This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Almost daily, teams have requests for new toolsfor database management, CI/CD, security, and collaborationto address specific needs. Increasingly, those tools involve AI capabilities to potentially boost productivity and automate routine tasks. But proliferating tools across different teams for different uses can also balloon costs, introduce operational inefficiency, increase complexity, and actually break collaboration.
By Cheng Xie , Bryan Shultz , and Christine Xu In a previous blog post , we described how Netflix uses eBPF to capture TCP flow logs at scale for enhanced network insights. In this post, we delve deeper into how Netflix solved a core problem: accurately attributing flow IP addresses to workload identities. A BriefRecap FlowExporter is a sidecar that runs alongside all Netflix workloads.
As someone who works closely with distributed systems and microservices, I've seen firsthand how complex things can get once Kubernetes, Istio, and service meshes enter the picture. The shift to a cloud-native world is exciting, but it brings new challenges especially around resilience. We can't just hope things wont fail because they will. Thats where chaos engineering comes in.
On April 22, 2022, I received an out-of-the-blue text from Sam Altman inquiring about the possibility of training GPT-4 on OReilly books. We had a call a few days later to discuss the possibility. As I recall our conversation, I told Sam I was intrigued, but with reservations. I explained to him that we could only license our data if they had some mechanism for tracking usage and compensating authors.
In Percona Server for MySQL 8.0.41 / 8.4.4, we introduced several improvements in Encryption User-Defined Functions. Added support for RSAES-OAEP (OAEP) padding for RSA encrypt / decrypt operations. Added support for RSASSA-PSS (PSS) padding for RSA sign / verify operations. Added new encryption_udf.legacy_padding_scheme component system variable. Normalized character set support for all Encryption UDFs.
CPU cores have become significantly wider over the past decade. Ten years ago, the highest-performance CPUs could decode only up to four instructions simultaneously and execute up to eight instructions. However, top-tier CPUs released in recent years have grown to nearly twice this width. For example, Apple’s M4 processor , released in 2024, can decode 10 instructions simultaneously and execute up to 19 instructions.
KubeCon EU 2025 welcome banner just outside of Londons ExCeL Centre. I have just returned from what I can only describe as a whirlwind week that was the first KubeCon of 2025, KubeCon EU , which took place in London, England from March 31 to April 4. KubeCon is a massive conference, full of energy, great talks, and great friends, and my fellow Dynatracers and I couldnt wait to get started.
In this tutorial, we’ll build a real-time fraud detection system using MongoDB Atlas Vector Search, Apache Kafka, and AI-generated embeddings. We’ll demonstrate how MongoDB Atlas Vector Search can be used to detect anomalies in a stream of financial transactions by analyzing a user’s transaction history and identifying suspicious behavior based on LLM-generated embeddings.
Sign up to get articles personalized to your interests!
Technology Performance Pulse brings together the best content for technology performance professionals from the widest variety of industry thought leaders.
In this tutorial, we’ll build a real-time fraud detection system using MongoDB Atlas Vector Search, Apache Kafka, and AI-generated embeddings. We’ll demonstrate how MongoDB Atlas Vector Search can be used to detect anomalies in a stream of financial transactions by analyzing a user’s transaction history and identifying suspicious behavior based on LLM-generated embeddings.
This series is a general-purpose getting-started guide for those who want to learn about the Cloud Native Computing Foundation (CNCF) project Fluent Bit. Each article in this series addresses a single topic by providing insights into what the topic is, why we are interested in exploring that topic, where to get started with the topic, and how to get hands on with learning about the topic as it relates to the Fluent Bit project.
For the past decade and a half, I’ve been exploring the intersection of technology, education, and design as a professor of cognitive science and design at UC San Diego. Some of you might have read my recent piece for O’Reilly Radar where I detailed my journey adding AI chat capabilities to Python Tutor , the free visualization tool that’s helped millions of programming students understand how code executes.
When using the Percona Operator for MySQL based on Percona XtraDB Cluster (PXC), it’s common to encounter scenarios where cluster nodes request a full State Snapshot Transfer (SST) when rejoining the cluster.
At QCon London 2025, Vanderbijl unveiled how domain-driven design transformed a chaotic healthcare platform into a coherent business architecture. Through innovative strategies like "Take That" and "Robbie Williams," the team tackled architectural complexity, emphasizing adaptability and continuous improvement. This journey illustrates DDD as an evolving process essential for sustainable growth.
Among the myriad options in today’s cloud security landscape, three key solutions stand out: Cloud-Native Application Protection Platform (CNAPP), Cloud Security Posture Management (CSPM), and Kubernetes Security Posture Management (KSPM). Each offers unique features and benefits, but how do they compare, and which IT security solution is right for your organization?
I recently contributed a guest post on my employer’s blog about the importance of the almost-feature-complete C++26 draft standard: “Sea change in C++: Why opportunities abound” It starts by summarizing a talk I gave recently, about how C++26 is poised to do what C++11 did over a decade ago: usher in a new era of C++ code style. Just as we can now glance at 10 or 20 lines and quickly recognize modern C++ as C++11-era code, soon well be able to do the same with code that uses st
A detailed website QA checklist helps make sure every aspect of the website is tested, whether through manual or automated testing approaches. It usually covers parameters like functionality, performance, usability, security, and compatibility across various browsers and devices. By following the website QA checklist, testers can test the website step-by-step, making sure everything works well without any bugs.
It almost sounds pejorative, doesnt it? But the distinction between senior and junior software developers is built into our jobs and job titles. Whether we call it entry-level or something else, we distinguish between people who are just starting their careers and those who have been around for a while. Were all still learning (one hopes), but entry-level people are still learning the basics, and seniors have greater responsibility, along with the potential for making bigger mistakes.
If you’re using MongoDB, whether it’s the Community Edition, Enterprise Advanced, or Atlas, youve probably asked yourself at some point: what is this actually costing us? And the answer isnt always easy to pin down. The reality is that there’s no one-size-fits-all price tag. Your infrastructure, usage patterns, and team setup all factor in.
With the release of MongoDB 7.0 in August 2023, we introduced a feature called Queryable Encryption , the first of its kind. With queryable encryption, your data is encrypted, even at rest, with the server unable to read it either but still able to execute queries against it. You can specify what fields to encrypt so you can encrypt as much or as little of your document as you need.
Dynatrace Business Flow simplifies business process observability, connecting top-level process KPIs with detailed flow analytics. The app tracks the progress of every process instance, reporting individual and aggregated process performance, throughput, exceptions, and business outcomes. With this update, Davis AI can track and alert on KPI threshold violations to assure end-to-end process efficiency and reliability.
Matthew Liste, Head of Infrastructure at American Express, shared insights at QCon London 2025 on building robust cloud platforms in financial services. With 20+ years of experience, he emphasized stability, security, scalability, the value of interchangeable components, and long-term sustainability, urging professionals to maintain focus and foster a strong team culture for platform engineering.
Scheduling is crucial in computer system design. The right policy can significantly reduce mean response time without needing faster machines, effectively improving performance for free. Scheduling also optimizes other metrics, such as user fairness and differentiated service levels, ensuring some job classes have lower mean delays than others [1]. MySQL 8.0 uses the Contention-Aware Transaction Scheduling (CATS) algorithm to prioritize transactions waiting for locks.
Unlock the Future of Custom, Responsive Websites with AI Web Development Solutions! Web development processes are experiencing a revolutionary change through Artificial Intelligence (AI). AI assists developers in creating websites that are smarter, faster, and more efficient through automatic coding and customization capabilities. AI technology is moving forward due to web development frameworks, which enable developers to optimize page load speed and generate dynamic content and ambitious respo
It is generally known and established that different database versions provide different sets of features and performance rates. Along with the binary versions, MongoDB has a property called Feature Compatibility Value, which allows administrators to run a binary version without enabling any features that are incompatible with the previous one.
MongoDB 6.0 will reach its end of life (EOL) in July 2025, according to the official release dates. This means it will no longer receive updates or technical support, exposing it to security and operational risks. If youre using MongoDB 6.0, you need to plan your transition to a newer version to maintain system stability and security. This article explains what EOL means, its implications, and steps to prepare for it.
Picture this: A notification appears on a monitoring dashboard indicating the production Kubernetes cluster has been compromised. An attacker has gained access through security misconfigurations in an API server, escalated privileges, and deployed cryptocurrency mining pods that consume massive resources. The DevOps team spends the day containing the damage and now faces tough questions from leadership about how this happened.
If you could measure the impact of site speed on your business, how valuable would that be for you? Say hello to correlation charts – your new best friend. Here's the truth: The business folks in your organization probably don't care about page speed metrics. But that doesn't mean they don't care about page speed. It just means you need to talk with them using metrics they already care about – such as conversion rate, revenue, and bounce rate.
Index maintenance is a critical component of database administration as it helps ensure the ongoing efficiency and performance of a Structured Query Language (SQL) Server environment. Over time, as data is added, updated, and deleted, index fragmentation can occur, where the logical and physical ordering of index pages becomes misaligned. This fragmentation can lead to increased disk I/O, decreased query performance, and overall system inefficiency.
Smart. Scalable. Strategic. AI is the Future of Next-Gen Digital Marketing Services! Modern digital transformation bases its core operations on Artificial Intelligence (AI). By 2025, AI in digital marketing will develop personalized real-time strategies alongside predictive analytics tools that produce superior results to traditional marketing approaches.
Remember when running databases in Kubernetes felt like a gamble? When unpredictable storage performance and complex state management made stability a constant battle? Thankfully, those days are largely behind us. With better tools, smarter operators, and field-tested strategies, you can now confidently deploy PostgreSQL on Kubernetes, especially when you need scale, automation, and platform consistency.
DjangoCon Europe is just around the corner, and this year, its in Dublin, Ireland. This means two things: Im legally required to drink my first Guinness (yes, first ever!). I obviously had to build an app to help me find the best pubs to accomplish my Guinness goal. This full-stack, AI-powered Dublin City Center Pub Finder app is built using our new Django MongoDB Backend Python package, Voyage AI embeddings to best understand the queries, and LangChain to power our natural-language interface.
The need for application and DevOps modernization to deliver on business outcomes has never been greater. Organizations are increasingly embracing cloud- and AI-native strategies, requiring a more automated and intelligent approach to their observability and development practices. Thats why Dynatrace will make its AI-powered, unified observability platform generally available on Google Cloud for all customers later this year.
The vision was to build the Star Trek computer. 10 years ago that was an ambitious goal. Weve come a long way since then - from basic voice commands to much more conversational interfaces with Alexa+.
In the world of Linux system administration and software development, understanding how executables interact with shared libraries is crucial. Enter ldd (List Dynamic Dependencies), a powerful command-line utility that helps you peer into the complex web of library dependencies that make your applications run. In this comprehensive guide, we'll explore ldd , its usage, security considerations, and how it can help you solve common problems.
Smart. Scalable. Strategic. AI is the Future of Next-Gen Digital Marketing Services! Modern digital transformation bases its core operations on Artificial Intelligence (AI). By 2025, AI in digital marketing will develop personalized real-time strategies alongside predictive analytics tools that produce superior results to traditional marketing approaches.
One of our customers recently reported that MongoDBs diagnostic metricscollected via FTDC (Full-Time Diagnostic Data Capture)had stopped updating. As a result, no metrics were being collected, either through diagnostic data files or the getDiagnosticDatacommand. Key metrics such as uptime were no longer progressing.
Dive into implementing the iconic Cover Flow UI pattern using modern CSS scroll-driven animations and alternative ways of implementing Cover Flow, such as via Three.
In Part 1 of our Kubernetes security essentials series, we examined the critical components of Kubernetes and the common security misconfigurations that make each one vulnerable. Now, lets explore how these vulnerabilities translate into real-world attack paths and what you can do to protect your clusters. The threat landscape: Mapping Kubernetes misconfigurations to attack tactics The incredible flexibility of Kubernetes creates an equally expansive attack surface.
In this tutorial, we will dive head first into utilizing MongoDBs Flask-PyMongo library! We will build a basic CRUD (create, read, update, delete) Flask-PyMongo application and learn about how intuitive this library is for building fully functional Flask applications. The post Build a Basic CRUD Application With Flask-PyMongo appeared first on DEV.
52
52
Input your email to sign up, or if you already have an account, log in here!
Enter your email address to reset your password. A temporary password will be e‑mailed to you.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content