Remove Code Remove Design Remove Java Remove Servers
article thumbnail

Practical API Design at Netflix, Part 1: Using Protobuf FieldMask

The Netflix TechBlog

How can we achieve a similar functionality when designing our gRPC APIs? Add FieldMask to the Request Message Instead of creating one-off “include” fields, API designers can add field_mask field to the request message: [link] Consumers can set paths for the fields they expect to receive in the response. Field names are not included.

Design 245
article thumbnail

What is infrastructure as code? Discover the basics, benefits, and best practices

Dynatrace

The IT world is rife with jargon — and “as code” is no exception. “As code” means simplifying complex and time-consuming tasks by automating some, or all, of their processes. Today, the composable nature of code enables skilled IT teams to create and customize automated solutions capable of improving efficiency.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Open Sourcing the Netflix Domain Graph Service Framework: GraphQL for Spring Boot

The Netflix TechBlog

By open-sourcing the project, we hope to contribute to the Java and GraphQL communities and learn from and collaborate with everyone who will be using the framework to make it even better in the future. The transition to the new federated architecture meant that many of our backend teams needed to adopt GraphQL in our Java ecosystem.

article thumbnail

Unmatched scalability and security of Dynatrace extensions now available for all supported technologies: 7 reasons to migrate your JMX and Python plugins

Dynatrace

are technologically very different, Python and JMX extensions designed for Extension Framework 1.0 focused on technology coverage, building on the flexibility of JMX for Java and Python-based coded extensions for everything else. Python data source—brings the flexibility of coding where declarative extensions are not enough.

article thumbnail

What is vulnerability management? And why runtime vulnerability detection makes the difference

Dynatrace

According to the 2022 CISO Research Report , only 25% of respondents’ security teams “can access a fully accurate, continuously updated report of every application and code library running in production in real-time.” Undetected, the compromised code could allow attackers to access data they’re not authorized to have.

Traffic 157
article thumbnail

Intro to Redis Sharding

Scalegrid

Unlike replication, which merely copies data from one place to another, sharding entails horizontally partitioning the database into separate segments or shards placed on different servers. Instead of one runner (server) bearing the entire burden until exhaustion, several runners (servers) take turns, which leads to enhanced efficiency.

article thumbnail

The Return of the Frame Pointers

Brendan Gregg

Apart from library code, maybe your application doesn't have frame pointers either, in which case everything is broken. Only in extreme circumstances does the cost (in processor time and I-cache footprint) translate to a tangible benefit - circumstances which usually resort to hand-coded assembly anyway. Back-end servers.

Java 145