News AggregatorThe Stoic Scrum MasterAggregated on: 2023-03-16 20:14:58 TL; DR: The Stoic Scrum Master – Making Your Scrum Work #30 Can wisdom from the past still be relevant to today’s VUCA-determined world? I started reading Marcus Aurelius’ Meditations some time ago and found it intriguing; maybe it applies to “Agile?” In other words: is there something like a Stoic Scrum Master? If I understand Stoicism correctly, it is about living a life of virtue, which comprises wisdom, justice, courage, and moderation. (All of those can be further subdivided, see Stoic Ethics.) For whatever reason, I felt reminded of Scrum Values and thought: could it be that the first principles of “agile” haven’t been defined by the Agile Manifesto but by “Zeno of Citium in Athens in the early 3rd century BCE?” View more...Developing a Barcode Reader To Make Life EasierAggregated on: 2023-03-16 18:59:58 I recently came across an article saying that barcodes and barcode readers have become a mainstay of today's economies and our lives in general since they were introduced in the 1970s. So, I decided to test how true this is by seeing how often I come across barcode readers on a typical day of mine. And — surprise surprise — they turned out to be more important than I thought. View more...Intrusion Detection Through Cyber Deception: Disrupting Attacks With an Active DefenseAggregated on: 2023-03-16 18:29:58 We should do our best to ensure our network and pipeline perimeters are secure and make it hard for attackers to gain access. However, the reality is that intruders will stop at nothing to gain access, as evidenced by the Uber, CircleCI, and Dropbox breaches, just to name a few. Common to all of those incidents was the attacker's behavior once they were inside. Each time they quickly found and exploited hardcoded credentials, giving them further access. Since we know this is something attackers do time after time, it is time to turn this behavior against them by engaging in some blue team cyber deception and start planting honeytokens in our environments. View more...Rust vs Go: Which Is Better?Aggregated on: 2023-03-16 18:29:58 It is a question every programmer and developer has asked, and many others still ask, even when they have made their own decision. Rust vs. Go: Which one should I choose in 2023? Or which language to choose: Golang or Rust? Golang and Rust are the youngest programming languages in use today. Go was launched at Google in 2009, and followed by Go, Rust was launched at Mozilla in 2010. Selecting the ideal programming language is seen as an important preference to prosper in this dynamic environment. The situation is very complex for programmers to select any one language over the other and develop reliable and systematic applications. Developers are always updated with emerging technology, and they can easily deal with the regularly changing mechanisms. View more...Graph Augmented Intelligence and XAIAggregated on: 2023-03-16 17:59:58 There are broad-spectrum real-world applications that can be powered by graph technologies. Social networks dwell on graphs that best model how people follow and befriend each other; Biotech and pharmaceutical companies leverage graphs to understand protein interactions and chemical compounds efficacies; Supply chains, telco networks, and power grids are naturally presented as graphs for root-cause analysis; Financial transactions naturally form networks and fraud detections, smart recommendations or asset-liability management are possible to run across these networked data for improved productivity, prediction accuracy or business intelligence. Many industries are looking to graph’s smart (and deep) data processing capabilities to help with their businesses. The big-data era started around 2010, as more and more industries are interested in machine learning (and deep learning and AI) to boost their business predictability; some have been using deep learning and specifically varied neural networks to extract more predictive powers. There are three major problems lingering around, though: View more...How to Make Testing Progress VisibleAggregated on: 2023-03-16 17:59:58 Testing efforts can easily go under the radar or be hard to grasp. It’s important to remember that software testing is not only about running tests: it involves multiple crucial facets that contribute to creating better and better software. In this article, we share with you all what we do in order to help the team and the different stakeholders to be informed of the testing progress. Testing is aimed to provide information about the quality of our system and the risks that might affect the user experience and our business so that better decisions can be taken. All this in order to mitigate those risks and improve the quality and the experience of our users. View more...5 Common Firewall Misconfigurations and How to Address ThemAggregated on: 2023-03-16 17:59:58 Cybersecurity experts are always learning the latest methods criminals are using to break into networks and steal data — but sometimes the criminals don’t need nefarious solutions. Especially not when people take an average of 277 days to recognize a breach through things like common firewall misconfigurations. Protect yourself or your clients by addressing these concerns with common firewall issues. When criminals run into optimized firewalls, they’re more likely to look for potential victims elsewhere. View more...MySQL Date CompareAggregated on: 2023-03-16 17:29:58 This article will give us a walk-through of different methods to compare datetime values in MySQL. In MySQL, we can store dates in DATE and TIMESTAMP data types. Both data types store data in the “YYYY-MM-DD” “HH:MM:SS” format. There are a few differences between both data types, such as: The DATETIME supports “1000-01-01 00:00:00” to “9999-12-31 23:59:59,” but the TIMESTAMP supports “1970-01-01 00:00:01” to “2038-01-19 03:14:07” UTC. The DATETIME is constant, but the TIMESTAMP values change based on the timezone the application uses because the TIMESTAMP data will convert the current time to UTC and vice-versa. Differences Between Both Data Types The following is a simple example that explains the difference between both data types: View more...Software Maintenance ModelsAggregated on: 2023-03-16 17:29:58 Software maintenance may require different approaches based on your business goals, the industry you function in, the expertise of your tech team, and the predictive trends of the market. Therefore, along with understanding the different types of software maintenance, you also have to explore various models of software. Based on the kind of problem you are trying to solve, your team can choose the right model from the following options: View more...The Future of PyTorch for Generative AI (GPT-4 and Beyond)Aggregated on: 2023-03-16 16:29:58 PyTorch is not only used for research but also for production purposes, with billions of requests being served and trained daily. The PyTorch community has made remarkable strides in recent times. Last year, contributors of PyTorch also introduced BetterTransformer inference optimizations for transformer models such as GPT, which have significantly improved the performance of these models. This collection of highly optimized code is designed specifically to accelerate transformer models in production workloads, allowing for more accurate and efficient data generation. This is an exciting development that has the potential to revolutionize many industries soon. View more...Fixing Bottlenecks in Your Microservices App FlowsAggregated on: 2023-03-16 15:14:58 Significance of Bottleneck Analysis in Microservices Bottleneck analysis has become a significant part of microservices development for many reasons. Such as: 1. Identify and Isolate Performance Issues Conducting a bottleneck analysis allows the developer to pinpoint specific areas where the application is experiencing performance issues. This process involves identifying the application's slow-performing components and evaluating its reasons. Metrics such as response time, error rate, and throughput can be used to identify and isolate the bottlenecks to improve the application's overall performance. View more...Transforming the Future With Deep Tech and Big DataAggregated on: 2023-03-16 13:44:58 The realm of digital innovation is in a constant state of flux, and we are living in an era where technology is spearheading breakthroughs at an unprecedented pace. The emergence of cutting-edge technology, such as deep tech and big data, is instigating a paradigm shift in the operational processes of businesses. The impact of these technologies is resonating across all domains. In this write-up, we aim to delve into the omnipotent potential of deep tech and big data and how they are transfiguring the future. View more...Container Security: Don't Let Your Guard DownAggregated on: 2023-03-16 13:44:58 Developers and DevOps teams have embraced the use of containers for application development and deployment. They offer a lightweight and scalable solution to package software applications. The popularity of containerization is due to its apparent benefits, but it has also created a new attack surface for cybercriminals, which must be protected against. Industry-leading statistics demonstrate the wide adoption of this technology. For example, a 2020 study from Forrester mentioned, "container security spending is set to reach $1.3 billion by 2024". In another report, Gartner stated, "by 2025, over 85% of organizations worldwide will be running containerized applications in production, a significant increase from less than 35% in 2019". View more...High-Performance Analytics for the Data LakehouseAggregated on: 2023-03-16 01:29:57 CelerData, a unified analytics platform for the modern, real-time enterprise, has announced the latest version of its enterprise analytics platform. “The data lakehouse has added critical capabilities to the data lake architecture by introducing ACID control, table formats, and data governance,” said James Li, CEO, CelerData. “However, analytics capabilities on the lakehouse are still limited and cost prohibitive. Most query engines struggle to support interactive ad-hoc queries, are not able to support real-time analytics, and fall apart when facing a large number of concurrent users.” View more...An End-to-End Guide to Vue.js TestingAggregated on: 2023-03-16 00:44:57 “When Vue’s user count reached a certain volume, it became a community. Suddenly all these people counted on me: contributors, users, educators, students… It became bigger than I ever thought it could be.” – Evan You. This is a confession of a developer towards releasing a JS framework in 2014 that today is used by over 1.5 million users. A framework has become significant in website development if we consider how new it is. With developers picking up Vue slowly, the question of Vue.js testing becomes all the more interesting to decode among the organization. View more...Automated Testing With Jasmine Framework and SeleniumAggregated on: 2023-03-15 23:14:57 In today’s fast-paced world of software development, we have new technologies and languages for development coming on very frequently. With this, comes several testing and automation tools and frameworks in the related market. Choosing the right set of tools and frameworks becomes an absolute necessity because it impacts the accuracy and TTM (Time to Market). JavaScript is one of the widely used programming languages for web automation testing. It also supports a number of Selenium test automation frameworks for web UI testing. Of all the available ones, the Jasmine framework turns out to be the best-suited, as it provides a stable and functional architecture. It is easy to get started with the Jasmine framework and implement test scenarios with the same. View more...Differentiate With Google Cloud Cortex FrameworkAggregated on: 2023-03-15 21:44:57 Customers have consistently posed the question of how to extract maximum value from the data residing in their SAP and other enterprise applications. They aim to optimize their business processes across different areas, make informed decisions, and leverage the wealth of data they have accumulated over the years. After all, data is the new oil. Lets Dig Deeper To conduct their core operations, businesses rely on critical functions such as finance, procurement, and supply chain. Making data-driven decisions is crucial, and business line leaders are continuously seeking innovative ways to obtain predictive insights from data stored in their SAP and other enterprise systems. While hosting large SAP systems in the cloud has become easier through technological innovation, many enterprises still struggle to derive value from the data in their SAP and other applications. At Google Cloud, we welcome customer and partner feedback on how we can address these challenges and believe that feedback is a gift, regardless of its form. View more...Tackling Technology Challenges for Social Networking Applications With a Distributed SQL DatabaseAggregated on: 2023-03-15 20:44:57 Recently, researchers at UC Berkeley published TAOBench, an end-to-end benchmark for social network workloads based on the traces collected from TAO, the distributed database for Meta. Among the typical data operations in social network applications, 99.7% are read, while only 0.2% are write and 0.01% are write transactions. Some other findings include: Transaction hotkeys are often co-located. Read and write hotspots appear on different keys. Contention can result intentionally. All these characteristics of social network application workloads pose special challenges. View more...Using AI To Optimize IoT at the EdgeAggregated on: 2023-03-15 20:14:57 As more companies combine Internet of Things (IoT) devices and edge computing capabilities, people are becoming increasingly curious about how they could use artificial intelligence (AI) to optimize those applications. Here are some thought-provoking possibilities. Improving IoT Sensor Inference Accuracy With Machine Learning Technology researchers are still in the early stages of investigating how to improve the performance of edge-deployed IoT sensors with machine learning. Some early applications include using sensors for image-classification tasks or those involving natural language processing. However, one example shows how people are making progress. View more...Java Code Review SolutionAggregated on: 2023-03-15 20:14:57 A code review solution is a tool to validate that all critical events are logged with the required information and follow best practices. This low-code utility uses user-input application code to produce exception reports. Code Review Challenges Manually reviewing each logger statement is a time-consuming activity and risks human error. Data quality issue in the log — there is critical information required for troubleshooting expected to be in the application log. Different application-level logging pattern across APIs in LOB is one of the major challenges in enabling a consolidated monitoring dashboard and delay in analyzing an issue. Solution Features 1. Logger statement with unique ID validation View more...What Is the Difference Between VOD and OTT Streaming?Aggregated on: 2023-03-15 20:14:57 Today, there are a considerable number of sites that provide streaming services. Interest in them is overgrowing, but only some users understand the distinction between OTT and VOD. Let’s discuss these two concepts and explain whether they are different. Or has this border been completely erased? Definition of VOD Interest in streaming services is growing, especially during the pandemic, when many are forced to suspend their professional activities or start working remotely. While working from home, some people often watch videos in the background, which they previously could not do in the office. Many companies appreciated the benefits of remote work, so they extended this format after the end of the acute phase of the pandemic. View more...How To Handle Secrets in DockerAggregated on: 2023-03-15 19:44:57 Secrets management in Docker is a critical security concern for any business. When using Docker containers, it is essential to keep sensitive data, such as passwords, API keys, and other credentials, secure. This article will discuss some best practices for managing secrets in Docker, including how to store them securely and minimize their exposure. We will explore multiple solutions: using Docker Secrets with Docker Swarm, Docker Compose, or Mozilla SOPS. Feel free to choose what’s more appropriate to your use case. But most importantly is to remember to never hard-code your Docker secrets in plain text in your Dockerfile! View more...Django Bootstrap Login Template (How-To)Aggregated on: 2023-03-15 19:29:57 High-Level Refresher Django is a high-level Python framework that follows the model-template-views architectural pattern. Django is one of the most popular web frameworks due to its security, scalability, and flexible design. Companies like Instagram, Reddit, and Dropbox all use Django. Bootstrap is an open-source CSS framework that provides pre-built HTML, CSS, and JavaScript components. This includes elements such as navigation bars, forms, buttons, modals, and more. Originally created by Twitter, Bootstrap is now maintained by a large developer community. View more...7 Most Sought-After Front-End Frameworks for Web DevelopersAggregated on: 2023-03-15 19:29:57 Frontend frameworks are an essential tool for web development because they provide a structured and organized approach to building the user interface of a web application. They help developers create consistent and efficient layouts, styles, and interactions, making developing and maintaining a web application easier over time. It allows your web apps to interact with APIs in the same way as any other program (on desktop OS, mobile device, or elsewhere). Moreover, front-end frameworks can improve the user experience as they keep the common parts of the page intact (like navigation, etc.) and load whatever data the user requests instead of flashing and reloading with every click. View more...Build an Automated Testing Pipeline With GitLab CI/CD and Selenium GridAggregated on: 2023-03-15 18:59:57 CI/CD has been gaining a lot of attraction and is probably one of the most talked topics for the novices in DevOps. With the availability of CI/CD tools available in the market, configuring and operating a CI/CD pipeline has become a lot easier than what it was 5-6 years ago. Back then, there were no containers and the only CI/CD tool that dominated the sphere was Jenkins. Jenkins provided you with a task runner, so you could define your jobs to run either sequentially or in parallel. Today, the scenario is different. We have numerous CI/CD tools available in the market, which provides us with added features and functionality in comparison to Jenkins. One such renowned CI/CD tool is GitLab CI and that is precisely what we will be covering in this article. View more...Building a RESTful API With AWS Lambda and ExpressAggregated on: 2023-03-15 18:59:57 AWS Lambda is a serverless computing service provided by Amazon Web Services (AWS) that allows you to run code without provisioning or managing servers. Node.js is a JavaScript runtime built on Chrome’s V8 JavaScript engine. Together, AWS Lambda and Node.js can be used to create a RESTful API that can be triggered by events such as an HTTP request. Prerequisites Before building a RESTful API with Express.js, you should have the following in place: View more...How To Turn Smartphone Into a Peripheral Keyboard and Barcode QR Scanner in FlutterAggregated on: 2023-03-15 18:29:57 Barcode scanning technology is crucial for many enterprises, such as those in the supermarket, logistics, and warehousing industries. The data obtained from scanning barcodes is used to track inventory, manage orders, and process payments. Handheld barcode scanners are widely used as peripheral devices in these industries. However, traditional handheld laser barcode scanners can only detect one-dimensional codes, while more expensive scanners with an embedded camera are needed to detect two-dimensional codes like QR codes. Smartphones with built-in cameras can detect both one-dimensional and two-dimensional codes. Nowadays, smartphones have become ubiquitous. Everyone has at least one smartphone in their pocket. If a smartphone can do the same job as a handheld barcode scanner, no additional hardware is needed. This article presents a solution that combines technologies like Flutter, Python, Bonjour, web sockets, PyAutoGUI, and Dynamsoft Barcode Reader SDK to help enterprises save costs by using smartphones instead of barcode scanners. Supported Platforms Android iOS Demo Video: Smartphone as a Peripheral Keyboard and Barcode Scanner The demo shows how to input text from an Android phone to Windows notepad and macOS notes simultaneously. View more...All the Cloud’s a Stage and All the WebAssembly Modules Merely ActorsAggregated on: 2023-03-15 18:29:57 The actor model is a model for concurrent computation originally developed in 1973. This classic definition says that in response to a message, an actor may: Make local decisions Create more actors Send messages Determine how to respond to the next message There are dozens of actor model implementations out there, from Akka to wasmCloud. One aspect of the model implementation differentiates wasmCloud from the majority. In this post, we’ll take a look at the notion of actors creating more actors and see why people have historically wanted this ability in their frameworks and how wasmCloud accomplishes the same goals but without manual supervision tree management. View more...The Role of Artificial Intelligence in Modernizing Legacy ApplicationsAggregated on: 2023-03-15 17:29:57 In today's fast-paced digital world, businesses are continuously seeking ways to remain competitive and relevant in the market. One of the significant challenges they face is how to modernize their legacy applications to meet the needs of modern-day customers. Modernization of legacy applications can involve significant investment in terms of time, resources, and money. But with the advancements in artificial intelligence (AI) technology, businesses can now modernize their legacy applications more efficiently and effectively than ever before. In this blog, we will discuss the role of AI in modernizing legacy applications and the benefits it can provide. View more...How to Use Java Event Listeners in Selenium WebDriver?Aggregated on: 2023-03-15 16:14:57 While working on any UI functionality, I tend to aspire for more and more logs and reporting. This happens especially when performing test automation on web pages. Testing such websites means interacting with several web elements, which would require a lot of movement from one page to another, from one function to another. Now, having stated the problem statement and scenario it occurs in, the next question would be how to do it. Is there any tool or means to fulfill this requirement? The answer is YES! View more...Cloud Performance EngineeringAggregated on: 2023-03-15 15:29:57 Along with the extensively discussed technological trending topics like AI, hyper-automation, blockchain, edge computing, and hyper-automation, Cloud computing is the central component in the upcoming years of various firms' IT strategies. These days the benefits of flexibility, alertness, fast speed, and cost efficiency have become essential for various CIOs. View more...Stress Testing Tutorial: Comprehensive Guide With Best PracticesAggregated on: 2023-03-15 14:59:57 Stress testing is a type of performance testing in which a system is subjected to a workload beyond the limits of its normal operations to determine how it behaves under such scenarios. The primary objective of stress testing is to identify bottlenecks, evaluate system response times, and detect any flaws or failures when the system is under stress. With the demand for products and services going off the roof, software services experience insanely high amounts of stress at unexpected times. It calls for a method that ensures optimal performance regardless of the stress. View more...Developer Productivity: The Secret Sauce to Building Great Dev TeamsAggregated on: 2023-03-15 14:29:59 Software development costs an estimated 63% of a project's budget, making developers and their work performances a center point of executive discussions. Initially, organizations resorted to a more mechanical approach of locating the work done by their devs- through average lines of code written or bugs fixed per day. However, the metrics don't convey the full picture of the software development lifecycle. Teams with high productivity and process efficiency have taken a more provocative approach by focusing on the 'how' of development; developer behavior, collaboration patterns, code reviews, and team dynamics. Identifying and eliminating bottlenecks helps the team work on their core competencies and be more productive. View more...Leveraging Datadog and Solace PubSub+ for Improved Visibility in Event-Driven SystemsAggregated on: 2023-03-15 13:14:57 To manage complex distributed systems, you need to be able to observe and understand what’s happening to all of the components that make up the system. Observability, however, hinges on the assumption that every component can generate information about what’s happening with it, and in an event-driven system, that can be quite complicated. For example, if you have an application that executes activities A, B, and C and publishes a message to an event broker, which then goes to a queue, you would want to know what happened from start to finish: from the publishing application, to and within the broker, all the way to the receiving application, for every transactional event. View more...How HPC and AI in Sports Is Transforming the IndustryAggregated on: 2023-03-15 03:14:57 Artificial intelligence (AI) has made a profound impact in industries around the world and the sports industry is no exception, with a wide range of AI applications aimed at improving athletic performance and enhancing the fan experience. From analyzing game footage to optimizing training regimens, AI is being used in a variety of ways to make sports more competitive and efficient. With the increasing use of AI and high-performance computing in sports, the potential benefits of AI in sports are vast and will be interesting to see how the technology has changed the landscape. View more...Isolating Noisy Neighbors in Distributed Systems: The Power of Shuffle-ShardingAggregated on: 2023-03-15 03:14:57 Effective resource management is essential to ensure that no single client or task monopolizes resources and causes performance issues for others. Shuffle-sharding is a valuable technique to achieve this. By dividing resources into equal segments and periodically shuffling them, shuffle-sharding can distribute resources evenly and prevent any client or task from relying on a specific segment for too long. This technique is especially useful in scenarios with a risk of bad actors or misbehaving clients or tasks. In this article, we'll explore shuffle-sharding in-depth, discussing how it balances resources and improves overall system performance. Model Before implementing shuffle-sharding, it's important to understand its key dimensions, parameters, trade-offs, and potential outcomes. Building a model and simulating different scenarios can help you develop a deeper understanding of how shuffle-sharding works and how it may impact your system's performance and availability. That's why we'll explore shuffle-sharding in more detail, using a Colab notebook as our playground. We'll discuss its benefits, limitations, and the factors to consider before implementing it. By the end of this post, you'll have a better idea of what shuffle-sharding can and can't do and whether it's a suitable technique for your specific use case. View more...FIFO vs. LIFO: Which Queueing Strategy Is Better for Availability and Latency?Aggregated on: 2023-03-15 02:29:57 As an engineer, you probably know that server performance under heavy load is crucial for maintaining the availability and responsiveness of your services. But what happens when traffic bursts overwhelm your system? Queueing requests is a common solution, but what's the best approach: FIFO or LIFO? In this post, we'll explore both strategies through a simple simulation in Colab, allowing you to see the impact of changing parameters on system performance. Comparing the pros and cons of each approach helps to build an understanding of the trade-offs and make better calls about queueing strategies, improving your engineering skills in the process. After all, as the saying goes: "I hear and I forget, I see and I remember, I do and I understand." Model To compare the performance of FIFO (which processes requests in the order they are received) and LIFO (which prioritizes the most recent requests) queueing strategies, we'll build a simple model using a Client that generates requests and a Server that handles them. You can find the details in this Colab. The essential characteristics of the model are: View more...Create Spider Chart With ReactJSAggregated on: 2023-03-15 01:29:57 Hi again! I've been publishing new data visualization content here in DZone but never published anything about React. View more...Custom Validators in QuarkusAggregated on: 2023-03-15 01:29:57 Quarkus is an open-source, full-stack Java framework designed for building cloud-native, containerized applications. As Quarkus is built for cloud applications, it is designed to be lightweight and fast and supports fast startup times. A well-designed containerized application facilitates the implementation of reliable REST APIs for creating and accessing data. Data validation is always an afterthought for developers but is important to keep the data consistent and valid. REST APIs need to validate the data it receives, and Quarkus provides rich built-in support for validating REST API request objects. There are situations where we need custom validation of our data objects. This article describes how we can create custom validators using the Quarkus framework. View more...How To Use Artificial Intelligence to Ensure Better SecurityAggregated on: 2023-03-15 00:59:57 The advancement in disruptive technologies has given rise to a plethora of opportunities for miscreants to fuel cyber sabotage and data integrity risk. The proliferation of cloud-based technologies has accelerated the process of data exchange and sharing—data is more easily accessible to users across business ecosystems. The odds for any user to enter a business ecosystem are more favorable than ever. Organizations are struggling to deal with cyber breaches and threats on two fronts—from amateur artists who find it rewarding to particular crime syndicates with intentions to destabilize the economy and disrupt the existing system. According to a report by Security Intelligence, the average cost of a data breach is $4.35 million. As per a report submitted by Cybersecurity Ventures, the cost of cybercrime will hit $8 trillion in 2023 and will grow to reach $10.5 trillion by 2025. This means the impact cyber threats will have on the world is huge. The alarming numbers will only increase if proper actionable steps are not taken. View more...Microsoft Azure Key Management ServiceAggregated on: 2023-03-15 00:59:57 Encryption keys in Azure can be controlled by the platform or the customer. Encryption keys, known as platform-managed keys (PMKs), are created, kept, and controlled exclusively by Azure. PMKs are not used in customer interactions. For instance, PMKs are the default type of keys used for Azure Data Encryption-at-Rest. View more...What Is Continuous Testing?Aggregated on: 2023-03-15 00:14:57 Testing is a crucial part of the Software Development Lifecycle (SDLC). Testing should be included in every stage of the SDLC to get faster feedback and bake the quality within the product. Test automation can get you excellent results if it is implemented and used in an efficient way and continuous testing is the right approach. According to Markets and Markets, the continuous testing market is expected to grow at a compound annual growth rate of 15.9% during the forecast period of 2018-2023 and reach $2.41 billion by 2023. 2017 was considered the base year for estimating the market size. View more...Creating 'Crap' Faster Isn't an ImprovementAggregated on: 2023-03-14 22:29:57 Over the last few weeks, there’s been a lot of chatter about ChatGPT, a writing tool built in OpenAI. So much noise, in fact, that everyone from CNN, the NYT, Forbes, the Atlantic, the Washington Post, the Guardian, BBC, TechCrunch, CNet, and approximately a half billion techbruhs on YouTube had to sound off on it. All in the last two weeks. The opinions range from incredulous to breathless to skeptical — albeit carefully so. Nobody really knows what the next few weeks will bring, and therefore nobody is willing to declare ChatGPT entirely one thing or another. View more...A Simple Method for Training GPT-2 To Generate Haiku Using the NanoGPT RepositoryAggregated on: 2023-03-14 22:29:57 Purpose In this article, I will show how to easily train GPT-class neural networks from home. Let me start by saying that we won’t train NN from scratch, as that would require 8 (eight!) A100-class GPUs at least and a massive dataset. Instead, we’ll focus on fine-tuning a pre-trained GPT-2 model using a smaller dataset, which anyone can easily make or find online. OpenAI has kindly released GPT-2 under Modified MIT License. nanoGPT We’ll use the nanoGPT repository created by Andrej Karpathy for fast and easy GPT training. He has a comprehensive video lecture explaining how GPT-2 works and how to train such a neural network. However, we’re interested in fine-tuning the model using our own dataset and seeing the difference from the original (GPT-2 trained by OpenAI). View more...Don’t Rely Solely on Privileged Access Management (PAM) To Secure Your AccountsAggregated on: 2023-03-14 21:59:57 Imagine burglars have stolen the keys to your home, which they then use to get inside and take whatever they want without being detected. A privileged account access breach is a bit like this. Cybercriminals can gain access to a privileged account from which they can steal confidential information and disrupt the normal operations of your business. The only way to protect against this type of attack is to ensure that only authorized users gain access to privileged accounts. And while Privileged Access Management (PAM) can help reduce risks, it also provides security teams with a false sense of security. View more...How To Calculate CPU vs. RAM Costs For More Accurate K8s Cost MonitoringAggregated on: 2023-03-14 21:59:57 Cloud providers like AWS and Azure do this one thing that makes monitoring, reporting, and forecasting compute costs so hard. They often blend the CPU and RAM costs together. Why does that matter? View more...Pretty Data All in Neat RowsAggregated on: 2023-03-14 20:59:57 DBA Mary extraordinary,What makes your tables grow?When queries propel through my TSQL shelldata ingests into neat little rows. This will likely be the last post in my series about monitoring the pihole DNS server. You can find part 1, "Your Pi-Hole is a Rich Source of Data," here and part 2, "Mind the Gap," here. If you've been reading along, it should be clear that this is not so much about the pi-hole in particular as it is about ways New Relic allows you to manipulate observability data. The truth is that the pi-hole provided me with a number of great examples of the different ways data can present itself out of various systems. View more...A Complete Guide on ERR_SSL_PROTOCOL_ERRORAggregated on: 2023-03-14 20:59:57 What Does ERR_SSL_PROTOCOL_ERROR Mean? ERR_SSL_PROTOCOL_ERROR is an error message that Chrome shows when a website has a problem with the SSL/TLS certificate. SSL/TLS is the protocol that encrypts data between your browser and the web server, and it’s essential for secure communication. In this article, we will guide you on how to fix ERR_SSL_PROTOCOL_ERROR in Chrome. Before we proceed with the solutions, let’s take a quick look at the reasons that cause this error. View more...Introducing Remult: The Open Source Backend to Frontend Framework You Always WantedAggregated on: 2023-03-14 20:59:57 Application developers, as their name implies, like to develop applications––they ultimately care very little about frontend vs. backend and just want to deliver value to users. Being an application developer myself, and very much like other application developers, one of the things that constantly drive my decision-making when selecting tools and frameworks is the fact that I’m also quite lazy. My main objective is to be able to ship applications with as little effort as possible, and my pet peeve is silly repetitive, mechanical tasks that make me die a little inside every time I need to perform them. For example, I don’t like to remember to align things that don’t automatically align themselves, as one common example of a repetitive task that is completely superfluous. I guess my trademark is that when I encounter challenges, I will always look for ways to automate a solution. (Like the app I once built in the 90s to send a romantic text message to my girlfriend once a day––to overcome my romantic shortcomings). View more...Build Chatbot and Activate in Flutter App in 10 MinutesAggregated on: 2023-03-14 20:29:57 Flutter is Google’s new open-source technology for creating native Android and iOS apps with a single codebase. Since it has ready-made and custom widgets, it’s easy to build the UI. Follow These Steps To Create a Flutter Chatbot Step 1: Setup an Account in Kommunicate Login to your Kommunicate dashboard and navigate to the Bot Integration section. View more... |
|