This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Developer tools are one area where generative AI is already having a tangible impact on productivity and speed, and it's the reason I'm excited about Amazon CodeWhisperer.
As companies accelerate digital transformation, they implement modern cloud technologies like serverless functions. According to Flexera , serverless functions are the number one technology evaluated by enterprises and one of the top five cloud technologies in use at enterprises. The elasticity of serverless services helps organizations scale as needed.
REST APIs are the heart of any modern software application. Securing access to REST API s is critical for preventing unauthorized actions and protecting sensitive data. Additionally, companies must comply with regulations and standards to operate successfully. This article describes how we can protect REST APIs using Role-based access control (RBAC) in the Quarkus Java framework.
Ruchir Jha , Brian Harrington , Yingwu Zhao TL;DR Streaming alert evaluation scales much better than the traditional approach of polling time-series databases. It allows us to overcome high dimensionality/cardinality limitations of the time-series database. It opens doors to support more exciting use-cases. Engineers want their alerting system to be realtime, reliable, and actionable.
Indexes are generally considered to be the panacea when it comes to SQL performance tuning, and PostgreSQL supports different types of indexes catering to different use cases. I keep seeing many articles and talks on “tuning” discussing how creating new indexes speeds up SQL but rarely ones discussing removing them. The urge to create more and more indexes is found to be causing severe damage in many systems.
Optimize cost and availability while staying compliant Observability data like logs and metrics provide automated answers, root cause detection, and security issues. Customer decisions about data retention are often determined by important security, privacy, and legal issues. Customers must comply with internal and external policies and regulations that might demand them to keep specific data stored for a minimum period of time (for example, audit logs).
Deployment is the day when the software is finally released to the world. Yet, as Stackify CEO Matt Watson said, organizations lack confidence in deployment. One of the greatest strengths of agile is the ability to deploy rapidly. However, moving too fast and without following the right processes, one can witness problems like downtime, errors, and poor user experience.
eBPF has many uses in improving computer security, but just taking eBPF observability tools as-is and using them for security monitoring would be like driving your car into the ocean and expecting it to float. Observability tools are designed have the lowest overhead possible so that they are safe to run in production while analyzing an active performance issue.
Sign up to get articles personalized to your interests!
Technology Performance Pulse brings together the best content for technology performance professionals from the widest variety of industry thought leaders.
eBPF has many uses in improving computer security, but just taking eBPF observability tools as-is and using them for security monitoring would be like driving your car into the ocean and expecting it to float. Observability tools are designed have the lowest overhead possible so that they are safe to run in production while analyzing an active performance issue.
For starters, yes, Percona has chosen sides. We are a company of open source proponents. We’re also dedicated and active participants in the global open source community. But the intent here is to be informative, not to declare a winner between the two. Both open source and proprietary options have advantages. At the same time, it’s hard to ignore key differences and how they affect customers.
Traditionally, cloud-resource management is done by collecting telemetry data for critical-capacity resources and configuring multi-level reactive alerting (warnings, errors, and critical errors) for those resources. While the traditional approach to cloud-resource management might have been acceptable in the past, it doesn’t scale up to address the requirements of modern cloud environments.
This article outlines some of the key factors to consider while choosing whether to build or buy Incident Management software. When your organization realizes that it needs an Incident Management System (IMS), the first question is almost always, "Build or Buy?" Superficially, the requirements seem simple, and being a technical organization, you probably have the skills you need as well.
This post is a brief commentary on Martin Fowler’s post, An Example of LLM Prompting for Programming. If all I do is get you to read that post, I’ve done my job. So go ahead–click the link, and come back here if you want. There’s a lot of excitement about how the GPT models and their successors will change programming. That excitement is merited. But what’s also clear is that the process of programming doesn’t become “ChatGPT, please build me an enterprise application to sell shoes.
Did you notice that Percona Server for MongoDB 6.0.5-4 was released just a few days ago? This time around, it introduced improvements to the way we handle master key rotation for data at rest encryption as well as AWS IAM integration. One key to rule them all — improvements to master key rotation With the improvements introduced in Percona Server for MongoDB 6.0.5-4, one key path can be used for all servers in a clustered environment.
Cloud-native applications require observability and security that can scale, flex, and respond instantaneously. Dynatrace was built for this moment, and we’re excited to announce the Dynatrace Platform Subscription (DPS) —modern pricing with flexibility and transparency for cloud environments. With DPS, you make an annual spend commitment at the platform level and immediately gain access to use any capability in any quantity at any time.
Sometimes referred to as automated UI testing or visual regression testing, VRT checks software from a purely visual standpoint (taking a screenshot and comparing it against another approved screenshot). Cypress is an emerging test automation framework that enables teams to ship high-quality products faster. Cypress utilizes a modern architectural approach and is fully equipped with built-in screenshot functionality and also video recording capabilities, making it one of the best test automation
Selenium Conf 2023 may be over, but its learnings are sure to live on. In this article, I will give you an approach to what was my talk at the event, so you can have the step-by-step for creating load tests with JMeter DSL from. The post How to Create Load Tests with JMeter DSL from Selenium Scripts in Performance Testing Services appeared first on Abstracta Software Testing Services.
Even though open source software is firmly in the mainstream, used widely by businesses, governments, and everyone who owns a cell phone or computer, the question repeatedly arises: “Is open source software safe?” Broadly speaking, the answer is a resounding yes. But it’s worth examining what we mean by “safe,” contrasting open source software with proprietary software, and discussing when you should use caution.
We have released Dynatrace version 1.265 and started rolling out the latest Dynatrace to all Dynatrace SaaS environments. To learn what’s new, have a look at the release notes. The post Dynatrace SaaS release notes version 1.265 appeared first on Dynatrace news.
Functional testing is a type of testing that validates the functionality of a given application feature in accordance with software requirements. The output of each function is compared with the corresponding requirement to determine whether it meets the end user's expectations. As technology evolves and rapidly transforms, the only constant remains the need for speed.
Polestars and a few Teslas at Heathrow Hertz recently started to rent electric cars, and we’ve tried them out a few times. Most people are used to renting cars, but renting electric cars is a fairly new thing, so I’m sharing to help encourage people to try it out and to hopefully smooth the way with some learning and feedback ideas. We’re experienced electric car owners, and early adopters.
In this blog post, we will see how to persist the password inside the ProxySQL mysql_users table in hashed format only. Also, even if someone stored the password in cleartext, we see how to change those into the hashed format easily. Here we are just highlighting one of the scenarios during work on the client environment where we noticed that the ProxySQL mysql_users table had more than 100 user entries, but some of them were available/inserted into the clear text password, whereas some were ins
From the corridors of our county governments and municipalities to golden-domed state capitols to the nearly 700 federal office buildings in Washington, D.C., public sector leaders and their teams are progressing steadily toward the next chapter of their digital transformation. Ensuring secure applications amid rising complexity is a crucial part of this journey.
The test strategy is an organizational-level document that describes the general test approach, i.e., what needs to be achieved and how to achieve it. This document is outside the scope of the software testing life cycle (STLC) and does not specify testing requirements for a specific project. Instead, it establishes the common testing principles for all of the organization's projects.
The primary metric for memory bandwidth in multicore processors is that maximum sustained performance when using many cores. For most high-end processors these values have remained in the range of 75% to 85% of the peak DRAM bandwidth of the system over the past 15-20 years — an amazing accomplishment given the increase in core count (with its associated cache coherence issues), number of DRAM channels, and ever-increasing pipelining of the DRAMs themselves.
When you do a database restore, you want to have it done as soon as possible. In the case of disaster recovery, the situation is stressful enough on its own. And the database is unusable until the restore is done. So every minute matters. That becomes especially crucial with big datasets. Bringing physical backups in Percona Backup for MongoDB (PBM) was a big step toward the restoration speed.
eBPF has many uses in improving computer security, but just taking eBPF observability tools as-is and using them for security monitoring would be like driving your car into the ocean and expecting it to float. Observability tools are designed have the lowest overhead possible so that they are safe to run in production while analyzing an active performance issue.
In software development, feature interaction occurs when the behavior of a software system is affected by the combination of features or inputs. Feature interaction can cause unexpected and undesirable behavior in software systems, which can be challenging to detect and resolve. Feature interaction matrices are one of the techniques used to identify and analyze feature interaction in software systems.
You know what time it is… it’s time for the release roundup! Percona is a leading provider of unbiased, performance-first, open source database solutions that allow organizations to easily, securely, and affordably maintain business agility, minimize risks, and stay competitive, free from vendor lock-in. Our Release Roundups showcase the latest Percona software updates, tools, and features to help you manage and deploy our software.
As technology continues to advance, the use of Artificial Intelligence (AI) in various industries is becoming more common. One area where AI has shown significant.
Our CTO Roger Abelenda gave an approach for creating performance tests with JMeter DSL from Selenium scripts at Selenium Conf 2023. He taught something really useful for test automation and performance testing services: How to reuse Selenium tests to verify that a site works accurately. The post Performance Testing Services: Everything about JMeter DSL at Selenium Conf 2023 appeared first on Abstracta Software Testing Services.
The primary metric for memory bandwidth in multicore processors is that maximum sustained performance when using many cores. For most high-end processors these values have remained in the range of 75% to 85% of the peak DRAM bandwidth of the system over the past 15-20 years — an amazing accomplishment given the increase in core count (with its associated cache coherence issues), number of DRAM channels, and ever-increasing pipelining of the DRAMs themselves.
Drowning under endless data? Having access to large data sets can be helpful, but only if organizations are able to leverage insights from the information. Exploratory analytics with collaborative analytics capabilities can be a lifeline for CloudOps, ITOps, site reliability engineering, and other teams struggling to access, analyze, and conquer the never-ending deluge of big data.
The KubeCon + CloudNativeCon event kicked off with a slew of off-site events. I dropped in on Observability Day Europe and wanted to share a few things I found interesting. This event was set up to foster collaboration, discussion, and knowledge sharing of cloud-native observability projects (including but not necessarily limited to Prometheus, Fluentd, Fluent Bit, OpenTelemetry, and OpenMetrics), as well as vendor-neutral best practices for addressing observability challenges.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content