💡 Tip: “Zero overhead” is not a feature. It’s the baseline. If your observability tool adds overhead… you’re not measuring your system — you’re influencing it. Before adopting any tooling, ask: • Does it impact CPU or latency? • Does it rely on sampling instead of full visibility? • Does it force context switching to understand issues? If yes — your data might not reflect reality. Good observability doesn’t interfere. It reveals. #ZeroOverhead #NoContextSwitch #NodeJS #Observability #WebSummitVancouver #TheMissingLink
NodeSource
Software Development
Seattle, WA 6,789 followers
N|Solid, the best tool for organizations to monitor Node.js applications, built by the Node experts. Know your Node.
About us
NodeSource is dedicated to helping developers and organizations leverage the power of Node.js. We are Node Navigators. We help organizations & developers use Node to its fullest through N|Solid, the world's safest and most secure Node.js platform. Secure. Reliable. Extensible. NodeSource provides Node.js runtime security, enterprise-grade production Node.js support. From the Node company. #KnowyourNode
- Website
-
https://nodesource.com
External link for NodeSource
- Industry
- Software Development
- Company size
- 11-50 employees
- Headquarters
- Seattle, WA
- Type
- Privately Held
- Founded
- 2014
- Specialties
- Node.js, Node.js Products, Technology Audits, Education, DevOps, Software Lifecycle Communication, Node.js Security, Node.js Performance, AI, and OSS
Locations
-
Primary
Get directions
Seattle, WA, US
Employees at NodeSource
Updates
-
Big move for the future of Node.js 👇🏼 Michaël Zasso landed the V8 14.6 upgrade in upstream Node — coming in Node v26. And with it: → Temporal (Stage 4), now available unflagged This is bigger than it looks. Time handling has historically been one of the most error-prone areas in JavaScript — time zones, parsing inconsistencies, edge cases in production… Temporal is a fundamental step toward fixing that at the language level. And now it’s becoming part of the default Node.js runtime experience. These are the kinds of changes that quietly reshape production systems. 👏🏼 Credit to Michaël Zasso for the work 📣 Shared via Rob Palmer Source: https://lnkd.in/gbsdpiCq https://lnkd.in/gF84q7PH
-
NodeSource reposted this
The stage is set. It's almost time for #WebSummitVancouver 🚀 Will we be seeing you there?
-
Most developers think Node.js has “a version.” It doesn’t. At any moment, multiple versions are active: • Current (fast-moving) • LTS (production-ready) • Maintenance (limited support) • EOL (unsupported) Each one behaves differently — and choosing the wrong one introduces real risk over time. In this video, we break down: • How many Node.js versions exist • How the lifecycle actually works • How to read the official lifecycle chart • What codenames like Krypton, Jod, and Iron mean 🎬 Watch here: https://lnkd.in/erW-6-ja ⏳ Node.js Releases https://lnkd.in/exDp8HeR 🚀 Need to upgrade your Node.js version? https://lnkd.in/eb2A7Wup If you're running Node.js in production… this is something you need to understand.
-
NodeSource reposted this
🔐 The #Nodejs Collaborator Summit #security session recording is now online. Rafael Gonzaga walked us through the current state of vulnerability reporting in Node.js, and the numbers tell the story: 352 reports in two years, with a 4.6x spike after AI Agent Teams launched in February 2026. Last month alone, 65 reports. The team has tried raising signal thresholds, auto-closing low-quality reports, expanding the threat model, and pausing the bounty program. None of it has been enough. The session includes a controversial proposal: move most reports to a public workflow. If any capable LLM can reproduce the same findings on demand, treating them as private secrets only provides a false sense of security. Our 90-day disclosure window offers little protection when the "vulnerability" can be re-discovered in minutes. On the other hand, a public fix can ship in a regular release the next day. The same LLMs causing this flood are also useful on the defense side. I use them daily to validate patches and scan for things I might have missed. Just during the summit, two new issues in userland projects came up that are now being patched. The tools work both ways. My take: the current system is not sustainable, and not just for Node.js. So far we have never had unpatched CVEs on Node.js active versions. That might change. We will likely see major projects with known vulnerabilities on their latest releases simply because triage capacity cannot keep up. It is broken for maintainers now. It will be broken for users soon too. That might be what finally pushes companies to invest in the security work they rely on every day. The full session, with open discussion from collaborators, is worth watching. https://lnkd.in/ekVMqYPf
Node.js Collaboration Summit 26H1 - Node.js Security - State of the Ecosystem & What's Next
https://www.youtube.com/
-
Debugging today isn’t just hard. It’s fragmented. We’ve added more tools, more telemetry, more dashboards… But understanding what’s actually happening in production still takes too long. Why? Because the problem isn’t visibility. It’s disconnected context. In this new post, we break down the real friction behind modern debugging: • Context spread across logs, metrics, traces, and profilers • Observability built for systems — not for developers • Async complexity in environments like Node.js • Reactive workflows that start after things break • Tooling that shows what happened — but not why And more importantly: What’s starting to change. → Continuous profiling → Code-level observability → Runtime-aware debugging → AI-assisted workflows The direction is clear: Debugging is moving closer to the code itself. 📖 Read the full post: https://lnkd.in/eC5eqE3A
-
Debugging today is fragmented by design. You open one tool for logs. Another for metrics. Another for traces. And still… you don’t fully understand what’s happening. Not because the data isn’t there — but because the context isn’t where you need it. For years, observability has been built around dashboards. But developers don’t work in dashboards. They work in code. That gap creates friction. And it’s exactly the problem we’ve been focused on solving. As AI accelerates how we build software, this problem only becomes more obvious — and more urgent. At #WebSummitVancouver 🇨🇦, we’re introducing a new approach. One that brings understanding closer to where debugging actually happens. Stay tuned. 👀
-
There are 4 very common bugs in Node.js apps 🐛 1. Unexpected shared state 2. Retries that make things worse 3. Poorly handled timeouts 4. Lack of visibility across services They can be avoided — if you treat them as architecture problems, not just code issues: • Isolate state (stateless + idempotency) • Use backoff + circuit breakers for retries • Define explicit timeouts at every layer (not defaults) • Invest in real observability (tracing + metrics + profiling) It’s not magic — it’s system design. Have you hit any of these before? Read more: https://lnkd.in/ePTHk8a9 🚀
-
-
Sourcemaps now work in production — automatically in N|Solid 🎉 For years, sourcemaps have been the missing link in debugging real production systems. They’re generated during build — but often unavailable when errors actually happen. That gap creates friction: • Stack traces without context • Slower debugging • More time reconstructing what went wrong We just published how N|Solid approaches this with automatic sourcemap retrieval: • Fetch sourcemaps directly from your CDN or S3 • Resolve them using build metadata • Link them to runtime profiles automatically No manual uploads. No broken workflows. The result: Debugging that actually works in production. Read the full breakdown 👇🏼 https://lnkd.in/eZ9ayTBp
-
AI is generating code faster than we can debug it. And that’s not just a tooling problem — it’s a shift in how software is built. We’ve optimized for speed. Now the bottleneck is something else: → understanding what’s actually running in production. Because developers today are not just writing systems. They’re reviewing AI-generated logic, operating increasingly complex architectures, and debugging things they didn’t fully write. And the current model? It still assumes that: → observability happens after deployment → context lives across multiple tools That gap is getting expensive. What’s emerging now is different: → faster feedback loops → runtime awareness earlier → less context switching Not more dashboards. Better understanding. Because in an AI-driven world, the advantage is no longer who writes code faster— It’s who understands it faster. Something new is coming.
-
-
-
-
-
+1
-