News Aggregator

Why You Should Be Obsessed With Dogfooding

Aggregated on: 2022-06-30 19:51:21

What Exactly Is Dogfooding? If you’ve worked in a tech company, you’ve probably eaten some dog food. Or to be more precice — you’ve probably eaten your own dog food. Because the phenomenon known as “dogfooding” (or “eating your own dog food”) has become an accepted part of the product development process. So what is dogfooding exactly? It’s the practice of using your own product or service.

View more...

3 Best Tools to Implement Kubernetes Observability

Aggregated on: 2022-06-30 18:51:21

A properly managed and implemented observability system provides DevOps with granular insights that can be used to debug and heal complex systems. Observability combines monitoring, alerting, and logging with metrics visualization and its analysis.It allows development teams to get detailed insights into the real-time performance of Kubernetes clusters and applications so that they can make timely and informed actions. Here, in this blog, we’ve discussed three important tools to implement Kubernetes Observability. Let’s take a look! Kubernetes at Its Boom Today, containers and microservices are emerging as the cornerstone of a flexible hybrid cloud strategy. Kubernetes have completely revolutionized the deployment and lifecycle management of containers across public clouds and private data centers. So profound was its effect that initially, Kubernetes was considered a “be-all and end-all” for software lifecycle management.

View more...

A Complete Guide to Generated Columns in MySQL

Aggregated on: 2022-06-30 17:51:21

MySQL generated columns pose as a powerful, easy-to-use, and advanced tool for anyone who wants to add automatically generated data to their tables - in this blog, we will learn everything you need to know to master them. Generated columns allow you to store automatically generated data in a table without using the INSERT and UPDATE clauses. This useful feature has been part of MySQL since version 5.7, and it represents an alternative approach to triggers when it comes to generating data. Also, generated columns can help you make your query easier and more efficient.

View more...

Regression Testing: Significance, Challenges, Best Practices and Tools

Aggregated on: 2022-06-30 17:21:21

Minor changes can have huge consequences. As the wants and choices of customers and markets are dynamic, so is expected the software to progress in parallel with the varying trends. In a few cases, the changes or even slight modifications in the back-end can often cause a diversion from intended use and functionality. To evade such anomalies in software, the QA specialist team performs regression tests (with the assistance of regression test tools).  Tester teams should make certain that fresh code doesn’t conflict with older code and that unchanged code continues to function as expected. Software products, once designed, are frequently changed to ensure the right incorporation of sophisticated and unique features. This form of testing makes certain that the app’s earlier functionality is still functional and that the latest alterations haven’t introduced new bugs. 

View more...

Purpose-Driven Microservice Design

Aggregated on: 2022-06-30 13:06:21

Buzzwords aren’t something I expected when I started my career. In those days, most of the technology news arrived in paper-based weekly publications like InformationWeek and Network World. I remember thinking to myself, “Man, they are using these same words over and over again each week.” That translated to people using buzzwords … all the time. Back then, my two favorite buzzwords were references to the internet as the “world wide web” and the “information superhighway.” I always wondered if there would be a super-duper-highway at some point.

View more...

Are All Kubernetes Ingresses the Same?

Aggregated on: 2022-06-30 00:06:21

The simple answer is yes and no, but the real answer is more complicated. There has been a lot written on this topic, and I am taking a shot at making this area more understandable. Before getting started, it's important that I point out a key fact. k8s Upstream does not provide an Ingress. Like components such as service load balancers and storage, it simply provides the API that the controller should consume to create the functionality described in the k8s resource. An Ingress consists of the controller watching k8s APIs and the proxy engine that is programmed by that controller to affect forwarding.

View more...

Plan Routes to Nearby Places in an App

Aggregated on: 2022-06-29 23:36:21

Route planning is a very common thing that all of us do in our daily lives. Route planning in apps allows users to enter a location that they want to go to and then select an appropriate route based on various factors such as the estimated time of arrival (ETA), and is applicable to a wide range of scenarios. In a travel app, for example, travelers can select a starting point and destination and then select an appropriate route. In a lifestyle app, users can search for nearby services within the specified scope and then view routes to these service locations. In a delivery app, delivery riders can plan optimal routes to facilitate order pickup and delivery. So, how do we go about implementing such a useful function in an app? That's exactly what I'm going to introduce to you today. 

View more...

Complete Guide to TestOps

Aggregated on: 2022-06-29 23:06:21

As we all know, DevOps is not a person — it’s a complex set of processes, skills, communication, and tools between developers, ops, testing, and business units. DevOps entered the tech big scene several years ago with The Phoenix Project (2013) and The DevOps Handbook (2016) to address scalability issues and provide an opportunity for tech companies to ship software faster. It focuses on closing the loop between development and operations and drives production through continuous development, integration, testing, monitoring and feedback, delivery, and deployment. The technology leaders have now switched to it, breaking communication barriers between dev and ops silos and reducing new features’ time-to-market. DevOps is responsible for the fact that we all use CI/CD systems, virtualization tools, and various automation to ship updates twice a day.

View more...

Top 7 Features in Jakarta EE 10 Release

Aggregated on: 2022-06-29 22:36:21

Java EE was the dominant force behind all the enterprise development in Java. Lately, it was renamed Jakarta EE, transitioning from JCP to Eclipse Foundation. This transition opened the door to open governess, open compatibly testing (earlier Technology Compatibility Kit -TCK was closed source), and of course, open-source. That means no specific vendor has more influence than others; it's more distributed now.

View more...

Caching Across Layers in Software Architecture

Aggregated on: 2022-06-29 22:06:21

The purpose of this article is to help readers understand what is caching, the problems it addresses, and how caching can be applied across layers of system architecture to solve some of the challenges faced by modern software systems. This article is aimed at software developers, technical managers, software architects, test engineers, or anyone else interested in understanding how the cache can be used in software systems.

View more...

Data Mesh — Graduating Your Data to Next Level

Aggregated on: 2022-06-29 20:51:21

Data Mesh is fast emerging as a serious architecture pattern to look for in the field of data. I will stop after saying 'field of data' rather than extending the 'data' to data science, data engineering, data warehouse, and all such kinds of buzz words. We in IT have the habit of creating buzzwords and then following them. I just want to focus on something other than just the buzzword. The reason for this is Data Mesh has the potential to completely change the way we handle and look at our data. This will have an impact on all areas where data is the critical element. Report Card For Current Level of Data Before we graduate our data to the next level, here is a quick summary of progress or a report card of the current level of data. The diagram below shows how data is normally handled in today's IT systems.

View more...

Java’s Encapsulation - When the Getter and Setter Became Your Enemy

Aggregated on: 2022-06-29 20:51:21

Encapsulation is the key to a good code design, but how to archive it? Java developers automatically think about putting getter and setter in a private attribute.  The encapsulation is a wrapping up of data under a single unit. It is the way to protect the data with OOP and avoid any security issues. The main idea around encapsulation is the data's guardian or a shield from being accessed by the code outside this shield when it makes sense. 

View more...

Tutorial: Build a Simple Rust App and Connect It to ScyllaDB NoSQL

Aggregated on: 2022-06-29 20:51:21

ScyllaDB, an open-source database for data-intensive applications that require high performance and low latency, is an excellent match for Rust. Similar to the Rust programming language and the Tokio framework, ScyllaDB is built on an asynchronous, non-blocking runtime that works well for building highly-reliable low-latency distributed applications. The ScyllaDB team has developed the scylla-rust-driver, an open-source ScyllaDB (and Apache Cassandra) driver for Rust. It’s written in pure Rust with a fully async API using Tokio. You can read more regarding its benchmark results, plus how our developers solved a performance regression.

View more...

MySQL to DynamoDB: Build a Streaming Data Pipeline on AWS Using Kafka

Aggregated on: 2022-06-29 19:51:21

This is the second part of the blog series which provides a step-by-step walkthrough of data pipelines with Kafka and Kafka Connect. I will be using AWS for demonstration purposes, but the concepts apply to any equivalent options (e.g. running these locally in Docker). This part will show Change Data Capture in action that lets you track row-level changes in database tables in response to create, update and delete operations. For example, in MySQL, these change data events are exposed via the MySQL binary log (binlog).

View more...

MEAN vs MERN Stack: Which One Is Better?

Aggregated on: 2022-06-29 19:21:21

While talking about the word “Stack” can be described as an amalgamation of the tools and technologies used to build a particular software. The technology stack, also known as the Solution Stack, comprises the programming languages, frameworks, databases, and front and back-end technologies that collectively help in running a project/application successfully. All these tools, when used together, make up a full stack.

View more...

Introduction to JWT (Also JWS, JWE, JWA, JWK)

Aggregated on: 2022-06-29 16:06:21

The security and privacy of users' data have been a growing concern for the past few years. At the same time, JWT, as one technology to combat it, has been used more and more. Understanding JWT will give you an edge over the other software engineers. JWT might seem simple at first, but it is pretty hard to understand. In this article, we will explore mainly JWT and JWS. In addition, we'll also go through JWE, JWA, and JWK quickly. This article aims to make the reader understand the concept of JWT without diving too deep into the topic.

View more...

What Are the Best Performance Tuning Strategies for Your SQL Server Indexes?

Aggregated on: 2022-06-29 14:21:21

An optimized approach to indexing is important if you are keen to keep the performance of an SQL Server instance at its best and, in turn ,deliver a consistent experience for end users of any software solution that relies on it. This is an easy thing to say but harder to achieve in practice unless you have the right strategies and solutions at your disposal as an administrator.

View more...

Reactive Kafka With Streaming in Spring Boot

Aggregated on: 2022-06-29 01:51:20

The AngularAndSpring project uses Kafka for the distributed sign-in of new users and the distributed token revocation for logged-out users. System Architecture The AngularAndSpring project needs to be able to be horizontally scaled each with its own database. To enable that, a sign-in needs to be propagated to all instances. Kafka serves as a central event streaming platform to send the sign-in events. Kafka is horizontally scalable to high event loads and can be set up to be highly available.

View more...

What Developers Need to Know About Table Partition Pruning

Aggregated on: 2022-06-29 00:06:20

Table partitioning is a very handy feature supported by several databases, including PostgreSQL, MySQL, Oracle, and YugabyteDB. This feature is useful when you need to split a large table into smaller independent pieces called partitioned tables or partitions. If you’re not familiar with this feature yet, consider the following simple example. Let’s pretend you develop an application that automates operations for a large pizza chain. Your database schema has a PizzaOrders table that tracks the order’s progress.

View more...

Supabase and Angular Quickstart Guide

Aggregated on: 2022-06-28 22:36:20

This example provides the steps to build a simple user management app (from scratch!) using Supabase and Angular. It includes: Supabase Database: a Postgres database for storing your user data. Supabase Auth: users can sign in with magic links (no passwords, only email). Supabase Storage: users can upload a photo. Row Level Security: data is protected so that individuals can only access their own data. Instant APIs: APIs will be automatically generated when you create your database tables. By the end of this guide you'll have an app that allows users to log in and update some basic profile details:

View more...

To Shift Right, You Need Observability

Aggregated on: 2022-06-28 20:51:20

In a world of shifting left, there is a growing movement: to shift right.  I recently attended a panel discussion where the panelists (from tech companies in this space) debated and even insisted – that shifting right will actually allow you to deliver more value to your customers.  Then, as they laid out their arguments, one thing became clear:  In order to shift right without significant risk, you need extensive observability of your entire application stack. Shifting Left vs. Shifting Right First, what does it mean to shift left or right?  Well, the shift-left movement came out of something we've known for many years: if you find a problem earlier, it costs less to fix it. The idea is to encourage your developers to do extensive testing, verify functionality in multiple levels of pre-production environments, and catch every issue you possibly can before it goes out to production.

View more...

Develop With Oracle Transactional Event Queues

Aggregated on: 2022-06-28 18:36:20

This article provides a quick tour of Oracle's Transactional Event Queues (TEQ) and so attempts to cover as much as possible at a high-level while giving quick, low-level, and code examples at the same time. There is quite a bit of material, and there are multiple workshops related to TEQ and its use in modern application development and microservices that can be found at the end of this piece.This article corresponds to a 12-minute video that can be found here... Oracle Transactional Event Queues (previously known as Advanced Queueing) has been around and widely used for decades (long before Kafka) and is well-harden technology. Here is a timeline to give an idea.

View more...

How to Operationalize a Cloud Security Solution

Aggregated on: 2022-06-28 18:06:20

Smooth and incremental operationalization of your cloud security platform ensures that your implemented solution will be fast to provide measurable value. But when it comes to operationalization, not all cloud security solutions are created equal. In this blog post, we discuss the obstacles and provide four actionable steps for successful operationalization. What Is Operationalization in Cloud Security? Cloud security operationalization is the process of turning the abstract concept of “cloud security” into an implemented solution that drives measurable value. When operationalizing a solution, Security teams seek to ensure it is tightly integrated into organizational processes and actively contributes to the organization’s security posture. A successfully operationalized cloud security solution helps reduce risk, save time, cover its own expense (and more), and be fast to value – all in a measurable way.

View more...

Machine Learning in Cybersecurity

Aggregated on: 2022-06-28 16:36:20

What Is Machine Learning? Machine learning (ML) is a domain of computer science that allows computers to learn without having to be programmed directly. Machine learning is one of the most intriguing technologies ever discovered. Machine Learning in Security Thanks to machine learning (ML), computers may learn without being explicitly programmed. Machine learning works with computers to learn as humans do: by trial and error. The topic of artificial intelligence encompasses machine learning as a subset.

View more...

Top Salesforce Deployment Challenges and Tips

Aggregated on: 2022-06-28 14:36:20

As Salesforce organizations strive to improve IT delivery, making it faster, more quality-focused, and secure, they continue to face deployment challenges. Increased customer demands and high velocity releases every now and then are creating bottlenecks for Salesforce enterprises. This is where you need to recognize the Salesforce deployment challenges your team is facing and find ways to address them. In this article, we will dive into Salesforce deployment challenges, how to orchestrate Salesforce DevOps tools, and techniques to enhance efficiency and speed while maintaining the quality and security of your applications.

View more...

Is DataOps the Future of the Modern Data Stack?

Aggregated on: 2022-06-27 23:21:20

Before DevOps took the software engineering world by storm, developers were left in the dark once their applications were up and running.  Instead of being the first to know when outages occurred, engineers would only find out when customers or stakeholders complained of “laggy websites” or one too many 503 pages. 

View more...

Internal Developer Platform in Plain English

Aggregated on: 2022-06-27 21:51:19

Pros and Cons of Using Internal Development Platforms in the Cloud Computing World Internal Development Platform (IDP) is a brand new word in DevOps and product development. In this article, I’m explaining: What exactly IDP is How to involve it in your organization An overview of the existing IDP platforms on the market, their pros, and cons An example of IDP Architecture based on the Azure Cloud What Is an Internal Developer Platform? As a software architect, I design the DevOps processes and spend much time selecting the DevOps toolset, building pipelines, and communicating with the DevOps team to implement some procedures for the development team. We can solve this with the internal development platform (IDP).

View more...

Applying Domain-Driven Design Principles to Microservice Architectures

Aggregated on: 2022-06-27 21:21:19

Microservices are the most scalable way of developing software. But you need a good design that lets developer teams work autonomously and deploy without stepping on each other's toes; otherwise, you lose most of the scalability benefits. Domain-Driven Development allows us to plan a microservice architecture by decomposing the larger system into self-contained units, understanding the responsibilities of each, and identifying their relationships. In this article, we'll learn the basics of Domain-Driven Design and how to apply it to microservices.

View more...

Which Backend Frameworks Are Impacting Web App Development Immensely?

Aggregated on: 2022-06-27 19:36:20

Developing a successful web application is more like a group task. Deciding on the web development framework, programming languages, and efforts of the whole software development team bring to life an amazing project. To keep up with the ever-rising standards of businesses, the web and app development frameworks are becoming more complex and advanced.  As you may already know, frameworks are of two types- front-end and backend. Front-end development is about developing the user interface of a website using HTML, CSS, and JavaScript. Front-end development enables the users to view and interact with the website. 

View more...

Hard Things in Computer Science

Aggregated on: 2022-06-27 19:06:19

If you've more than a couple of years of experience in IT, you probably have stumbled upon the following quote: There are only two hard things in computer science: cache invalidation and naming things.

View more...

Progressive Delivery With Argo Rollouts: Blue-Green Deployment

Aggregated on: 2022-06-27 18:06:19

Continuous integration (CI) and continuous delivery (CD) have been widely adopted in modern software development enabling organizations to quickly deploy these software to customers. But doing it in the right way is equally important, as in some cases, unfinished code can lead to failures and customers have to face downtime. To solve this, progressive delivery was introduced, which enables the delivery of software with the right changes to the right amount of customers at the right time. More precisely, it controls the speed at which changes are deployed for a software. Traditional CI/CD and Progressive Delivery Continuous integration (CI) is an automation process that helps in continuously integrating software development changes. It automates the building, testing, and validation of the source code. Its goal is to ultimately produce a packaged artifact that is ready to deploy.

View more...

Open Source Monitoring and Metrics Landscape

Aggregated on: 2022-06-27 17:36:19

Metrics and managing and understanding them is an essential part of any modern complex application. As with any active and busy technical ecosystem, there is a proliferation of competing open source monitoring standards. A handful emerges as the most popular solutions. Slowly, the community creates a standard that most projects follow in some way. This article aims to help you navigate what’s available, what piece of the ecosystem puzzle an option fills, and crucially, how interoperable they are with each other.

View more...

SQL Database Schema: Beginner’s Guide (With Examples)

Aggregated on: 2022-06-27 17:36:19

What Is a Database Schema? That’s actually a bit of a difficult question to answer! Like many database terms, database schema gets used in a variety of contexts. Depending on the context, it can mean different things. In the context of generally discussing a database and how it’s organized, the term database schema describes the structure of the data and how the elements within the database relate to each other. This information is often presented visually with diagrams that illustrate how different tables and elements connect to give you a logical view of the entire database. However, the schema itself exists in the database as the coded rules that define the data’s structure and relationships.

View more...

Practice on Pushing Messages to Devices of Different Manufacturers

Aggregated on: 2022-06-27 17:06:19

Push messaging, with the proliferation of mobile Internet, has become a very effective way for mobile apps to achieve business success. It improves user engagement and stickiness by allowing developers to send messages to a wide range of users in a wide range of scenarios: taking the subway or bus, having a meal in a restaurant, having a chat... you name it. No matter what the scenario is, a push message is always a great helper for you to directly "talk" to your users, and for your users to know something informative. Such great benefits brought by push messages, however, can be dampened by a challenge: the variety of mobile phone manufacturers. This is because usually each manufacturer has their own push messaging channels, which increases the difficulty for uniformly sending your app's push messages to mobile phones of different manufacturers. Of course there is an easy solution for this — sending your push messages to mobile phones of only one manufacturer — but this can limit your user base and prevent you from obtaining your desired messaging effects.

View more...

Correlation Between Fast TTM and Containers

Aggregated on: 2022-06-27 16:36:19

TTM and Software Architecture  One of the critical factors for business success is Time to Market (TTM). TTM is the length of time from the moment of idea creation, which could be a new product or business, to launching the final product or service to customers. Markets move fast and delayed TTM may ruin the whole business idea.  Therefore it is no surprise that TTM is a metric all product owners and businesses are concerned with. The delayed-release can seriously impact the potential to benefit from business opportunities. TTM directly affects revenues, and the faster a product is launched, the bigger advantage a company has over its competitors. TTM varies by sector, with the technology industry experiencing some of the fastest TTMs. There are many ways in which an organization can shorten TTM.

View more...

Hyperautomation: The Beacon for Your Digital Transformation Journey

Aggregated on: 2022-06-27 15:36:19

The concept of automation is constantly expanding as time passes. IT executives have already seen the potential of automation and how it makes the entire process smoother. They are now looking for new methods to use hyperautomation to fulfill digital transformation goals. As per a market study done by Global NEWSWIRE, in the next few years, the global hyperautomation market is expected to grow at a CAGR of more than 18.7 percent, attaining a value of more than US$ 32,632 million by 2030. The hyperautomation market has expanded fast across several business sectors (retail, manufacturing, BFSI, automotive, and so on), with the BFSI industry showing the most opportunity for hyperautomation application.

View more...

How to Get GDPR and Customer Communications Right

Aggregated on: 2022-06-27 04:51:19

The General Data Protection Regulation (GDPR) was big news for companies when it came into effect in 2018. It aimed to put more controls on how organizations manage the personal data of their EU-based users. Since the law’s enactment in 2018, some US states, such as California and Virginia, followed suit and passed their own data privacy laws for their respective residents. Companies that do business in those regions now have to ensure they comply with these legal requirements. This post is the third in a series about what developers need to keep in mind when sorting out security and compliance for their application. The first article in this series covered how to build security for user communications, the second was about compliance certifications and regulations for SaaS apps, and this one is all about GDPR and customer communications. GDPR and similar regulations cover all communications from a company to its customers and prospects, including marketing and transactional notifications. If you are considering sending notifications to the users of your SaaS application, whether via email, push, or a Slack bot, you need to keep GDPR in mind when building your service.

View more...

The Importance of Semantics for Data Lakehouses

Aggregated on: 2022-06-27 04:06:19

Data lakehouses would not exist — especially not at enterprise scale — without semantic consistency. The provisioning of a universal semantic layer is not only one of the key attributes of this emergent data architecture, but also one of its cardinal enablers. In fact, the critical distinction between a data lake and a data lakehouse is that the latter supplies a vital semantic understanding of data so users can view and comprehend these enterprise assets. It paves the way for data governance, metadata management, role-based access, and data quality.

View more...

The Advanced Risk of Basic Roles In GCP IAM

Aggregated on: 2022-06-26 13:06:19

Most GCP users know that granting basic roles is a really bad practice, but you may be surprised to learn that the risk is much more serious than it might seem because basic roles actually grant far more than what appears on the permissions list (which is already excessive, of course). For the owner role, we can assume that most project administrators are aware it includes the resourcemanager.projects.setIamPolicy permission which allows for straightforward privilege escalation and managing the risk accordingly. However, for Viewer or Editor, you could make the very reasonable assumption that even though the roles provide a wide set of permissions - spanning every resource type in a GCP project - at least they won’t allow anything else.

View more...

When Writing Code Isn't Enough: Citizen Development and the Developer Experience

Aggregated on: 2022-06-26 12:36:19

This is an article from DZone's 2022 Low Code and No Code Trend Report.For more: Read the Report What is citizen development? In this article, we define citizen development and dive into its impact on internal development practices and how software companies think about designing their developer experience.

View more...

Low Code and No Code: The Security Challenge

Aggregated on: 2022-06-25 20:36:18

This is an article from DZone's 2022 Low Code and No Code Trend Report.For more: Read the Report Many companies are looking to low-code and no-code platforms to build apps in the visual environment. They provide the opportunity for faster app development and reduce the dependence on highly skilled developers. Companies may hire less experienced or only minimally trained staff (I’ll call them citizen developers) to meet service gaps and to respond to skills shortages, ensuring their larger dev team can focus on more advanced projects. 

View more...

Vaadin Apps as Native Executables Using Quarkus Native

Aggregated on: 2022-06-25 17:21:18

JVM is a monster – in a good way. Its architecture and especially the super-optimized just-in-time-compiler (JIT) help Java byte-code apps to run at a performance that makes startups rewrite their entire software when they grow up. But this amazing piece of engineering doesn’t come without a price. Even small JVM applications are known to eat up a lot of memory and the start-up times of non-trivial JVM apps are – well – iconic. GraalVM is a newish JDK distribution coming from Oracle Labs. It uses partly the same codebase as the regular OpenJDK, a variant of which you most likely use on a daily basis, but focuses on performance and polyglot support. For JVM performance, GraalVM replaces the JIT compiler in the HotSpotJava Virtual Machine with a custom version that, especially in the enterprise edition, is expected to give significantly better performance (34%, according to their own benchmarks), including some memory savings. 

View more...

Securing Software Supply Chains on Kubernetes Using Nirmata and Venafi

Aggregated on: 2022-06-25 16:51:18

Securing software supply chains remains a top priority for DevOps teams. In a prior post, we discussed the A MAP framework for Kubernetes supply chain security.  In this post, we will discuss how supply chain security can be implemented using Nirmata Policy Manager and Venafi CodeSign Protect.  With supply chain attacks on the rise, securing the software supply chain has become a requirement for DevOps teams building cloud-native applications on Kubernetes. Signing the container image is typically the very first step in securing software supply chains. The modern application development and deployment process is highly automated with platforms like Kubernetes & Github at the heart of continuous integration (CI) and continuous delivery (CD) practices. Any additional steps required for signing and verifying container images need to be automated as well so that software development agility can be maintained. 

View more...

Terraform Controller: Cloud Resource Self-Service

Aggregated on: 2022-06-25 16:51:18

Kubernetes has been brilliant at delivering an ecosystem for developers, improving the velocity of shipping, bringing components under a common framework and DSL, coupled with the flexibility to expand and extend the offering. And so it beggars belief that speaking to customers, application dependencies and consumption is still a major bottleneck to progress, with teams blocked waiting on that database, queue, object store, and so forth. Thing is ...

View more...

Getting Started With RSocket Kotlin

Aggregated on: 2022-06-25 16:21:18

RSocket is a transport protocol designed for reactive applications. More information on RSocket can be found on their website, leaving me to focus on writing about how RSocket and Kotlin can be combined. RSocket has several libraries written in various languages that implement the RSocket protocol. For Kotlin, this comes as an extension for Ktor (a Kotlin client and web-server library) named rsocket-kotlin. We will look at this extension through this post.

View more...

Secure Proxy for HIPAA-Compliant API Analytics

Aggregated on: 2022-06-25 15:51:18

In HeathTech apps, it’s often the case that you’re dealing with private or health-related data. This requires compliance with regulations, such as HIPAA in the United States. These regulations force you to handle sensitive data in a well-defined manner, so only specific people can read it, and if they do, it should be logged for later auditing. To be compliant with HIPAA, technical and administrative safeguards must be implemented both within your company and in your app. The technical safeguards often lead to more complicated software architectures. So, it’s a good idea to make sure the extra engineering development work for HIPAA compliance is necessary before embarking. Alternatively, you could fall under one of the four cases where it’s safe not to comply with HIPAA.

View more...

Supabase and Ionic Vue Quickstart Guide

Aggregated on: 2022-06-25 15:51:18

This example provides the steps to build a simple user management app (from scratch!) using Supabase and Ionic Vue. It includes: Supabase Database: a Postgres database for storing your user data. Supabase Auth: users can sign in with magic links (no passwords, only email). Supabase Storage: users can upload a photo. Row Level Security: data is protected so that individuals can only access their own data. Instant APIs: APIs will be automatically generated when you create your database tables. By the end of this guide you'll have an app that allows users to log in and update some basic profile details:

View more...

Modern Application Security Requires Defense in Depth

Aggregated on: 2022-06-25 02:21:18

Perimeter security has been dying a slow death over the better part of a decade, as breaches of the corporate network have become commonplace. Most organizations now find it obvious that trusting devices and users merely for being "on the corpnet" is insufficient to maintain security in the face of evolving threats. At the same time, the re-platforming of business applications to a SaaS model, coupled with a more mobile and distributed workforce, has made the need to "VPN into a corpnet" feel archaic and cumbersome. The pandemic created the perfect storm around these two long-term trends, accelerating this slow death into a fast one. Adopting a zero-trust architecture is no longer negotiable for any organization that wants to stay alive.

View more...

Migrating Legacy Applications and Services to Low Code

Aggregated on: 2022-06-25 01:51:18

This is an article from DZone's 2022 Low Code and No Code Trend Report.For more: Read the Report Low code accelerates and optimizes software development with a visual approach. It automates the development process and makes it easier to deliver solutions by providing visual tools that simplify and democratize development. But low code isn't just for new projects. It's a good candidate for migrating legacy applications, too. When moving an existing application to low code, you shorten development time and effort, save money, and take a big step toward cloud migration. 

View more...

Demystifying Cloud-Native Data Management: Layers of Operation

Aggregated on: 2022-06-24 23:21:18

As containerized applications go through an accelerated pace of adoption, Day 2 services have become a here-and-now problem. These Day 2 services include data management functions such as backup and disaster recovery along with application mobility. In this new world of containerized cloud-native applications, microservices use multiple data services (MongoDB, Redis, Kafka, etc.) and storage technologies to store state and are typically deployed in multiple locations (regions, clouds, on-premises). In this environment, where legacy infrastructure or hypervisor-based solutions don’t work, what are the right constructs for designing and implementing these data management functions for cloud-native applications? How should you reason about the various data management options provided by storage vendors, data services vendors, and cloud vendors to decide the right approach for your environment and needs? This piece dives under the covers and addresses the pros and cons of various data management approaches across several attributes including consistency, storage requirements, and performance.

View more...