Systems | Development | Analytics | API | Testing

Calling Ruby Methods in C: Avoid Memory Leaks

Memory leaks are a pain for gem users. They are hard to track and can lead to expensive infrastructure costs. Memory leaks within a C extension are even worse. You'll see a lot of tools and articles about finding leaks in Ruby. However, you don't have the same access to internals in C. A naive usage of rb_funcall can cause memory leaks: it's much better to use rb_protect instead. So, if you are a C extension writer, please read on for the sake of developers who will use your gem. Let's get started!

How To Instrument Your Elixir Application with AppSignal

Instrumentation is an essential part of monitoring and operating an application, especially for apps heavily used in production. Even in today's everchanging technology landscape, visibility and observability still challenge developers and system administrators. Metrics and logging are essential for monitoring and operating an application. Metrics measure an application's performance and system health, while logging records system health and application state.

5 Business Data Migration Best Practices

Data migration is something that all businesses will have to deal with at some point. Maybe a high level of growth has meant that you have too much data and need a larger server. Or maybe you want to move to a new cloud-based system. Regardless of the specifics, all modern businesses will know the power of unlocking data.

Cybersecurity Update: What Do the Latest WP.29 UNECE Regulations Cover?

With the growth in the number of electric and autonomous vehicles, where the vast majority of components are built on software, the amount of code in a vehicle is only going to increase. Connectivity, both within the vehicle and outside, is also increasing, meaning that the security of these systems has become more critical than ever before. For any system where there is communication between components or with the outside world, there is an increase in possible software cybersecurity threats.