Datadog
Datadog
  • 713
  • 5 373 852

Video

Making Observability Ownership Practical for Every Developer
zhlédnutí 103Před 9 hodinami
Connor Teague, Greenlight Gabby Luna, Greenligt Greenlight is a fintech company that empowers parents to raise financially smart kids by teaching them how to responsibly earn, spend, save, invest, and build credit with their money. Recently, observability practices diverged between our SREs and engineers, and they began operating without a common monitoring strategy, leading to a slowdown in fe...
Hear how Whoop is using LLM Observability to help expand their AI usage
zhlédnutí 341Před 4 hodinami
WHOOP Coach is an AI powered bespoke human performance coach that brings bespoke summaries of its members data to them. Coach gives recommendations that are actionable and realistic to help members achieve their goals. As WHOOP continues to teach Coach to get smarter every day, WHOOP leverages Datadog as the observability platform to monitor the health of all its systems. Watch more customer st...
Iterating on Observability: Reproducing Production Errors in Isolation
zhlédnutí 276Před 16 hodinami
Jeremy Brett, Charter Communications Robert Gladmon, Charter Communications The orchestration required to support Charter’s 32 million customers is expansive. Many teams are involved in the operations of hundreds of microservices in support of dozens of customer-facing applications with data from nearly 100 back-office systems. All of these systems are in constant flux- fixing bugs, adding feat...
Live-Streaming platform Vidio relies on Datadog for real-time visibility & early feedback
zhlédnutí 238Před 19 hodinami
Vidio.com is an Indonesian live-stream platform that offers a diverse range of content, including live sports, concerts, original series, and more. Ensuring low latency and high-quality streams is vital in the OTT industry due to varied customer behaviours. During major live events, Vidio services up to 4 Terabits per second of media through multiple CDNs for more than 2 million concurrent user...
How Datadog enables FinTech startup, Flip.id, to scale by democratizing access to telemetry data
zhlédnutí 110Před 14 dny
Flip.id is an Indonesian fintech startup that has revolutionized the way people transfer money domestically. Founded in 2015, Flip.id offers a seamless, cost-effective alternative to traditional banking services by allowing users to transfer money between different banks without incurring fees. Datadog helps Flip.id by allowing unlimited user access to telemetry data and democratizes access to ...
How the Google Kubernetes Engine Team Increased Autonomy and Reduced Costs
zhlédnutí 216Před 14 dny
Ayelet Sachto, Google In this talk, Ayelet Sachto will share lessons from Google’s two-year sustainable operations program, which aimed to reduce the cost of Google Kubernetes Engine (GKE) while their fleet increased-without compromising the reliability of their systems. She will show how improving the partnership with critical dev teams enabled them to reduce 45 percent of the team's unactiona...
Scaling ML Serving to 1000s of Models
zhlédnutí 183Před 14 dny
Gerard Casas Saez, Cash App Join the Cash App engineering team as we discuss effective strategies for scaling ML serving solutions to manage thousands of models efficiently. In this talk, Gerard Casas Saez (Senior Machine Learning Engineer) shares how Cash App optimized their platform, focusing on ONNX model performance, hot container replacements, and automatic, streamlined model deployments. ...
Iterating on Culture: Datadog's Journey Building Remote Configuration
zhlédnutí 131Před 14 dny
David Mitchell, Datadog Companies that build products have strong perspectives on their product’s relationship with customers. For Datadog, this meant building an observability platform that ingests all of your telemetry to provide valuable insights that enables teams to make the best decisions. But sometimes building the right things for customers means you have to reconsider your product phil...
Navigating Cost Pressures at Scale with Rivian’s Connected Vehicle Platform
zhlédnutí 237Před 14 dny
Beau Christensen, Rivian Electric vehicles are increasingly becoming data-centric platforms, and Rivian's integration of advanced digital capabilities with robust physical systems has established their fleet as sophisticated mobile data centers. With automation as a core principle of modern Site Reliability Engineering, cost-cutting is crucial as companies expand their cloud footprint while rem...
AI and the Future of Software Engineering
zhlédnutí 366Před 14 dny
Skylar Graika, Smartsheet Randy DeFauw, Amazon Sam Torchio, Datadog Rima Al-Ghossein, Datadog Moderated by Jason Yee As AI becomes more accessible and more engineers try it, many of the early outlandish claims and fears have subsided. And while there’s little concern now that AI will replace software engineers any time soon, there are many questions regarding where and how to best use AI when w...
Building Compelling AI Products
zhlédnutí 118Před 14 dny
Sherry Marcus, AWS Sajid Mehmood, Datadog AI is hot, but it seems that many companies are haphazardly slapping AI onto their products. Often, these new AI-enabled tools seem more like a solution in search of a problem than a useful product. So how should we be incorporating AI to truly benefit our customers? In this fireside session, Dr. Sherry Marcus (Director of Applied Science, Generative AI...
Scaling Observability in the Cloud with 3 FTEs
zhlédnutí 97Před 14 dny
Laurie McKenzie, TD Bank Iram Mughal, TD Bank Moderated by Ajuna Kyaruzi, Datadog TD Bank is a massive financial institution with a huge technology footprint. At the beginning of their Public Cloud journey they had to implement critical objectives for scalability, increased observability and adopt a DevOps shift-left methodology. In order to modernize, the small team responsible for leading the...
Introduction to RUM & Session Replay
zhlédnutí 327Před 14 dny
Welcome to the first video of our new series, Frontend Observability & Monitoring! In this video, we dive into Datadog Real User Monitoring and walk you through everything you need to get started. Have any questions? Let us know in the comments! And be sure to check out our resources below. 00:00 - Introduction 00:58 - What is Real User Monitoring? 02:35 - Getting Started 03:46 - Privacy & Secu...
CJ Olive Young’s Journey to Bridging the Gap Between Business Operations and Infrastructure
zhlédnutí 558Před 14 dny
Minju Shin, CJ Olive Young With a thousand brick-and-mortar stores and a successful online shop, CJ Olive Young is the most popular health and beauty product store based in South Korea. Although the company has stood out for its successful business operation, our business metrics-such as rate of sales, new memberships, and delivery statuses-were completely separated from our infrastructure and ...
Automating Through the Red Tape
zhlédnutí 71Před 14 dny
Automating Through the Red Tape
Service Inventories as a Foundation for Vulnerability Management
zhlédnutí 53Před 14 dny
Service Inventories as a Foundation for Vulnerability Management
How SiriusXM Used Readiness Days to Launch its Next-Gen Streaming App to 34 million Subscribers
zhlédnutí 45Před 14 dny
How SiriusXM Used Readiness Days to Launch its Next-Gen Streaming App to 34 million Subscribers
That Time I Accidentally DDoS'd My Company
zhlédnutí 82Před 14 dny
That Time I Accidentally DDoS'd My Company
Modern Web Performance
zhlédnutí 107Před 14 dny
Modern Web Performance
How to Systematically Filter PII from Logs
zhlédnutí 236Před 14 dny
How to Systematically Filter PII from Logs
Detection as Code: Streamlining Security Operations with Terraform
zhlédnutí 79Před 14 dny
Detection as Code: Streamlining Security Operations with Terraform
Lessons from Building HashiCorp’s Internal Platform
zhlédnutí 83Před 14 dny
Lessons from Building HashiCorp’s Internal Platform
Fast Incident Response for Even Faster Food Delivery at iFood
zhlédnutí 126Před 14 dny
Fast Incident Response for Even Faster Food Delivery at iFood
How Snowflake Optimized Its New UI
zhlédnutí 175Před 14 dny
How Snowflake Optimized Its New UI
Arcane: Open-Source Kubernetes Native Streaming Framework with Focus on Simplicity & Costs
zhlédnutí 117Před 14 dny
Arcane: Open-Source Kubernetes Native Streaming Framework with Focus on Simplicity & Costs
Building a Culture of Observability
zhlédnutí 370Před 14 dny
Building a Culture of Observability
Beyond Metrics and Traces: Using Continuous Profiler for Low-level Optimization
zhlédnutí 186Před 14 dny
Beyond Metrics and Traces: Using Continuous Profiler for Low-level Optimization
What’s Next for DevSecOps?
zhlédnutí 186Před 14 dny
What’s Next for DevSecOps?
Improving Software Delivery and Developer Experience
zhlédnutí 97Před 14 dny
Improving Software Delivery and Developer Experience

Komentáře

  • @JamesWright-ol3rw
    @JamesWright-ol3rw Před 3 dny

    I eagerly await for your response.

  • @JamesWright-ol3rw
    @JamesWright-ol3rw Před 3 dny

    OH!!! In case you were wondering, the SGQGG stands for sacred geometry quantum gate generator

  • @JamesWright-ol3rw
    @JamesWright-ol3rw Před 3 dny

    Okay now just one more little piece of information : tetrahedral operator: T - 1 / √ 2 ( ( | 0 +| 1 +|2 + | 3 )

  • @JamesWright-ol3rw
    @JamesWright-ol3rw Před 3 dny

    Well, I will just text you a little information . Possible quantum gates equation fractal hadamard gate: H_f-1/√2(10+e^( I π / 4 )|1)

  • @JamesWright-ol3rw
    @JamesWright-ol3rw Před 3 dny

    I am looking for someone who's going to respectfully take me seriously and give me the financial and encouraging support to manifest my invention into reality. I call it the SGQGG , the device is a quantum teleportation device. I have the mathematical equations and algorithms with the solutions, and I have the schematics of the device, I Will send a photo of a tiny portion of my work.

  • @IAmJudy1111
    @IAmJudy1111 Před 6 dny

    I'm not sure why I got an ad on Facebook for this. I mean, I'm the target audience somewhat, I work and teach in IT, and I'm teaching Agile this week, though what is the sell? Also boggles the mind as I have been discussing Eisenhower matrix, did not post that anywhere and yet the ad I saw started with that. Best wishes.

  • @Orladopaginag
    @Orladopaginag Před 10 dny

    Thank you're company,❤PG tewala sa aken at Ng shea8 puso at comment ❤️ salahat Ng suportirs at sa casino slots godblss to all, salamat,

  • @worthexcellence9163
    @worthexcellence9163 Před 15 dny

    Those little comments about ops peeps, like that desire to understand weird corner cases, and others, I- I really feel seen 😆

  • @smshin3357
    @smshin3357 Před 15 dny

    ❤❤❤❤❤

  • @magictorch5103
    @magictorch5103 Před 16 dny

    Thank you Rory for the series. I have learnt a lot from this

  • @BUY_YOUTUB_VIEWS.986
    @BUY_YOUTUB_VIEWS.986 Před 17 dny

    Soooo gooooood

  • @sbimochan
    @sbimochan Před 24 dny

    Really helpful content.

  • @KimberlyMoore-c1r
    @KimberlyMoore-c1r Před 25 dny

    Great teamwork data dog you made a better priority everyone to understand

  • @RubyCheng-tz4oh
    @RubyCheng-tz4oh Před měsícem

    Hi, thank you for providing this. Since this video was filmed 4 years ago, are there any other resources I can refer to?

  • @Voidroamer
    @Voidroamer Před měsícem

    would you look at that, an actually useful demo! Thanks :) MicroFocus could learn a thing or two from you..

  • @divyavishwakarma2002
    @divyavishwakarma2002 Před měsícem

    How does one look into a similar proc filesystem in MacOS where we'll find information for all the processes like the way it's shown in the video?

  • @gemini_537
    @gemini_537 Před měsícem

    Gemini 1.5 Pro: This video is part of a series on container security fundamentals. In this particular video, the focus is on Linux capabilities and how they are used to limit privileges within containers. The video starts with a brief explanation of traditional methods for giving users privileged access on a Linux host. These methods, such as using sudo or setting a binary as setuid root, are not very granular and can be security risks. Capabilities are a more granular way to grant privileges. They allow a file or process to have a small subset of root's overall privileges. There are 41 different capabilities available in Linux. The video then demonstrates how to view capabilities on the host using the pscap command. This command shows which processes have all or some of the capabilities available. For example, the systemd process has the net_raw capability, which allows it to create raw network packets. Another way to view capabilities is with the filecap command. This command can be used to see which files have capabilities assigned to them. For example, the ping utility has the net_raw capability assigned to it, which allows it to create ICMP network packets. The video then discusses how Docker handles container privileges. By default, Docker assigns a set of capabilities to each container that it runs. This set of capabilities is designed to allow most containerized workflows to run without problems, but it also avoids giving containers too many privileges that could be used to escalate privileges. The next video in the series will cover how to harden containers by reducing the number of capabilities that are assigned to them by default.

  • @claireblake3852
    @claireblake3852 Před měsícem

    I work as a freshly promoted account manager team leader managing 12 people and despite the vastly different industries, these principles are going to help me immensely so thank you - I've found so much value in this <3

    • @NT-qd2rs
      @NT-qd2rs Před měsícem

      I've managed 16, we'll see if I learn smth new 😊

  • @gemini_537
    @gemini_537 Před měsícem

    Gemini 1.5 Pro: This video is the first part of a series on container security fundamentals. In this video, the speaker explains that containers are essentially just processes. The speaker demonstrates this by showing how you can interact with a container using standard Linux process tools. First, the speaker runs a PS command to list all the processes on the machine. The command returns nothing because there are no nginx web servers running. Then, the speaker creates a new container running the nginx container image. After the container is created, the speaker reruns the PS command and finds a new process with the ID 46727. This process is the nginx web server that is running inside the container. Next, the speaker creates a new file called "my_new_file" inside the container using the docker exec command. Then, the speaker uses the sudo ls command to look inside the proc file system. The proc file system contains information about all the running processes on the machine, including containers. The speaker navigates to the root directory of the process with ID 46727 (the nginx container) and finds the file "my_new_file" that was created earlier. This demonstrates that containers are just processes and that you can interact with them using standard Linux tools. In future videos, the speaker will delve more into how containers appear to be isolated even though they are just processes.

  • @gemini_537
    @gemini_537 Před měsícem

    Gemini 1.5 Pro: This video is part one of a series on container security fundamentals. In this part, the video talks about Linux namespaces and how they are used to isolate resources on a host. The video starts by explaining what Linux namespaces are and the different types of namespaces that are available. There are eight namespaces available in total, but only six of them are enabled by default when using Docker containers. These six namespaces are mount, network, PID, IPC, UTS, and cgroups. The video then goes into detail about how to use the `lsns` command to list the namespaces on a machine. This command shows the number of processes using a given set of namespaces. The video also explains how to use the `findmnt` command to view how the mount namespace has been set up for a container. This command shows all of the information about the mounted file systems for that process. Finally, the video talks about how to use the `NS enter` program to interact with different Linux namespaces. This program allows you to run commands in the namespace of a process. This can be useful for inspecting a container on a machine without having to use Docker tooling. The next video in the series will go into more depth about some of the other namespaces that are used by Linux containers.

  • @happyloo2023
    @happyloo2023 Před měsícem

    Hello? Let me introduce a new product for dogs that I developed. I upgraded the product four times with faith for 10 years and finally completed it. Currently on sale on Naver in Korea, it is enjoying 99 percent satisfaction and top popularity among consumers. It automatically cleans the dog's urine with water. And it has no movement, so the dog uses it easily and comfortably.

  • @dembadiop3395
    @dembadiop3395 Před měsícem

    Ce que je sais et si le saucisse ne se fait pas comme devait se faire la parole la France et je ne l'écris jamais ayé gage

  • @Hasan-ow2tr
    @Hasan-ow2tr Před měsícem

    عالی

  • @DAVIDOZERSKY
    @DAVIDOZERSKY Před měsícem

    Firebase performance monitoring automatically tracks all network requests made using OkHttp and function calls. How does Datadog compare in this regard? Are their difference in the automatic traces that are captured by each product?

  • @StevanNetto-qg7gx
    @StevanNetto-qg7gx Před 2 měsíci

    "research organisation" 😂

  • @brandydurdengonzalez
    @brandydurdengonzalez Před 2 měsíci

    Thank you, for the conversation! Really enjoyed the feedback from the Jesse Gonzalez. Interesting stuff

  • @IOSARBX
    @IOSARBX Před 2 měsíci

    Datadog, I love your channel so much, I just had to subscribe!

  • @Shiv-qv7dv
    @Shiv-qv7dv Před 2 měsíci

    Excellent

  • @ROBERTHARRISON-zo7hl
    @ROBERTHARRISON-zo7hl Před 2 měsíci

    Logistics

  • @jayesh.savkare
    @jayesh.savkare Před 2 měsíci

    Informative !

  • @g.martino5014
    @g.martino5014 Před 2 měsíci

    Scusa eh, ma tu sei Nutello????

  • @ThzZoltek
    @ThzZoltek Před 2 měsíci

    Nice video ! thanks !