Remove Google Remove Software Remove Systems Remove White Paper
article thumbnail

DevOps Enterprise Summit, Europe 2021: Leadership and OKRs

Tasktop

Citing the Navy’s “leadership factory”, he encouraged attendees to focus on tuning a system for building leaders, to give them the responsibility and ownership to hone their skills and come back “stronger” from missions. The admiral would no doubt admire what Jason Cox, Director of Platform & Systems Reliability, is doing at Disney.

DevOps 91
article thumbnail

Measuring Carbon is Not Enough?—?Unintended Consequences

Adrian Cockcroft

A rough guide if you don’t have any better data is that with no traffic to a system it will be 10% utilization and use 30% of peak power, 25% utilization uses 50% of peak power, and at 50% utilization it uses 75% of peak power. they are never really idle. I’ve written before about how to tune out retry storms.

Energy 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

To Transform, Trade Ego for Humility

The Agile Manager

Each had come to prominence in the handset market differently: Nokia was a mobile telephony company, Blackberry a mobile email company, Apple a personal technology company, Google an internet search and advertising company. With the benefit of hindsight, we know how it played out. The dominant sentiment in modern-day Europe is anxiety.

article thumbnail

ABAC on SpiceDB: Enabling Netflix’s Complex Identity Types

The Netflix TechBlog

By Chris Wolfe , Joey Schorr , and Victor Roldán Betancort Introduction The authorization team at Netflix recently sponsored work to add Attribute Based Access Control (ABAC) support to AuthZed’s open source Google Zanzibar inspired authorization system, SpiceDB. After all, SpiceDB is a Relationship Based Access Control (ReBAC) system.

Cache 249
article thumbnail

C++ safety, in context

Sutter's Mill

To talk about C++’s current safety problems and solutions well, I need to include the context of the broad landscape of security and safety threats facing all software. Software security ” (or “cybersecurity” or similar) means making software able to protect its assets from a malicious attacker.

C++ 139