article thumbnail

Trade-offs under pressure: heuristics and observations of teams resolving internet service outages (Part 1)

The Morning Paper

Trade-offs under pressure: heuristics and observations of teams resolving internet service outages , Allspaw, Masters thesis, Lund University, 2015. The Internet itself, over which these systems operate, is a dynamically distributed network spanning national borders and policies with no central coordinating agent.

article thumbnail

A Decade of Dynamo: Powering the next wave of high-performance, internet-scale applications

All Things Distributed

With these requirements in mind, and a willingness to question the status quo, a small group of distributed systems experts came together and designed a horizontally scalable distributed database that would scale out for both reads and writes to meet the long-term needs of our business. This was the genesis of the Amazon Dynamo database.

Internet 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Dynatrace adds support for VPC Flow Logs to Kinesis Data Firehose

Dynatrace

VPC Flow Logs is an Amazon service that enables IT pros to capture information about the IP traffic that traverses network interfaces in a virtual private cloud, or VPC. By default, each record captures a network internet protocol (IP), a destination, and the source of the traffic flow that occurs within your environment.

Traffic 221
article thumbnail

What Is a Workload in Cloud Computing

Scalegrid

Various forms can take shape when discussing workloads within the realm of cloud computing environments – examples include order management databases, collaboration tools, videoconferencing systems, virtual desktops, and disaster recovery mechanisms. This applies to both virtual machines and container-based deployments.

Cloud 130
article thumbnail

Rising Tide Rents and Robber Baron Rents

O'Reilly

Back in 1971, in a talk called “ Designing Organizations for an Information-rich World ,” political scientist Herbert Simon noted that the cost of information is not just money spent to acquire it but the time it takes to consume it. From 2000 to 2011, the percentage of US adults using the internet had grown from about 60% to nearly 80%.

article thumbnail

USENIX SREcon APAC 2022: Computing Performance: What's on the Horizon

Brendan Gregg

Titus, the Netflix container management platform, is now open source,” [link] Apr 2018 - [Cutress 19] Dr. DDR6: Here's What to Expect in RAM Modules,” [link] Nov 2020 - [Salter 20] Jim Salter, “Western Digital releases new 18TB, 20TB EAMR drives,” [link] Jul 2020 - [Spier 20] Martin Spier, Brendan Gregg, et al.,

article thumbnail

Container security: What it is, why it’s tricky, and how to do it right

Dynatrace

Unfortunately, container security is much more difficult to achieve than security for more traditional compute platforms, such as virtual machines or bare metal hosts. Many good security tools provide that function, and benchmarks from the Center for Internet Security (CIS) are clear and prescriptive. Harden the host operating system.