQL user account at a rapid rate and can try many different passwords.

Servers 99
article thumbnail

Farewell FID. and hello Interaction to Next Paint!

Speed Curve

Today at Google I/O 2023, it was announced that Interaction to Next Paint (INP) is no longer an experimental metric. INP will replace First Input Delay (FID) as a Core Web Vital in March of 2024. It's been three years since the Core Web Vitals initiative was kicked off in May 2020. In that time, we've seen people's interest in performance dramatically increase, especially in the world of SEO.

Metrics 96
article thumbnail

Mastering Time Series Analysis: Techniques, Models, and Strategies

DZone

Time series analysis is a specialized branch of statistics that involves the study of ordered, often temporal data. Its applications span a multitude of fields, including finance, economics, ecology, neuroscience, and physics. Given the temporal dependency of the data, traditional validation techniques such as K-fold cross-validation cannot be applied, thereby necessitating unique methodologies for model training and validation.

Strategy 300
article thumbnail

Pause AI?

O'Reilly

It’s hard to ignore the discussion around the Open Letter arguing for a pause in the development of advanced AI systems. Are they dangerous? Will they destroy humanity? Will they condemn all but a few of us to boring, impoverished lives? If these are indeed the dangers we face, pausing AI development for six months is certainly a weak and ineffective preventive.

article thumbnail

How To Start Logical Replication in PostgreSQL for Specific Tables Based on a pg_dump

Percona

In simpler terms, logical replication in PostgreSQL is a way to copy data from one database to another in a more flexible and customizable manner compared to physical replication. Instead of copying the entire database, logical replication focuses on replicating changes made to individual rows or transactions. To set up logical replication, you create a publication on the source database and a subscription on the target database.

Servers 103
article thumbnail

?My Experience at Kubecon Europe in Amsterdam

Percona Community

Kubecon is the most significant event focused on the Kubernetes ecosystem. It takes place once a year in North America, Europe, and Asia. It is a perfect opportunity to learn from experts, meet friends, grow your network, and attend talks at a varied technical level and meetings focused on CNCF communities. This time I attended Kubecon in Amsterdam.

Network 59
article thumbnail

Microservices Decoded: Unraveling the Benefits, Challenges, and Best Practices for APIs

DZone

In today's fast-paced software development landscape, microservices have emerged as a popular architectural pattern. But what exactly are microservices? In a nutshell, microservices are a way of structuring an application as a collection of loosely coupled, fine-grained services that communicate through lightweight protocols. This architectural style enables teams to develop and deploy services independently, offering flexibility and scalability to the software development process.

article thumbnail

Dynatrace adds monitoring support for Microsoft Azure Kubernetes Service deployments using Azure Linux container host

Dynatrace

Dynatrace is proud to provide deep monitoring support for Azure Linux as a container host operating system (OS) platform for Azure Kubernetes Services (AKS) to enable customers to operate efficiently and innovate faster. This integration is a result of our collaboration with Microsoft to better serve our Azure customers across the Microsoft portfolio.

Azure 202
article thumbnail

Optimizing HDFS with DataNode Local Cache for High-Density HDD Adoption

Uber Engineering

This blog post unveils the seamless, exabyte-scale integration of local SSD disks into the Hadoop Distributed File System (HDFS), enabling the utilization of high-density disk SKUs to optimize disk IO and achieving exceptional performance.

Cache 52
article thumbnail

Backup and Restore with MyDumper on Docker

Percona

At the end of 2021, I pushed the first Docker image to hub.docker.com. This was the first official image and since then, we have been improving our testing and packaging procedures based on Docker, CircleCI, and GitHub Actions. However, when I’m coding, I’m not testing in Docker. But a couple of weeks ago, when I was reviewing an issue, I realized some interesting Docker use cases that I want to share.

C++ 99
article thumbnail

Blunders To Avoid While Choosing On-Demand App Development Firm

Tech News Gather

Choosing the right on-demand app development firm is a critical decision that can significantly impact the success of your business. With the increasing demand for on-demand services, it has become crucial to have a reliable and efficient app that meets the needs of your customers. However, many businesses make blunders during the selection process, which can lead to costly mistakes and unsatisfactory results.

article thumbnail

VPN Architecture for Internal Networks

DZone

In today's hyperconnected digital landscape, secure internal networks have become a cornerstone of corporate infrastructure. This crucial aspect of operations is often bolstered by robust VPN technologies, such as OpenVPN. As a leading solution in the realm of VPN , OpenVPN's architecture plays a critical role in enhancing corporate network security and connectivity.

article thumbnail

DevOps monitoring tools: How to drive DevOps efficiency

Dynatrace

With the world’s increased reliance on digital services and the organizational pressure on IT teams to innovate faster, the need for DevOps monitoring tools has grown exponentially. In fact, the Dynatrace 2023 CIO Report found that 78% of respondents deploy software updates every 12 hours or less. 54% reported deploying updates every two hours or less.

DevOps 221
article thumbnail

Software Testing: What Generative AI Can—and Can't—Do

TechBeacon Testing

Is ChatGPT coming to take automation engineers' jobs? The short answer is "maybe, but probably not.

Testing 73
article thumbnail

Restoring a Snapshot of a Sharded MongoDB Cluster to a Kubernetes-Based MongoDB Environment

Percona

Many MongoDB clusters use storage-level snapshots to provide fast and reliable backups. In this blog post, you’ll learn how to restore such a snapshot from a traditional VM-based sharded MongoDB cluster to a freshly deployed Percona Operator for MongoDB cluster on Kubernetes. Background story I recently worked with a company running a large four-shard MongoDB Enterprise Server database cluster on VMs on premises that decided to migrate to the Google Cloud Platform.

Servers 101
article thumbnail

Increase your system's observability with OpenTelemetry support in NServiceBus

Particular Software

When code breaks, our first move is carefully inspecting the call stack. It helps us find the needle in the haystack by understanding how, where, and why the failure occurred, including how we got there. However, in a message-based system, we no longer have a single call stack. We’ve exchanged it for a haystack of call stacks , which makes finding the needle (the root cause of the failure) even more difficult. ?

Systems 52
article thumbnail

Docker Swarm vs. Kubernetes: Who Wins the Container War?

DZone

As organizations increasingly adopt containerization for their applications, container orchestration platforms have become essential tools for managing and scaling containerized workloads. Two of the most popular container orchestration platforms today are Docker Swarm and Kubernetes. While both platforms share some similarities, they differ in architecture, scalability, high availability, container management, and learning curve.

article thumbnail

Davis AI: Your personal interactive troubleshooting assistant 

Dynatrace

With the introduction of Davis ® root-cause detection , Dynatrace reduced the amount of single-alert spam that arises when large-scale incidences occur. Instead of immediately firing off an alert for all raw events, the Davis root-cause engine follows each violating service’s causal relationships. By automatically following the causal direction of the topology between services and their underlying infrastructure, Davis collects all raw events that belong to the same root cause and then not

DevOps 187
article thumbnail

How to Hire an Effective QA Team for your Software Project?

Kovair

In the dynamic world of software development, the key to success lies in the hands of an exceptional Quality Assurance (QA) team. As you embark.

article thumbnail

MongoDB 4.2 EOL… And Its Implications

Percona

Enjoy it while it lasts, as everything has its end. Maricon454688973982390893280398289038302380283’2233’832’23 , CC BY-SA 4.0 , via Wikimedia Commons It sounded a bit more cryptic than it was planned, but I hope that it gets the attention it needs, as it’s important to know that MongoDB 4.2 in April has reached its End of Life (EOL), and more versions are soon going to be decommissioned as well.

Servers 84
article thumbnail

Cybersecurity Incident Simulation @ Uber

Uber Engineering

We stand for safety and our approach to cybersecurity incident simulations is just one of the ways that we work to protect our riders, earners, eaters, and employees.

52
article thumbnail

What Is Istio Service Mesh?

DZone

Most organizations prefer to deploy containerized applications into K8s because of its scalability and flexibility. But as the number of microservices increased and application pods are distributed across multiple clusters and cloud providers, managing and scaling them has become complex. While scaling, it is harder to configure complex communication logic between microservices.

article thumbnail

Dynatrace supports nonprofit A Girl Like Me Inc. for National Volunteer Week

Dynatrace

In recognition of National Volunteer Week, which ran from April 16th – 22nd, 2023, Dynaspace for Women (DFW), the women-focused employee resource group at Dynatrace, hosted its inaugural group volunteer event with nonprofit A Girl Like Me Inc. DFW partnered with the founder of A Girl Like Me Inc., Tyra Moore, to build care kits for new moms in the Detroit area.

Education 192
article thumbnail

Why You Can’t Retrofit Real-Time Decisioning

VoltDB

The post Why You Can’t Retrofit Real-Time Decisioning appeared first on Volt Active Data.

52