In his article, Thomas Pierrain lists some of the main reasons a software system may become unstable. There are several reasons (I suggest you read his article), but they all have something in common: to notice and fix them, you need telemetry and measurable values. How can you find your system's bottleneck if you don't know the quantity of memory used by your components and the amount of time they generally take to complete their operations? This is a good article for people interested in #SoftwareArchitecture
Davide Bellone’s Post
More Relevant Posts
-
Read #Paper "There Are Infinite Ways to Formulate Code: How to Mitigate the Resulting Problems for Better Software Vulnerability Detection" by Jinghua Groppe, Sven Groppe, Daniel Senf, and Ralf Möller. See more details at: https://lnkd.in/dHmSrdTW #software_security #software_vulnerability #deep_learning
To view or add a comment, sign in
-
-
Memory safety has graduated from buzzword to baseline. 🔜 The 2025 State of Software Assurance Report reveals why traditional testing is reaching its limits and what’s next. Read more: https://bit.ly/4mgeUA0
To view or add a comment, sign in
-
-
🎃 Tech Tip: Don’t let old software come back to haunt you. Outdated systems are like unlocked doors—easy for hackers to creep through. ✅ Update regularly. ✅ Retire unsupported tools. ✅ Ask your IT provider about upgrade options. Call ArgoCTS if you need one. Keep the ghosts out of your network and your business running strong.
To view or add a comment, sign in
-
🚀 Day 2 of Socket Launch Week: Socket now brings all the core security checks together, static analysis, secrets detection, container scanning, and CVE vulnerability scanning into one simple platform. Modern software teams juggle separate tools for static analysis, secrets detection, container scanning, and dependency checks, each with its own setup, configs, and reports. That fragmentation creates noise, slows developers down, and blinds security teams to the bigger picture. Socket Basics unifies all of these in a single platform that provides a comprehensive view of your application’s risk without the tool fatigue. Stay tuned, more big updates are coming tomorrow. Read the blog in the comments below!
To view or add a comment, sign in
-
-
When your software receives data from the network, every packet is an input - and attackers can craft malicious ones. A packet contains headers that describe what’s inside, including how many bytes follow. If the header lies, it can trick your code into reading beyond valid memory. To prevent that, I always validate length fields before touching the payload. I also use a fuzzer to automatically generate millions of test inputs, exploring every possible parsing path. I run the fuzzer on changed functions, fix all findings until none remain, then ship.
To view or add a comment, sign in
-
When recording software malfunctions or auto-correct features mess up the script, it results in some amusing digital distortions or hilarious mispronunciations. #VoiceActingMagic #RichardCrossmanVO #Messaging #FridayFun #TechnicalGlitches
To view or add a comment, sign in
-
-
When recording software malfunctions or auto-correct features mess up the script, it results in some amusing digital distortions or hilarious mispronunciations. #VoiceActingMagic #RichardCrossmanVO #Messaging #FridayFun #TechnicalGlitches
To view or add a comment, sign in
-
-
🎃 Tech Tip: Don’t let old software come back to haunt you. Outdated systems are like unlocked doors—easy for hackers to creep through. ✅ Update regularly. ✅ Retire unsupported tools. ✅ Ask your IT provider about upgrade options. Call 10D Tech if you need one. Keep the ghosts out of your network and your business running strong.
To view or add a comment, sign in
-
-
When making software, stability isn't just about preventing every error (reasonably) possible; it's about preparing for when things inevitably produce errors. Software/systems designed with redundancy and 'graceful degradation' in mind have the ability to recover faster, producing a much better user experience when things do go wrong. From personal experience, it isn't good enough to just discuss 'what if this fails?'. Build things with the assumption that they will fail, at some point.
To view or add a comment, sign in
-
🎃 Tech Tip: Don’t let old software come back to haunt you. Outdated systems are like unlocked doors—easy for hackers to creep through. ✅ Update regularly. ✅ Retire unsupported tools. ✅ Ask your IT provider about upgrade options. Call Intelli-NET if you need one. Keep the ghosts out of your network and your business running strong.
To view or add a comment, sign in
-