August, 2024

article thumbnail

Essential Guidelines for Building Optimized ETL Data Pipelines in the Cloud With Azure Data Factory

DZone

When building ETL data pipelines using Azure Data Factory (ADF) to process huge amounts of data from different sources, you may often run into performance and design-related challenges. This article will serve as a guide in building high-performance ETL pipelines that are both efficient and scalable.

Azure 306
article thumbnail

Taming DORA compliance with AI, observability, and security

Dynatrace

The Digital Operational Resilience Act (DORA) adopted by the EU addresses the digital and cybersecurity resilience of financial institutions. Although DORA helps banking and financial institutions prevent, respond to, and recover from critical cybersecurity incidents, DORA compliance could present many hurdles for financial institutions. Applying the DORA framework is especially challenging as organizations move more workloads to the cloud and manage sprawling hybrid and multi-cloud environments

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

blocking=render: Why would you do that?!

CSS Wizardry

WebKit have recently announced their intent to implement the blocking=render attribute for and elements, bringing them in line with support already available in Blink and generally positive sentiment in Firefox. The blocking=render attribute allows developers to explicitly mark a resource as render blocking, but… why on earth would you want to do that?!

C++ 260
article thumbnail

Continuous reinvention: A brief history of block storage at AWS

All Things Distributed

Marc Olson, a long-time Amazonian, discusses the evolution of EBS, highlighting hard-won lessons in queueing theory, the importance of comprehensive instrumentation, and the value of incrementalism versus radical changes. It's an insightful look at how one of AWS’s foundational services has evolved to meet the needs of our customers.

Storage 189
article thumbnail

RabbitMQ Security and Compliance

Scalegrid

Follow fundamental procedures in authentication, encryption, and commitment to RabbitMQ security protocols to protect your RabbitMQ system and secure messages. This article provides instructions on how to fortify your RabbitMQ setup. Key Takeaways Securing RabbitMQ involves implementing strong authentication and authorization mechanisms, such as username/password pairs, X.509 certificates, and OAuth 2.0, to prevent unauthorized access and ensure data protection.

article thumbnail

MySQL Router and RestAPI – What Do They Have in Common?

Percona

The usage of MySQL Router as a Middleware/Proxy/Router has increased along with the rise in MySQL InnoDB Cluster usage. While it is still relatively easy to use in production, monitoring it to stay informed about its current status is essential.

article thumbnail

Anomaly Detection: The Dark Horse of Fraud Detection

DZone

Today, machine learning-based fraud prediction has become a mainstay in most organizations. The two common types of machine learning are supervised and unsupervised machine learning. Out of the two, supervised learning is the most desired choice for fraud prediction for apparent reasons. Supervised learning that learns the patterns from known fraud cases yields more accurate predictions.

More Trending

article thumbnail

Cache Grab: How Much Are You Leaving on the Table?

CSS Wizardry

For the longest time now, I have been obsessed with caching. I think every developer of any discipline would agree that caching is important, but I do tend to find that, particularly with web developers, gaps in knowledge leave a lot of opportunities for optimisation on the table. How does it affect you? Want to know everything (and more) about HTTP cache?

Cache 225
article thumbnail

Presentation: Why a Hedge Fund Built Its Own Database

InfoQ

James Munro discusses ArcticDB and the practicalities of building a performant time-series datastore and why transactions, particularly the Isolation in ACID is just not worth it.

Database 111
article thumbnail

Most Common RabbitMQ Use Cases

Scalegrid

Wondering where RabbitMQ fits into your architecture? This article expands on the most commonly used RabbitMQ use cases, from microservices to real-time notifications and IoT. Learn how RabbitMQ can boost your system’s efficiency and reliability in these practical scenarios. Key Takeaways RabbitMQ is a versatile message broker that improves communication across various applications, including microservices, background jobs, and IoT devices.

Ecommerce 130
article thumbnail

Solving pg_upgrade and lc_collate Mismatch Issues in PostgreSQL

Percona

Character collations determine the sort order and classification of characters. When creating a database with initdb, PostgreSQL normally sets the collation based on the operating system’s locale settings, but other special collations, such as “C,” “POSIX,” and “ucs_basic,” are available as alternatives. On Linux systems, updates to glibc can bring changes to collation rules.

C++ 113
article thumbnail

Cloud Build Unleashed: Expert Techniques for CI/CD Optimization

DZone

CI/CD and Its Importance We all know what CI/CD is and how it fosters a sense of collaboration among teams and enables them to deliver high-quality software efficiently and reliably. By automating the integration, testing , and deployment processes, CI/CD helps maintain code quality, reduce manual effort, and provide continuous feedback, ultimately leading to faster and more reliable software delivery.

Cloud 298
article thumbnail

Six causes of major software outages–And how to avoid them

Dynatrace

As recent events have demonstrated, major software outages are an ever-present threat in our increasingly digital world. From business operations to personal communication, the reliance on software and cloud infrastructure is only increasing. Outages can disrupt services, cause financial losses, and damage brand reputations. Understanding the causes of these outages is crucial for preventing them and ensuring smoother, more reliable tech operations.

Software 260
article thumbnail

Empowering builders with the new AWS Asia Pacific (Malaysia) Region

All Things Distributed

Builders are at the heart of AWS. Most recently, I visited Malaysia, the location of the newest AWS Region, our 34th globally, and home to a rapidly evolving technology sector, where businesses of all sizes are proving that solving hard human problems can be a profitable business model.

AWS 104
article thumbnail

For years, tech firms were fighting a war for talent. Now they are waging war on talent.

The Agile Manager

In the years immediately following the dot-com meltdown, there was more tech labor than there were tech jobs. That didn’t last long. By 2005, the tech economy had bounced back on its own. After that, the emergence of mobile (a new and lucrative category of tech) plus low interest rate policy by central banks fueled demand for tech. Before the first decade of the century was out, “tech labor scarcity” became an accepted norm.

article thumbnail

Reader Q&A: What does it mean to initialize an int?

Sutter's Mill

Acknowledgments: Thanks to Jens Maurer, Richard Smith, Krystian Stasiowski, and Ville Voutilainen, who are all ISO C++ committee core language experts, for helping make my answer below correct and precise. I recently got this question in email from Sam Johnson. Sam wrote, lightly edited: Given this code, at function local scope: int a; a = 5; So many people think initialization happens on line 1, because websites like cppreference defines initialization as “Initialization of a variable pro

C++ 94
article thumbnail

Dispelling Myths About PostgreSQL Default Privileges

Percona

The ALTER DEFAULT PRIVILEGES command allows us to set the privileges that will be applied to objects created in the future. It’s important to note that this does not affect privileges assigned to existing objects; default privileges can be set globally for objects created in the current database or in specified schemas.

Database 113
article thumbnail

Optimizing Software Quality: Unit Testing and Automation

DZone

Unit testing is the first line of defense against bugs. This level of protection is essential as it lays the foundation for the following testing processes: integration tests, acceptance testing, and finally manual testing, including exploratory testing. In this article, I will shed some light on what differentiates unit testing from other methods and will bring examples of when we can or cannot do without unit testing.

Testing 288
article thumbnail

Dynatrace Opportunity Insights uses AI prediction and real-user data to optimize business outcomes

Dynatrace

Performance and error optimization is complicated, and the approach to driving improvement has long relied on static recommendations disconnected from a site’s end users and their experiences. While traditional methods can help you understand when your users face poor performance or errors, understanding if and how much these problems impact your business remains largely guesswork.

Airlines 258
article thumbnail

Canva Opts for Amazon KDS over SNS+SQS to Save 85% with 25 Billion Events per Day

InfoQ

Canva evaluated different data massaging solutions for its Product Analytics Platform, including the combination of AWS SNS and SQS, MKS, and Amazon KDS, and eventually chose the latter, primarily based on its much lower costs. The company compared many aspects of these solutions, like performance, maintenance effort, and cost.

AWS 86
article thumbnail

Pinot for Low-Latency Offline Table Analytics

Uber Engineering

Comments

Latency 85
article thumbnail

Think Better

O'Reilly

Over the years, many of us have become accustomed to letting computers do our thinking for us. “That’s what the computer says” is a refrain in many bad customer service interactions. “That’s what the data says” is a variation—“the data” doesn’t say much if you don’t know how it was collected and how the data analysis was performed. “That’s what GPS says”—well, GPS is usually right, but I have seen GPS systems tell me to go the wrong way down a one-way street.

article thumbnail

How to Build a PostgreSQL Patch Test Environment on Ubuntu 22.04

Percona

While the well-established ways of building PostgreSQL from source still work, there are many new options on Linux as well. Postgres has adopted Meson as a build system, and there are more—and more granular—git commands.

Testing 111
article thumbnail

A Hands-On Guide to OpenTelemetry: Programmatic Instrumentation for Developers

DZone

Are you ready to start your journey on the road to collecting telemetry data from your applications? Great observability begins with great instrumentation! In this series, you'll explore how to adopt OpenTelemetry (OTel) and how to instrument an application to collect tracing telemetry. You'll learn how to leverage out-of-the-box automatic instrumentation tools and understand when it's necessary to explore more advanced manual instrumentation for your applications.

article thumbnail

Dynatrace commitment to safe OneAgent releases: Protecting your production environment

Dynatrace

Modern observability and security require comprehensive access to your hosts, processes, services, and applications to monitor system performance, conduct live debugging, and ensure application security protection. This level of access enables advanced capabilities such as runtime instrumentation and detailed diagnostics. While these techniques are powerful, they can pose risks if not managed properly, as demonstrated in the recent incident.

article thumbnail

Article: Scaling the Heights: Unveiling the Secrets of Azure Functions’ Cold Starts and Scalability

InfoQ

The insightful piece featured on InfoQ delves into the intricacies of Azure Functions’ Cold Starts, illuminating a topic frequently stirring debate within the serverless computing sphere. With the growing embrace of serverless architectures, discussions around Azure Functions’ cold starts have ignited a firestorm of controversy and given rise to numerous misconceptions.

Azure 84
article thumbnail

Improving how we collect RUM Data

Speed Curve

TL;DR; We're making improvements to how we collect RUM data. Most customers won't see significant changes to Core Web Vitals or other metrics but for a small number of customers some metrics will increase. This post will cover: What the changes are How the changes can affect Core Web Vitals and other metrics Why we are making the changes now What's Changing?

Metrics 56
article thumbnail

Jepsen Test Validates ACID Nature of Volt Streaming Capabilities

VoltDB

Volt Active Data (Volt) is a sophisticated real-time data platform intricately designed with multiple critical components, including high-speed data processing, in-memory storage, and ACID-compliant transactions. Volt’s outbound streaming data (also known as Export) functionality, a key aspect of its distributed database system, has multiple components crucial for efficient data movement.

Testing 52
article thumbnail

Effective Strategies for Recovering MySQL Group Replication From Failures

Percona

Group replication is a fault-tolerant/highly available replication topology that ensures if the primary node goes down, one of the other candidates or secondary members takes over so write and read operations can continue without any interruptions.

Strategy 104
article thumbnail

Why Replace External Database Caches?

DZone

Teams often consider external caches when the existing database cannot meet the required service-level agreement (SLA). This is a clear performance-oriented decision. Putting an external cache in front of the database is commonly used to compensate for subpar latency stemming from various factors, such as inefficient database internals, driver usage, infrastructure choices, traffic spikes, and so on.

Cache 278
article thumbnail

New SQL injection vulnerability in FileCatalyst Workflow

Dynatrace

Following Tenable Research’s disclosure of a critical SQL injection vulnerability in FileCatalyst Workflow in May 2024, further investigation by Dynatrace revealed another SQL injection vulnerability. The vulnerability, identified as CVE-2024-6632, allows the abuse of a form submission during the setup process to make unauthorized modifications of the database.

Database 247
article thumbnail

Performance Testing Tools: Top 10 Picks for 2024

Abstracta

Find our Top 10 Performance Testing Tools in this article, including a balanced mix of open-source platforms and proprietary testing tools. The post Performance Testing Tools: Top 10 Picks for 2024 appeared first on Blog about Software Development, Testing, and AI | Abstracta.

article thumbnail

Providing better attribution

Speed Curve

Making newer RUM metrics more actionable has been a significant priority for standards bodies. RUM has always been incredibly important for any organization focused on performance, but it’s only in the last few years that it has started to become more actionable. A big part of this shift has been better attribution so we can tell what's actually going on.

Metrics 52
article thumbnail

What is a Real-Time Data Platform?

VoltDB

In a world where 2.5 quintillion bytes of data are generated each day, enterprises have more data under their control than ever before. Unfortunately, many organizations lack the tools, infrastructure, and architecture needed to unlock the full value of that data. Just like you can’t finish a puzzle without all of the pieces, organizations can’t make the best decisions without being able to leverage all of the data they have at any given time.

IoT 52
article thumbnail

Open Source AI Database Agent Part 1: Introduction

Percona

Generative AI is top of mind for many engineers. The questions of how it can be applied to solve business problems and boost productivity are still up in the air.

article thumbnail

Improving Snowflake Performance by Mastering the Query Profile

DZone

Having worked with over 50 Snowflake customers across Europe and the Middle East, I've analyzed hundreds of Query Profiles and identified many issues including issues around performance and cost.

article thumbnail

Third-party vulnerabilities: Prioritize CVEs with vulnerable function insights

Dynatrace

The Dynatrace third-party vulnerabilities feature provides insights into vulnerable software packages by matching detected package identifiers and version numbers with known vulnerable software packages and related common vulnerabilities and exposures (CVEs). The risk of impact from an existing known vulnerability also depends on whether certain processes are using the vulnerable parts of a software component.

Java 242