Sat.Aug 24, 2024 - Fri.Aug 30, 2024

article thumbnail

Why Replace External Database Caches?

DZone

Teams often consider external caches when the existing database cannot meet the required service-level agreement (SLA). This is a clear performance-oriented decision. Putting an external cache in front of the database is commonly used to compensate for subpar latency stemming from various factors, such as inefficient database internals, driver usage, infrastructure choices, traffic spikes, and so on.

Cache 274
article thumbnail

New SQL injection vulnerability in FileCatalyst Workflow

Dynatrace

Following Tenable Research’s disclosure of a critical SQL injection vulnerability in FileCatalyst Workflow in May 2024, further investigation by Dynatrace revealed another SQL injection vulnerability. The vulnerability, identified as CVE-2024-6632, allows the abuse of a form submission during the setup process to make unauthorized modifications of the database.

Database 229
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Empowering builders with the new AWS Asia Pacific (Malaysia) Region

All Things Distributed

Builders are at the heart of AWS. Most recently, I visited Malaysia, the location of the newest AWS Region, our 34th globally, and home to a rapidly evolving technology sector, where businesses of all sizes are proving that solving hard human problems can be a profitable business model.

AWS 107
article thumbnail

Percona Server for MySQL Performance Improvements – August 2024

Percona

At Percona, we have always prioritized database performance as a critical factor in selecting database technologies. Recently, we have observed a concerning trend in the community edition of MySQL, where performance appears to be declining across major releases, specifically MySQL versions 5.7, 8.0, and 8.4.

Servers 92
article thumbnail

Java Performance Tuning: Adjusting GC Threads for Optimal Results

DZone

Garbage Collection (GC) plays an important role in Java’s memory management. It helps to reclaim memory that is no longer in use. A garbage collector uses its own set of threads to reclaim memory. These threads are called GC threads. Sometimes JVM can end up either with too many or too few GC threads. In this post, we will discuss why JVM can end up having too many/too few GC threads, the consequences of it, and potential solutions to address them.

Tuning 261
article thumbnail

Dynatrace SaaS release notes version 1.299

Dynatrace

We have released Dynatrace version 1.299. To learn what’s new, have a look at the release notes. The post Dynatrace SaaS release notes version 1.299 appeared first on Dynatrace news.

177
177
article thumbnail

Most Common RabbitMQ Use Cases

Scalegrid

Wondering where RabbitMQ fits into your architecture? This article expands on the most commonly used RabbitMQ use cases, from microservices to real-time notifications and IoT. Learn how RabbitMQ can boost your system’s efficiency and reliability in these practical scenarios. Key Takeaways RabbitMQ is a versatile message broker that improves communication across various applications, including microservices, background jobs, and IoT devices.

IoT 130

More Trending

article thumbnail

Anomaly Detection: The Dark Horse of Fraud Detection

DZone

Today, machine learning-based fraud prediction has become a mainstay in most organizations. The two common types of machine learning are supervised and unsupervised machine learning. Out of the two, supervised learning is the most desired choice for fraud prediction for apparent reasons. Supervised learning that learns the patterns from known fraud cases yields more accurate predictions.

article thumbnail

Taming DORA compliance with AI, observability, and security

Dynatrace

The Digital Operational Resilience Act (DORA) adopted by the EU addresses the digital and cybersecurity resilience of financial institutions. Although DORA helps banking and financial institutions prevent, respond to, and recover from critical cybersecurity incidents, DORA compliance could present many hurdles for financial institutions. Applying the DORA framework is especially challenging as organizations move more workloads to the cloud and manage sprawling hybrid and multi-cloud environments

article thumbnail

RabbitMQ Security and Compliance

Scalegrid

Follow fundamental procedures in authentication, encryption, and commitment to RabbitMQ security protocols to protect your RabbitMQ system and secure messages. This article provides instructions on how to fortify your RabbitMQ setup. Key Takeaways Securing RabbitMQ involves implementing strong authentication and authorization mechanisms, such as username/password pairs, X.509 certificates, and OAuth 2.0, to prevent unauthorized access and ensure data protection.

article thumbnail

Jepsen Test Validates ACID Nature of Volt Streaming Capabilities

VoltDB

Volt Active Data (Volt) is a sophisticated real-time data platform intricately designed with multiple critical components, including high-speed data processing, in-memory storage, and ACID-compliant transactions. Volt’s outbound streaming data (also known as Export) functionality, a key aspect of its distributed database system, has multiple components crucial for efficient data movement.

Testing 52
article thumbnail

Overcoming the Retry Dilemma in Distributed Systems

DZone

“Insanity is doing the same thing over and over again, but expecting different results” - Source unknown As you can see in the quote above, humans have this tendency to retry things even when results are not going to change. This was manifested in systems designs as well where we pushed these biases when designing systems.

Systems 261
article thumbnail

What is DORA? The application security and reliability implications of the Digital Operational Resilience Act

Dynatrace

The European Union has adopted the Digital Operational Resilience Act (DORA) to safeguard the cybersecurity and operational resilience of the European financial sector. In effect since January 2023, DORA requires compliance from all financial institutions operating in the EU by January 2025. But what is DORA? And how do DORA security requirements affect application security and reliability?

article thumbnail

Snowflake Administration: A Comprehensive Step-by-Step Guide

DZone

Snowflake is a powerful cloud-based data warehousing platform renowned for its scalability , flexibility, and ease of use.

article thumbnail

Telemetry Pipelines Workshop: Integrating Fluent Bit With OpenTelemetry, Part 1

DZone

Are you ready to get started with cloud-native observability with telemetry pipelines? This article is part of a series exploring a workshop guiding you through the open source project Fluent Bit, what it is, a basic installation, and setting up the first telemetry pipeline project. Learn how to manage your cloud-native data from source to destination using the telemetry pipeline phases covering collection, aggregation, transformation, and forwarding from any source to any destination.

article thumbnail

Achieving DevOps Harmony With Unified Log Monitoring for CI/CD

DZone

In modern software development, DevOps methods have evolved into the pillar of dependable and effective product delivery. Two methods that particularly help automate and simplify the software release process are continuous integration (CI) and continuous deployment (CD). But as software systems get more complicated, so does the necessity for strong log monitoring systems that can unite and streamline log management at several CI/CD phases.

DevOps 167
article thumbnail

DORA Metrics: Tracking and Observability With Jenkins, Prometheus, and Observe

DZone

DORA ( DevOps Research and Assessment ) metrics, developed by the DORA team have become a standard for measuring the efficiency and effectiveness of DevOps implementations. As organizations start to adopt DevOps practices to accelerate software delivery, tracking performance and reliability becomes critical. DORA metrics help organizations address these critical tasks by providing a framework for understanding how well teams are delivering software and how quickly they can recover from failures.

Metrics 167
article thumbnail

Advanced analytics: Leverage edge IoT data with OpenTelemetry and Dynatrace

Dynatrace

In today’s data-driven world, businesses across various industry verticals increasingly leverage the Internet of Things (IoT) to drive efficiency and innovation. IoT is transforming how industries operate and make decisions, from agriculture to mining, energy utilities, and traffic management. Agricultural businesses use IoT sensors to automate irrigation systems, while mining and water supply organizations traditionally rely on SCADA to optimize and monitor water distribution, quality, and cons

IoT 206
article thumbnail

Understanding and expressing our workplace culture: How we created the Dynatrace Culture Code

Dynatrace

In the previous installment of the People & Culture Transformation blog series, we highlighted the extraordinary efforts in making our organization a destination workplace, with ongoing changes aimed at enhancing the Dynatrace employee experience. This blog focuses on the steps we’re taking to cultivate a strong and positive environment for Dynatracers worldwide by articulating what our culture is all about.

Code 150