News Aggregator


Meet Bun.js and Vite, Two Web-Development Turbochargers

Aggregated on: 2024-07-27 14:38:32

What about boosting your bicycle with a jet engine? That's the kind of speed Bun.js and Vite bring to web development. Let's dive into these two tools and see what they offer. Two experienced developers of Valletta, Alexander, and Oleg, helped me with this. Bun.js: The Speed Boost for JavaScript Remember when we thought Node.js was fast? Well, Bun.js makes it look slow in comparison.

View more...

Practitioner’s Guide to Deep Learning

Aggregated on: 2024-07-26 22:38:32

Our world is undergoing an AI revolution powered by very deep neural networks. With the advent of Apple Intelligence and Gemini, AI has reached the hands of every human being with a mobile phone. Apart from consumer AI, we also have deep learning models being used in several industries like automobile, finance, medical science, manufacturing, etc. This has motivated many engineers to learn deep learning techniques and apply them to solve complex problems in their projects. In order to help these engineers, it becomes imperative to lay down certain guiding principles to prevent common pitfalls when building these black box models.  Any deep learning project involves five basic elements: data, model architecture, loss functions, optimizer, and evaluation process. It is critical to design and configure each of these appropriately to ensure proper convergence of models. This article shall cover some of the recommended practices and common problems and their solutions associated with each of these elements.

View more...

5 Innovative Cybersecurity Measures App Developers Should Incorporate in the Digital Transformation Race

Aggregated on: 2024-07-26 20:38:32

Digital transformation initiatives are ongoing processes for software developers in particular, and organizations at large must constantly adapt while enabling seamless workplace-cultural shifts and enhancing relevance to global users. With the increasing sophistication of cyber threats and the growing reliance on digital technologies, it has become crucial for app developers to incorporate innovative cybersecurity measures to enhance digital transformation. Digital transformation entails integrating technology, such as apps and tools, to create new business processes; it can involve changing existing systems or building relatively new ones. To harness the expected outcome of digital transformation, organizations must change their operational mode by moving traditional tasks to digital formats. 

View more...

Introduction to Polymorphism With Database Engines in NoSQL Using Jakarta NoSQL

Aggregated on: 2024-07-26 18:38:32

Polymorphism, a fundamental concept in object-oriented programming, allows objects of different types to be treated as instances of a common superclass. This flexibility is essential for creating systems that can be easily extended and maintained. While traditional SQL databases in combination with Jakarta Persistence (JPA) can handle polymorphic data, NoSQL databases offer distinct advantages. Unlike SQL databases, which require strict schema definitions, NoSQL databases take a schema-less approach, inherently supporting dynamic and flexible data structures. This flexibility becomes especially appealing when integrated with Jakarta NoSQL, a tool that provides robust support for defining and managing polymorphic fields through custom converters. In many enterprise applications, there is a common need to manage different types of data objects. For example, an e-commerce platform may handle various payment methods such as credit cards, digital wallets, and bank transfers, each with specific attributes. Similarly, asset management systems in large corporations deal with different types of assets like real estate, machinery, and intellectual property, each with unique properties. Healthcare systems must accommodate various data types, from personal information to medical records and test results. Utilizing NoSQL databases with polymorphic fields can store and manage these diverse data types cohesively. The schema-less nature of NoSQL databases also makes it easier to adapt to changing requirements than relational databases.

View more...

How To Secure Your Angular Apps: End-To-End Encryption of API Calls

Aggregated on: 2024-07-26 16:38:32

When it comes to secure web applications, we must keep sensitive data secure during the communication period. Sadly, while HTTPS encrypts data as it moves from point A to point B, the information is still exposed in a browser's network tab and can leak out this way. In this post, I will give you an example of implementing end-to-end encryption of API calls in your secure web app built with Angular. Encryption Workflow Weak protections have traditionally been obfuscation with Base64 encoding or custom schemes. Public key cryptography (PKC) is considered a modern solution to be more secure. It uses a key pair one public key for encryption, and the other private key for decryption. A public key is distributed and a private key is kept on the server.

View more...

Roots of Test Smells

Aggregated on: 2024-07-26 13:08:32

Test smells are signs that something has gone bad in your code. Plenty of great stuff has been written about them, and we at our team have contributed practical examples of how to spot smelly test code here and here. While test smells may arise for a bunch of different reasons, there is one recurring theme that we'd like to cover today, and it has to do with team structure. The point we'd like to make is that a good automated test is an overlap of several different domain areas:

View more...

How To Implement a Gateway With Spring Cloud

Aggregated on: 2024-07-25 23:08:31

A microservice system could have a high number of components with complex interactions. It is important to reduce this complexity, at least from the standpoint of the clients interacting with the system. A gateway hides the microservices from the external world. It represents a unique entrance and implements common cross requirements. In this article, you will learn how to configure a gateway component for a Spring Boot application, using the Spring Cloud Gateway package. Spring Cloud Gateway Spring Cloud provides a gateway implementation by the Spring Cloud Gateway project. It is based on Spring Boot, Spring WebFlux, and Reactor. Since it is based on Spring WebFlux, it must run on a Netty environment, not a usual servlet container.

View more...

Exploring the Evolution of Transformers: From Basic To Advanced Architectures

Aggregated on: 2024-07-25 21:08:31

In their seminal 2017 paper, "Attention Is All You Need," Vaswani et al. introduced the Transformer architecture, revolutionizing not only speech recognition technology but many other fields as well. This blog post explores the evolution of Transformers, tracing their development from the original design to the most advanced models, and highlighting significant advancements made along the way. The Original Transformer The original Transformer model introduced several groundbreaking concepts:

View more...

Impact of Generative AI in the Cellular and IoT Telecommunication

Aggregated on: 2024-07-25 19:08:31

The telecommunications industry, known for its constant evolution and technological advancements, is on the brink of a transformative shift with the integration of Generative AI (Gen AI). This emerging technology promises and is poised to revolutionize telecom operators' operational methodologies, customer interactions, and service delivery. Let's explore the potential of Gen AI and its exciting future for telecommunication. Let's dive deep.

View more...

OpenTelemetry: Unifying Application and Infrastructure Observability

Aggregated on: 2024-07-25 17:08:31

In this insightful Q&A, Goutham Veeramachaneni, a long-time Prometheus maintainer and Product Manager at Grafana Labs, shares his unique perspective on the transformative impact of OpenTelemetry (OTel) in the observability landscape. Veeramachaneni discusses how OTel is standardizing telemetry data and inspiring new open-source data collectors and workflows that bridge the gap between application and infrastructure monitoring. He offers valuable insights into the evolving ecosystem, the challenges ahead, and the exciting possibilities for developers in composing more effective telemetry data pipelines. Q: As a Long-Time Prometheus Maintainer, What’s Your Take on the Overall Impact That OpenTelemetry Has Had on the Market? A: It’s given developers and platform teams much greater ownership of their data. It’s given them flexibility and freedom that they didn’t have before. Previously, with no universal open standard for telemetry data, the proprietary vendor mousetraps were designed to make it super difficult to migrate to other solutions, which was insane. These vendors didn’t have a lot of incentive to innovate or compete, because they had instrumented such effective mousetraps to lock users in. They spoke their protocols and collected their metrics, and there was no standardization. OpenTelemetry already has forced the entire market to standardize on the OTLP protocol and its ecosystem of SDKs and APIs. That has taken the power away from vendors and created a standard that is dynamic and open and where everyone collaborates — which is driving a ton of innovation.

View more...

Developing Event-Driven, Auto-Compensating Saga Transactions For Microservices

Aggregated on: 2024-07-25 16:38:31

Over the past decade, I have presented many times and written numerous blogs and source code on sagas and event-driven microservices. In those blogs, I’ve discussed the need for sagas in microservices architectures, the preferred and increased use of event-driven patterns and communication for microservices, and the difficulties in implementing sagas, particularly around developing saga participant code for compensating transactions. These are addressed in the product solution I will describe, including an example source code here, and soon, an update of the beta version of the saga workshop showing the same. The features are in the Oracle Database Free Docker container and soon in the Oracle Autonomous Database. Part of what makes the new Oracle Saga Framework so powerful is its combined usage of other features in the Oracle Database including the TxEventQ transactional messaging system and reservation-less locking; therefore, I will describe them and how they contribute to the overall comprehensive solution as well.

View more...

Pilot VPC and Advanced NAT: Securely Connect Overlapping Networks to AWS VPC

Aggregated on: 2024-07-25 15:08:31

In today's dynamic business environment, cloud computing has become a crucial enabler, offering enterprises unmatched scalability, flexibility, and cost-efficiency. Amazon Web Services (AWS), a leading cloud service provider, has transformed how organizations manage their IT infrastructures and applications. With AWS Virtual Private Clouds (VPCs), businesses can establish secure, isolated environments within the cloud, replicating the capabilities of traditional on-premises networks. However, despite the clear benefits of cloud adoption, bridging the gap between on-premises networks and AWS VPCs can be challenging, particularly when dealing with overlapping IP addresses. Situations often arise where on-premises networks and AWS cloud environments unintentionally use the same private IP addresses, obstructing communication and data exchange across the VPN tunnel. This article addresses this specific issue and explores an innovative solution for establishing secure connectivity between overlapping on-premises networks and AWS VPCs. Leveraging AWS site-to-site VPN, the traditional method for connecting on-premises environments and VPCs, enterprises frequently face obstacles when managing conflicting IP addresses. Mergers, acquisitions, and other networking complexities further complicate the situation, making straightforward resolution difficult.

View more...

Optimizing Search Precision With Self-Querying Retrieval (SQR) and Langchain

Aggregated on: 2024-07-25 13:08:31

What Is Self-Querying Retrieval? Self-querying retrieval (SQR) is a method ensuring that LLMs are at the core of understanding the user's intent against a document collection. Key ideas include: Document representation: Word embedding provides a numerical vector for every document. This helps in fast comparison between the documents. User query: The user submits a natural language query expressing their need for information. LLM-driven retrieval: The query and the document representations are fed into the LLM, which then retrieves documents that maximize the user's intent. Refine and repeat: The user is now able to refine his query or ask follow-up questions to narrow the search based on the retrieved documents. Why Self-Querying Retrieval? Traditional retrieval systems usually require complex query languages or predefined search facets. However, self-querying retrieval would provide a much more natural and user-friendly approach. Here is why:

View more...

Key Strategies on How to Advance Your Digital Tech Career

Aggregated on: 2024-07-24 23:08:31

The digital technology market is highly saturated and competitive, and to survive there, you need to succeed. Tech employers constantly seek IT professionals with the latest industry knowledge and expertise due to interconnected reasons: digital technology companies compete in international markets with each other, thus they need to be adaptive and constantly introduce new products and features to remain competitive. For every person working in the IT sector, it’s crucial to be up-to-date with the latest and most influential innovations and trends in their industry, read professional literature, and constantly develop new skills. What main skills have the most value in the digital tech market? What is the perfect ratio between hard and soft skills? Hard Skills vs Soft Skills Each employee's role is specific to different areas of digital technology, and it is difficult to determine the exact ideal balance between hard and soft skills. However, on average, I would say that for technical roles, the percentage of hard skills is approximately 60-70 percent and 30-40 percent for soft skills. But for managerial roles, on the contrary, hard skills should be slightly less than 50 percent. Among the most important soft skills are clear communication, adaptability, critical and strategic thinking, and time management. Therefore, if your goal is to advance your career in leadership positions, it’s better to concentrate on polishing your soft skills, or, alternatively, try to achieve an equal balance of hard and soft skills through continuous development in both areas which can lead to a greater career success.  

View more...

Use Guardrails for Safeguarding Generative AI Applications Built Using Custom or Third-Party Models

Aggregated on: 2024-07-24 22:38:31

Guardrails for Amazon Bedrock enables you to implement safeguards for your generative AI applications based on your use cases and responsible AI policies. You can create multiple guardrails tailored to different use cases and apply them across multiple foundation models (FM), providing a consistent user experience and standardizing safety and privacy controls across generative AI applications. Until now, you could use Guardrails when directly using the InvokeModel API, with a Knowledge Base or an Agent. In all these scenarios, Guardrails evaluates both user input entering into the model and foundation model responses coming out of the model. But this approach coupled the guardrail evaluation process with model inference/invocation.

View more...

How Behavioral Biometrics Enhances Fraud Prevention

Aggregated on: 2024-07-24 21:08:31

Today’s fraud prevention processes are far smoother than they used to be. Automated alert systems and authentication measures are now standard, but these relatively simple, rules-based solutions are still imperfect. The growing field of behavioral biometrics offers a more reliable alternative. Higher Detection Accuracy Behavior biometrics’ accuracy is its primary advantage over conventional fraud detection. Researchers have developed systems capable of identifying fraud 95.5% of the time by tracking keystrokes alone. Such precision is difficult with a rules-based system, especially when it comes to unknown attack patterns.

View more...

Snowflake Integration Patterns: Apache Kafka vs. Zero ETL and Reverse ETL

Aggregated on: 2024-07-24 20:38:31

Snowflake is a leading cloud-native data warehouse. Integration patterns include batch data integration, Zero ETL, and near real-time data ingestion with Apache Kafka. This blog post explores the different approaches and discovers their trade-offs. Following industry recommendations, it is suggested to avoid anti-patterns like Reverse ETL and instead use data streaming to enhance the flexibility, scalability, and maintainability of enterprise architecture. Blog Series: Snowflake and Apache Kafka Snowflake is a leading cloud-native data warehouse. Its usability and scalability made it a prevalent data platform in thousands of companies. This blog series explores different data integration and ingestion options, including traditional ETL/iPaaS and data streaming with Apache Kafka. The discussion covers why point-to-point Zero-ETL is only a short-term win, why Reverse ETL is an anti-pattern for real-time use cases, and when a Kappa Architecture and shifting data processing “to the left” into the streaming layer helps to build transactional and analytical real-time and batch use cases in a reliable and cost-efficient way.

View more...

Test Automation in QA

Aggregated on: 2024-07-24 19:08:31

Maintaining quality is essential in the dynamic field of software development. Despite being essential, manual testing can become a bottleneck since it takes a lot of time and is prone to human error. One useful method for quickening the quality assurance process is test automation. They include employing software to manage test execution and compare predicted and actual findings.  Let's dive into the subtleties of test automation, including its advantages, best practices, and future industry developments. 

View more...

Democratizing Data With Graph RAG: What It Is, What It Can Do, How To Evaluate It

Aggregated on: 2024-07-24 18:38:31

Are you interested in making your data more accessible? A rhetorical question indeed. Even if you are well-versed in dark arts such as databases, data modeling, data science, and information retrieval, why would you not want to make data more accessible even to non-experts? Contrary to popular belief, data collection started in the analog age. Accessing analog data imposes severe limitations compared to what is possible with digital data. However, even with digital data, data democratization is not an easy feat for any organization.

View more...

The Hidden Costs of Lombok in Enterprise Java Solutions

Aggregated on: 2024-07-24 17:08:31

Imagine inheriting a codebase where classes are clean and concise, and developers don't have to worry about boilerplate code because they can get automatically generated getters, setters, constructors, and even builder patterns. Meet Lombok, a library used for accelerating development through "cleaning" boilerplate code and injecting it automatically during compile time. But, is Lombok a hero or a villain in disguise?  Let's explore the widespread perceived benefits and potential drawbacks of its adoption in enterprise Java solutions.

View more...

Effortless API Mocking With Playwright

Aggregated on: 2024-07-24 17:08:31

Automated testing of web applications often requires interaction with external APIs. However, relying on actual API responses can introduce variables beyond your control, such as network issues or server downtime. This is where API mocking comes in. Mocking allows you to simulate API responses, making your tests more reliable and faster. In this article, we’ll explore how to mock APIs using Playwright with TypeScript. Mocking APIs in Playwright Playwright provides a way to intercept network requests and mock responses using the route method. Let’s walk through an example where we mock an API response.

View more...

My Shortcut of Choice: Reading the Source Code

Aggregated on: 2024-07-24 16:38:31

There is a great post post on c2.com. c2.com is one of those golden blogs of the past just like codinghorror and Joel on software. You might have stumbled upon them before especially if you have been around for a long time. In the past, it was the norm to encourage individuals to read the source code and be able to figure out how things work. I see a trend against it from time to time including ranting on open source software and its documentation, which feels weird since having the source code available is essentially the ultimate form of documentation.

View more...

ChaosMeta for AI: Taking AI Stability to the Next Level With Chaos Engineering

Aggregated on: 2024-07-24 15:53:31

In today's AI era, the architecture of AI systems is becoming increasingly complex, making its stability, resource utilization, and fault self-healing capabilities increasingly important. Addressing issues only when they occur during actual operation not only incurs high costs but also affects user experience.  Chaos engineering is about proactively exposing and addressing system vulnerabilities, greatly enhancing system resilience. ChaosMeta, an open-source chaos engineering platform developed by Ant Group, provides comprehensive support for the stability of AI systems. 

View more...

Comprehensive Guide To Static Testing: Tools, Challenges, and Benefits

Aggregated on: 2024-07-24 15:08:31

To create high-quality software, it’s essential to thoroughly test applications before releasing them to customers. There are numerous methods available to rigorously analyze the software you’ve developed. Static testing is a valuable software development technique that focuses on preventing defects early on, without executing the code. By performing static tests in the early stages of development, you can avoid potential defects and improve code quality. What Is Static Testing? Static testing is a type of testing performed on software without actually running the code. During the testing process, we review and verify the product and its supporting documentation. In contrast, dynamic testing is the testing of software while the code is executing.

View more...

Advanced URL Rewriting With Apache APISIX

Aggregated on: 2024-07-24 15:08:31

I spoke at Swiss PgDay in Switzerland in late June. The talk was about how to create a no-code API with the famous PostgreSQL database, the related PostgREST, and Apache APISIX, of course. I already wrote about the idea in a previous post. However, I wanted to improve it, if only slightly. PostgREST offers a powerful SELECT mechanism. To list all entities with a column equal to a value, you need the following URL:

View more...

Spring Microservice Tip: Abstracting the Database Hostname With Environment Variable

Aggregated on: 2024-07-24 14:38:31

Managing database connection strings securely for any microservice is critical; often, we secure the username and password using the environment variables and never factor in masking or hiding the database hostname. In reader and writer database instances, there would be a mandate in some organizations not to disclose the hostname and pass that through an environment variable at runtime during the application start. This article discusses configuring the hostname through environment variables in the properties file.  Database Configurations Through Environment Variables We would typically configure the default connection string for Spring microservices in the below manner, with the database username and password getting passed as the environment variables. 

View more...

Consistency vs Availability: The Eternal Struggle in Distributed Databases

Aggregated on: 2024-07-24 13:53:31

Imagine millions of customers trying to book last-minute deals on a hotel or flight during one of the biggest sale events of the year, and while some customers can book, others see failures while making their bookings. This inconsistency results in frustrated customers and logistical nightmares. This typical scenario highlights a fundamental challenge in distributed systems and databases: how do you balance consistency and availability? This article aims to highlight the nuances of this balancing act along with the complexities and trade-offs that are in play. CAP Theorem, Consistency, and Availability To understand the nuances better, it’s important to understand the CAP theorem. As there are several other articles on the internet explaining this, we will refrain from going into details. However, to highlight what the CAP theorem is per Eric Brewer (who formulated the CAP theorem), a system can achieve only two of the three guarantees: Consistency, Availability, and Partition Tolerance. In simple words, during a network partition (when communication between nodes is disrupted), a system must choose between being consistent (all the nodes showing the same data) versus all the nodes being available (all the requests will receive a response). 

View more...

Building a Modern Data Architecture: From Legacy Systems to Cloud Integration

Aggregated on: 2024-07-24 13:08:31

The transition from legacy data systems to modern, cloud-based architectures is a complex but essential process for businesses seeking to enhance their data management capabilities, scalability, and overall efficiency. This article will discuss the steps and considerations necessary for successfully transitioning from legacy systems to cloud-based solutions. The rapid evolution of technology has rendered cloud computing an indispensable component of contemporary data architecture. Companies increasingly acknowledge legacy systems' shortcomings, such as scalability issues, high maintenance costs, and lack of flexibility.

View more...

History and Future of LLMs

Aggregated on: 2024-07-23 23:08:30

Inception of LLMs: NLP and Neural Networks The creation of Large Language Models didn’t happen overnight. Remarkably, the first concept of language models started with rule-based systems dubbed Natural Language Processing. These systems follow predefined rules that make decisions and infer conclusions based on text input. These systems rely on if-else statements processing keyword information and generating predetermined outputs. Think of a decision tree where output is a predetermined response if the input contains X, Y, Z, or none. For example: If the input includes keywords "mother," output "How is your mother?" Else, output, "Can you elaborate on that?" The biggest early advancement was neural networks, which were considered when first introduced in 1943 inspired by neurons in human brain function, by mathematician Warren McCulloch. Neural networks even pre-date the term “artificial intelligence” by roughly 12 years. The network of neurons in each layer is organized in a specific manner, where each node holds a weight that determines its importance in the network. Ultimately, neural networks opened closed doors creating the foundation on which AI will forever be built.

View more...

From Observability To Architectural Observability — Shifting Left for Resiliency

Aggregated on: 2024-07-23 22:38:30

In my previous article, Managing Architectural Tech Debt, I talked about understanding and managing architectural technical debt. Architectural technical debt is the often ignored, but ironically one of the most damaging, categories of technical debt. In this article, I want to dive deeper into one way to manage architectural technical debt (and technical debt as a whole) — architectural observability (AO). AO is a new category of observability that I believe is just as important, if not more so, as application performance management (APM). I believe we need to shift left observability — to the architectural stage — where we can not just see symptoms, but fix core problems.

View more...

Understanding Concurrency Patterns in Go

Aggregated on: 2024-07-23 21:08:30

Go, also known as Golang, has become a popular language for developing concurrent systems due to its simple yet powerful concurrency model. Concurrency is a first-class citizen in Go, making it easier to write programs that efficiently use multicore processors. This article explores essential concurrency patterns in Go, demonstrating how to leverage goroutines and channels to build efficient and maintainable concurrent applications. The Basics of Concurrency in Go Goroutines A goroutine is a lightweight thread managed by the Go runtime. Goroutines are cheap to create and have a small memory footprint, allowing you to run thousands of them concurrently.

View more...

Step-By-Step Guide To Setting up and Training GANs for Image Generation

Aggregated on: 2024-07-23 20:38:30

Here is a basic tutorial on setting up and training image generation models using Generative Adversarial Networks (GANs) with TensorFlow and PyTorch. This guide assumes a fundamental understanding of Python and basic machine learning concepts. 1. Setting up Your Environment Install Necessary Libraries Ensure you have Python installed. You will also need to install TensorFlow or PyTorch along with some other essential libraries.

View more...

Cross-Platform Integration: Enabling Seamless Workflow Between AI, Microservices, and Azure Cloud

Aggregated on: 2024-07-23 19:08:30

Importance of Cross-Platform Integration in Modern IT Architectures As digital transformation continues to accelerate, the demand for integrating various technological platforms is also increasing at a rapid pace. In today’s digital world organizations execute their operations in complex environments where multiple technologies need to work together seamlessly. The complexity of the environments can be dependent on the nature of the business and the services that the organizations are offering. Specific to IT architectures, cross-platform integration is crucial in enabling different systems to communicate and collaborate effectively, enhancing overall efficiency and productivity. Moreover, this integration is particularly critical and has to be effectively designed when combining AI capabilities, microservices architecture, and cloud platforms like Azure. These components, when integrated, offer powerful solutions that drive innovation and efficiency across various domains.  Benefits of Integrating AI, Microservices, and Azure Cloud Applications of AI and integrating AI in IT architectures span multiple industries, including healthcare, where it aids in diagnostics and personalized medicine; finance, where it enhances fraud detection and algorithmic trading; and retail, where it drives personalized marketing and customer service automation. AI's ability to analyze vast amounts of data and derive meaningful insights makes it a transformative technology in modern enterprises.

View more...

How To Migrate From Godaddy DNS to AWS Route 53

Aggregated on: 2024-07-23 18:38:30

In this post, we are going to learn about how to migrate from Godaddy to AWS Route53. First, it is necessary to buy a domain in Godaddy and later on migrate it to Amazon’s DNS system, which is Amazon Route 53. Transfer a Godaddy Domain to AWS Route53. 1. Godaddy DNS Management Okay, so once we already have the Godaddy domain, we will log into our account and access it to manage our domain. On GoDaddy products, we will be able to see the domains we own, additional products, and recommendations.

View more...

JUnit 5 Custom TestListeners

Aggregated on: 2024-07-23 17:08:30

If you are using JUnit5 for your Automation and would like to post your test execution results directly from CI/CD to your Test Management System via Zephyr API, it is possible to do so via JUnit5 Test Execution Listeners. Custom Listener You can create a custom Listener according to your needs. In our case, the API needs the results in a specific format and zipped. We will have to add custom logic for that and send the Test case name and key along with the execution result for a test. you can do this by using the following Listener methods.

View more...

Build End-To-End RAG Applications Using Airbyte and Snowflake Cortex

Aggregated on: 2024-07-23 16:38:30

As a practical example, this article shows how to build an AI Product assistant — an AI chatbot capable of answering product-related questions using data from multiple sources. With the AI Product Assistant, you can ask questions across all your company’s data in one place. You can utilize the Snowflake Cortex destination to load vector data into Snowflake, followed by leveraging Snowflake’s Cortex functions to perform Retrieval-Augmented Generation (RAG). Cortex offers general-purpose ML functions and LLM-specific functions, along with vector functions for semantic search, each backed by multiple models, all without needing to manage or host the underlying models or infrastructure.

View more...

Event Sourcing Explained: Building Robust Systems With Immutable Event Logs

Aggregated on: 2024-07-23 15:53:30

An architectural pattern named Event Sourcing is gaining more and more recognition from developers who aim for strong and scalable systems. In this article, we’ll take a closer look at the concept of it: what it entails, its benefits, general flow, and key concepts. Moreover, we will discuss how to implement ES — some details on the technologies that make adoption easy. This article is aimed at software architects, system developers, and project managers who might be contemplating or are already engaged in integrating Event Sourcing into their systems. 

View more...

AI vs. Human: Who Detects Bugs Better?

Aggregated on: 2024-07-23 15:08:30

Software testing processes are evolving with the interaction of AI technologies. The advancement in AI tech has helped organizations witness improvements in their testing capabilities. Robust testing enables the release of high-quality and reliable products and services, and bug detection assists.  Earlier bug detection and reporting processes required intensive manual labor, which was time-consuming and prone to human errors. 

View more...

Emerging Trends in Data Warehousing: What’s Next?

Aggregated on: 2024-07-23 15:08:30

Data warehousing has been a cornerstone of business intelligence and analytics for decades, providing organizations with a structured way to store, manage, and analyze large volumes of data. However, as technology continues to evolve, so do the capabilities and expectations of data warehousing systems. This article explores the latest advances and future trends in data warehousing technologies, highlighting the innovations that are shaping the next generation of data warehouses. In the era of big data, the traditional data warehouse is undergoing significant changes. The need for real-time analytics, scalability, and integration with disparate data sources has driven the development of new technologies and approaches to data warehousing. Modern data warehouses now leverage cloud computing, artificial intelligence, and advanced data processing techniques to meet the needs of today's data-driven organizations.

View more...

Security Challenges in AI-Powered Applications

Aggregated on: 2024-07-23 14:38:30

AI is revolutionizing how Software-as-a-Service (SaaS) applications work, making them more efficient and automated than ever before. However, this rapid progress has opened up a Pandora's box of new security threats. From the sly manipulation of data to the gradual decay of AI models, these vulnerabilities are unique to AI-powered SaaS and need our urgent attention. In this article, we're diving deep into these risks, looking at real-world examples, and discussing practical ways to protect these AI-driven solutions. We'll focus on:

View more...

Shadow IT: The Unavoidable Reality and How To Embrace It Safely

Aggregated on: 2024-07-23 13:53:30

In a world where innovation and productivity are paramount, the rise of Shadow IT has become an unavoidable reality for many organizations. A recent survey by Next DLP revealed a startling statistic: 73% of security professionals admitted to using unauthorized SaaS applications in the past year. This finding underscores a critical challenge faced by CISOs, developers, engineers, and architects alike — balancing the need for productivity with the inherent security risks of Shadow IT. Chris Denbigh-White, CISO at Next DLP, offers a refreshing perspective on this dilemma. "The security risk is not knowing what's in use," he explains. Instead of viewing Shadow IT as an insurmountable threat, Denbigh-White advocates for a more nuanced approach.

View more...

Dynamic Pricing Implementation: Price Rules and QCP in Salesforce CPQ

Aggregated on: 2024-07-23 13:08:30

In today's rapidly evolving go-to-market landscape, organizations with diverse product portfolios face intricate pricing and discounting challenges. The implementation of a robust, scalable pricing framework has become paramount to maintaining competitive edge and operational efficiency. This study delves into the strategic utilization of Salesforce CPQ's advanced features, specifically price rules and Quote Calculator Plugins (QCP), to address complex dynamic pricing scenarios.  This guide presents an in-depth analysis of ten sophisticated use cases, demonstrating how these automation tools can be harnessed to create agile, responsive pricing models. By emphasizing low-code and declarative configuration methodology, this comprehensive guide provides software developers and solution architects with a blueprint to accelerate development cycles and enhance the implementation of nuanced pricing strategies.

View more...

The Ultimate 5-Step Guide for Mobile App Testing Automation

Aggregated on: 2024-07-22 23:08:30

The global mobile app market has been growing at more than 11.5% per year and is now worth more than $154.06 billion after the COVID-19 shift toward remote work has increased and time spent online has gone up. With over 10.97 billion mobile connections worldwide, the demand for sophisticated, high-performance B2B and B2C mobile apps is increasing. The main reason for app abandonment is poor user experience. This includes a perplexing UI/UX and an excessive number of bugs. Loading times are slow.  Continuous testing for mobile applications is required to ensure that a mobile app functions properly on both iOS and Android. In addition, mobile app testing can be difficult, involving numerous platforms, operating systems, and network connections.

View more...

Building Your Own IoT Project: A Step-By-Step Guide

Aggregated on: 2024-07-22 22:38:30

The Internet of Things (IoT) is revolutionizing the way we interact with technology, enabling everyday objects to connect, collect data, and communicate with each other. Whether you’re a tech enthusiast or a beginner, diving into your own IoT project can be both exciting and rewarding.  This guide will walk you through the essential steps to build your first IoT project, ensuring you have a solid foundation to explore this fascinating field.

View more...

A Hands-On Guide to OpenTelemetry: Using Automatic Instrumentation

Aggregated on: 2024-07-22 21:08:29

Are you ready to start your journey on the road to collecting telemetry data from your applications? Great observability begins with great instrumentation! In this series, you'll explore how to adopt OpenTelemetry (OTel) and how to instrument an application to collect tracing telemetry. You'll learn how to leverage out-of-the-box automatic instrumentation tools and understand when it's necessary to explore more advanced manual instrumentation for your applications. By the end of this series, you'll have an understanding of how telemetry travels from your applications to the OpenTelemetry Collector, and be ready to bring OpenTelemetry to your future projects. Everything discussed here is supported by a hands-on, self-paced workshop authored by Paige Cruze.

View more...

Task-Specific Large Language Models Using Distillation

Aggregated on: 2024-07-22 20:38:30

Large Language Models Large language models (LLMs) represent a significant advancement in Artificial Intelligence, particularly in the field of Natural Language Processing. These models are designed to understand, generate, and interact with natural language in a way that closely mimics human communication. Trained on vast datasets comprising text from diverse sources, LLMs learn to recognize patterns, contexts, and nuances within language, enabling them to perform tasks such as translation, summarization, question-answering, and creative writing. Their ability to generate coherent and contextually relevant text makes them valuable tools in various applications, including customer service, content creation, and educational assistance. General-purpose LLMs are powerful and impressive but come with issues like non-determinism in outputs and formatting, and high resource and financial costs. Smaller, task-specific LLMs distilled from larger, general-purpose LLMs can be an attractive option for many tasks.

View more...

A Practical Guide To Implementing Adaptive Software Development

Aggregated on: 2024-07-22 19:08:29

As a tech leader in the custom software development industry for over a decade, I’ve seen methodologies evolve and change. One that has particularly caught my attention in recent years is Adaptive Software Development (ASD). This approach is designed to help teams thrive in uncertain and rapidly changing environments.  In this guide, I’ll walk you through the principles, benefits, and practical steps for implementing ASD in your projects.

View more...

Empowering Developers in Code Security

Aggregated on: 2024-07-22 18:38:29

Effective security requires a shared responsibility model. Developers are already overburdened with their primary tasks of writing code and delivering features, and we think it is not realistic to expect them to know everything about security, be responsible for triaging and handling incidents on their own, or consider all the implications of security. Adding security responsibilities without proper support and integration can lead to frustration, resistance, and, ultimately, a less secure environment. Yet, their involvement in fixing code security issues is crucial and cannot be replaced by security work.

View more...

Use Guardrails To Prevent Hallucinations in Generative AI Applications

Aggregated on: 2024-07-22 17:53:29

Guardrails for Amazon Bedrock enables you to implement safeguards for your generative AI applications based on your use cases and responsible AI policies. You can create multiple guardrails tailored to different use cases and apply them across multiple foundation models (FM), providing a consistent user experience and standardizing safety and privacy controls across generative AI applications. Until now, Guardrails supported four policies — denied topics, content filters, sensitive information filters, and word filters. The Contextual grounding check policy (the latest one added at the time of writing) can detect and filter hallucination in model responses that are not grounded in enterprise data or are irrelevant to the users’ query.

View more...

Ansible and the Pre-Container Arts

Aggregated on: 2024-07-22 17:53:29

Before containerization made it so easy to prepare images for virtualization, it was quite an art to prepare custom ISO images to boot from CD. Later these images were used to boot virtual machines from. In other words, ISO images were precursors of container images. It is so that I had a couple of unfortunate run-ins with the Windows Docker client. Even when not running any containers, the Windows memory manager would hand it as much memory as possible slowing whatever I was busy with. I hence banned the Windows Docker client from my machine. 

View more...