article thumbnail

What is RASP? Why runtime application self-protection is important, and how to do it right

Dynatrace

In 2012, Gartner coined the term RASP to characterize this approach, which brings the security perimeter right to the application itself. With RASP technology, you can distinguish between genuine information requests and malicious attacks. It can control application execution as well as detect and block real-time attacks.

Tuning 223
article thumbnail

Updating Rasmussen’s Triangle for a Modern World

J. Paul Reed

Sidney Dekker coined that term in his 2012 book Just Culture : A system creates all kinds of opportunities for action. Beyond these opportunities and constraints, we could argue that there remains a discretionary space, a space that can only be filled by an individual care-giving or technology-operating human.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to collect Prometheus metrics in Dynatrace

Dynatrace

Since its launch in 2012, Prometheus has become the standard technology to collect metrics in a Kubernetes cluster. Most software technologies currently on the market are exposing observability metrics related to their product (CI/CD, network appliances, databases). How to collect Prometheus metrics.

Metrics 200
article thumbnail

Two Sessions: C++ Concurrency and Parallelism – 2012 State of the Art (and Standard)

Sutter's Mill

I’m going to put them together especially and only for C++ and Beyond 2012 , and I’ll be giving them nowhere else this year: C++ Concurrency – 2012 State of the Art (and Standard). C++ Parallelism – 2012 State of the Art (and Standard). I hope to see many of you at C&B 2012. And there’s a lot to tell. I can’t wait.

C++ 40
article thumbnail

It’s time to migrate from NAM to Dynatrace

Dynatrace

Application availability and performance measured using network probe technology. Technology developments come in waves. In parallel, network technology developments ensured that centralized mass-sniffing was no longer feasible because of the costs. Technology waves are inevitable. ” The AppMon wave.

Network 166
article thumbnail

USENIX LISA2021 Computing Performance: On the Horizon

Brendan Gregg

It's an exciting time for developments in computer performance, not just for the BPF technology (which I often [write about]) but also for processors with 3D stacking and cloud vendor CPUs (e.g.,

article thumbnail

Rising Tide Rents and Robber Baron Rents

O'Reilly

The answer can be found in the theory of economic rents, and in particular, in the kinds of rents that are collected by companies during different stages of the technology business cycle. Then the cycle begins again with a new class of competitors, who are forced to explore new, disruptive technologies that reset the entire market.