Sat.Apr 06, 2019 - Fri.Apr 12, 2019

article thumbnail

From bare-metal to Kubernetes

High Scalability

This is a guest post by Hugues Alary , Lead Engineer at Betabrand , a retail clothing company and crowdfunding platform, based in San Francisco. This article was originally published here. Early infrastructure. VPS. Rackspace. OVH. Hardware infrastructure. The scalability and maintainability issue. Scaling development processes. The advent of Docker.

Retail 233
article thumbnail

Native image lazy-loading for the web!

Addy Osmani

In this post, we'll look at the new loading attribute which brings native and lazy-loading to the web!

112
112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Row Pattern Recognition in SQL

SQL Performance

The ISO/IEC 9075:2016 standard, or SQL:2016 in short, introduces support for a profound concept called Row Pattern Recognition (RPR) in SQL. I posted a suggestion to improve SQL Server by adding support for RPR in T-SQL , but I was quite limited in the space that I had to provide the feedback. The purpose of this article is to provide more details about the proposal, and hopefully you will be convinced of its importance and add your vote.

C++ 73
article thumbnail

Top 30 Functional Testing Tools for Automation Testing

Simform

Since functional testing is a fundamental part of the software testing process, it should be done with the right tool to deliver a quality product. Let’s take a look at top 30 functional testing tools that may come in handy. The post Top 30 Functional Testing Tools for Automation Testing appeared first on Insights on Latest Software Technologies - Simform Blog.

article thumbnail

Kill more bugs! Add randomization to your web testing

TechBeacon Testing

In his book Software Testing Techniques , Boris Beizer describes the Pesticide Paradox. In the context of software testing, it says that no matter what testing method you choose, you will still miss subtler "pests," or software bugs.

Testing 66
article thumbnail

Desktop Application Monitoring – Are you Doing it Right?

Apica

Legacy applications tend to be the driver for businesses to achieve revenue goals. Despite having the standard legacy challenges like Read More. The post Desktop Application Monitoring – Are you Doing it Right? appeared first on Apica.

article thumbnail

Native Lazy Loading

CSS - Tricks

IntersectionObserver has made lazy loading a lot easier and more efficient than it used to be, but to do it really right you still gotta remove the src and such, which is cumbersome. It's definitely not as easy as: <img src="celebration.jpg" loading="lazy" alt="." /> Addy Osmani says it's coming in Chrome 75: The loading attribute allows a browser to defer loading offscreen images and iframes until users scroll near them. loading supports three values: lazy : is a good candidate for lazy

Games 55

More Trending

article thumbnail

Doing continuous testing? Here's why you should use containers

TechBeacon Testing

All managers think they want containers, but few teams know what to do with them. When done thoughtfully, containerizing your services can transform the way your organization thinks about testing.

Testing 57
article thumbnail

Master of web puppets: abusing web browsers for persistent and stealthy computation

The Morning Paper

Master of web puppets: abusing web browsers for persistent and stealthy computation Papadopoulus et al., NDSS’19. UPDATE 2019-04-14: An author update has been published for this paper which details that with current browser versions, ServiceWorkers can only stay alive for about a minute after the user navigates away from the site. This mitigates the main risk detailed in the paper of long running botnet membership.

Website 44
article thumbnail

AWS RDS SQL Server – Monitoring database instances

SQL Shack

In this article, we will review how to monitor AWS RDS SQL Server database instances and setup email notifications using event subscriptions and CloudWatch alarms. Database monitoring is one of the important tasks of a database administrator to ensure availability and performance. AWS provides different tools to monitor the database instance. Below are some of […].

AWS 43
article thumbnail

Desktop Application Monitoring – Are you Doing it Right?

Apica

Legacy applications tend to be the driver for businesses to achieve revenue goals. Despite having the standard legacy challenges like Read More. The post Desktop Application Monitoring – Are you Doing it Right? appeared first on Apica.

article thumbnail

TPDP Episode #26: Game Development With Houdini

The Polyglot Developer

The latest episode of The Polyglot Developer Podcast has been published and it is the first one on the show to be on the topic of game development! In episode twenty-six titled, Game Development with Houdini , I’m joined by Ben Mears from SideFX , the company that is responsible for Houdini. In case this is your first time hearing of Houdini, it is a system that allows you to create procedural, node-based workflows, for generating game assets and terrains.

Games 40
article thumbnail

Microsoft Introduces Azure Front Door, a Scalable Service for Protecting Web Applications

InfoQ

In a recent blog post, Microsoft introduced the general availability (GA) of Azure Front Door (AFD), a scalable and secure entry point for web applications. The underlying technology in Azure Front Door, has been in place inside of Microsoft for the past five years where it has enabled scaling and protection for many popular Microsoft services including Office 365, Xbox, and Microsoft Teams.

Azure 40
article thumbnail

Methods to Insert Data into SQL Server

SQL Shack

Summary There are a variety of ways of managing data to insert into SQL Server. How we generate and insert data into tables can have a profound impact on performance and maintainability! This topic is often overlooked as a beginner’s consideration, but mistakes in how we grow objects can create massive headaches for future developers […].

Servers 43
article thumbnail

Dynatrace achieves four Comparably awards, and Gartner recognition

Dynatrace

Dynatrace news. As we begin the start of our next fiscal year here at Dynatrace, I’m immensely proud to see us close the year in such a positive way as we’ve been recognized by Comparably for a further four awards. Announcing the ‘ Best Company Outlook ’, ‘Best Places to Work in Boston’ , ‘Best Product Department Team 2019’ , and ‘Best Sales Team’ awards, Dynatrace has ranked #8, #5, and in the Top 25 respectively.

article thumbnail

Sponsored Post: PerfOps, InMemory.Net, Triplebyte, Etleap, Stream, Scalyr

High Scalability

Who's Hiring? Triplebyte lets exceptional software engineers skip screening steps at hundreds of top tech companies like Apple, Dropbox, Mixpanel, and Instacart. Make your job search O (1), not O ( n ). Apply here. Need excellent people? Advertise your job here! Fun and Informative Events. Join Etleap , an Amazon Redshift ETL tool to learn the latest trends in designing a modern analytics infrastructure.

article thumbnail

Understanding Subresource Integrity

Smashing Magazine

Understanding Subresource Integrity. Understanding Subresource Integrity. Drew McLellan. 2019-04-09T12:30:59+02:00. 2019-04-29T18:34:58+00:00. If you’ve ever used a CDN-hosted version of a JavaScript library, you may have noticed a strange looking integrity attribute on the script tag. This attribute contains seemingly endless alphanumeric junk that you may be tempted to strip out in the quest for cleaner code.

Website 57
article thumbnail

How bad can it git? Characterizing secret leakage in public GitHub repositories

The Morning Paper

How bad can it git? Characterizing secret leakage in public GitHub repositories Meli et al., NDSS’19. On the one hand you might say there’s no new news here. We know that developers shouldn’t commit secrets, and we know that secrets leaked to GitHub can be discovered and exploited very quickly. On the other hand, this study goes much deeper, and also provides us with some very actionable information. …we go far beyond noting that leakage occurs, providing a conservative longitudinal

Google 76
article thumbnail

Musings on Crafting a CFP

J. Paul Reed

This post is part of a larger retrospective on REdeploy 2018; the discussion about our CFP process, specifically, was split out into its own post; read the full retrospective here. Mary talked a little bit about our CFP, but I think it’s worth talking a bit more about because it’s one of the aspects of REdeploy I’m most proud of. One of the lesser known REdeploy facts is that Mary and I originally didn’t plan to have a CFP: we were going to invite speakers.

article thumbnail

Stuff The Internet Says On Scalability For April 12th, 2019

High Scalability

Out sick today, but start saving up for that ticket to Mars ( more ):

article thumbnail

The Serif Tax

CSS - Tricks

Fonts are vector. Vector art with more points makes for larger files than vector art with fewer points. Custom fonts are downloaded. So, fonts with less points in their vector art are smaller. That's the theory anyway. Shall we see if there is any merit to it? Open Sans (top) and Garamond (bottom). Let's take two fonts off of Google Fonts: Open Sans and EB Garamond.

Google 44
article thumbnail

Don’t trust the locals: investigating the prevalence of persistent client-side cross-site scripting in the wild

The Morning Paper

Don’t trust the locals: investigating the prevalence of persistent client-side cross-site scripting in the wild Steffens et al., NDSS’19. Does your web application make use of local storage? If so, then like many developers you may well be making the assumption that when you read from local storage, it will only contain the data that you put there.

Storage 44
article thumbnail

I Ran This Whole Conference and I Didn’t Even Get a T-shirt

J. Paul Reed

As many of you know, Mary Thengvall and I produced and co-chaired REdeploy last year, a conference on the intersection of resilient technology, organizations, and people. Mary recently posted a three-part retrospective series on the conference. Despite ignoring my own advice about running retrospectives within 72 hours after incidents, here are some of my musings about the 2018 event (based largely on notes I, at least, did take in the days after): On “Making the Sausage” ?

article thumbnail

AMD EPYC Processors in Azure Virtual Machines

SQL Performance

Back on December 5, 2017, Microsoft announced that they were using AMD EPYC 7551 processors in their storage-optimized Lv2-Series virtual machines. Since then, Microsoft has changed the naming of this series to Lsv2. These VMs are not available in all regions, so you will want to check the availability in the Azure region that you are interested in using.

Azure 42
article thumbnail

Integrate Azure Monitor to get AI-powered service behavior insights

Dynatrace

Dynatrace news. As adoption rates for Azure continue to skyrocket, Dynatrace is developing a deeper integration with the Azure platform to provide even more value to organizations that run their businesses on Microsoft Azure or have Microsoft as a part of their multi-cloud strategy. With rich offerings available in platform services and the growing popularity of serverless application architectures, new challenges in monitoring have emerged.

Azure 104
article thumbnail

Tackling the Pipeline Problem in the Architecture Research Community

ACM Sigarch

Computer architecture is an important and exciting field of computer science, which enables many other fields (eg. big-data processing, machine learning, quantum computing, and so on). For those of us who pursued computer architecture as a career, this is well understood. However, we often hear anecdotes that the number of prospective graduate students applying to computer architecture/systems is small and shrinking.