article thumbnail

Database Housekeeping in the New Year

Percona

Check the versions of database connectors, programming languages, and proceed all the way down to the operating system. There are several exciting conferences on the calendar where you can expand your technical knowledge and network. This is the open source database conference, and you need to be present.

article thumbnail

Partner Spotlight: Simplify microservices complexity with Red Hat & Dynatrace

Dynatrace

With the Red Hat Summit 2019 just around the corner, this month’s featured partner is the world’s leading provider of open source software solutions: Red Hat. So, he started selling open source Linux and Unix operating systems with his famous sales pitch “You wouldn’t buy a car with the hood welded shut”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why Don't You Use.

Brendan Gregg

X may be an application, programming language, operating system, hypervisor, processor, or tool. It is not open source. - I've also privately chatted with key technology contributors at conferences who are looking for something different to work on, because they believe their own technology is doomed.

Energy 103
article thumbnail

Why Don't You Use.

Brendan Gregg

" X may be an application, programming language, operating system, hypervisor, processor, or tool. It is not open source. I've also privately chatted with key technology contributors at conferences who are looking for something different to work on, because they believe their own technology is doomed.

Energy 40
article thumbnail

CheriABI: enforcing valid pointer provenance and minimizing pointer privilege in the POSIX C run-time environment

The Morning Paper

abstract capabilities are constructed only through legitimate provenance chains of operations, successively reducing permissions from initial maximally permissive capabilities provided at machine reset. CHERI also rethinks the way that pointers and memory work, but the goal here is memory protection.

C++ 61
article thumbnail

Failure Modes and Continuous Resilience

Adrian Cockcroft

Figure out how much delay is built into your observability system, it may be taking samples once a minute, processing them for a minute or two, then watching for several bad samples in a row before it triggers an alert. that are used across multiple applications.

Latency 52
article thumbnail

Failure Modes and Continuous Resilience

Adrian Cockcroft

Figure out how much delay is built into your observability system, it may be taking samples once a minute, processing them for a minute or two, then watching for several bad samples in a row before it triggers an alert. that are used across multiple applications.

Latency 53