The humble log has largely been thought of as a data source that is there â€śjust in caseâ€ť there is a problem. Generally logs have only ever been accessible by the chosen few, who sit in the engine room of the system looking at at log events flying past all day long. However, there is a wealth of information contained in your log data which is useful for use cases beyond debugging or security. Find out what 200 users said they use logs for, and how to use logs as data: https://blog.logentries.com/2014/04/logs-as-data-what-are-the-top-use-cases-for-your-logs/
The infamous Oscar selfie of Ellen and other celebs broke a record of 2 million retweets before midnight, March 2, and Twitter came crashing down for a record 20 minutes. And this despite the fact that Twitter built their own Load Testing tool, IAGO in 2012. So why did Twitter build its own tool and what does that have to do with your decision to use homegrown versus vendor load testing tools? Read on for the answer: http://www.neotys.com/blog/how-homegrown-load-testing-tools-can-misfire/
I wrote this blog to highlight the architectural and performance problems that come with using frameworks without properly configuring them for your use case. The application in question was a customized SharePoint app using Telerik controls. Even though performance was good under normal load conditions we found several architectural issues that most likely bring the SharePoint cluster down under heavier load: #1data-driven performance problem, #2 connection pool issues and #3 load balancing issues.
Whatever application you are developing - in case you use any sort of framework that hides the complexity of data access make sure to look behind the scenes to figure out what is really executed by these frameworks.
This article was originally written by Bill Karwin
Recently the author gave a presentation on â€śHow to Avoid Common (but Deadly) MySQL Development Mistakesâ€ť for Percona MySQL Webinars. Here are all the questions with the author's complete answers.
In the last 14 years, it has been increasingly difficult to determine the progress of women in technical industries. The general populace assumes that things are improving as, according to the Bureau of Labor Statistics, women comprise 47% of the general workforce. Why then, does the same survey say that women comprise only 26.1% of all "Computer and Mathematical" occupations?
It is always recommended to use Spring properties with Mule, to externalize any configuration parameters (URLs, ports, user names, passwords, etc.). For example, the Acme APIfrom my previous post connects to an external database. So instead of hard-coding connectivity options inside my application code, I would create a properties file, e.g.
Iâ€™ve been using Lucene for the past six or seven years, and after my
last post, I thought it would be a good idea to talk a bit about the
kind of things that it isnâ€™t doing well. Weâ€™ve been using it
extensively in RavenDB for the past 5 years, and I think that I have a
pretty good understanding of it. We used to have one of Lucene.NET
committers working at Hibernating Rhinos, so Iâ€™ve...
Explore the data movement through the MapReduce architecture and the API calls used to do the actual processing, along with customization techniques and function overriding for application specific needs.