article thumbnail

An analysis of performance evolution of Linux’s core operations

The Morning Paper

For the rest of us, if you really need that extra performance (maybe what you get out-of-the-box or with minimal tuning is good enough for your use case) then you can upgrade hardware and/or pay for a commercial license of a tuned distributed (RHEL). A second takeaway is this: security has a cost! Measuring the kernel. Headline results.

article thumbnail

A Spectrum of Actions, Part II

J. Paul Reed

Even though that remediation task was pretty minor — tweaking some low-level hardware settings on each physical server and rebooting — and could have been done quickly enough, there was intense debate on whether it should be done. In practice (and I’ve done this exercise with teams), this spectrum can provide useful insight.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

COVID-19 Hazard Analysis using STPA

Adrian Cockcroft

There are many possible failure modes, and each exercises a different aspect of resilience. Staff should be familiar with recovery processes and the behavior of the system when it’s working hard to mitigate failures. Memorial at Hawaiian native burial ground, Kapalua, Maui. Book: Engineering a Safer World by Nancy G.

article thumbnail

How to Assess MySQL Performance

HammerDB

Instead, focus on understanding what the workloads exercise to help us determine how to best use them to aid our performance assessment. In the context of MySQL performance evaluation, it simulates a typical online transaction processing (OLTP) workload on your MySQL database. and 8.0.32 HammerDB 4.5 Concurrency at 80 VU’s 1.00

article thumbnail

Questions of Worth

The Agile Manager

Within a few years, we saw significant expansion of contract labor firms (or "services", or "consulting", whichever you prefer): firms like Accenture and Infosys grew rapidly, while firms like IBM ditched hardware for services. We look to process and organization, coaches and rules. Selling became a race to the bottom in pricing.

article thumbnail

Evolving Container Security With Linux User Namespaces

The Netflix TechBlog

For example, the PID namespace makes it so that a process can only see PIDs in its own namespace, and therefore cannot send kill signals to random processes on the host. There are also more common capabilities that are granted to users like CAP_NET_RAW, which allows a process the ability to open raw sockets. User Namespaces.

Media 286
article thumbnail

Why Browsers Get Built

Alex Russell

In some sense it's a confidence-management exercise. This adds powerfully to the usual moat-digger's weaponisation of consensus processes. A Web As Platform play depends on credibly keeping up with the expansion in underlying OS power to deliver safe, effective versions of important capabilities portably.