Remove Java Remove Presentation Remove Traffic Remove Tuning
article thumbnail

The Speed of Time

Brendan Gregg

Since instances of both CentOS and Ubuntu were running in parallel, I could collect flame graphs at the same time (same time-of-day traffic mix) and compare them side by side. There's no Java stack—there should be a tower of green Java methods—instead there's only a single green frame or two. us on Centos and 0.68

Speed 126
article thumbnail

Zero Configuration Service Mesh with On-Demand Cluster Discovery

The Netflix TechBlog

Eureka and Ribbon presented a simple but powerful interface, which made adopting them easy. In order for a service to talk to another, it needs to know two things: the name of the destination service, and whether or not the traffic should be secure. Our internal IPC traffic is now a mix of plain REST, GraphQL , and gRPC.

Traffic 220
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Dynatrace Application Security protects your applications in complex cloud environments

Dynatrace

More modern tools can provide runtime insights into certain platforms, like Kubernetes or containers, but are still limited in their ability to detect which libraries are actually used vs. those that are present, but unused. Dynatrace Application Security currently detects, assesses, and manages Java vulnerabilities.

Cloud 284
article thumbnail

DBLog: A Generic Change-Data-Capture Framework

The Netflix TechBlog

Nonetheless, we found a number of limitations that could not satisfy our requirements e.g. stalling the processing of log events until a dump is complete, missing ability to trigger dumps on demand, or implementations that block write traffic by using table locks. Blocking write traffic by locking tables. Writing events to any output.

Database 197
article thumbnail

DBLog: A Generic Change-Data-Capture Framework

The Netflix TechBlog

Nonetheless, we found a number of limitations that could not satisfy our requirements e.g. stalling the processing of log events until a dump is complete, missing ability to trigger dumps on demand, or implementations that block write traffic by using table locks. Blocking write traffic by locking tables. Writing events to any output.

Database 212
article thumbnail

The Speed of Time

Brendan Gregg

Since instances of both CentOS and Ubuntu were running in parallel, I could collect flame graphs at the same time (same time-of-day traffic mix) and compare them side by side. There's no Java stack—there should be a tower of green Java methods—instead there's only a single green frame or two. us on Centos and 0.68

Speed 40
article thumbnail

Structural Evolutions in Data

O'Reilly

But in its early form of a Hadoop-based ML library, Mahout still required data scientists to write in Java. And that brings our story to the present day: Stage 3: Neural networks High-end video games required high-end video cards. Moving beyond point estimates is very close to present-day AI challenges.

Hardware 102