article thumbnail

Elasticsearch Indexing Strategy in Asset Management Platform (AMP)

The Netflix TechBlog

It provides simple APIs for creating indices, indexing or searching documents, which makes it easy to integrate. Mapping is used to define how documents and their fields are supposed to be stored and indexed. All the assets of a specific type use the specific index defined for that asset type to create or update the asset document.

Strategy 258
article thumbnail

Real World Programming with ChatGPT

O'Reilly

This post is a brief commentary on Martin Fowler’s post, An Example of LLM Prompting for Programming. There’s a lot of excitement about how the GPT models and their successors will change programming. First, note the overall strategy Xu Hao uses to write this code. He is using a strategy called “Knowledge Generation.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Black Friday traffic exposes gaps in observability strategies

Dynatrace

The company did a postmortem on its monitoring strategy and realized it came up short. Consider issues such as application crashes and page load times and consider application programming interfaces as well as third-party interfaces. When teams plan and test for incidents, they can also document team roles and responsibilities.

Traffic 197
article thumbnail

Strategy

The Agile Manager

A few months ago I was asked to review a product strategy a team had put together. I had to give them the unfortunate feedback that what they had created was a document with a lot of words, but those words did not articulate a strategy. There is a formula for articulating strategy. The actions must be, well, actionable.

article thumbnail

What the NIS2 Directive means for application security

Dynatrace

Final report within 1 month (detailed description, type of threat that triggered it, applied and ongoing remediation strategies, scope, and impact). Application security must inform any robust NIS2 compliance strategy. Incident notification within 72 hours of the incident (must include initial assessment, severity, IoCs).

article thumbnail

eBPF Documentary

Brendan Gregg

eBPF is a crazy technology – like putting JavaScript into the Linux kernel – and getting it accepted had so far been an untold story of strategy and ingenuity. Thanks to Speakeasy Productions for doing such a great job with this documentary , and letting you experience what it was like in those early days.

article thumbnail

What the SEC cybersecurity disclosure mandate means for application security

Dynatrace

The mandate also requires that organizations disclose overall cybersecurity risk management, strategy, and governance. Be sure to incorporate cybersecurity into every one of your organization’s strategies to ensure full coverage. These are essential for compliance, post-incident analysis, and reporting.