article thumbnail

Performance Testing with Open Source Tools – Myths and Reality

Alex Podelko

Some time ago Federico Toledo published Performance Testing with Open Source Tools- Busting The Myths. While Federico definitely has good points there, there is some truth in these myths too. My point is that we were always going to use one of the open source solutions as a basis for our tool.

article thumbnail

Three smart log ingestion strategies in Dynatrace (without OneAgent)

Dynatrace

In this blog, we share three log ingestion strategies from the field that demonstrate how building up efficient log collection can be environment-agnostic by using our generic log ingestion application programming interface (API). Log ingestion strategy no. Log ingestion strategy No. Log ingestion strategy No.

Strategy 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Monitoring-as-code through Dynatrace’s Open-Source Initiative

Dynatrace

Configurations such as dashboards, alerting rules and Service Level Objective definitions are left to be created separately, and often manually. Do you want to take your observability strategy with Dynatrace to a whole new level and take a GitOps approach to monitoring or offer a true Monitoring as a Service to your teams?

article thumbnail

How architecture evolves into strategy

O'Reilly Software

A look at the roles of architect and strategist, and how they help develop successful technology strategies for business. I'm offering an overview of my perspective on the field, which I hope is a unique and interesting take on it, in order to provide context for the work at hand: devising a winning technology strategy for your business.

Strategy 100
article thumbnail

What the SEC cybersecurity disclosure mandate means for application security

Dynatrace

The mandate also requires that organizations disclose overall cybersecurity risk management, strategy, and governance. Not only that, but the growing reliance on a complex software supply chain that includes homegrown, third-party, and open-source software makes it more difficult to manage risk throughout the software development lifecycle.

article thumbnail

Vendor Lock-in: What It Is and How To Avoid It

Percona

The term is inherently ominous, and a broad definition isn’t much cheerier. First, here’s a broad and common definition: Vendor lock-in means having to rely on one company for a product or service because switching to other options would be too costly in terms of money and interruption in business operations.

article thumbnail

Black Hat 2022 highlights zero-day attacks as key theme

Dynatrace

The centrality of zero-day attacks suggests that organizations need a better strategy to fend off these attacks. But they also need a better strategy to address these attacks if they have IT systems and live applications that are already compromised. By definition, zero-day attacks take organizations by surprise.

DevOps 130