Sat.Mar 30, 2019 - Fri.Apr 05, 2019

article thumbnail

2019 PostgreSQL Trends Report: Private vs. Public Cloud, Migrations, Database Combinations & Top Reasons Used

Scalegrid

PostgreSQL is an open source relational database system that has soared in popularity over the past 30 years from its active, loyal, and growing community. For the 2nd year in a row, PostgreSQL has kept the title of #1 fastest growing database in the world according to the DBMS of the Year report by the experts at DB-Engines. So what makes PostgreSQL so special, and how is it being used today?

Database 185
article thumbnail

2019 PostgreSQL Trends Report: Private vs. Public Cloud, Migrations, Database Combinations & Top Reasons Used

High Scalability

PostgreSQL is an open source object-relational database system that has soared in popularity over the past 30 years from its active, loyal, and growing community. For the 2nd year in a row, PostgreSQL has kept the title of #1 fastest growing database in the world according to the DBMS of the Year report by the experts at DB-Engines. So what makes PostgreSQL so special, and how is it being used today?

Database 177
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Halo Jakarta! An AWS Region is coming to Indonesia!

All Things Distributed

Today, I am excited to announce our plans to open a new AWS Region in Indonesia! The new AWS Asia Pacific (Jakarta) Region will be composed of three Availability Zones, and will give AWS customers and partners the ability to run workloads and store data in Indonesia. The AWS Asia Pacific (Jakarta) Region will be our ninth Region in Asia Pacific. It joins existing Regions in Beijing, Mumbai, Ningxia, Seoul, Singapore, Sydney, and Tokyo, as well as an upcoming Region in Hong Kong SAR.

AWS 142
article thumbnail

How to Perform First Web App Penetration Testing?

QAMentor

In today’s broad digital landscape, web app penetration testing is considered as one of the most important parts of a company’s vulnerability management program. Conducting a web app penetration test not only requires expertise, but it also needs a significant amount of time. In this age of steadily increasing cyber attacks, it has become essential … The post How to Perform First Web App Penetration Testing?

Testing 75
article thumbnail

Who has the fastest website in F1?

CSS - Tricks

Jake Archibald looks at the websites of Formula One race teams and rates their performance, carefully examining their images and digging into the waterfall of assets for each site: Trying to use a site while on poor connectivity is massively frustrating, so anything sites can do to make it less of a problem is a huge win. In terms of the device, if you look outside the tech bubble, a lot of users can't or don't want to pay for a high-end phone.

Website 74
article thumbnail

New LUX JavaScript Dashboards

Speed Curve

As organizations work to improve performance for users around the world on slower networks and devices, the focus on JavaScript continues to grow. LUX's new JavaScript dashboards help to identify the problems and solutions for creating a fast, joyous user experience. LUX is SpeedCurve's real user monitoring product. We launched it two years ago with four dashboards: Live, Users, Performance, and Design.

Traffic 53
article thumbnail

IGNORE_DUP_KEY slower on clustered indexes

SQL Performance

The IGNORE_DUP_KEY option for unique indexes specifies how SQL Server responds to an attempt to INSERT duplicate values: It only applies to tables (not views) and only to inserts. Any insert portion of a MERGE statement ignores any IGNORE_DUP_KEY index setting. When IGNORE_DUP_KEY is OFF , the first duplicate encountered results in an error , and none of the new rows are inserted.

Storage 53

More Trending

article thumbnail

How to define load models for continuous testing

TechBeacon Testing

How can you take advantage of application performance monitoring (APM) products and logs to define realistic load models for continuous testing?

Testing 58
article thumbnail

SQL Server Transaction Log Growth Monitoring and Management

SQL Shack

In the previous articles of this series on the SQL Server Transaction Log, we discussed the importance of the SQL Server Transaction Log and the role that it plays in maintaining the database consistency, by ensuring that the committing transactions data will be preserved and the failed transaction will be rolled back. It also helps […].

Servers 51
article thumbnail

Configure Visual Studio Code For C++ Development

The Polyglot Developer

I mentioned a few months ago that I was going to periodically go back to the basics when it comes to computer programming and application development. Building a Hello World Example C++ Application was a first example of what I was talking about. However, in this previous example, much of our work was done in a basic text editor, then compiled and ran with a Command Prompt or Terminal.

C++ 49
article thumbnail

The Problem With Design

Allen Holub

Somehow, some people have gotten the idea that design is somehow inimical to Agile. That’s not true. It’s always helpful to think about things before you do them. The question is not whether or not you should think in advance, it’s how far in advance should the thinking occur. Hours? Days? Months? The problem with… The post The Problem With Design appeared first on Allen Holub.

Design 43
article thumbnail

Moving up the testing leadership ladder: 3 lessons learned

TechBeacon Testing

Moving up the ladder in testing often means more money, more fun, and having more impact. Some folks sit around and just hope it will happen. Some ask for promotions before they are ready. Some wait a decade for promotion through simple attrition.

Testing 48
article thumbnail

The crux of voice (in)security: a brain study of speaker legitimacy detection

The Morning Paper

The crux of voice (in)security: a brain study of speaker legitimacy detection Neupane et al., NDSS’19. The key results of this paper are easy to understand, but the implications are going to take us a long time to unravel. Speech morphing (voice morphing) is the process of translating a speaker’s voice to sound like a given impersonation target.

article thumbnail

SQL Mysteries: Causality tracking vs Event Sequence for XEvent Sessions

SQL Server According to Bob

You need to make sure to order the events by event_sequence when doing analytics on the XEvent data. It has been proposed to me that you can use the causality tracking sequence as a sort target, which may work as long as you understand how the activity ids are associated with the parent and the sequence is produced. [link]. [link]. Summary. Values are generated when the event sequence is submitted to the target.

article thumbnail

Sometimes the Strategy is Buoy the Credit Rating

The Agile Manager

These drastic actions provide reassurance to creditors that big companies will do just about anything to keep their investment grade ratings. FT Lex, US credit ratings: attack of the killer Bs As a company grows, and the rate of its growth slows, it changes its capital structure. Early-stage capital is speculating on future cash flows, while later-stage capital has expectations of future cash flows.

article thumbnail

Stuff The Internet Says On Scalability For April 5th, 2019

High Scalability

Wake up! It's HighScalability time: SHUTDOWN ABORT the last Oracle database running Amazon Fulfillment! pic.twitter.com/DorqTua2Lt. — John Darrow (@jdarrow) March 29, 2019. How unhappy do you have to be as a customer to take so much joy in end-of-lifing a product? Do you like this sort of Stuff? I'd greatly appreciate your support on Patreon. I wrote Explain the Cloud Like I'm 10 for people who need to understand the cloud.

article thumbnail

Establishing software root of trust unconditionally

The Morning Paper

Establishing software root of trust unconditionally Gligor & Woo, NDSS’19. The authors won a best paper award for this work at NDSS this year. The main result is quite something, but as you might expect the lines of argument are detailed and not always easy to follow (and certainly not critically!) for non-experts like me. I’ll use today’s write-up to convey the big ideas as I understand them.

article thumbnail

Ginseng: keeping secrets in registers when you distrust the operating system

The Morning Paper

Ginseng: keeping secrets in registers when you distrust the operating system Yun & Zhong et al., NDSS’19. Suppose you did go to the extreme length of establishing an unconditional root of trust for your system, even then, unless every subsequent piece of code you load is also fully trusted (e.g., formally verified) then you’re open to post-boot attacks.