This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
New code-signing certificates follow the evolution of industry-security standards. New code signing signature algorithm recommended by NIST. This follows the recommendations of the National Institute of Standards and Technology (NIST) , which deprecated SHA-1, and has been possible since the desupport of Windows 7 and Windows 2008 R1.
I went to the launch event, got an iPhone on day 1, and when Apple finally shipped their SDK in March 2008 I was in the first wave of people who signed up as an iOS developer. In September 2008 Netflix ran an internal hack day event. I wonder if any of my code is still present in todays Netflixapps?)
The Qualys Threat Research Unit (TRU) has discovered a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH server (sshd) in glibc-based Linux systems. The CVE assigned to this vulnerability is CVE-2024-6387. This race condition affects sshd in its default configuration.
Then in 2008, Google issued a code yellow for application speed, and I was the code yellow lead for Google Docs. A critical part of the code yellow was ensuring Google's sites would be fast for users across the globe, even if they had slow networks and low end devices.
This approach was already at its limit back in 2008 when an Akamai CDN network had only ~25,000 delivery nodes. So, how can you know if a CDN is delivering HTTP 404 error codes for requests in a specific region? This was however the only option back then, since Real User Monitoring (RUM) didn’t yet exist.
The evolution of DevOps automation Since the concept of DevOps emerged around 2007 and 2008 in response to pain points with Agile development, DevOps automation has been continuously evolving. For example, consider an e-commerce website that automatically sends personalized discount codes to customers who abandon their shopping carts.
We talked about how we’re investing in better tooling to automatically scan code as part of the build process, e.g. using tools like Sonar and Barbara said, “Hey, what about this blog post you wanted to write? As far as I remember, Atlassian’s JIRA had already been used back when I started at Dynatrace in 2008. I have a new idea.
This system is much older than the PVS-Studio static code analyzer, but no one has tried to apply the analyzer on its code and review the errors. CMake is a cross-platform system for automating software building from source code. For comparison, the PVS-Studio analyzer appeared only in 2008. The CMake audience is huge.
Windows: Windows Server 2008. Improved OneAgent.NET code module handling on read-only file systems. Last compatible OneAgent version: 1.197. Windows: Windows 7 and 8.1 x86 (64bit-only). Vendor announcement. Last compatible OneAgent version: 1.197. x86 (32bit-only). Vendor announcement. Last compatible OneAgent version: 1.197.
A brief history of IPC at Netflix Netflix was early to the cloud, particularly for large-scale companies: we began the migration in 2008, and by 2010, Netflix streaming was fully run on AWS. Today we have a wealth of tools, both OSS and commercial, all designed for cloud-native environments.
However, unlike the early days of the web, static sites are no longer limited to developers working in a code editor. Piecing together a website using a WYSIWYG editor and seeing the code it generated was a fascinating and educational experience that sparked an initial interest in web design. Editing a blog post in MovableType 2.0
During the recession of 2008, they experienced firsthand how fast money and assets can vanish. By optimizing your code and fine-tuning your database infrastructure, you can enhance the flexibility and performance of your database environment, especially if you’re using cloud resources.
If you’re reading this, chances are you’ve played around with using AI tools like ChatGPT or GitHub Copilot to write code for you. So far I’ve read a gazillion blog posts about people’s experiences with these AI coding assistance tools. And if I switch tabs to view a paper from 2008, then a song from 2008 could start up.
Using the AWS Toolkit for Visual Studio , you can now deploy your.NET applications to AWS Elastic Beanstalk directly from your Visual Studio environment without changing any code. Amazon RDS currently supports SQL Server 2008 R2 and plans to add support for SQL Server 2012 later this year.
1:00 Intro and roadmap for the talk 2:28 1. cppfront recap 2:35 – green-field experiments are great; but cppfront is about refreshing C++ itself 3:28 – “when I say compatibility.
From the article: … Active objects dramatically improve our ability to reason about our thread’s code and operation by giving us higher-level abstractions and idioms that raise the semantic level of our program and let us express our intent more directly. 5 Avoid Calling Unknown Code While Inside a Critical Section (Dec 2007).
5 Avoid Calling Unknown Code While Inside a Critical Section (Dec 2007). 6 Use Lock Hierarchies to Avoid Deadlock (Jan 2008). Feb 2008). 8 Going Superlinear (Mar 2008). 9 Super Linearity and the Bigger Machine (Apr 2008). 10 Interrupt Politely (May 2008). 13 The Many Faces of Deadlock (Aug 2008).
5 Avoid Calling Unknown Code While Inside a Critical Section (Dec 2007). 6 Use Lock Hierarchies to Avoid Deadlock (Jan 2008). Feb 2008). 8 Going Superlinear (Mar 2008). 9 Super Linearity and the Bigger Machine (Apr 2008). 10 Interrupt Politely (May 2008). 13 The Many Faces of Deadlock (Aug 2008).
RISC-Vthe CPU you didnt know you alreadyhave Photo taken by Adrian at the RISC-V SummitKeynote I just attended the RISC-V Summit (Oct 22nd, 2024 at the Santa Clara Convention Center) to get up to date on the latest developments.
” Each step has been a twist on “what if we could write code to interact with a tamper-resistant ledger in real-time?” Mental contortions led to code contortions led to frustration. ” Most recently, I’ve been thinking about this in terms of the space we currently call “AI.”
From roughly 2008 until 2019 or so, real estate in this area was inexpensive, a long-lived aftereffect of the 2008 financial crisis (fewer buyers) as well as changes in where and how people vacationed (fewer tourists). Unsurprisingly, some flashpoints have emerged. COVID-19 changed this. Let’s start with detection.
Now we have a problem statement that we can reason about: why are large chunks of our code segment filled with zeroes? This command compares the code bytes in the crash dump (some of them are saved in the crash dump, just in case) against those on disk. In this case it said that 9322 bytes in the code in the crash dump were wrong.
Most notably, way back in 2008, Pat built a little open-source tooI called WebPageTest (now owned by Catchpoint) that has served as the biggest arrow in our collective web performance quiver for years. If you are looking to optimize LCP or other important resources, using fetchpriority is one of Pat's cheat codes for web performance.
It comes set to SQL Server 2008 compatibility (level 100), but we will start with a more modern setting of SQL Server 2017 (level 140): ALTER DATABASE StackOverflow2013 SET COMPATIBILITY_LEVEL = 140 ; The tests were performed on my laptop using SQL Server 2019 CU 2. The code may be easier to read and understand than the recursive CTE.
Imported from a Blogger post I wrote in 2008. Code shared on GitHub For some reason I seem to find time to write code in R when I’m on an airplane. The last two trips I made resulted in significant enhancements and debugging of the code for my headroom plot. The set of data is now split into ranges and color coded.
Imported from a Blogger post I wrote in 2008. Code shared on GitHub For some reason I seem to find time to write code in R when I’m on an airplane. The last two trips I made resulted in significant enhancements and debugging of the code for my headroom plot. The set of data is now split into ranges and color coded.
I happen to be using SQL Server 2019 CU16 but the details I’ll describe haven’t materially changed since partition level lock escalation was added to SQL Server 2008. Notice the lack of a check at 1250 due to the code quirk I mentioned. The code in HeapDataSetSession::EscalateLocks next calls sqlmin!IsEscalationPossible
A lot of this is a function of the fact that despite the dot-com bust and the 2008 financial crisis, the first two decades of the 2000s have been characterized by overall global economic growth. Is the code written to a degree of simplicity that it is comprehensively testable, and easily maintainable by other developers?
Anyone who cares to download and fork the code can do so. From 2008 to 2013, the Chrome project was based on WebKit, and a growing team of Chrome engineers began to contribute heavily "upstream." The signal to parties who might contribute code for these features could scarcely be clearer: your patch is unlikely to be accepted.
In hindsight it’s obvious that these zombies were caused by a trivial user-space coding bug. If you do care – if you want to wait for the process to quit – WaitForSingleObject(hProcess, INFINITE); – or query its exit code – GetExitCodeProcess(hProcess, &exitCode); – then you need to remember to close the handles after that.
Since SQL Server 2012 (and, to a much lesser extent, since SQL Server 2008), the most complete and flexible solution for monitoring events on a SQL Server instance has been Extended Events. Afraid of Extended Events? It is high time we all ditch Profiler and embrace the present.
“SQL Server 2016 running on the same hardware as SQL Server 2014, 2012, 2008, 2008 R2 or 2005 uses fewer resources and executes a wide range of workloads faster. For example, the improved compression capabilities applied to AlwaysOn are being tested and evaluated for use by the Backup/Restore code line. Table of Contents.
Table-valued parameters have been around since SQL Server 2008 and provide a useful mechanism for sending multiple rows of data to SQL Server, brought together as a single parameterized call. The DataTable can be created multiple ways in the.NET code, but a common way to create the table is something like the following: System.
If you have instances running older versions like SQL Server 2008 R2 (I found one!), You could also not be lazy like me, and run the code in Powershell instead of a CMS query window, where you could easily filter out databases given any number of properties before ever hitting compile-time issues.
The intent behind CSSDOC is to provide a standardized way of commenting CSS making use of the very well known DocBlock way of commenting source-code. DocBlock is a very common form of documenting source code in programming that has proven to be very popular for both PHP and Javascript.
SSRS 2008 brought that component into the reporting service module. To tune for a slow report, that usually means you need to create indexes for that specific report or tune the code within the report. In the early days of SSRS, a requirement was to also install and configure Internet Information Services (IIS).
This content is derived from material presented in a ThoughtWorks-sponsored webcast in June 2008. For example, a team that infrequently performs its build manually today will not be able to cope with a build that automatically fires with each code commit and fails if code quality levels are below a specified threshold.
The simplest of them is that open-source projects are those whose source code is available to read and reuse in other projects. You can just navigate to their repository, open the files, analyze the code, change according to yourself and reuse it as per your requirement. . Contribution to open-source is not equal to coding.
The presentation discusses a family of simple performance models that I developed over the last 20 years — originally in support of processor and system design at SGI (1996-1999), IBM (1999-2005), and AMD (2006-2008), but more recently in support of system procurements at The Texas Advanced Computing Center (TACC) (2009-present).
Borrowing and adapting code from a previous post, Examining the Performance Impact of an Adhoc Workload , we will first create two stored procedures. ORDER BY [ Short Query Text ] ; The query_hash was added in SQL Server 2008, and is based on the tree of the logical operators generated by the Query Optimizer for the statement text.
The other is that it is primarily concerned with compliance with protocols, procedures or regulations, such as ITIL or Sarbanes-Oxley or even coding and architectural standards. As the financial crisis hit in 2008, it became glaringly obvious that few bank directors had any detailed understanding of either banking or risk.)
CPU Utilization and Power Consumption (Source: Blackburn 2008). Server Power Consumption (Source: Intel Labs 2008). I already had Google Analytics installed, so I added the following code to each page. Unfortunately, this also means that the more the CPU usage correlates to power consumption.
CPU Utilization and Power Consumption (Source: Blackburn 2008). Server Power Consumption (Source: Intel Labs 2008). I already had Google Analytics installed, so I added the following code to each page. Unfortunately, this also means that the more the CPU usage correlates to power consumption.
CPU Utilization and Power Consumption (Source: Blackburn 2008). Server Power Consumption (Source: Intel Labs 2008). I already had Google Analytics installed, so I added the following code to each page. Unfortunately, this also means that the more the CPU usage correlates to power consumption.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content