article thumbnail

Getting ready! Part 2: A taste of what’s to come in the “Release Better Software Faster” track at Perform 2020

Dynatrace

A taste of what’s to come at Perform 2020’s “Release Better Software Faster” track – we highlighted what you can expect to learn about best practices for sessions 1 – 4 at Perform 2020. They’ll cover scenarios where run-book automation is a fit, and where application architecture supporting “self-healing” is a fit.

DevOps 103
article thumbnail

Keeping Netflix Reliable Using Prioritized Load Shedding

The Netflix TechBlog

How viewers are able to watch their favorite show on Netflix while the infrastructure self-recovers from a system failure By Manuel Correa , Arthur Gonigberg , and Daniel West Getting stuck in traffic is one of the most frustrating experiences for drivers around the world. Logs and background requests are examples of this type of traffic.

Traffic 252
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Core Web Vitals for Search Engine Optimisation: What Do We Need to Know?

CSS Wizardry

Google’s Core Web Vitals initiative was launched in May of 2020 and, since then, its role in Search has morphed and evolved as roll-outs have been made and feedback has been received. All Core Web Vitals data used to rank you is taken from actual Chrome-based traffic to your site.

article thumbnail

Achieving observability in async workflows

The Netflix TechBlog

Managing and operating asynchronous workflows can be difficult without the proper tools and architecture that puts observability, debugging, and tracing at the forefront. Prodicle Distribution Our service is required to be elastic and handle bursty traffic. Written by Colby Callahan , Megha Manohara , and Mike Azar. Things got hairy.

Traffic 160
article thumbnail

What is web application security? Everything you need to know.

Dynatrace

Their “ State of Open Source Security Report, 2020 ” found that the most common vulnerabilities are cross-site scripting vulnerabilities (18%), followed by malicious packages (13%). Especially as software development continually evolves using microservices, containerized architecture, distributed multicloud platforms, and open-source code.

article thumbnail

Front-End Performance Checklist 2020 [PDF, Apple Pages, MS Word]

Smashing Magazine

Front-End Performance Checklist 2020 [PDF, Apple Pages, MS Word]. Front-End Performance Checklist 2020 [PDF, Apple Pages, MS Word]. 2020-01-06T10:30:13+00:00. 2020-01-06T12:35:48+00:00. New metrics landing in Lighthouse v6 in early 2020. Vitaly Friedman. Web performance is a tricky beast, isn’t it? Large view.

article thumbnail

DBLog: A Generic Change-Data-Capture Framework

The Netflix TechBlog

Nonetheless, we found a number of limitations that could not satisfy our requirements e.g. stalling the processing of log events until a dump is complete, missing ability to trigger dumps on demand, or implementations that block write traffic by using table locks. Blocking write traffic by locking tables. DBLog High Level Architecture.

Database 197