Remove Best Practices Remove Database Remove eBook Remove Infrastructure
article thumbnail

Vulnerability assessment: key to protecting applications and infrastructure

Dynatrace

Protecting IT infrastructure, applications, and data requires that you understand security weaknesses attackers can exploit. Examples of such weaknesses are errors in application code, misconfigured network devices, and overly permissive access controls in a database. Dynatrace news. Analyze findings.

article thumbnail

Sustainable IT: Optimize your hybrid-cloud carbon footprint

Dynatrace

This is a rather simple move as it doesn’t directly impact your infrastructure, just your contract with your electricity provider. Reduce the volume of data volumes requested from databases (for example, request all, filter in memory). The complication with this approach is that your energy bill will likely increase.

Cloud 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is cloud migration?

Dynatrace

We’ll answer that question and explore cloud migration benefits and best practices for how to go through your migration smoothly. Generally speaking, cloud migration involves moving from on-premises infrastructure to cloud-based services. But what does it take to migrate your existing applications to the cloud?

Cloud 163
article thumbnail

MySQL Performance Tuning 101: Key Tips to Improve MySQL Database Performance

Percona

MySQL performance tuning offers several significant advantages for effective database management and optimization. Enhanced Database Efficiency By adjusting configuration settings, you can markedly enhance the overall efficiency of your MySQL database. Experiencing database performance issues?

Tuning 52
article thumbnail

What is cloud monitoring? How to improve your full-stack visibility

Dynatrace

With more organizations taking the multicloud plunge, monitoring cloud infrastructure is critical to ensure all components of the cloud computing stack are available, high-performing, and secure. Cloud monitoring is a set of solutions and practices used to observe, measure, analyze, and manage the health of cloud-based IT infrastructure.

Cloud 220
article thumbnail

From Proprietary to Open Source: The Complete Guide to Database Migration

Percona

Migrating a proprietary database to open source is a major decision that can significantly affect your organization. Today, we’ll be taking a deep dive into the intricacies of database migration, along with specific solutions to help make the process easier.

article thumbnail

MongoDB Best Practices: Security, Data Modeling, & Schema Design

Percona

In this blog post, we will discuss the best practices on the MongoDB ecosystem applied at the Operating System (OS) and MongoDB levels. We’ll also go over some best practices for MongoDB security as well as MongoDB data modeling. The Linux default is usually 60 , which is not ideal for database usage.