Remove Code Remove Database Remove Design Remove Java
article thumbnail

Practical API Design at Netflix, Part 1: Using Protobuf FieldMask

The Netflix TechBlog

How can we achieve a similar functionality when designing our gRPC APIs? If the service knows which fields are important for the caller, it can make an informed decision about making expensive calls, starting resource-heavy computations, and/or calling the database. Our protobuf message definition (.proto Field names are not included.

Design 245
article thumbnail

Unmatched scalability and security of Dynatrace extensions now available for all supported technologies: 7 reasons to migrate your JMX and Python plugins

Dynatrace

already address SNMP, WMI, SQL databases, and Prometheus technologies, serving the monitoring needs of hundreds of Dynatrace customers. are technologically very different, Python and JMX extensions designed for Extension Framework 1.0 Python data source—brings the flexibility of coding where declarative extensions are not enough.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Java Or Scala Performance – Which One Is Better?

Alex Podelko

For years, the debate has raged on regarding which programming language is better, Java or Scala. While some argue that just because Java is older it is better, others believe Scala is better for a variety of reasons. In essence, Java is classified as an object oriented programming language. The Size and Quality of the Code.

Java 100
article thumbnail

Millions of tiny databases

The Morning Paper

Millions of tiny databases , Brooker et al., It takes you through the thinking processes and engineering practices behind the design of a key part of the control plane for AWS Elastic Block Storage (EBS): the Physalia database that stores configuration information. NSDI’20. This paper is a real joy to read. Requirements.

Database 106
article thumbnail

What is vulnerability management? And why runtime vulnerability detection makes the difference

Dynatrace

According to the 2022 CISO Research Report , only 25% of respondents’ security teams “can access a fully accurate, continuously updated report of every application and code library running in production in real-time.” Undetected, the compromised code could allow attackers to access data they’re not authorized to have.

Traffic 168
article thumbnail

Legacy Architecture Modernisation With Strategic Domain-Driven Design

Strategic Tech

Before jumping into either of those scenarios, have a look at what Strategic Domain-Driven Design can offer you. This means a software architecture should be purposely designed for the most favourable business consequences. It also means that understanding the business model is a pre-requisite for designing a software architecture.

article thumbnail

How Netflix Scales its API with GraphQL Federation (Part 2)

The Netflix TechBlog

This gives us access to Netflix’s Java ecosystem, while also giving us the robust language features such as coroutines for efficient parallel fetches, and an expressive type system with null safety. For storing schema changes, we use an internal library that implements the event sourcing pattern on top of the Cassandra database.