How Do You Test A Design System? — Advanced Topics


How do you test a design system? You got here because you either have a design system or know you need one. Marie Drake , Principal Test Automation Engineer at News UK , presented her webinar, " Roadmap To Testing A Design System ", where she discussed this topic in some detail.

It’s time to upgrade the PTC System Monitor (PSM)!


As a PSM system administrator, you’ve relied on AppMon as a preconfigured APM tool for detecting, diagnosing, and repairing problems that impact the operational health of your Windchill application suite. The post It’s time to upgrade the PTC System Monitor (PSM)!


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Reinventing virtualization with the AWS Nitro System

All Things Distributed

A great example of this approach to innovation and problem solving is the creation of the AWS Nitro System , the underlying platform for our EC2 instances. Running a business at the scale of Amazon, we often have to solve problems that no other company has faced before.

Chaos Mesh — A Solution for System Resiliency on Kubernetes


Traditionally we use unit tests and integration tests that guarantee a system is production-ready. To better identify system vulnerabilities and improve resilience, Netflix invented Chaos Monkey , which injects various types of faults into the infrastructure and business systems. security performance kubernates distributed system chaos engineering scalableWhy Chaos Mesh? In the world of distributed computing, faults can happen to your clusters any time, anywhere.

Design Systems and Testability With Applitools


May 2020, Applitools had the pleasure of hosting Tyler Krupicka from Intuit for an hour-long webinar discussing design systems and testability. At Intuit, Tyler works on the "Player/Design Systems" team, where he focuses on design systems. performance testing web developement interview ui cross browser testing unit test storybook design systems ui component

Understanding When to Use a Test Tool vs. a Test System


Yet, for all the importance that testing has in the SDLC, there is a misconception among many about the difference between a testing tool and a testing system. performance test tools test systemTesting is a mission-critical aspect of the software development lifecycle (SDLC). You'd be hard-pressed to find a software development professional who disagrees.

Desupport of monitoring for legacy 32-bit operating systems


We’re continuously working to support the most popular operating systems with high quality OneAgent deployment options. Because of continuously decreasing and already marginal adoption of 32-bit operating systems we will discontinue support for monitoring of legacy 32-bit operating systems for all Windows and Linux distributions, as of April 2021. Of course, it’s possible to run a legacy 32-bit application on a 64-bit operating system. Dynatrace news.

Free Google Book: Building Secure and Reliable Systems

High Scalability

Google added another book into their excellent SRE series: Building Secure and Reliable Systems. Copy/pasting a few paragraphs: "In this book we talk generally about systems, which is a conceptual way of thinking about the groups of components that cooperate to perform some function. Because security and reliability are everyone’s responsibility, we’re targeting a broad audience: people who design, implement, and maintain systems.

Google 175

Understanding, detecting and localizing partial failures in large system software

The Morning Paper

Understanding, detecting and localizing partial failures in large system software , Lou et al., Partial failures ( gray failures ) occur when some but not all of the functionalities of a system are broken. It contains a study of partial failure causes, and a novel approach to fault detection using system-specific, auto-generated watchdogs. Here are the key findings: Partial failures appear throughout the release history of each system, 54% within the last three years.

Benchmarking spreadsheet systems

The Morning Paper

Benchmarking spreadsheet systems Rahman et al., They often freeze during computation, and are unable to import datasets well below the size limits posed by current spreadsheet systems. The other systems avoid this recomputation, but are slower than Excel for value-only datasets. Overall, there is a plethora of interesting and challenging research directions in making spreadsheet systems more effective at handling large datasets.

Benefits of Using an Online Bug Tracking System


When a software program or an application does not work the way it is created or designed to perform, it is called a software bug. In most cases, these errors are caused by developers or designers. The software testing team uses bug tracking software's to keep a track of bugs and to report them as the program is being tested. It is estimated that software developers make 100-150 errors for every thousand lines of code.

Wireless attacks on aircraft instrument landing systems

The Morning Paper

Wireless attacks on aircraft instrument landing systems Sathaye et al., Today’s paper is a good reminder of just how important it is becoming to consider cyber threat models in what are primary physical systems, especially if you happen to be flying on an aeroplane – which I am right now as I write this! The first fully operational Instrument Landing System (ILS) for planes was deployed in 1932. USENIX Security Symposium 2019.

Deployment challenges with large enterprise systems


For small deployments, it isn’t a problem however when scaling up to hundred or even thousands of systems things can become complicated. Even when all the systems are mapped correctly by Dynatrace, identifying these systems is a real challenge. When deploying on multiple machines, the one agent will group all the instances of the same system together. Dynatrace will automatically group both systems. System (Tibco, API-gateway, Weblogic, shared-middleTier).

MySQL Memory Management, Memory Allocators, and Operating System


performance mysql memory operating system bug memory management memory allocatorsWhen users experience memory usage issues with any software, including MySQL, their first response is to think that it’s a symptom of a memory leak. As this story will show, this is not always the case. This story is about a bug.

Dynatrace and AWS Systems Manager – Automate OneAgent distribution securely, centrally and at scale


We’re pleased to announce that Dynatrace is among the first set of partners to offer support for AWS Distributor , a capability of AWS Systems Manager, that allows you to select from available popular third party agents to install and manage. What is AWS Systems Manager Distributor?

AWS 167

Orbital edge computing: nano satellite constellations as a new class of computer system

The Morning Paper

Orbital edge computing: nanosatellite constellations as a new class of computer system , Denby & Lucia, ASPLOS’20. Only space system architects don’t call it request-response, they call it a ‘ bent-pipe architecture.’. Nanosatellite systems have a GSD of around 3.0m/px.

How to Kill Processes in Unix/Linux


There are different options to terminate a process in Unix/Linux flavor of operating systems. java open source devops command line operating systems linux operating system linux tools/utilities system admin unix operating system unix osThis article intends to list and provide examples of each option. You can use the kill command to terminate a process by passing the process id. PID is the process ID of the process that you want to terminate.

Mutation Testing Systems: Improving the Quality of Tests


Professionally, I label myself as a developer, although I don’t like labels very much, and I prefer to say that the reason for my work is: to create quality software. But what is quality software ? I like to define it as follows: Quality software is that which meets the user's needs. test software developent software quality mutation testing coverage test quality pitest

Towards federated learning at scale: system design

The Morning Paper

Towards federated learning at scale: system design Bonawitz et al., This is a high level paper describing Google’s production system for federated learning. The FL system contains a number of privacy-enhancing building blocks, but the privacy guarantees of any end-to-end system will always depend on how they are used. At the core of the system is a federated learning approach called Federated Averaging , with an optional extension for Secure Aggregation.

Unlocking Enterprise systems using voice

All Things Distributed

The interfaces to our digital system have been dictated by the capabilities of our computer systems—keyboards, mice, graphical interfaces, remotes, and touch screens. As a result, they fail to deliver a truly seamless and customer-centric experience that integrates our digital systems into our analog lives. All of these benefits make voice a game changer for interacting with all kinds of digital systems.

Checksums in Storage Systems and Why the Enterprise Should Care


Let’s assume for a moment that your data survives its many passes through a system’s DRAM and emerges intact. That data must then be safely transported over a network to the storage system where it is written to disk. Random bit flips are far more common than most people, even IT professionals, think. Surprisingly, the problem isn’t widely discussed, even though it is silently causing data corruption that can directly impact our jobs, our businesses, and our security.

Aligning superhuman AI with human behaviour: chess as a model system

The Morning Paper

Aligning superhuman AI with human behavior: chess as a model system , McIlroy-Young et al., Maia thus succeeds at capturing granular human behavior in a tunable way that is qualitatively beyond both traditional engines and self-play neural network systems.

Systems Performance: Enterprise and the Cloud, 2nd Edition

Brendan Gregg

Eight years ago I wrote _Systems Performance: Enterprise and the Cloud_ (aka the "sysperf" book) on the performance of computing systems, and this year I'm excited to be releasing the second edition. A year ago I announced [BPF Performance Tools: Linux System and Application Observability]. In a way, Systems Performance is volume 1 and BPF Performance Tools is volume 2.

Teaching rigorous distributed systems with efficient model checking

The Morning Paper

Teaching rigorous distributed systems with efficient model checking Michael et al., It describes the labs environment, DSLabs , developed at the University of Washington to accompany a course in distributed systems. During the ten week course, students implement four different assignments: an exactly-once RPC protocol; a primary-backup system; Paxos; and a scalable, transactional key-value storage system. A visual debugger/system explorer.

Machine learning systems are stuck in a rut

The Morning Paper

Machine learning systems are stuck in a rut Barham & Isard, HotOS’19. In this paper we argue that systems for numerical computing are stuck in a local basin of performance and programmability. Systems researchers are doing an excellent job improving the performance of 5-year old benchmarks, but gradually making it harder to explore innovative machine learning research ideas.

An open-source benchmark suite for microservices and their hardware-software implications for cloud & edge systems

The Morning Paper

An open-source benchmark suite for microservices and their hardware-software implications for cloud & edge systems Gan et al., Systems built with lots of microservices have different operational characteristics to those built from a small number of monoliths, we’d like to study and better understand those differences. In this paper we explore the implications microservices have across the cloud system stack. Operating system and network implications.

I/O Waiting CPU Time – ‘wa’ in Top


CPU consumption in Unix/Linux operating systems is broken down into 8 different metrics: User CPU time , System CPU time , nice CPU time , Idle CPU time , Waiting CPU time , Hardware Interrupt CPU time , Software Interrupt CPU time , and Stolen CPU time. tutorial performance cpu operating systems performance engineering linux operating system root cause analysis memory analysis unix operating system cpu usage

Build automated self-healing systems with xMatters and Dynatrace (Part 1 of 3)


In this three-part blog series, we’ll share the following three common problem scenarios that you can easily solve by building an automated self-healing system with Dynatrace and xMatters Flow Designer: Process crash. Depending on the type of Dynatrace issue, xMatters prompts on-call resources with response option buttons that launch workflows across your systems to start the automated self-healing process—and to keep stakeholders and customers updated. Dynatrace news.

Scaling Uber’s Apache Hadoop Distributed File System for Growth

Uber Engineering

This analysis powers our services and enables the delivery of more seamless and reliable user … The post Scaling Uber’s Apache Hadoop Distributed File System for Growth appeared first on Uber Engineering Blog. Three years ago, Uber Engineering adopted Hadoop as the storage ( HDFS ) and compute ( YARN ) infrastructure for our organization’s big data analysis.

Software Systems Will Fail

Professor Beekums

Gitlab had a very public outage last month. Most companies provide some kind of explanation when their services are interrupted. Those are usually sanitized (or seem sanitized) to make things seem better than they actually are. Gitlab instead provided an extremely detailed report of the incident as well as all the things they know they could be better at. Some of my friends were extremely troubled by the report.

Build automated self-healing systems with xMatters and Dynatrace (Part 2 of 3)


In this alert, xMatters includes all the important incident information from Dynatrace, so there’s no need for you to visit additional system dashboards. Based on this contextual data, resources are prompted with their pre-configured response options, each of which kicks off a workflow across systems (based on the severity of the issue). Depending on the type of the issue, xMatters launches workflows across your systems to start the automated self-healing process.

Partitioned Hive Table Across Storage Systems Using Alluxio


This is where Alluxio comes in and interfaces with applications like Hive as a distributed virtual file system to create tables with multiple partitionings in a different storage system. In this regard, data will always reside in the under-storage system as the source of truth and can be residing temporarily in the Alluxio file system.

Different CPU Times: Unix/Linux ‘top’


CPU consumption in Unix/Linux operating systems is studied using eight different metrics: User CPU time, System CPU time, nice CPU time, Idle CPU time, Waiting CPU time, Hardware Interrupt CPU time, Software Interrupt CPU time, Stolen CPU time. User CPU Time and System CPU Time. In order to understand ‘user’ CPU Time, one should understand ‘system’ CPU time as well, since they go hand in hand. This will be accounted as ‘system’ CPU time.

BPF Performance Tools: Linux System and Application Observability (book)

Brendan Gregg

BPF (eBPF) tracing is a superpower that can analyze everything, and I'll show you how in my upcoming book BPF Performance Tools: Linux System and Application Observability , coming soon from Addison Wesley. At over 700 pages, it covers CPUs, memory, disks, file systems, networking, multiple languages, applications, containers, hypervisors, security analysis, and the Linux kernel. - A time where you can pose arbitrary questions of the system, and it can answer them.

Migrating a privacy-safe information extraction system to a Software 2.0 design

The Morning Paper

Migrating a privacy-safe information extraction system to a software 2.0 This is a comparatively short (7 pages) but very interesting paper detailing the migration of a software system to a ‘Software 2.0’ Replacing these rules with a machine learned component dramatically simplified the code base (45 Kloc deleted) and set the system back onto a growth and improvement trajectory. system. design , Sheng, CIDR’20.

Watching you watch: the tracking system of over-the-top TV streaming devices

The Morning Paper

Watching you watch: the tracking ecosystem of over-the-top TV streaming devices , Moghaddam et al., CCS’19. The results from this paper are all too predictable: channels on Over-The-Top (OTT) streaming devices are insecure and riddled with privacy leaks. The authors quantify the scale of the problem, and note that users have even less viable defence mechanisms than they do on web and mobile platforms. When you watch TV, the TV is watching you.

In Defense of Humanity—How Complex Systems Failed in Westworld **spoilers**

High Scalability

The reason is in How Complex Systems Fail. How Complex Systems Fail The Westworld season finale made an interesting claim: humans are so simple and predictable they can be encoded by a 10,247-line algorithm. Small enough to fit in the pages of a thin virtual book. Perhaps my brain was already driven into a meta- fugal state by a torturous, Escher-like, time shifting plot line , but I did observe myself thinking— that could be true.

Games 156

Three Other Models of Computer System Performance: Part 1

ACM Sigarch

Computer systems, from the Internet-of-Things devices to datacenters, are complex and optimizing them can enhance capability and save money. Existing systems can be studied with measurement, while prospective systems are most often studied by extrapolating from measurements of prior systems or via simulation software that mimics target system function and provides performance metrics. It provides a quick calculation for what a system may or can’t do.

50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system

The Morning Paper

50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system Reardon et al., Side-channels are typically an unintentional consequence of a complicated system. USENIX Security Symposium 2019. The problem is all inside your app, she said to me / The answer is easy if you take it logically / I’d like to help data in its struggle to be free / There must be fifty ways to leak their data.

Fine-grained, secure and efficient data provenance on blockchain systems

The Morning Paper

Fine-grained, secure and efficient data provenance on blockchain systems Ruan et al., That’s hard to do in today’s blockchain systems for two reasons: Provenance can only be determined by querying and replaying all on-chain transactions, which is inefficient and an offline activity. They demonstrate that provenance queries are efficient, and the system incurs small storage overhead. VLDB’19.

Amazon Aurora development team wins the 2019 ACM SIGMOD Systems Award

All Things Distributed

This week, the developers of Amazon Aurora have won the 2019 Association for Computing Machinery's (ACM) Special Interest Group on Management of Data (SIGMOD) Systems Award. The award recognizes "an individual or set of individuals for the development of a software or hardware system whose technical contributions have had significant impact on the theory or practice of large-scale data management systems

File systems unfit as distributed storage backends: lessons from ten years of Ceph evolution

The Morning Paper

File systems unfit as distributed storage backends: lessons from 10 years of Ceph evolution Aghayev et al., In this case, the assumption that a distributed storage backend should clearly be layered on top of a local file system. Ceph is a widely-used, open-source distributed file system that followed this convention [of building on top of a local file system] for a decade. ” Ten years of building on local file systems.

PyTorch-BigGraph: a large-scale graph embedding system

The Morning Paper

PyTorch-BigGraph: a large-scale graph embedding system Lerer et al., SysML’19. We looked at graph neural networks earlier this year, which operate directly over a graph structure.