Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Troubleshooting Java Performance: Detecting Anti-Patterns with Open Source Tools

Buy
With just 30 minutes of troubleshooting, how close can you get to finding the root cause of a Java performance problem? What observability tools would you use? What subsystems would you investigate?

This book is a short curriculum in Java performance tuning for Java server-side developers. It explores one methodical approach to getting the most out of your 30 minutes and aims to show that much more is possible than is generally thought, even for Java developers with little exposure to performance tuning.

The brevity of this book is attributed to a sharp focus on only the worst problems seen in the author’s 10 years of working exclusively as a lead Java performance engineer with Java distributed systems. That said, the tools and techniques can be used to find pretty much any defect.

This book is heavy on walkthroughs of performance problems that you can download from github.com and run on your own machine. The hands-on examples provide a rich, in-the-trenches experience that a book-only approach can’t provide, not even a much larger book.

The reader will learn a methodical, easy-to-remember four-step tuning approach, called the P.A.t.h. Checklist, that directs the reader’s attention to the right parts of the system and the right tools to find the performance defects. If you’re wondering why I’ve chosen to capitalize the acronym that way, you’ll find out in Chapter 4. Only open-source and freely available tools are used. In most cases, you will even see how the monitoring data looks before and after a performance fix is applied. Here is the checklist:

• P: Persistence. Learn how to recognize and fix the most common JDBC performance issues, ones that also apply to the NoSQL world.

• A: Alien systems. Detect when network calls to other systems cause slowdowns.

• t: threads. Learn how to identify CPU and response time issues using a low overhead tool that can be used in any environment, even production.

• h: heap. With the Quick GC Health Check, the reader will use a red-yellow green approach to assess whether GC performance is healthy. It also provides direction for more advanced techniques like finding/fixing memory leaks.

Generating a production-like workload is required to identify these defects, so there are a few chapters to get you up and going quickly to create load scripts to stress out your system. Among other topics like load scripting priorities and avoiding common pitfalls, the reader will learn a unique approach to deciding exactly how many threads of load to apply to show whether your system is scalable.
(HTML tags aren't allowed.)

Beginning Visual Basic 2012
Beginning Visual Basic 2012

The ultimate beginner's guide to programming in Visual Basic 2012

Visual Basic, used to write Windows applications and web apps with ASP.NET, is an essential language for beginning programmers. Using the time-tested Wrox approach, this guide provides a step-by-step format that gets beginners up and running quickly and...

Orthospinology Procedures: An Evidence-Based Approach to Spinal Care
Orthospinology Procedures: An Evidence-Based Approach to Spinal Care
This text presents the current and updated teaching of the Orthospinology procedure. Written by the author of the landmark text Upper Cervical Subluxation Complex, this book is a step-by-step, thoroughly illustrated guide to the Orthospinology procedure for correcting subluxations. Whereas Upper Cervical Subluxation Complex explains the...
A History of Plastic Surgery
A History of Plastic Surgery

This book covers the history of plastic surgery from the remarkable achievements of such ancient civilizations as India and Egypt up to the revolutionary techniques developed at the end of the Middle Age, the Renaissance and beyond. Coverage details how the knowledge of wound healing has changed and influenced plastic surgery, describes the...


Cisco Access Control Security : AAA Administration Services
Cisco Access Control Security : AAA Administration Services

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.


Hands-on techniques for enabling authentication, authorization, and
...

The Best Enemy Money Can Buy
The Best Enemy Money Can Buy
Back in 1973 this author published National Suicide: Military Aid to the Soviet Union, itself a sequel to a three volume academic study, Western Technology and Soviet Economic Development, published by the Hoover Institution, Stanford University. These four books are detailed verifiable catalogs of Western technology used and in use by the Soviet...
The Book of IMAP: Building a Mail Server with Courier and Cyrus
The Book of IMAP: Building a Mail Server with Courier and Cyrus

There is very little specialist literature available on IMAP servers, and no current documentation deals with the subject in sufficient depth.

There is a real need for a guide to IMAP. A quick look at relevant mailing lists shows that they are full of questions and problems, indicating that the software solutions now in use...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy