article thumbnail

Bending pause times to your will with Generational ZGC

The Netflix TechBlog

If you’re interested in how we use Java at Netflix, Paul Bakker’s talk How Netflix Really Uses Java , is a great place to start. In fact, we’ve found for our services and architecture that there is no such trade off. Reference processing is also only performed in major collections with ZGC.

Latency 228
article thumbnail

Dynatrace strengthens container security across popular cloud-based registries

Dynatrace

Cloud-native CI/CD pipelines and build processes often expose Kubernetes to attack vectors via internet-sourced container images. Incorporating signed Dynatrace containers into your pipeline To enhance security in CI/CD processes, Dynatrace customers can integrate verified Dynatrace container images into their deployment pipelines.

Cloud 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

RSA guide 2024: AI and security are top concerns for organizations in every industry

Dynatrace

Additionally, blind spots in cloud architecture are making it increasingly difficult for organizations to balance application performance with a robust security posture. Whether multicloud or hybrid , public or private, cloud-native architecture offers flexibility and agility to help organizations deliver software faster.

article thumbnail

Legacy Architecture Modernisation With Strategic Domain-Driven Design

Strategic Tech

Most organisations go through an architecture modernisation effort at some point as their systems drift into a state of intolerable maintenance costs and they diverge too far from modern technological advances. High-level Process Sections Conceptually, there are three major sections to a modernisation process.

article thumbnail

Kubernetes in the wild report 2023

Dynatrace

Java, Go, and Node.js Redis is an in-memory key-value store and cache that simplifies processing, storage, and interaction with data in Kubernetes environments. Specifically, they provide asynchronous communications within microservices architectures and high-throughput distributed systems. Java, Go, and Node.js

article thumbnail

The anatomy of the Spring4Shell vulnerability and how to prevent its effects—and those of similar vulnerabilities

Dynatrace

Because 60% of developers use Spring for their Java applications , many applications are potentially affected. Spring is a widely used open source Java-based framework for building web applications with the Java Enterprise Edition platform. Further, the report lists Tomcat as the most popular Java application server.

Java 215
article thumbnail

Log auditing and log forensics benefit from converging observability and security data

Dynatrace

It requires an understanding of cloud architecture and distributed systems, with the goal of automating processes. Cloud infrastructure and applications scale dynamically, which generates a large volume of logs at high This can make it challenging to process, store, and analyze them in real time. Time and resources.

Analytics 184