article thumbnail

Optimizing Java XPath CPU and memory overhead by 98%

Dynatrace

Therefore, it was unsurprising to see a huge spike in traffic for Family Visa enrollment via Metrash. The system saw up to 800 application requests per second – far more than anticipated. More worrisome was a spike in CPU usage, resulting in severe service disruption as backend processing systems crashed due to the spike in load.

Java 227
article thumbnail

Migrating Netflix to GraphQL Safely

The Netflix TechBlog

A single API team maintained both the Java implementation of the Falcor framework and the API Server. The control group’s traffic utilized the legacy Falcor stack, while the experiment population leveraged the new GraphQL client and was directed to the GraphQL Shim. The Replay Tester tool samples raw traffic streams from Mantis.

Traffic 353
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Geek Reading - Week of June 5, 2013

DZone

Improving testing by using real traffic from production ( Hacker News). Linux System Mining with Python ( Javalobby – The heart of the Java developer community). Java EE 7 is Final. Javalobby – The heart of the Java developer community). A Study on Solving Callbacks with JavaScript Generators ( Hacker News).

Java 244
article thumbnail

Protect your organization against zero-day vulnerabilities

Dynatrace

Malicious attackers have gotten increasingly better at identifying vulnerabilities and launching zero-day attacks to exploit these weak points in IT systems. A zero-day exploit is a technique an attacker uses to take advantage of an organization’s vulnerability and gain access to its systems.

Java 191
article thumbnail

Seeing through hardware counters: a journey to threefold performance increase

The Netflix TechBlog

We decided to move one of our Java microservices?—?let’s A quick canary test was free of errors and showed lower latency, which is expected given that our standard canary setup routes an equal amount of traffic to both the baseline running on 4xl and the canary on 12xl. The problem It started off as a routine migration.

Hardware 363
article thumbnail

Orchestrating Data/ML Workflows at Scale With Netflix Maestro

The Netflix TechBlog

Due to its popularity, the number of workflows managed by the system has grown exponentially. We started seeing signs of scale issues, like: Slowness during peak traffic moments like 12 AM UTC, leading to increased operational burden. The scheduler on-call has to closely monitor the system during non-business hours.

Java 202
article thumbnail

What is vulnerability management? And why runtime vulnerability detection makes the difference

Dynatrace

But managing the breadth of the vulnerabilities that can put your systems at risk is challenging. Security vulnerabilities are weaknesses in applications, operating systems, networks, and other IT services and infrastructure that would allow an attacker to compromise a system, steal data, or otherwise disrupt IT operations.

Traffic 168