The document discusses JavaEye, a popular Chinese technical blog. It describes the evolution of JavaEye's architecture over time from a single server running Ruby on Rails to a more complex distributed system with front-end web servers, backend application servers, a search server, database servers, and caching. It highlights the technologies used at each stage, including Lighttpd, Memcached, and search tools like Ferret and Lucene, and how caching improved performance by reducing SQL queries.
How Flipping your Classroom Can Improve InstructionElizabeth Nesius
Flipping a classroom is a type of blended learning that allows instructors more time to interact with their students by placing traditional classroom activity, such as lectures, outside of class time. Watching lectures in class leaves class time for hands-on activities, small group work, and one-on-one interactions between professor and student. Flipping can be done through LMS forums, Khan Academy, lecture capture software, VoiceThread, etc. This presentation will discuss benefits of the flipped classroom model, provide ideas and best practices for successful classroom flipping, and give participants an opportunity to start planning how to flip their own classes.
Lessons Learned and Best Practices for Game Development in the Cloudsarahnovotny
Game developers need to spend their time building new games and features, not managing infrastructure. Meteor Entertainment has learned how-to minimize the time they spend managing infrastructure by automating deployments, monitoring systems through log analysis, and by making their data tier easy to scale. Attend this session to hear all about Meteor’s best-practices.
How is this relevant to me? A Human Centred Approach to Public EngagementFergus Bisset
A presentation given as part of the Human-Centred Design Institute (HCDI) Seminar series. This is an outline sketch of some of the theoretical work behind a public engagement project I'm working on and the part time Masters in Design Research that I'm also pursuing.
How Flipping your Classroom Can Improve InstructionElizabeth Nesius
Flipping a classroom is a type of blended learning that allows instructors more time to interact with their students by placing traditional classroom activity, such as lectures, outside of class time. Watching lectures in class leaves class time for hands-on activities, small group work, and one-on-one interactions between professor and student. Flipping can be done through LMS forums, Khan Academy, lecture capture software, VoiceThread, etc. This presentation will discuss benefits of the flipped classroom model, provide ideas and best practices for successful classroom flipping, and give participants an opportunity to start planning how to flip their own classes.
Lessons Learned and Best Practices for Game Development in the Cloudsarahnovotny
Game developers need to spend their time building new games and features, not managing infrastructure. Meteor Entertainment has learned how-to minimize the time they spend managing infrastructure by automating deployments, monitoring systems through log analysis, and by making their data tier easy to scale. Attend this session to hear all about Meteor’s best-practices.
How is this relevant to me? A Human Centred Approach to Public EngagementFergus Bisset
A presentation given as part of the Human-Centred Design Institute (HCDI) Seminar series. This is an outline sketch of some of the theoretical work behind a public engagement project I'm working on and the part time Masters in Design Research that I'm also pursuing.
OSMC 2008 | Monitoring MySQL by Geert VanderkelenNETWAYS
Monitoring MySQL has a long history within Nagios. Several plugins are available already. In addition to that, there are probably lots of plugins that have been developed by the community. We take a look at some of these and discuss what kind of additional useful information could be pulled out of a MySQL Server for monitoring it even better. A simple example on how to write such plugins will be shown, also using NDB API for monitoring MySQL Cluster. Now that MySQL Enterprise Monitor (MEM) is available, we'll go through the possibilities for combining the two platforms. We will also discuss the NDOUtils for storing configuration and event data using MySQL.
This talk starts with a brief overview of MySQL itself: some history, where it's heading too, and why it is so successful.
(SDD419) Amazon EC2 Networking Deep Dive and Best Practices | AWS re:Invent 2014Amazon Web Services
Amazon EC2 instances give customers a variety of high-bandwidth networking choices. In this session, we discuss how to choose among Amazon EC2 networking technologies and examine how to get the best performance out of Amazon EC2 enhanced networking and cluster networking. We also share best practices and useful tips for success.
My talk for "MySQL, MariaDB and Friends" devroom at Fosdem on February 2, 2019
Born in 2010 in MySQL 5.5.3 as "a feature for monitoring server execution at a low level," grown in 5.6 times with performance fixes and DBA-faced features, in MySQL 5.7 Performance Schema is a mature tool, used by humans and more and more monitoring products. It becomes more popular over the years. In this talk I will give an overview of Performance Schema, focusing on its tuning, performance, and usability.
Performance Schema helps to troubleshoot query performance, complicated locking issues, memory leaks, resource usage, problematic behavior, caused by inappropriate settings and much more. It comes with hundreds of options which allow precisely tune what to instrument. More than 100 consumers store collected data.
Performance Schema is a potent tool. And very complicated at the same time. It does not affect performance in most cases and can slow down server dramatically if configured without care. It collects a lot of data, and sometimes this data is hard to read.
This talk will start from the introduction of how Performance Schema designed, and you will understand why it slowdowns server in some cases and does not affect your queries in others. Then we will discuss which information you can retrieve from Performance Schema and how to do it effectively.
I will cover its companion sys schema and graphical monitoring tools.
DCSF 19 Online Feature Extraction and Event Generation for Computer-Animal In...Docker, Inc.
This talk will present an architecture developed to investigate the interaction with and between animals. The architecture allows online processing of multimedia streams and the generation, storing and visualizing of events using feature extraction. It allows biologists to analyze the events by monitoring live or by replaying streams through a web interface Docker swarm is the central component of the architecture and serves as infrastructure for stream processing, event generation, event processing and visualization. The main entry point for users is a web interface that spins up one container per user and allows independent replay of streams. This talk will focus on the architecture and on technical details concerning its implementation as well as how docker is utilized to process, store and visualize events. Some time will be spent explaining details about custom made docker solutions.
Security is always a challenge when we come to data but regulations like GDPR brings a new layer on top of it with rules more and more restrictive to access and manipulate data. These slides cover security best practices, traditional and new features available for MySQL including features coming with the new MySQL 8.
SO security
SSL
ACL
TDE
Audit Plugin
MySQL 8 features (undo, redo and binlog encryption)
New caching_sha2_password
Roles
Password Management
FIPS mode
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
17. IT
CSDN 30+ Server ASP.net 260 3.5X
JavaEye 74
ChinaUnix 73
Cnblogs 55
ITPUB 38
51CTO 23
infoq 8
0 75 150 225 300
18. IT
CSDN 30+ Server ASP.net 260 3.5X
JavaEye 74 2 Server
ChinaUnix 73
Cnblogs 55
ITPUB 38
51CTO 23
infoq 8
0 75 150 225 300
19. IT
CSDN 30+ Server ASP.net 260 3.5X
JavaEye 74 2 Server ruby
ChinaUnix 73
Cnblogs 55
ITPUB 38
51CTO 23
infoq 8
0 75 150 225 300
20. IT
CSDN 30+ Server ASP.net 260 3.5X
JavaEye 74 2 Server ruby
ChinaUnix 73 4+ Server
Cnblogs 55
ITPUB 38
51CTO 23
infoq 8
0 75 150 225 300
21. IT
CSDN 30+ Server ASP.net 260 3.5X
JavaEye 74 2 Server ruby
ChinaUnix 73 4+ Server PHP
Cnblogs 55
ITPUB 38
51CTO 23
infoq 8
0 75 150 225 300
22. IT
CSDN 30+ Server ASP.net 260 3.5X
JavaEye 74 2 Server ruby
ChinaUnix 73 4+ Server PHP
Cnblogs 55 4+ Server
ITPUB 38
51CTO 23
infoq 8
0 75 150 225 300
23. IT
CSDN 30+ Server ASP.net 260 3.5X
JavaEye 74 2 Server ruby
ChinaUnix 73 4+ Server PHP
Cnblogs 55 4+ Server ASP.net
ITPUB 38
51CTO 23
infoq 8
0 75 150 225 300
24. IT
CSDN 30+ Server ASP.net 260 3.5X
JavaEye 74 2 Server ruby
ChinaUnix 73 4+ Server PHP
Cnblogs 55 4+ Server ASP.net
ITPUB 38 PHP
51CTO 23
infoq 8
0 75 150 225 300
25. IT
CSDN 30+ Server ASP.net 260 3.5X
JavaEye 74 2 Server ruby
ChinaUnix 73 4+ Server PHP
Cnblogs 55 4+ Server ASP.net
ITPUB 38 PHP
51CTO 23
infoq 8 Java
0 75 150 225 300
49. Web Server DB Server RSS/API
fastcgi(ruby)
lighttpd SearchServer
analytics (lucene)
fastcgi(ruby) mysql
PDF Creating
memcached (ruby, C)
twitter sync
DNS Server/Email Server/
NFS Server DNS Server/Email Server