Sat.Jul 27, 2024 - Fri.Aug 02, 2024

article thumbnail

How Kubernetes Changed the Networking Model and What Developers Should Know about eBPF and Cilium

DZone

Enterprise networking is a radically different discipline in today’s microservices, containers, and Kubernetes paradigm than what it used to be in the old three-tier architecture world. Containers broke traditional networking models, and in this networking rethink for the distributed computing era, a lot has happened in a very short period of time. In this exclusive interview, Nicolas Vibert — senior technical engineer at Isovalent — traces this evolution and explains how open-source projects li

Network 297
article thumbnail

Collaborate with peers in hunting security threats

Dynatrace

When kicking off a threat hunting activity, you can immediately share your investigation with your teammates, to keep them up-to-date and allow them to collaborate with the ongoing investigation. Sharing a case There are several ways to share a case: Personal or group sharing – Select colleagues by name or a group to share the case. Link sharing – Generate and distribute a shared link in Slack or include it in your report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

cppfront: Midsummer update

Sutter's Mill

Over the winter and spring I spent a bunch of time building my essay “C++ safety, in context” and the related ACCU 2024 safety keynote , and on behind-the-scenes work toward improving C++ memory safety that you’ll be hearing more about in the coming months (including a lock-free data structure that’s wait-free and constant-time for nearly all operations; that was fun to develop and could be useful for making certain existing C and C++ code safer, we’ll see).

C++ 87
article thumbnail

Update Your Percona Release Repository (Or Start Using It!)

Percona

We published a blog a few months back about incorporating telemetry into our core database products.

article thumbnail

Ensuring Data Integrity Through Anomaly Detection: Essential Tools for Data Engineers

DZone

In the trending landscape of Machine Learning and AI, companies are tirelessly innovating to deliver cutting-edge solutions for their customers. However, amidst this rapid evolution, ensuring a robust data universe characterized by high quality and integrity is indispensable. While much emphasis is often placed on refining AI models, the significance of pristine datasets can sometimes be overshadowed.

article thumbnail

Dynatrace SaaS release notes version 1.297

Dynatrace

We have released Dynatrace version 1.297. To learn what’s new, have a look at the release notes. The post Dynatrace SaaS release notes version 1.297 appeared first on Dynatrace news.

176
176
article thumbnail

US automakers are struggling with electrification. They won’t have that luxury bringing autonomy to market.

The Agile Manager

Four years ago today, I blogged about the difficulty automakers faced in transitioning to electric vehicles , specifically that there were consequences to transitioning too soon or too late. Here we are, four years later, and US automakers are in a tight place. Manufacturers invested heavily in the factories, only for sales to stall right when OEMs need them to soar.

More Trending

article thumbnail

Interference in A/B Tests

DZone

A/B testing is the gold standard for online experimentation used by most companies to test out their product features. Whereas A/B test experimentation works just fine in most settings, it is particularly susceptible to interference bias, particularly in the case of online marketplaces or social networks. In this article, we aim to look at the situations with interference bias and some potential ways to mitigate its effect on evaluation.

Testing 256
article thumbnail

Plot Your REST Endpoints Using grafana-infinity-datasource

DZone

When it comes to observability Grafana is the go-to tool for visualization. A Grafana dashboard consists of various forms of visualizations which are usually backed by a database. This is not always the case. Sometimes instead of pushing the data from the database as is, you might want to refine the data. This cannot always be achieved through the functionalities the DB provides.

Database 247
article thumbnail

How To Achieve High GC Throughput

DZone

In this post, let’s explore a key performance metric studied during garbage collection analysis: "GC throughput." We’ll understand what it means, its significance in Java applications, and how it impacts overall performance. Additionally, we’ll delve into actionable strategies to improve GC throughput, unlocking its benefits for modern software development.

Java 235
article thumbnail

Real-Time Anomaly Detection Using Large Language Models

DZone

The capability to detect anomalies becomes important in the data-driven world of today and is a key component for various industries such as finance, healthcare, cybersecurity, and manufacturing. Anomalies can be a sign of fraud, system failings, security incidents, or other important events that require immediate attention. The volume, velocity, and variety of streaming data are difficult for traditional anomaly detection techniques to handle.

article thumbnail

K3s vs. Talos Linux

DZone

In the world of Kubernetes choosing the right technology can make a big difference in how smoothly and efficiently our applications run. This is where focused Kubernetes distributions like K3s and Talos Linux stand out. From large data centers to smaller devices on the edge, Kubernetes plays an important role in managing applications across various environments.

article thumbnail

Black Hat 2024: Observability for DevSecOps and scaled security posture management

Dynatrace

Security concerns are soaring with the rise of generative AI and cloud-native tech. From securing elections to protecting data privacy, the stakes of cybersecurity are mounting around the globe. The AI boom is pushing DevSecOps teams across industries to the limit as they struggle to secure increasingly complex cloud applications against expanding attack surfaces.

Analytics 172
article thumbnail

Outlier Identification in Continuous Data Streams With Z-Score and Modified Z-Score in a Moving Window

DZone

My name is Maksim Kupriianov, and for the past few years, I have been actively involved in network monitoring. This means sending network probes from different locations within an organization’s network, analyzing the responses with regard to packet loss percentage and response times, and identifying places in the network where something has gone wrong.

Network 157
article thumbnail

A Hands-On Guide to OpenTelemetry: Better Tracing With Automatic Instrumentation

DZone

Are you ready to start your journey on the road to collecting telemetry data from your applications? Great observability begins with great instrumentation! In this series, you'll explore how to adopt OpenTelemetry (OTel) and how to instrument an application to collect tracing telemetry. You'll learn how to leverage out-of-the-box automatic instrumentation tools and understand when it's necessary to explore more advanced manual instrumentation for your applications.

157
157
article thumbnail

Beyond DORA compliance: How Dynatrace helps the financial sector stay resilient

Dynatrace

The Digital Operational Resilience Act (DORA) ensures that the European financial sector remains resilient during severe operational disruptions. DORA compliance is required of all organizations that fall under its jurisdiction by January 17, 2025. Financial institutions face an increased compliance burden with DORA. We estimate that Dynatrace can automate the majority of repetitive tasks and additional compliance burdens introduced by DORA technical requirements using analytics and automation b

article thumbnail

Beyond DORA compliance: How Dynatrace helps the financial sector stay resilient

Dynatrace

DORA ensures that the European financial sector remains resilient during severe operational disruptions. All impacted organizations must comply by January 17, 2025. Financial institutions face an increased compliance burden with DORA. We estimate that Dynatrace can automate the majority of repetitive tasks and additional compliance burdens introduced by DORA technical requirements using analytics and automation based on observability and security data.

article thumbnail

CrowdStrike update crisis: How Dynatrace helped customers recover in hours

Dynatrace

On July 19th, countless organizations had their operations disrupted by a routine software update from CrowdStrike, a popular cybersecurity software. The resulting outages wreaked havoc on customer experiences and left IT professionals scrambling to quickly find and repair affected systems. A wide variety of companies and industries have suffered the effects of this incident , from delayed flights to disruptions in healthcare, insurance, and the financial industry.

Airlines 177
article thumbnail

Monitoring and Troubleshooting Serverless Applications

DZone

Gone are the days when developers handled app development, server logs, infrastructures, and other resources single-handedly. With the introduction of serverless computing , businesses can build and deploy applications much faster. Serverless architectures offload routine tasks from developers and let them focus on app building. They offer scalable, flexible, and cost-effective solutions that eliminate the need to manage servers.