article thumbnail

MySQL 5.7 End of Life Options – Free Course at Percona University Online

Percona

Percona University Online has released a new free course, “MySQL 5.7 End of Life Options – Free Course at Percona University Online,” by Dave Stokes, Technical Evangelist at Percona. This course consists of eight short videos. Take the full course and pass the quiz in our Google class to get a certificate.

Google 101
article thumbnail

Sustainable IT: Optimize your hybrid-cloud carbon footprint

Dynatrace

Evaluating these on three levels—data center, host, and application architecture (plus code)—is helpful. Of course, you need to balance these opportunities with the business goals of the applications served by these hosts. From here, it’s time to consider the next level of energy optimization, green coding.

Cloud 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

MongoDB Performance Resources

Alex Podelko

Then, of course, great online free courses (these two are for MongoDB 3.6 – not covering the latest features; updated versions should be released soon): M201 MongoDB Performance course. M312 Diagnostic and Debugging course. (I Impact of Available IOPS On Your Database Performance. What is MongoDB FTDC (aka.

article thumbnail

Towards multiverse databases

The Morning Paper

Towards multiverse databases Marzoev et al., Therefore, frontend code is responsible for permission checks and privacy-preserving transformations that protect user’s data. The central idea behind multiverse databases is to push the data access and privacy rules into the database itself. HotOS’19.

article thumbnail

What is application security monitoring?

Dynatrace

Identification The identification stage of application security monitoring involves discovering and pinpointing potential security weaknesses within an application’s code, configuration, or design. If a vulnerability remains undetected, the compromised code can allow attackers access to data they’re not authorized to have.

article thumbnail

Accelerate and empower Site Reliability Engineering with Dynatrace observability

Dynatrace

These events serve as logical operators that dictate the course of the release process. During this phase, Davis AI automatically identifies that a key business request has breached its automated baseline due to a significant Mongo database slowdown. This can save SRE teams from the time and effort of debugging or a war room scenario.

article thumbnail

Dynatrace Application Security detects and blocks attacks automatically in real-time

Dynatrace

They are part of continuous delivery pipelines and examine code to find vulnerabilities. There is another critical element that needs to be addressed: how do you protect applications against attacks exploiting vulnerabilities while DevSecOps teams simultaneously try to resolve those issues in the code ?

Traffic 235