Remove 2016 Remove Blog Remove Load Balancer Remove Open Source
article thumbnail

20 influential women in software development

Apiumhub

In 2016, as tech passionate of cloud application development she achieved IBM Certified Application Developer – Cloud Platform v1. She is a well-known blogger and international speaker, a core member of the BDD community and a contributor to a number of open-source projects including JBehave. 11 – Leah Culver .

article thumbnail

Partnering with A10 Networks for DDoS Defense

Kentik

Late 2016 was a busy time for DDoS on multiple fronts. All of which brings me to the topic of today’s blog post. An IDGConnect survey in 2016 found that the average downtime due to DDoS attacks is 17 hours. Kentik Integration with Thunder TPS Pairs Detection with Mitigation.

Network 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Test drive the Citus 11.0 beta for Postgres

The Citus Data

beta, which is our first ever beta release of the Citus open source extension to Postgres. beta blog post you will learn about: New automatic metadata syncing feature in Citus 11.0 beta blog post you will learn about: New automatic metadata syncing feature in Citus 11.0 How to load balance queries across the worker nodes.

Testing 126
article thumbnail

From Monolith to Service Mesh, via a Front Proxy — Learnings from stories of building the Envoy…

Daniel Bryant

particularly within an API gateway like the open source Kubernetes-native Ambassador gateway. There was also limited visibility into infrastructure components such as hosted load balancers, caches and network topologies. The proxy implements “zone aware least request load balancing”, and provides Envoy metrics per zone.

SOA 40
article thumbnail

From Monolith to Service Mesh, via a Front Proxy — Learnings from stories of building the Envoy…

Daniel Bryant

particularly within an API gateway like the open source Kubernetes-native Ambassador gateway. There was also limited visibility into infrastructure components such as hosted load balancers, caches and network topologies. The proxy implements “zone aware least request load balancing”, and provides Envoy metrics per zone.

SOA 40