Sat.Dec 11, 2021 - Fri.Dec 17, 2021

article thumbnail

What is Log4Shell? The Log4Shell vulnerability explained (and what to do about it)

Dynatrace

Dynatrace news. Since December 10, days after a critical vulnerability known as Log4Shell was discovered in servers supporting the game Minecraft, millions of exploit attempts have been made of the Log4j 2 Java library, according to one team tracking the impact, with potential threat to millions more applications and devices across the globe. In this article, we’ll answer some of the most frequently asked questions about the Log4Shell vulnerability, and continue to add on as new questions come u

Internet 263
article thumbnail

How to Translate Android Text in JetPack Compose

DZone

Sometimes there are projects where Android’s native text management system falls short. For example, if we wanted to fix a translation error, adjust an explanation or add a new language without having to deploy a new version of the application, the Android system would not allow us to do so. In Apiumhub's case, we have an application with this problem.

Systems 252
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Designing Netflix

High Scalability

This is a guest post by Ankit Sirmorya. Ankit is working as a Machine Learning Lead/Sr. Machine Learning Engineer at Amazon and has led several machine-learning initiatives across the Amazon ecosystem. Ankit has been working on applying machine learning to solve ambiguous business problems and improve customer experience. For instance, he created a platform for experimenting with different hypotheses on Amazon product pages using reinforcement learning techniques.

Design 329
article thumbnail

Expanding the cloud: Introducing the AWS Asia Pacific (Jakarta) Region

All Things Distributed

AWS ada untuk Indonesia - Starting today the new AWS Asia Pacific (Jakarta) Region is now open!

AWS 198
article thumbnail

Log4j 2 Vulnerability: Identifying and Minimizing Production Risk

Dynatrace

Dynatrace news. Log4Shell, a zero-day exploit affecting the popular Apache package was made public on December 9, 2021. The National Vulnerability Database describes the exploit here. It results in remote code execution (RCE) by submitting a specially composed request. This means that an attacker with control over a string that gets passed to the log4j 2 logger can trick the application into requesting a resource from a server under the attacker’s control, then load it, and then execute it.

Java 244
article thumbnail

Sacrificial Architecture: Case Studies

DZone

One of the toughest decisions your software development team may face as you scale is deciding between keeping your current codebase and rebuilding on new software architecture. In this article, we will see what so-called sacrificial architecture is and why sometimes it's better to build something from scratch instead of trying to continue and improve what already exists.

article thumbnail

AWS Went Down. Now What?

Professor Beekums

Amazon Web Services went down last Tuesday. It doesn’t happen often, but it is a harrowing experience when it does. Understandably, people get angry during these times. They have come to rely on AWS to provide services necessary for their business. Who isn’t going to be angry when their business stops because of something they can’t control?

AWS 127

More Trending

article thumbnail

Business observability and the travel and hospitality industry: a key to successful recovery

Dynatrace

Dynatrace news. For most industries, the pandemic has accelerated digital transformation. For some, “accelerated” is an understatement. The global travel industry has arguably been hit the hardest, and the disruption is pervasive – and ongoing. Consider these staggering statistics from last year: During lockdown peaks, several European countries experienced a 99% decrease in bookings through travel aggregator sites like Booking.com and Expedia.

Airlines 235
article thumbnail

Metadata Synchronization in Alluxio: Design, Implementation, and Optimization

DZone

Metadata synchronization (sync) is a core feature in Alluxio that keeps files and directories consistent with their source of truth in under-storage systems, thus making it simple for users to reason the data retrieved from Alluxio. Meanwhile, understanding the internal process is important in order to tune the performance. This article describes the design and the implementation in Alluxio to keep metadata synchronized.

Design 244
article thumbnail

Cadence Multi-Tenant Task Processing

Uber Engineering

Introduction. Cadence is a multi-tenant orchestration framework that helps developers at Uber to write fault-tolerant, long-running applications, also known as workflows. It scales horizontally to handle millions of concurrent executions from various customers. It is currently used by hundreds of … The post Cadence Multi-Tenant Task Processing appeared first on Uber Engineering Blog.

article thumbnail

Touch Design For Mobile Interfaces: Defining Mobile Devices (Excerpt)

Smashing Magazine

Touch Design For Mobile Interfaces: Defining Mobile Devices (Excerpt). Touch Design For Mobile Interfaces: Defining Mobile Devices (Excerpt). Steven Hoober. 2021-12-15T11:30:00+00:00. 2021-12-15T13:06:33+00:00. The personal computer (PC) is still assumed to only be used at a desk-like workstation, in discrete sessions of work with the user focused entirely on the computer.

Mobile 106
article thumbnail

Dynatrace’s automatic and intelligent observability co-flies with GKE Autopilot for managed Kubernetes – you can have it all!

Dynatrace

Dynatrace news. What’s up? Hands-free fully managed Kubernetes. Hundreds of thousands of companies use Google Cloud’s GKE to build and run their applications. While GKE has been popular since its inception by making computing more efficient and advancing container orchestration – running and administration still require some hands-on work, for example in managing worker nodes.

DevOps 232
article thumbnail

How to Perform Load Testing Against Nebula Graph With K6

DZone

Why Load Testing Matters in Nebula Graph? The load testing for the database needs to be conducted usually so that the impact on the system can be monitored in different scenarios, such as query language rule optimization, storage engine parameter adjustment, etc. The operating system in this article is the x86 CentOS 7.8.

Testing 239
article thumbnail

Starting Your Journey from Project to Product: Be Patient with Yourself and Others

Tasktop

Listening to conferences, webinars and podcasts, it’s easy to find organizations that have made significant wins on the project to product journey. It’s also easy to gloss over the significant challenges that were overcome along the journey when you’ve only got 45 minutes to tell a story that took two+ years to unfold. The journey from project to product can be long, sometimes hard, but always worth it.

Games 98
article thumbnail

Modifying Headers In HTTP(s) Requests In UI Automation Testing

Smashing Magazine

Modifying Headers In HTTP(s) Requests In UI Automation Testing. Modifying Headers In HTTP(s) Requests In UI Automation Testing. Nafees Nehar. 2021-12-14T10:30:00+00:00. 2021-12-14T14:35:23+00:00. There are various methods to modify headers. You can modify headers by using browser extensions or proxy apps (such as Charles and Proxyman) that intercept the request and let you modify the response by including the headers.

Testing 103
article thumbnail

How to start with SLOs to align Business, DevOps, and SREs

Dynatrace

Dynatrace news. Service-level objectives (SLOs) are a great tool to align business goals with the technical goals that drive DevOps (Speed of Delivery) and Site Reliability Engineering (SRE) (Ensuring Production Resiliency). In a recent workshop I did with a global player in the financial market we used their new mobile banking app as a reference. The business said it wanted to increase the adoption of the new app vs the existing app.

DevOps 218
article thumbnail

What Is CAP Theorem?

DZone

In short, the CAP theorem is a mathematical theorem describing how our application will behave in the event of network partitioning. It is one of the most important laws currently in existence. Through the course of this text, I will share more information on this theorem and why it is important. By the time you’re done reading, you’ll also know why CAP may not be enough for modern-day systems.

Network 235
article thumbnail

Tasktop’s Rapid Response to the Log4J Vulnerability Exemplifies the Importance of Value Stream Management

Tasktop

Did Your Response Delight or Disappoint Customers? . The Log4j vulnerability that set the internet on fire on Friday was happily already fixed in Tasktop’s SaaS products by early afternoon. Customers running our solutions on-prem promptly received a security bulletin containing instructions on how to address the vulnerability shortly after. . Our customers’ palpable relief and gratitude was a great reminder of why speed-to-market is so essential to the modern enterprise.

Speed 98
article thumbnail

Billing Management For Your Next SaaS Idea Using Stripe And Azure Functions

Smashing Magazine

Billing Management For Your Next SaaS Idea Using Stripe And Azure Functions. Billing Management For Your Next SaaS Idea Using Stripe And Azure Functions. Nwani Victory. 2021-12-17T13:30:00+00:00. 2021-12-17T17:34:45+00:00. To follow the steps in this tutorial, you should have the following: a Stripe account (you can create one for free and use the test mode to avoid incurring any charges while following the steps in this article); a basic understanding of JavaScript and React; an Auth0 account (

Azure 98
article thumbnail

Business observability and the travel and hospitality industry: a key to successful recovery

Dynatrace

Dynatrace news. For most industries, the pandemic has accelerated digital transformation. For some, “accelerated” is an understatement. The global travel industry has arguably been hit the hardest, and the disruption is pervasive – and ongoing. Consider these staggering statistics from last year: During lockdown peaks, several European countries experienced a 99% decrease in bookings through travel aggregator sites like Booking.com and Expedia.

Airlines 201
article thumbnail

Carefully Forming Teams to Begin Technology Modernization

Strategic Tech

It’s a common sight to see technology organization re-inventing aspects of their operating model. Often, it’s a combination of migrating to modern cloud technologies, adopting new organizational models, and striving for better ways of working. I find that modernization is often triggered by market pressures, such as not being able to deliver at the pace of competitors, or new leadership with big ambitions and a different mindset.

article thumbnail

Implement Full-Text Search over a GraphQL API in MongoDB Atlas

The Polyglot Developer

GraphQL can be an extremely powerful and efficient way to create APIs and MongoDB Realm makes it easy by allowing you to connect your collections to GraphQL schemas without writing a single line of code. I wrote about some of the basics behind configuring MongoDB and Realm for GraphQL in an announcement tutorial a while back. As you find yourself needing to do more advanced things with GraphQL, you’re going to need to familiarize yourself with custom resolvers.

article thumbnail

AWS Went Down. Now What?

Professor Beekums

Amazon Web Services went down last Tuesday. It doesn’t happen often, but it is a harrowing experience when it does. Understandably, people get angry during these times. They have come to rely on AWS to provide services necessary for their business. Who isn’t going to be angry when their business stops because of something they can’t control?

AWS 40
article thumbnail

Log4Shell vulnerability: Identifying and minimizing production risk

Dynatrace

Dynatrace news. Log4Shell, a zero-day vulnerability affecting the popular Apache package was made public on December 9, 2021. The National Vulnerability Database describes the vulnerability here. It results in remote code execution (RCE) by submitting a specially composed request. This means that an attacker with control over a string that gets passed to the log4j 2 logger can trick the application into requesting a resource from a server under the attacker’s control, then load it, and then exec

Java 196