Remove eBook Remove Network Remove Operating System Remove Systems
article thumbnail

Vulnerability assessment: key to protecting applications and infrastructure

Dynatrace

Vulnerability assessment is the process of identifying, quantifying, and prioritizing the cybersecurity vulnerabilities in a given IT system. The goal of an assessment is to locate weaknesses that can be exploited to compromise systems. NMAP is an example of a well-known open-source network scanner. Identify vulnerabilities.

article thumbnail

Touch Design For Mobile Interfaces: Defining Mobile Devices (Excerpt)

Smashing Magazine

To many designers and developers the process of designing for mobile assumes that touch is natural, so we don’t need to pay any particular attention to the design of touch systems. Feature phones all use proprietary and little known operating systems developed by the makers of the phones, as opposed to prevalent ones like Android or iOS.

Mobile 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is IT operations analytics? Extract more data insights from more sources

Dynatrace

IT operations analytics is the process of unifying, storing, and contextually analyzing operational data to understand the health of applications, infrastructure, and environments and streamline everyday operations. This enables AIOps teams to better predict performance and security issues and improve overall IT operations.

Analytics 186
article thumbnail

Applying real-world AIOps use cases to your operations

Dynatrace

Anomalous behavior in a newly deployed application can easily escape human detection, but AIOps systems complement SecOps engineers by identifying and reporting on potentially exploitable vulnerabilities. It may have third-party calls, such as content delivery networks, or more complex requests to a back end or microservice-based application.

DevOps 194
article thumbnail

How to overcome the cloud observability wall

Dynatrace

When an application runs on a single large computing element, a single operating system can monitor every aspect of the system. Modern operating systems provide capabilities to observe and report various metrics about the applications running. Just as the code is monolithic, so is the logging.

Cloud 225
article thumbnail

MongoDB Best Practices: Security, Data Modeling, & Schema Design

Percona

In this blog post, we will discuss the best practices on the MongoDB ecosystem applied at the Operating System (OS) and MongoDB levels. Operating System (OS) settings Swappiness Swappiness is a Linux kernel setting that influences the behavior of the Virtual Memory manager when it needs to allocate a swap, ranging from 0-100.

article thumbnail

A Guide To CSS Debugging

Smashing Magazine

On design systems, CSS/JS and UX. Depending on the browser and operating system, you may also experience browser scrollbar widths upsetting the 100vw calculation as well. Particularly when using a framework or design system and then also writing custom CSS, we can encounter bugs related to the cascade and inheritance.

Design 145