Thu.Oct 17, 2019

article thumbnail

Monitoring Prow Resources With Prometheus and Grafana

DZone

She is monitoring Prow resources very closely. At Loodse we’re making extensive use of Prow , Kubernetes’ own CI/CD framework , for our public and private projects. Prow is responsible for managing source code builds which are usually triggered by creating Pull Requests (PRs) on our GitHub repositories or sometimes periodically for nightly cleanup jobs.

article thumbnail

Business Models and Trust

Edge Perspectives

Three years ago I sketched out three dimensions of business model evolution in response to the mounting performance pressure of the Big Shift. In this blog post, I want to highlight the role of this business model evolution in restoring trust in our corporations. A growing number of surveys around the world highlight the continuing erosion of trust in all our institutions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

HackPPL: a universal probabilistic programming language

The Morning Paper

HackPPL: a universal probabilistic programming language Ai et al., MAPL’19. The Hack programming language, as the authors proudly tell us, is “ a dominant web development language across large technology firms with over 100 million lines of production code.” Nail that niche! Does your market get any smaller if we also require those firms to have names starting with ‘F’ ?

article thumbnail

AV1 Image File Format (AVIF)

KeyCDN

The major application for high quality compression of photos is Internet speed. While bandwidth does continue to increase each year, so does the quality and size of most Internet media. What that means is that even though data can be transferred more quickly, the need for compressing media into smaller files without losing visual quality has not gone away.

Media 43
article thumbnail

Network Throttling: Monitor the User Experience

Dotcom-Montior

Network Throttling. When it comes to monitoring web application performance, not only is it necessary emulate user actions, but also network conditions of end-user devices. Network throttling allows you to control connection speeds to better match the experience of real users, allowing you to see web application behavior in specific network conditions.

Network 40
article thumbnail

How It Works: SQL Server Lock Iteration / Enumeration

SQL Server According to Bob

When executing a query to enumerate the locks, such as select * from sys.dm_tran_locks, how does SQL Server scan the locks and avoid impacting the overall concurrency? I recently posted on aspects of the SQL Server Lock Manager and found the iteration of the locks interesting as I was stepping in the code. [link] [link]. SQL Server has a lock iterator class which is used by Lock Monitor (deadlock detection), DMVs such as dm_tran_locks and other workers.

Servers 40
article thumbnail

Understanding Event Loss with Extended Events

SQL Performance

My colleague, Erin Stellato, recently asked me a question about where and why event loss could happen with Extended Events. The question was the result of a comment someone had made on one of her blog posts that was claiming that showplan_xml events can not be collected by the XE Profiler or through a "live" stream of the events from the server. I happen to know that this is not correct because I have routinely demonstrated the negative performance impacts of using the post_query_execution_showp

Servers 40

More Trending

article thumbnail

Dynatrace recognized for helping Pivotal customers drive digital transformation

Dynatrace

Dynatrace news. Our team mates are returning from an informative and exciting SpringOne Platform by Pivotal conference last week in Austin, TX. With thousands of attendees and over 200 talks, it was an incredible learning and networking event for sharing best practices, and new ways of innovating, using the Pivotal Platform. At the event, our software intelligence company, Dynatrace, was pleased to receive the Pivotal ISV Partner of the Year Award for Customer Impact.

article thumbnail

PostgreSQL Connection Pooling: Part 1 – Pros & Cons

Scalegrid

A long time ago, in a galaxy far far away, ‘threads’ were a programming novelty rarely used and seldom trusted. In that environment, the first PostgreSQL developers decided forking a process for each connection to the database is the safest choice. It would be a shame if your database crashed, after all. Since then, a lot of water has flown under that bridge, but the PostgreSQL community has stuck by their original decision.

article thumbnail

Everything as Code

Dynatrace

Dynatrace news. We’re no longer living in an age where large companies require only physical servers, with similar and rarely changing configurations, that could be manually maintained in a single Datacenter. We’re currently in a technological era where we have a large variety of computing endpoints at our disposal like containers, Platform as a Service (PaaS), serverless, virtual machines, APIs, etc. with more being added continually.

Code 110
article thumbnail

Improve Cloud Foundry observability with the immutable OneAgent BOSH release

Dynatrace

Dynatrace news. Cloud Foundry BOSH is a powerful tool that combines release engineering, deployment, and life cycle management of distributed software in the cloud. While BOSH is platform agnostic, it’s the standard vehicle for rolling out and managing Cloud Foundry on virtualized infrastructure, across cloud providers. BOSH loves YAML (so it’s in good company with Kubernetes) and follows a declarative approach for defining the desired state of Cloud Foundry’s various components as w

Cloud 103