Remove Database Remove eBook Remove Open Source Remove Serverless
article thumbnail

Vulnerability assessment: key to protecting applications and infrastructure

Dynatrace

Examples of such weaknesses are errors in application code, misconfigured network devices, and overly permissive access controls in a database. NMAP is an example of a well-known open-source network scanner. That said, vulnerability databases such as CVE , help identify known vulnerabilities. Analyze findings.

article thumbnail

Open Source at AWS re:Invent

Adrian Cockcroft

We’re excited to let you know that we have an Open Source track at re:Invent this year! Brendan Gregg tours BPF tracing, with open source tools & examples for EC2 instance analysis. Software Engineer, AWS Serverless Applications, and Yishai Galatzer, Senior Manager Software Development.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Open Source at AWS re:Invent

Adrian Cockcroft

We’re excited to let you know that we have an Open Source track at re:Invent this year! Brendan Gregg tours BPF tracing, with open source tools & examples for EC2 instance analysis. Software Engineer, AWS Serverless Applications, and Yishai Galatzer, Senior Manager Software Development.

article thumbnail

Aurora vs RDS: How to Choose the Right AWS Database Solution

Percona

Now that Database-as-a-service (DBaaS) is in high demand, there are multiple questions regarding AWS services that cannot always be answered easily: When should I use Aurora and when should I use RDS MySQL ? What we should really compare is the MySQL and Aurora database engines provided by Amazon RDS. How do I choose which one to use?

AWS 52