article thumbnail

Hyperlambda is twice as fast as Entity Framework

DZone

Of course, the Java version was built using Java's best practices at the time, while the.Net version was almost in its entirety implementing 100% of its business logic in stored procedures. When we do benchmarks, it's important that we measure best practices, and typical usage.

article thumbnail

Sustainable IT: Optimize your hybrid-cloud carbon footprint

Dynatrace

A structured approach Reducing carbon emissions involves a combination of technology, practice, and planning. Evaluating these on three levels—data center, host, and application architecture (plus code)—is helpful. Of course, you need to balance these opportunities with the business goals of the applications served by these hosts.

Cloud 218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

T-SQL bugs, pitfalls, and best practices – window functions

SQL Performance

This article is the fourth installment in a series about T-SQL bugs, pitfalls and best practices. The focus of this month's article is bugs, pitfalls and best practices related to window functions. At any rate, make sure to remember the best practice here! DROP TABLE IF EXISTS dbo. Transactions. (

article thumbnail

Build custom workflow actions using the Dynatrace App Toolkit

Dynatrace

IDE or text editor of your choice (VS Code recommended) Now, consider your use case! Prerequisites Before you begin, please make sure you have the following: Access to a Dynatrace environment (for example [link] environment-id.apps.dynatrace.com ) where you can install and access Dynatrace® Apps and run Workflows.

article thumbnail

What is application security monitoring?

Dynatrace

Identification The identification stage of application security monitoring involves discovering and pinpointing potential security weaknesses within an application’s code, configuration, or design. If a vulnerability remains undetected, the compromised code can allow attackers access to data they’re not authorized to have.

article thumbnail

MongoDB Performance Resources

Alex Podelko

Then, of course, great online free courses (these two are for MongoDB 3.6 – not covering the latest features; updated versions should be released soon): M201 MongoDB Performance course. M312 Diagnostic and Debugging course. (I There are many great blog posts: Performance Best Practices 7-parts series.

article thumbnail

T-SQL bugs, pitfalls, and best practices – subqueries

SQL Performance

This article is the second in a series about T-SQL bugs, pitfalls and best practices. Run the following code to create a helper function called GetNums, and to create and populate the Customers and Orders tables: SET NOCOUNT ON ; USE tempdb ; GO. However, the code uses custid in both the outer and inner queries.