Sat.Sep 21, 2019 - Fri.Sep 27, 2019

article thumbnail

Seven key enablers for continuous testing

TechBeacon Testing

You're not doing continuous testing unless you're doing testing that occurs before, during, and after each software change is made. That's long been a goal for many testers.

Testing 61
article thumbnail

Organisational Dysfunctions Mirrored as Architectural Complexity

Strategic Tech

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TCP: Out of Memory — Consider Tuning TCP_Mem

DZone

What happens when you're out of memory? You may also like: Java Out of Memory Heap Analysis. Recently we experienced an interesting production problem. This application was running on multiple AWS EC2 instances behind Elastic Load Balancer. The application was running on a GNU/Linux OS, Java 8, Tomcat 8 application server. All of a sudden, one of the application instances became unresponsive.

Tuning 159
article thumbnail

Evolving Regional Evacuation

The Netflix TechBlog

Niosha Behnam | Demand Engineering @ Netflix At Netflix we prioritize innovation and velocity in pursuit of the best experience for our 150+ million global customers. This means that our microservices constantly evolve and change, but what doesn’t change is our responsibility to provide a highly available service that delivers 100+ million hours of daily streaming to our subscribers.

Traffic 190
article thumbnail

Optimize Citrix platform performance and user experience with a new extension (Preview)

Dynatrace

Dynatrace news. Citrix is a sophisticated, efficient, and highly scalable application delivery platform that is itself comprised of anywhere from hundreds to thousands of servers. It delivers vital enterprise applications to thousands of users. SAP GUI and other thick-client Windows applications are often delivered via Citrix. Therefore, it requires multidimensional and multidisciplinary monitoring: Infrastructure health —automatically monitor the compute, storage, and network resources availabl

Latency 119
article thumbnail

Microservices Testing Strategies, Types & Tools: A Complete Guide

Simform

From time and again, I've worked with several Fortune 5000 startups. The most common problem that we've dealt with is microservices testing. While transitioning to a microservices architecture, I've observed teams running into issues where they haven't planned out which testing strategies they want to use. This is especially true for a team that is brand new to microservices.

Strategy 104
article thumbnail

Servlet 3.0 Async Support in Spring and Performance Misconceptions

DZone

It is possible to improve the performance of application servers using Servlet 3.0 async, but is it necessary? Before We Start. Spring makes it easy to write Java applications. With Spring Boot, it became even easier. Spring Boot allows us to quickly create Spring applications: build and run a Java application server with embedded Tomcat and your own controller in less than 5 minutes.

Java 182

More Trending

article thumbnail

My CppCon 2019 talk video is online

Sutter's Mill

My CppCon 2019 talk is now available on YouTube, and the slides will soon be available here. I hope you enjoy it.

article thumbnail

Fit and value: The business case for blockchain

O'Reilly

Blockchains have a uniquely tumultuous early history for an enterprise technology—from a mysterious origin story, to a sensational first application in bitcoin, to a swift fall from a particularly frothy hype cycle. Blockchain technology provides the encrypted distributed ledger that made the first cryptocurrency, bitcoin, possible. Over the last decade, entrepreneurs and intrapreneurs around the world have taken that initial spark and reimagined blockchain by applying the technology broadly acr

article thumbnail

Synthetic Monitoring With Telegraf

DZone

This car would definitely require synthetic testing. There are two main modes for collecting data about your systems and software: the first is by collecting data from within the application itself, often called white-box monitoring, and the second is by querying the system from the outside and collecting data about the response.

article thumbnail

50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system

The Morning Paper

50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system Reardon et al., USENIX Security Symposium 2019. The problem is all inside your app, she said to me / The answer is easy if you take it logically / I’d like to help data in its struggle to be free / There must be fifty ways to leak their data. You just slip it out the back, Jack / Make a new plan, Stan / You don’t need to be coy, Roy / Just get the data free.

Systems 74
article thumbnail

GotW-ish: The ‘clonable’ pattern

Sutter's Mill

Yesterday, I received this question from a distinguished C++ expert who served on the ISO C++ committee for many years. The email poses a decades-old question that still has the classic roll-your-own answer in C++ Core Guidelines #C.130 , and basically asks whether we’ve made significant progress toward automating this pattern in modern C++ compared to what we had back in the 1990s and 2000s.

C++ 75
article thumbnail

Frankenstein Migration: Framework-Agnostic Approach (Part 2)

Smashing Magazine

Frankenstein Migration: Framework-Agnostic Approach (Part 2). Frankenstein Migration: Framework-Agnostic Approach (Part 2). Denys Mishunov. 2019-09-27T12:00:59+02:00. 2019-09-27T10:38:23+00:00. In this article, we’ll be putting all the theory to the test by performing step-by-step migration of an application, following the recommendations from the previous part.

Storage 69
article thumbnail

Event Monitoring Visibility Made Easy: Sensu Check Metric Extraction With InfluxDB and Grafana

DZone

Good luck monitoring an event like this. Monitoring dynamic, distributed environments often results in costly monitoring solution choices for developers seeking scalability, but your monitoring solution doesn’t have to be expensive. Sensu , InfluxDB , and Grafana — open source tools with enterprise counterparts — can work together to create a complete, scalable monitoring solution encompassing event monitoring, data ingestion and dashboarding.

article thumbnail

SSIS Derived Columns with Multiple Expressions vs Multiple Transformations

SQL Shack

In this article, we will first give an overview on SSIS derived column transformation, then we will run an experiment to check if there is any difference between adding multiple expressions within one derived column transformation and adding a derived column transformation for each expression. This article is the sixth article in the SSIS feature […].

article thumbnail

The secret-sharer: evaluating and testing unintended memorization in neural networks

The Morning Paper

The secret sharer: evaluating and testing unintended memorization in neural networks Carlini et al., USENIX Security Symposium 2019. This is a really important paper for anyone working with language or generative models, and just in general for anyone interested in understanding some of the broader implications and possible unintended consequences of deep learning.

Network 55
article thumbnail

Is AI Really Important In Software Test Automation?

Testsigma

What is AI? In layman terms, AI or Artificial intelligence is the area of computer science that focuses on making machines “intelligent.” And by intelligence, it means making the system capable of learning and taking decisions like humans. Thus, an AI-enabled machine will be able to learn how to react in particular situations and then take decisions in the future according to its learning.

article thumbnail

JMeter Tutorials: Test Better, Build Better

DZone

Developers and testers love using JMeter for performance testing. In this post, we go over the best JMeter tutorials that DZone has to offer. We take a look at load testing with JMeter, how to use JMeter to test your APIs (REST or otherwise), and more advanced JMeter turorials. JMeter Tutorials for Beginners. Being Your Journey With These JMeter Tutorials for Beginners.

Testing 100
article thumbnail

Using Database Metrics to Predict Application Problems

SQL Shack

Summary Database metrics can be collected, maintained, and used to help predict when processes go awry so problems can be resolved before they become severe. Understanding when an application or process misbehaves is not always easy. We are often left waiting until a server, application, or service breaks or enters an undesirable state before we […].

Metrics 63
article thumbnail

Preloading Pages Just Before They are Needed

CSS - Tricks

The typical journey for a person browsing a website: view a page, click a link, browser loads new page. That's assuming no funny business like a Single Page App, which still follows that journey, but the browser doesn't load a new page — the client fakes it for the sake of a snappier transition. What if you could load that new page before the person clicks the link so that, when they do, the loading of that next page is much faster?

Website 49
article thumbnail

Integrate Atlassian Jira and Micro Focus ALM: Defect reporting and resolution is a business process

Tasktop

By integrating Atlassian Jira and Micro Focus ALM, you can automate the flow of defects between the two tools to eradicate manual overhead and accelerate the speed and accuracy of the defect reporting and resolution process. Long gone are the days when defect management was solely the concern of IT teams. With software touching nearly every facet of the omnichannel customer experience, the process is considered a critical business issue.

article thumbnail

Percona Live Europe Presents: Test Like a Boss

Percona Community

My first talk is a tutorial Testing like a boss: Deploy and Test Complex Topologies With a Single Command, scheduled at Percona Live Europe in Amsterdam on September 30th at 13:30. My second talk is Amazing sandboxes with dbdeployer scheduled on October 1st at 11:00. It is the same topic as the tutorial, but covers a narrow set of features, all in the *amazing* category.

Testing 40
article thumbnail

An Overview of Instant File Initialization in SQL Server

SQL Shack

This article gives an overview of Instant File Initialization and its benefits for SQL Server database creation, restoration and file growth. Introduction As a database administrator, you must ensure database availability, performance, recovery from disaster. You might have faced a scenario in that new database creation, or database restoration takes a long time.

Servers 47
article thumbnail

Weekly Platform News: Layout Shifts, Stalled High-Bitrate Videos, Screenshots in Firefox

CSS - Tricks

In this week's roundup: fighting shifty layouts, some videos might be a bit stalled, and a new way to take screenshots in Firefox. Let's get into the news! Identifying the causes of layout shifts during page load. You can now use WebPageTest to capture any layout shifts that occur on your website during page load, and identify what caused them. Step 1: Paste a snippet.

Website 43
article thumbnail

Stuff The Internet Says On Scalability For September 27th, 2019

High Scalability

Wake up! It's HighScalability time: Nifty diagram of what testing looks like in an era or progressive delivery. ( @alexsotob, @samnewman ). Do you like this sort of Stuff? I'd greatly appreciate your support on Patreon. I wrote Explain the Cloud Like I'm 10 for all who want to understand the cloud. On Amazon it has 55 mostly 5 star reviews (131 on Goodreads).

article thumbnail

Vulnerability Management: Dynatrace’s data driven approach to security

Dynatrace

Dynatrace news. Over the last few years we’ve talked a lot about how at Dynatrace we have changed our development processes in order to deploy new feature releases with every sprint, as well as providing a fast-lane to production that allows us to deploy important updates to our customers within an hour. Read our case study to learn more about it, or listen in to my podcasts with CTO Bernd Greifeneder and DevOps Lead Anita Engleder.

article thumbnail

Bad Malloc [Comic]

DZone

Penguins learning the consequences of too much RAM. Further Reading. Commit Messages [Comic].

article thumbnail

Frankenstein Migration: Framework-Agnostic Approach (Part 1)

Smashing Magazine

Frankenstein Migration: Framework-Agnostic Approach (Part 1). Frankenstein Migration: Framework-Agnostic Approach (Part 1). Denys Mishunov. 2019-09-26T12:30:59+02:00. 2019-09-26T11:02:12+00:00. Migration, according to Oxford Learner’s Dictionary , is “the slow or gradual movement of something from one place to another.” This term describes many things and phenomena in our world — both with positive and negative tint.

article thumbnail

Wireless attacks on aircraft instrument landing systems

The Morning Paper

Wireless attacks on aircraft instrument landing systems Sathaye et al., USENIX Security Symposium 2019. It’s been a while since we last looked at security attacks against connected real-world entities (e.g., industrial machinery , light-bulbs , and cars ). Today’s paper is a good reminder of just how important it is becoming to consider cyber threat models in what are primary physical systems, especially if you happen to be flying on an aeroplane – which I am right now as I write this!