This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
With the enormous attack surface of cloud providers like AWS, Azure, and GCP, why aren't there more security problems? Data breaches and cyber attacks occur daily. How do you explain the unreasonable effectiveness of cloud security? Google has an ebook on their security approach; Microsoft has some web pages. Both are the equivalent of that person who is disgustingly healthy and you ask them how they do it and they say "I don't know.
Guest Post by Wendy Dessler. Source- Pixabay. When trying to develop a new piece of software or an app, one of the first things a developer has to do is pick a programming language. For years, the debate has raged on regarding which programming language is better, Java or Scala. While some argue that just because Java is older it is better, others believe Scala is better for a variety of reasons.
Exploring use cases for the two tools. This episode of the O’Reilly Podcast, features a conversation on serverless and Kubernetes, with Kelsey Hightower , developer advocate for Google Cloud Platform at Google (and co-author of Kubernetes: Up and Running ), and Chris Gaun , Kubernetes product manager at Mesosphere. Discussion points: Hightower and Gaun agree that the biggest issue people face when deciding to start using Kubernetes is an underestimation of the learning curve.
In America, it is generally considered taboo to discuss salaries. Some of this is surely rooted in socially normative behavior, where discussions of personal finances are considered conversation’s most intimate tier. Some of it probably comes from that stigma being cemented into the “professional identity” expected of employees. (Some companies have even gone so far as to make open salary discussions a dismissible offense !
TL;DR : we cannot continue to use as much JavaScript as is now “normal” and expect the web to flourish. At the same time, most developers experience no constraint on their use of JS…until it’s too late. “JS neutral” (or negative) tools are here, but we’re stuck in a rhetorical rut. We need to reset our conversation about “developer experience” to factor in the asymmetric cost of JS.
In this article, we'll go through the major concepts of performance optimization catered towards web builder platforms so you can ensure your hand-built site loads fast.
New databases used to be announced seemingly every week. While database neogenesis has slowed down considerably, it has not gone necrotic. RISELabs , those wonderfully innovative folks over at Berkeley, have uplifted their Anna datatabase —a shared-nothing, thread-per-core architecture to achieve lightning-fast speeds by avoiding all coordination mechanisms—to become cloud-aware.
The other week, there were a few articles that came out about Chrome’s NOSCRIPT intervention: an intervention that would disable JavaScript altogether on slow networks. Chrome intervening on behalf of the user when it feels the network is iffy isn’t exactly new. Chrome has several interventions including one that can replace images with placeholders and one that bypasses web fonts on slow connections.
Sign up to get articles personalized to your interests!
Technology Performance Pulse brings together the best content for technology performance professionals from the widest variety of industry thought leaders.
The other week, there were a few articles that came out about Chrome’s NOSCRIPT intervention: an intervention that would disable JavaScript altogether on slow networks. Chrome intervening on behalf of the user when it feels the network is iffy isn’t exactly new. Chrome has several interventions including one that can replace images with placeholders and one that bypasses web fonts on slow connections.
It has been quite some time since TLS underwent a major update. TLS 1.2 was defined in RFC 5246 10 years ago, back in August 2008. Now, 10 years later a faster, stronger, and more reliable version of TLS has been released. Today we’re very excited to announce that KeyCDN has officially launched TLS 1.3 support for all customers. This brings with it some exciting benefits which we will discuss throughout this article.
From chaos architecture to event streaming to leading teams, the O'Reilly Software Architecture Conference offers a unique depth and breadth of content. We received more than 200 abstracts for talks for the 2018 O'Reilly Software Architecture Conference in London—on both expected and surprising topics. We continue to see strong interest in microservices and its related ecosystem, including topics like DevOps and tools like Kubernetes.
These are exciting times in the evolution of stream-processing. As we have seen in previous blogs , the digital twin model offers a breakthrough approach to structuring stateful stream-processing applications. This model organizes key information about each data source (for example, an IoT device, e-commerce shopper, or medical patient) in a software component that tracks the data source’s evolving state and encapsulates algorithms, such as predictive analytics, for interpreting that state and g
In this blog post we shall discuss how you can analyze slow query logs from Amazon Aurora for MySQL , (referred to as Amazon Aurora in the remaining blog). The tools and techniques explained here apply to the other MySQL compatible services available under Amazon Aurora. However, we’ll focus specially on analyzing slow logs from Amazon Aurora version 2 (MySQL 5.7 compatible) using pt-query-digest.
Hey, it's HighScalability time: @danielbryantuk : "A LAMP stack is a good thing. Never inflict a distributed system on yourself unless you have too." @mipsytipsy #CloudNativeLondon. Do you like this sort of Stuff? Please support me on Patreon and you'll get 100 free cloud credits in heaven. Know anyone looking for a simple book explaining the cloud?
Many people ask what the difference between Alpha and Beta testing is? Both have important parts to play in bringing new or improved software to market. While the questions they ask serve different purposes, they are both forms of acceptance testing. Alpha and Beta testing differ in a number of ways, not least with the stage in development when they are implemented.
The key to success in life is learning from your mistakes. The same can be said for web development. Error tracking is a vital component to any web project because it helps you pinpoint performance problems before they get out of hand. Let’s take a look at some of the best error monitoring tools and strategies for 2018. What is Error Tracking?
Most modern web applications need to be able to handle data consumption requests and data manipulation requests from clients using HTTP. It is the norm to pass JSON data between these requests so it makes sense to use a NoSQL document database because JSON and similar is the common storage format, eliminating the need to marshal data to new formats in every request.
Here at SpeedCurve, we are continually gathering detailed performance data from tens of thousands of web pages. This gives us a relatively unique opportunity to analyse and aggregate performance metrics to gain some interesting insights. In this post, I'm going to analyse some browser-based paint timing metrics: First Paint & First Contentful Paint (defined in the Paint Timing spec and implemented in Chromium).
A few months ago I wrote a blog post on How to Capture Per Process Metrics in PMM. Since that time, Nick Cabatoff has made a lot of improvements to Process Exporter and I’ve improved the Grafana Dashboard to match. I will not go through installation instructions, they are well covered in original blog post. This post covers features available in release 0.4.0 Here are a few new features you might find of interest: Used Memory.
Hey, it's HighScalability time: The Cloud Native Interactive Landscape is fecund. You are viewing 581 cards with a total of 1,237,157 stars, market cap of $6.86T and funding of $20.1B. ( changelog ). Do you like this sort of Stuff? Please lend me your support on Patreon. It would mean a great deal to me. And if you know anyone looking for a simple book that uses lots of pictures and lots of examples to explain the cloud, then please recommend my new book: Explain the Cloud Like I'm 10.
Cryptocurrencies have had a lot of ups and downs. A lot of questions have been asked about whether they’re actually viable or not. These conversations have been focused on the technical problems such as slow transactions, preventing the 51% attack, bugs in smart contracts, etc. Yet, solving technical problems won’t have as much of an effect as other factors.
There was a poll posted the other day by Max on Twitter and it has lead to some fairly heated follow-up discussion (Developers being angry on Twitter? Shocking, I know.). Max posted the following question: Given these classes: red { color: red; }.blue { color: blue; }. Which color would these divs be? The correct answer is that they’re both blue.
Chrome Extensions have been around for a long time. I believe they are a very under-explored technology - and if you’re a traditional web developer, there’s a very small learning curve since Chrome Extensions are comprised of HTML, JavaScript and CSS. Bonus - you don’t have to worry about every browser under the sun, just Chrome! (though Firefox is becoming extension-friendly, it might be a good idea to not include Chrome-only web features).
According to Google, a website can lose as many as half its visitors while loading. This means you want to keep load times short and sweet to maximize user experience. However, your MachMetrics reports are showing that your page load times are much too slow. That’s valuable information, but what’s the next step? Now that you know you’re lagging, it’s time to kick your remediation plan into high gear.
A little over a decade ago, I was part of a team introducing new practices to a 200+ person, distributed development team. A lot of people were too quick to understand them. Some participated in stand-up as if it were a one-way status meeting. Others were still creating long-lived branches in Perforce as if they were still using ClearCase. "Stories" was just a new word for the technical tasks they had always assigned.
Like an amoeba the public cloud is extending fingerlike projections to the edge in a new kind of architecture that creates a world spanning distributed infrastructure under one centralized management, billing, and security domain. This issue—the deep nature of centralization—came up as a comment on my article What Do You Believe Now That You Didn't Five Years Ago?
There’s something deeply ingrained in many developers, including myself, that creates a tendency to over-engineer. Maybe it’s how we’re taught or maybe it’s a natural desire to “future proof” our code. Regardless, this tendency is so strong that even being aware of it is not enough to prevent the behavior. Earlier this year, I was working on a system for helping users filter their emails.
You’ve got a backlog full of innovative product ideas that will transform your business results, but you just can’t hire people quickly enough to build and deliver your wondrous innovations. Hiring is so hard?—?finding good software engineers takes so long and requires so much effort… but it doesn’t have to. 61 percent of C-suite executives believe access to developer talent is a threat to the success of their business.
As developers, we have encountered scenarios where some of the code we write can be reused by other code pieces. This has brought the concepts of code reuse in paradigms like object oriented programming. In this article, the author seeks to explain when to reuse code as well as how to achieve code reuse. The post Inheritance And Composition In A PHP Application appeared first on The Polyglot Developer.
What happens when power is lost to all nodes of a HCI Cluster? Ever wondered what happens when all power is simultaneously lost on a HCI cluster? One of the core principles of cloud design is that components are expected to fail, but the cluster as a whole should stay “up” We wanted to see what happens when all components fail at once, so we designed an X-Ray test to do exactly that.
Memory has a dramatic impact on SQL Server Performance. Fortunately, in SQL Server you can either use DMVs, , Extended Events, sp_server_diagnostics system procedure or SQL Profiler to server memory usage and track down root cause of SQL Server memory bottlenecks. In this article, I will provide you high-level overview of these memory-related tools.
Hey, it's HighScalability time: Get antsy waiting 60 seconds for a shot? Imagine taking over 300,000 photos over 14 years, waiting for Mount Colima to erupt. Sergio Tapiro studied, waited, and snapped. Do you like this sort of Stuff? Please lend me your support on Patreon. It would mean a great deal to me. And if you know anyone looking for a simple book that uses lots of pictures and lots of examples to explain the cloud, then please recommend my new book: Explain the Cloud Like I'm 10.
MySQL has locking capabilities, for example table and row level locking, and such locks are needed to control data integrity in multi-user concurrency. Deadlocks—where two or more transactions are waiting for one another to give up locks before the transactions can proceed successfully—are an unwanted situation. It is a classic problem for all databases including MySQL/PostgreSQL/Oracle etc.
These are exciting times in the evolution of stream-processing. As we have seen in previous blogs , the digital twin model offers a breakthrough approach to structuring stateful stream-processing applications. This model organizes key information about each data source (for example, an IoT device, e-commerce shopper, or medical patient) in a software component that tracks the data source’s evolving state and encapsulates algorithms, such as predictive analytics, for interpreting that state and g
Are you into video games, because I certainly am. Did you grow up playing the classics on your Nintendo Entertainment System (NES) and Nintendo 64? I did, and I still can’t get enough of them. If you’re like me and love video games and want to go back to simpler times, you can actually build your own entertainment station that contains a mashup of all the best consoles.
Cryptocurrencies have had a lot of ups and downs. A lot of questions have been asked about whether they’re actually viable or not. These conversations have been focused on the technical problems such as slow transactions, preventing the 51% attack, bugs in smart contracts, etc. Yet, solving technical problems won’t have as much of an effect as other factors.
Most Intel microprocessors support “HyperThreading” (Intel’s trademark for their implementation of “simultaneous multithreading”) — which allows the hardware to support (typically) two “Logical Processors” for each physical core. Processes running on the two Logical Processors share most of the processor resources (particularly caches and execution units).
Wake up! It's HighScalability time: A swarm of 300 autonomous burner drones take flight like sparkle from a fairy godmother's wand. ( mnn ). Do you like this sort of Stuff? Please lend me your support on Patreon. It would mean a great deal to me. And if you know anyone looking for a simple book that uses lots of pictures and lots of examples to explain the cloud, then please recommend my new book: Explain the Cloud Like I'm 10.
Creating a HCI benchmark to simulate multi-tennent workloads. HCI deployments are typically multi-tennant and often different nodes will support different types of workloads. It is very common to have large resource-hungry databases separated across nodes using anti-affinity rules. As with traditional storage, applications are writing to a shared storage environment which is necessary to support VM movement.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content