Monday Update: Bulk Upload, StatusCake Pages and a new testing server in Israel
Today we’ve got a few new additions to take you through, and you can expect some other changes still to come as the week progresses!
Today we’ve got a few new additions to take you through, and you can expect some other changes still to come as the week progresses!
“With Docker, developers can build any app in any language using any toolchain. “Dockerized” apps are completely portable and can run anywhere - colleagues’ OS X and Windows laptops, QA servers running Ubuntu in the cloud, and production data center VMs running Red Hat.
Gfycat is excited to announce our new integration with Mattermost that brings GIFs to workplace communication. Gfycat makes the Mattermost communication experience fun, visual and on-trend.
It’s good to be back from our short holiday break. This week we have articles on the world’s fastest internet (with a shout out to Prometheus and Grafana), visualizing real-time and historic weather data, making teams more autonomous, and Grafana + Prometheus + Postgres + TimescaleDB.
Secure Shell (SSH), is a network protocol that gives administrators secure access to remote computers. It also refers to the suite of utilities that implement the protocol. A SSH check looks at the availability of your SSH services to see if the service is accepting connections.
In this guest blog post from the folks at Ballerina, Anjana shows you how you can easily visualize metrics from a Ballerina service with Grafana, walking you step by step through the installation and configuration of the components. They’ve also extended an offer for a free ticket to their upcoming Ballerinacon to the Grafana community.
Request tracing is the ultimate insight tool. Request tracing tracks operations inside and across different systems. Practically speaking, this allows engineers to see the how long an operation took in a web server, database, application code, or entirely different systems, all presented along a timeline. Request tracing is especially valuable in distributed systems where a single transaction (such as “create an account”) spans multiple systems.
Container security is top-of-mind for any organization adopting Docker and Kubernetes, and this open source security guide is a comprehensive resource for anyone who wants to learn how to implement a complete open source container security stack for Docker and Kubernetes.
Welcome, and thanks for joining us! Today on Exception Perceptions, we’re inviting Sentry Product Manager Sara Gilford to give us all the dirt on collaboration and ownership. That’s right; we’re uncovering the juicy details of who and how folks on teams within Sentry should be notified when issues pop up in their application.
Most scientific papers are unlikely to change your day-to-day approach as a Rails web developer. How not to structure your database-backed web applications: a study of performance bugs in the wild Yang et al., ICSE’18 is the exception to that rule. This study examined 12 popular, mature, opensource Rails apps for ActiveRecord performance anti-patterns. And boy, did they find some issues.