Daily Shaarli
March 21, 2019
Relativ zu den Spitzenreitern liegt Österreich bei vielen Kennzahlen der Digitalisierung zurück.
To understand the future of Silicon Valley, cross the Atlantic.
Unternehmen können anhand des Leitfadens ihre Schwachstellen erkennen und mit Unterstützung des BVT Maßnahmen ergreifen, um ihren Schutz zu verbessern.
Sharding, also known as horizontal partitioning, is a popular scale-out approach for relational databases. Amazon Relational Database Service (Amazon RDS) is a managed relational database service that provides great features to make sharding easy to use in the cloud. In this post, I describe how to use Amazon RDS to implement a sharded database architecture to achieve high scalability, high availability, and fault tolerance for data storage. I discuss considerations for schema design and monitoring metrics when deploying Amazon RDS as a database shard. I also outline the challenges for resharding and highlight the push-button scale-up and scale-out solutions in Amazon RDS.
More than 1.55 million room nights are reserved on the Booking.com platform every day. It’s a staggering amount of traffic, and not surprisingly, the Amsterdam-based travel e-commerce company has a lot of knowledge to share about handling metrics at scale.
To support microservice-based development, Alibaba has now launched Fescar, an open source version of its Global Transaction Service solution to the problem of distributed transactions.
Killed by Google is a Free and Open Source list of dead Google products, services, and devices.
It serves to be a tribute and memorial of beloved products and services killed by Google.
Season of Docs brings technical writers and open source projects together for a few months to work on open source documentation. 2019 is the first time we’re running this exciting new program.
When you think about how “traditional” enterprise-focused firms – think Microsoft, Oracle and IBM – sell software, it usually follows a well trodden formula: negotiations, long sales cycles and a “checklist” of features demanded by decision makers who seldom use the products they buy.
We introduce SMoTherSpectre, a speculative code-reuse attack that leverages port-contention in simultaneously multi-threaded processors (SMoTher) as a side channel to leak information from a victim process. SMoTher is a fine-grained side channel that detects contention based on a single victim instruction.