This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
As a member of the Platform Extensions practice I am one of the subject matter experts responsible for all services related to expanding the visibility of Dynatrace into technologies which aren’t available out of the box. For this blog post I want to focus on how you can leverage Dynatrace to get a lot of insight into your plugin code.
The computer doesnt know C++ and doesnt care if the software was written in Java, Haskell, or BASIC; no matter how the software is written, its going to execute binary machine code. Sorting is important, but not for the reasons a junior developer might think; almost nobody will need to implement a sorting algorithm, except as an exercise.
Attendees will have the same great Dynatrace experts teaching the sessions live via webcam (and we’d highly encourage you to turn on your webcam as well), the same virtual classroom to join and complete the hands-on exercises, and the same great content. Already Dynatrace Associate Certified?
Replay Traffic Testing Replay traffic refers to production traffic that is cloned and forked over to a different path in the service call graph, allowing us to exercise new/updated systems in a manner that simulates actual production conditions. This approach has a handful of benefits.
You study and practice coding interview problems for hours/days/weeks/months, only to be asked to merge two sorted lists. For many roles, you will be given a choice between a take-home codingexercise or a one-hour discussion with one of the engineers from the team. These questions reflect actual challenges that our teams face.
Change starts by thoroughly evaluating whether the current architecture, tools, and processes for configuration, infrastructure, code delivery pipelines, testing, and monitoring enable improved customer experience faster and with high quality or not. What do you see as the biggest challenge for performance and reliability?
As organizations adopt microservices architecture with cloud-native technologies such as Microsoft Azure , many quickly notice an increase in operational complexity. Design efficient use of your computing resources as demand changes and technologies evolves. Dynatrace news. Operational excellence. Performance efficiency. Reliability.
How to assess an environment’s security posture, risk and threat profile, and possible attack vectors, where perhaps you didn’t code the application or build the infrastructure, and where new code is deployed frequently, and the infrastructure is constantly changing? And this poses a significant risk. Showing a list of key processes.
Technology services firms are going heavy on AI in delivery of services. Tech services firms are instead applying AI to their own offerings to do things like accelerate the reverse-engineering of existing code and expedite forward engineering of new solutions. That statement doesnt apply just to code.
Over the last little while, I’ve been able to collect links to several interactive coding tools and apps that can help you supplement your skills in different areas of web development. This is a straightforward flexbox playground that also generates the code for you. “code golf”). TypeScript Exercises.
Let’s assume your team has just pushed new code and it passed pre-deployment testing. But wait, there is more: Davis doesn’t just tell what exactly happened; it also understands how everything is connected—the relationships and interdependencies between each layer, component, and bit of code in your application environment.
The building blocks of multi-tenancy are Linux namespaces , the very technology that makes LXC, Docker, and other kinds of containers possible. Let’s go back to that kernel code example earlier. This, in turn, allows processes to exercise certain privileges without having any privileges in the init user namespace.
Were addressing UB methodically, starting with addressing the common high-value cases that will do the most to harden our code: uninitialized variables, out-of-bounds access, pointer misuse, and the key UB cases that adversaries need to implement remote code execution. Spoiler: All constexpr / consteval compile-time code is UB-free.
We are constantly innovating on video encoding technology at Netflix, and we have a lot of content to encode. large portions of the entire Netflix catalog are re-encoded whenever we’ve made significant advancements in encoding technology. What problem are we solving? Encoding is not a one-time process?—?large We have one file?—?the
When we were designing the workshop, I said to Gien that I like the idea of a puzzle, and it would be great to have it large and always visible, but how can we do that when there are a number of exercises? In this exercise, teams break up the large domain into sub-domains. The ability to design exercises in Miro is out of this world.
This gets even more tricky when those integrations are over on-prem-only technologies, like MSMQ, that don’t integrate out-of-the-box with cloud alternatives like Azure Service Bus or Amazon SQS. Now go rewrite all your code… we’ll wait…are you done yet? It’s as if they’re saying, “Have you documented your system?
All these terms refer to related technology and practices. Causes can run the gamut — from coding errors to database slowdowns to hosting or network performance issues. APM has rapidly expanded to encompass a broad range of technologies and use cases. Why businesses need APM. What does APM do? APM core features.
Figuring out what kinds of problems are amenable to automation through code. So it behooves a software developer to spot what portions of human activity can be properly automated away through code, and then build that. Because if companies use code to automate business rules, they use ML/AI to automate decisions.
What does a modern technology stack for streamlined ML processes look like? If you peek under the hood of an ML-powered application, these days you will often find a repository of Python code. but to reference concrete tooling used today in order to ground what could otherwise be a somewhat abstract exercise.
is opinionated about how to organize JavaScript code, but it doesn’t have built-in opinions about how to organize CSS. and exercise best CSS practices. Then, we’ll remove everything in the styles/ directory (it’s all sample code). We could certainly code our layout directly on the TeaList component. Design Tokens.
Early on, business technology was mostly large-scale labor-saving data processing. It wasn't until the 1950s (well, more accurately, the rise of COBOL in the 1960s) that we really started capturing business workflows in code. It went unnoticed because their knowledge was captured in code, and the developers knew the code.
It had licensed a workflow technology and contracted a large number of people to code and configure a custom solution around it. The rules were implemented as IFTTT statements in a low-code language that did not allow them to be tested in isolation. When that happens, the exercise tends to yield no better than "less bad."
It's easy to assume that we're hiring competent developers who write high quality code, and most buyers don't know what to look for or how to look for technical quality. We can invest in people to become mobile solution developers who can write client and server code. Stronger hand-offs will slow down coding.
Alice is great at fixing hard bugs, writing test suites, doing code merges, and other unglamorous work. He trash-talks other technologies, companies, and people behind their backs, always finding something negative to say. He also attacks technologies that either don't leverage his own prior work, or don't conform to his own beliefs.
Traditional IT projects are mass economy-of-scale exercises: once development begins, armies of developers are unleashed. Clearly, a small team delivering documentation is nowhere near as significant an event as a large team delivering executable code. An Agile team is not an exercise in scale.
Decommissioning Public102 was an exercise in the mundane, gradually transitioning tiny service after tiny service to new homes over the course of weeks, as the development schedule allowed. An IP address in a config file is still hardcoded; it's just hardcoded in XML instead of code. It's not so easy with a junk drawer server.
Decades of poor architecture guidelines and lax developer discipline resulted in the commercial-off-the-shelf components of an ERP becoming inseparable from the custom code built around it. The exercise of assessing, modeling and dispositioning the landscape does offer valuable new ways of looking at legacy assets.
The closer one looks, the less a definition of "appiness" can be pinned down to specific technologies. Industry commentators often write as though the transition to mobile rigidly aligned OSes with specific technology platforms. Circa '07, those web apps were notably slower than native code could be.
This allows application code to introspect on the dynamic behavior of each data source, maintain synthetic metrics which aid the analysis, and create alerts when conditions require. This exercises the model’s code and surfaces issues and exceptions, which can be readily examined and resolved in a controlled environment.
This allows application code to introspect on the dynamic behavior of each data source, maintain synthetic metrics which aid the analysis, and create alerts when conditions require. This exercises the model’s code and surfaces issues and exceptions, which can be readily examined and resolved in a controlled environment.
Every member creates the most comprehensive understanding they can of each story, which they express both through artifact (story narrative or code for example) and collaboration with other team members (story walkthroughs and desk checks). All useful, but not directly contributory to the technology asset itself.
IT projects are often structured by area of technology specialization (e.g., This means that lots of development tasks may be flagged as “complete” but they’re complete only by assertion of a developer, not by “fact” of somebody who has exercised the code from end-to-end. The last person to commit code in support of a use case?
It ignores that any given person may misunderstand or outright disagree with a task, a technology choice or a work estimate. To wit: writing requirements to get past the next “phase gate” in the project lifecycle is not the same as writing actionable statements of business need that developers can code into functionality.
Employees will see replatforming as an exercise in re-creating software. The existing systems have their shortcomings, but we run a multi-billion dollar business on that code, so we must be pretty good at software. The latter will result in systemic distortions in the code, courtesy Conway's Law.
Tool 1: Dolly the Sheep Companies that are heavily rule-based - think insurance - eagerly moved their business rules into code. It was easy to move into code; it's just as easy to move it back into human-readable format. A clone of something extinct - our lost business knowledge - runs the risk of suffering severe defects.
Glossy proclamations of new strategic visions often boil down to a prosaic cost-cutting exercise, or into a failure of implementation." There are plenty of cookie-cutter frameworks for combining businesses, even their technology systems and operations. IT is at the center of deal synergy. We need to combine systems, and do so quickly.
The same thinking applies to how we invest the time of our highest-capable IT professionals: if we create teams to take the burden of rote coding off the shoulders of the most capable people, we should be able to produce more IT assets and thus drive greater returns from IT. That will considerably eclipse the $0.80
Because a company really doesn't need to spend money on technology. If the stock rises to $70, we exercise the call, and we'll have made a profit of $10m less whatever we paid for the 1m calls. Clearly, most technology boondoggles won't pass that test. Why is software development a "deployment of capital"?
Managing the new risks required everyone to exercise new discipline. One person forcing a hasty code change could upset operations and lead to sizable losses. Today’s newly minted AI as Well companies, like their earlier software counterparts, have to address operational matters of this new technology. A love of pain?
So, software is a part of a greater whole, and typically multiple generations of technologies must coexist peacefully and purposefully to provide a viable service. This is mixing concerns and leads to code that becomes strongly coupled, monolithic, hard to write, hard to read, hard to evolve, hard to test, and hard to reuse.
Unethical practices at companies lead to the creation of technology that we all use but often neglect the influence of those intended to serve. A real interaction between computers and humans starts at technological conception by understanding users through a sound and ethical user research discipline. What are ethics anyway?
Often, big brands have already established guidelines which mean there’s less room for me to experiment and exercise my creative muscles. The periods where design changes often go step-by-step with advances in technology. These days, product companies seem more interested in refining interfaces and simplifying user experiences.
(It’s worth noting: the right end of the spectrum also covers the more… “exotic” action items, like “This was caused by a Windows-issue, so let’s migrate our entire self-run physical infrastructure to Linux and rewrite the entire code base.” In practice (and I’ve done this exercise with teams), this spectrum can provide useful insight.
We all know about the genius of Alan Turing in cracking the Enigma code, turning WWII in the Allies’ favor. But what about the contributions of his colleague Joan Clarke, a marveled code-breaker at Bletchley Park with a double-first degree in mathematics from Oxford? We all are consumers of technologies. expounds Tina.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content