Remove Best Practices Remove Operating System Remove Systems Remove Virtualization
article thumbnail

Vulnerability assessment: key to protecting applications and infrastructure

Dynatrace

Vulnerability assessment is the process of identifying, quantifying, and prioritizing the cybersecurity vulnerabilities in a given IT system. The goal of an assessment is to locate weaknesses that can be exploited to compromise systems. Changing system configurations. Identify vulnerabilities. Analyze findings. Assess risk.

article thumbnail

Kubernetes: Challenges for observability platforms

Dynatrace

Nevertheless, there are related components and processes, for example, virtualization infrastructure and storage systems (see image below), that can lead to problems in your Kubernetes infrastructure. Configuring storage in Kubernetes is more complex than using a file system on your host. Kelsey Hightower via Twitter, 2020).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

AWS re:Invent 2017: How Netflix Tunes EC2

Brendan Gregg

A video of the talk is on youtube : The slides are on slideshare : I love this talk as I get to share more about what the Performance and Operating Systems team at Netflix does, rather than just my work. Virtual Memory. File System. echo tsc > /sys/devices/system/clocksource/clocksource0/current_clocksource.

Tuning 61
article thumbnail

AWS re:Invent 2017: How Netflix Tunes EC2

Brendan Gregg

A video of the talk is on youtube : The slides are on slideshare : I love this talk as I get to share more about what the Performance and Operating Systems team at Netflix does, rather than just my work. Virtual Memory. File System. echo tsc > /sys/devices/system/clocksource/clocksource0/current_clocksource.

Tuning 52
article thumbnail

MongoDB Best Practices: Security, Data Modeling, & Schema Design

Percona

In this blog post, we will discuss the best practices on the MongoDB ecosystem applied at the Operating System (OS) and MongoDB levels. We’ll also go over some best practices for MongoDB security as well as MongoDB data modeling. Without further ado, let’s start with the OS settings.

article thumbnail

Why Your Performance Testing Strategy Needs to Shift Left

Dotcom-Montior

Additionally, end users can access your site or applications from anywhere in the world using different browsers, operating systems, and mobile devices, all with varying connection speeds. LoadView – Best Practices and Process. Finding upper limits of your current systems for capacity planning.

article thumbnail

What Adrian Did Next?—?Part 2?—?Sun Microsystems

Adrian Cockcroft

Photo by Adrian I spent six years at Cambridge Consultants, building some interesting systems, managing our Sun workstations and learning a lot, but by then Sun had opened a sales office across the street, and I wanted to find out what they were going to release next, before everyone else. as a result there were product and messaging changes.

Tuning 52