News AggregatorRevolutionizing AI: Unveiling the Power of WatsonXAggregated on: 2023-08-21 22:31:32 In the ever-evolving landscape of artificial intelligence, a new player has emerged to redefine the boundaries of what's possible. Enter WatsonX, a groundbreaking technology that promises to revolutionize the AI landscape. In this blog post, we'll dive deep into the intricacies of WatsonX, explore captivating examples, and unveil the potential use cases that can truly make it go viral. The Genesis of WatsonX Derived from the iconic Watson AI, which famously defeated human champions in Jeopardy!, WatsonX represents the culmination of years of research, development, and breakthroughs. Born from the fusion of advanced machine learning, natural language processing, and quantum computing, WatsonX is not just an evolution; it's a quantum leap forward in AI capability. View more...Apache Kafka’s Built-In Command Line ToolsAggregated on: 2023-08-21 22:16:32 Several tools/scripts are included in the bin directory of the Apache Kafka binary installation. Even if that directory has a number of scripts, through this article, I want to highlight the five scripts/tools that I believe will have the biggest influence on your development work, mostly related to real-time data stream processing. After setting up the development environment, followed by installation and configuration of either with single-node or multi-node Kafka cluster, the first built-in script or tool is kafka-topic.sh. View more...Getting Started With Prometheus Workshop: Service DiscoveryAggregated on: 2023-08-21 22:16:32 Are you interested in open-source observability but lack the knowledge to just dive right in? This workshop is for you, designed to expand your knowledge and understanding of open-source observability tooling that is available to you today. View more...Logging Incoming Requests in Spring WebFluxAggregated on: 2023-08-21 21:46:31 In the world of modern software development, meticulous monitoring and robust debugging are paramount. With the rise of reactive programming paradigms, Spring WebFlux has emerged as a powerful framework for building reactive, scalable, and highly performant applications. However, as complexity grows, so does the need for effective logging mechanisms. Enter the realm of logging input requests in Spring WebFlux — a practice that serves as a critical foundation for both diagnosing issues and ensuring application security. Logging, often regarded as the unsung hero of software development, provides developers with invaluable insights into their applications' inner workings. Through comprehensive logs, developers can peer into the execution flow, troubleshoot errors, and track the journey of each request as it traverses through the intricate layers of their Spring WebFlux application. But logging is not a one-size-fits-all solution; it requires thoughtful configuration and strategic implementation to strike the balance between informative insights and performance overhead. View more...Minimum Viable Library 2: Product Owner EditionAggregated on: 2023-08-21 21:46:31 The Minimum Viable Library Product Owner edition is available! Explore a series of carefully curated collections of essential books, newsletters, podcasts, and tools to elevate your agile expertise. Read on and learn how the recommendations for Product Owners cover a wide range of topics, including product management, product discovery, escaping the feature factory, and aligning with critical stakeholders. View more...Platform AnalyticsAggregated on: 2023-08-21 21:31:31 You don’t need to be a data science expert to make use of platform analytics to gain better insights into your business. From Google Analytics to deep-dive data analytics for your APIs, big data is your friend when it comes to understanding your company. The right analytics platform can open up your data in a user-friendly way that empowers you to fuel better-informed business decisions based on your performance, customer data, and analytics. What Is an Analytics Platform? An analytics platform is a platform that delivers a wide range of business analytics tools and functions to enable users to visualize and interact with the data. Platform analytics enables businesses to make more informed decisions underpinned by sound data science and actionable insights. View more...How to Configure an HTTPS Endpoint for Mule Applications With One-Way SSLAggregated on: 2023-08-21 20:46:31 In this post, we will learn about the steps involved in the process of configuring an HTTPS endpoint with one-way SSL for a Mule Application. Securing communication between clients and servers is essential in today's digital world, and using HTTPS over HTTP ensures secure data transfer. Before we start, let's understand how does CloudHub load balancer work. View more...Unveiling Kafka-Streams-Cassandra-State-StoreAggregated on: 2023-08-21 20:31:31 The Java library to be introduced: thriving-dev/kafka-streams-cassandra-state-store is a Kafka Streams State Store implementation that persists data to Apache Cassandra. It's a 'drop-in' replacement for the official Kafka Streams state store solutions, notably RocksDB (default) and InMemory. View more...Mitigate the Risks of Poor Performing Cloud AppsAggregated on: 2023-08-21 20:31:31 Cloud technology is no longer novel. It has revolutionized the manner in which business services are provided to the end user. It has made it easier and faster for companies to access and share data, collaborate on projects, and access applications from anywhere in the world. Is Cloud the 'One Medicine for All Diseases'? Cloud technology has empowered businesses to become more flexible and responsive to customer needs. It has also facilitated customers to access and utilize services in a more secure and cost-effective manner. View more...Securing the Software Supply Chain: Chainguard Builds on Foundational InnovationAggregated on: 2023-08-21 18:46:31 The software supply chain has emerged as a prime target for cyberattacks in recent years, as evidenced by major incidents like SolarWinds and Log4Shell. To understand how IT teams can get ahead of supply chain threats, I spoke with two founders of Chainguard – Ville Aikas and Kim Lewandowski, at BlackHat 2023. While at Google, Aikas, and Lewandowski were co-creators of two really popular open-source technologies (Sigstore and SLSA, aka “Salsa”). Supply chain attacks have driven home the risks of third-party software dependencies. But as Chainguard's founders explained, solutions like Sigstore and the SLSA framework are bringing discipline to securing code provenance and integrity. View more...Large Language Models: A Comprehensive Analysis of Real-World CX ApplicationsAggregated on: 2023-08-21 18:31:31 With technology advancing at a rapid pace, the customer experience landscape has undergone a profound transformation. Gone are the days of static websites and one-way communication. Customers now expect interactive, personalized, and intuitive experiences that align with their needs and preferences. However, meeting these ever-increasing standards is no easy feat for businesses. This is where Large Language Models (LLMs) reign supreme. Trained on a massive corpus of data, they possess the remarkable ability to generate human-like text and perform a multitude of natural language processing (NLP) tasks. No wonder, OpenAI’s ChatGPT garnered a staggering 100 million daily active users in just two months of its launch. View more...Reversing an Array: An Exploration of Array ManipulationAggregated on: 2023-08-21 17:16:31 Arrays are fundamental data structures that hold a collection of elements in a specific order. Reversing an array involves changing the order of its elements, flipping it from end to start. In this article, we'll dive into the concept of array manipulation and provide a Python program to reverse an array. Understanding Array Reversal Array reversal is a common operation in programming and is useful in various scenarios. For example, reversing an array can help in solving problems related to string manipulation, list processing, and algorithm design. It can also be valuable in tasks like displaying data in reverse order or creating palindrome-checking functions. View more...Android App Modularization: 4 Useful Tips to StartAggregated on: 2023-08-21 14:31:31 Android app modularization refers to the process of breaking down an Android app into smaller, independent modules. These modules can be thought of as building blocks that can be combined to form the complete app. Each module is typically responsible for a specific feature or functionality of the app and can be developed, tested, and deployed independently. Modularizing an app can provide several benefits, including easier maintenance, faster development cycles, improved scalability, and enhanced performance. View more...Introduction to List Data StructuresAggregated on: 2023-08-21 14:01:31 The list data structure is one of the fundamental concepts in computer science and programming. A list is a collection of items that are stored sequentially in memory. It is a dynamic data structure that can grow or shrink in size during runtime. Lists are used in many different applications, including databases, web development, and scientific computing. This article will explore the list data structure in detail, its properties, operations, and different types of lists. Properties of a List A list has the following properties: View more...8 Ways to Improve Application PerformanceAggregated on: 2023-08-20 17:16:31 Application performance is critical for delivering a fast and responsive user experience. Slow performance, or high latency, can lead to frustrated users and lost revenue for the organization. From a high level, application latency refers to the delay between the user's request and the application's response. Latency can not only impact the overall user experience and decrease engagement, but it can be a costly and complicated problem as well. App performance also impacts overall efficiency. Slow applications can slow down business processes, leading to decreased productivity and increased costs. All of these factors can reduce a company’s ability to compete in the market. In today’s world, customers expect fast and responsive applications. Businesses that are unable to deliver on this expectation risk losing customers to competitors who offer a better user experience. View more...What Is GitOps?Aggregated on: 2023-08-20 17:01:31 GitOps is a relatively new addition to the growing list of "Ops" paradigms taking shape in our industry. It all started with DevOps, and while the term DevOps has been around for some years now, it seems we still can't agree whether it's a process, mindset, job title, set of tools, or some combination of them all. We captured our thoughts about DevOps in our introduction to DevOps post, and we dive even deeper in our DevOps engineer's handbook. The term GitOps suffers from the same ambiguity, so in this post we look at: View more...6 Proven Strategies for Being a Great Platform EngineerAggregated on: 2023-08-20 16:46:31 “The future is still so much bigger than the past.”- Tim Berners-Lee, Inventor of the World Wide Web For platform engineers, the future is bright. Commonly thought of as the next stage beyond DevOps, platform engineers are one of the most in-demand and well-regarded positions in tech. While there is a huge upside to being on the cutting edge of an industry, there is one major, potential drawback: A lack of tried and true wisdom you can apply to the role. View more...How to Create Customer Resource Definitions in KubernetesAggregated on: 2023-08-19 17:31:30 Kubernetes is a popular open-source platform used for automating the deployment, scaling, and management of containerized applications. It provides a powerful API for managing resources, but sometimes its built-in resources are not sufficient for your use case. That's where Kubernetes Custom Resource Definitions (CRDs) come in. CRDs allow you to define your own custom resources, which can be managed in the same way as built-in resources like pods and services. In this tutorial, we'll go through the steps to implement a Kubernetes CRD. View more...Why the Manufacturing Sector Needs Edge ComputingAggregated on: 2023-08-19 17:16:30 Manufacturing is in the middle of a technological revolution. The data-driven fourth industrial revolution, Industry 4.0, is in full effect, and as manufacturers embrace this change, their needs are shifting. The longer this trend continues, the more it becomes clear that the sector needs edge computing. The manufacturing industry is already a leader in cloud adoption, but the cracks in the conventional cloud are starting to show. Production facilities need to take things further by embracing the edge, and there are five primary reasons why. View more...Navigating the PAM Landscape: Overcoming Deployment Barriers for Modern SecurityAggregated on: 2023-08-19 16:46:30 Privileged access management (PAM) is critical for securing sensitive systems and data, especially with remote work's expanded attack surface. However, recent research by Keeper Security reveals significant barriers still inhibit broad PAM adoption. Cost and complexity top the list of challenges. A survey of 400 IT and security leaders found 58% have not deployed PAM because it was too expensive. And 56% attempted PAM deployment but failed to fully implement due to excessive complexity. This indicates an appetite for robust PAM, but solutions remain out of reach for many. View more...Demystifying Kuma Service MeshAggregated on: 2023-08-18 21:31:29 Service mesh emerged as a response to the growing popularity of cloud-native environments, microservices architecture, and Kubernetes. It has its roots in the three-tiered model of application architecture. While Kubernetes helped resolve deployment challenges, the communication between microservices remained a source of unreliability. Under a heavy load, the application could break if the traffic routing, load balancing, etc., were not optimized. This led to the growth of service mesh. With the existing service mesh hard to scale due to too many moving parts, configure and manage, Kong built a service mesh tool called Kuma. In this blog post, we will discuss the open-source service mesh Kuma, its architecture, and its easy-to-implement policies like traffic control, metrics, circuit breaking, etc. We will also discuss how Kuma provides better observability of services. View more...Best Plugins For JetBrains IDEsAggregated on: 2023-08-18 21:16:30 JetBrains IDEs based on the IntelliJ platform are probably one of the most common IDEs in existence nowadays. Their popularity is especially visible within the JVM languages community, where IntelliJ IDEA remains the right-away IDE pick for most developers. All of this is despite some new competitors showing up and old competitors overcoming their previous shortcomings and joining back the table. In this text, I would like to describe the plugins for IntelliJ IDEA that may be a great help for you in your daily fight with your tasks, and that will make your work easier. Some plugins will be language agonistic, while others can be language dependent. View more...Content Moderation to Zero Shot ClassificationAggregated on: 2023-08-18 21:16:29 What if we wanted to analyze a small piece of text with no additional information or context and be able to get the most reasonable label that we wish to define for our own data? This can feed the more deterministic policy engines and rule engines, and even be a part of a larger context-driven analysis as required. OpenAI does provide a means to "content moderate" with preset classifications that can determine if your text belongs to one or more of the more vile categories. However, this analysis is more about how we can get more custom to defining our own labels against a given sentence or phrase. We will look at 4 categories: viz. politics, PHI/PII, legal matters, and company performance. Given that we don't have the option of gathering probability scores from Open AI on such custom labels (at this point in time), we will try the more user-oriented prompt engineering route in Option 1 while Option 2 evaluates other pre-trained models from Hugging Face for the same. View more...Combatting the OpenSSH VulnerabilityAggregated on: 2023-08-18 21:01:29 Time and again, we encounter stark reminders that every piece of software, no matter how widespread its use or how thoroughly it is reviewed, has the potential to harbor security vulnerabilities. A recent case in point is a security flaw that was detected in OpenSSH, a tool commonly employed for secure connectivity. This occurrence underlines the necessity of maintaining vigilance regarding all software, including those with the primary function of enhancing security.The detected vulnerability in OpenSSH, designated CVE-2023-38408, opens the possibility of a remote execution attack under certain conditions. A remote command execution vulnerability represents a type of security flaw within computer systems, applications, or network devices that allows an attacker to execute arbitrary commands remotely on the target system. Once this breach has been exploited, the attacker can utilize the remote execution to mount further attacks, given that the remote host often possesses additional permissions within an organization's network. As discovered through a code review, this vulnerability can be mitigated by updating OpenSSH to version 9.3p2. View more...Four Practical Ways To Make Your Software More SecureAggregated on: 2023-08-18 21:01:29 Our ever-increasing reliance on technology has made software security more crucial than ever. Business owners and individuals use software every day, and that isn’t changing any time soon. Developers are responsible for creating software that can stand up against a wide range of attacks from countless potential sources. View more...Data Streaming From Smart Factory to CloudAggregated on: 2023-08-18 20:01:29 A smart factory organizes itself without human intervention to produce the desired products. Data integration of IoT protocols, data correlation with other standard software like MES or ERP, and sharing data with independent business units for reporting or analytics is crucial for generating business value and improving the OEE. This blog post explores how data streaming powered by Apache Kafka helps connect and move data to the cloud at scale in real time, including a case study from BMW and a simple lightboard video about the related enterprise architecture. The State of Data Streaming for Manufacturing in 2023 The evolution of industrial IoT, manufacturing 4.0, and digitalized B2B and customer relations require modern, open, and scalable information sharing. Data streaming allows integrating and correlating data in real time at any scale. Trends like software-defined manufacturing and data streaming help modernize and innovate the entire engineering and sales lifecycle. View more...API ManagementAggregated on: 2023-08-18 19:31:29 In the ever-evolving landscape of modern software development, Application Programming Interfaces (APIs) have emerged as crucial building blocks that enable seamless communication between different software systems, applications, and services. APIs act as intermediaries, allowing developers to access the functionality and data of existing software components, making it easier to build new applications and integrate various services into a unified ecosystem. An API, short for Application Programming Interface, is a set of rules and protocols that allows different software applications to communicate and interact with each other. It defines the methods and data formats that applications can use to request and exchange information, enabling them to access specific functionalities and services without knowing the intricate details of how those services are implemented. View more...Seeing the Forest for the Trees: Data Preservation Starts With a Keen EyeAggregated on: 2023-08-18 13:46:29 Everywhere you turn, data security is a major challenge for several organizations. This makes it difficult to ensure that data is reliable and accurate for use. This is why organizations must now take data preservation more seriously than they ever have, especially when you consider what cybercriminals have in store. Effective data preservation starts with a keen eye: achieving holistic visibility. Organizations of all sizes and industries have come to rely heavily on the seamless flow of information, making data protection an essential pillar in maintaining integrity, competitiveness, and resilience. View more...The Rising Risks and Opportunities in API SecurityAggregated on: 2023-08-18 13:31:29 APIs are the digital fabric connecting companies, partners, and customers. But increased reliance on APIs also introduces new security risks. I recently spoke with Michelle McLean, VP of Marketing at API security provider Salt Security during Black Hat 2023 about the current challenges and future outlook for API security. McLean says API awareness has grown due to high-profile breaches like the Optus leak in Australia. Such incidents underscore that APIs are an easy yet lucrative target. Attackers increasingly focus on APIs to steal valuable data, carry out fraud, and more. View more...Edge Data Platforms, Real-Time Services, and Modern Data TrendsAggregated on: 2023-08-18 13:01:29 We all know that data is being generated at an unprecedented rate. You may also know that this has led to an increase in the demand for efficient and secure data storage solutions that won’t break the bank. Edge data platforms and real-time services are two solutions focused on solving the challenges of modern data management, and they are quickly gaining popularity among businesses. This article will explore what edge data platforms and real-time services are, why they are important, and how they can be used. What Are Edge Data Platforms? Edge data platforms are software solutions that enable businesses to collect, process, and analyze data at the edge of the network. These platforms offer several advantages over traditional cloud computing. By processing data at the edge of the network, latency can be minimized, which means that data can be processed and analyzed faster. This is especially important for applications that require real-time responses, such as autonomous vehicles, industrial IoT applications, or streaming media. View more...Things to Consider When Scaling Analytics for High QPSAggregated on: 2023-08-18 03:31:29 For some, the thought of analytics and high QPS (queries per second) together may seem unlikely. After all, we typically think of analytics as the occasional report and dashboard into business metrics. But, analytics use cases are evolving with high volume, low latency queries on the rise. Companies like Confluent, Target, and Pinterest use analytics for much more than weekly executive summaries. They’re making analytics available across their organizations; their teams are exploring high-dimensional raw data in a free-flowing, ad-hoc nature; and they’re powering analytics applications and data products for 1000s to millions of external users and customers. View more...IoT in the Cloud: 8 Key Benefits and How to Get StartedAggregated on: 2023-08-18 03:16:29 What Is IoT in the Cloud? The Internet of Things, or IoT, refers to the network of physical devices, vehicles, appliances, and other items embedded with sensors, software, and network connectivity, which enables these objects to connect and exchange data. IoT in the cloud means storing and processing the massive amounts of data generated by these interconnected devices in the cloud, rather than on local servers or in traditional data centers. Here are some of the key functions of cloud-based IoT platforms: View more...Function Calling: Integrate Your GPT Chatbot With AnythingAggregated on: 2023-08-18 03:01:29 Imagine creating an AI assistant to which you can say something like, "Book me the earliest reservation for the nearest Thai restaurant and update my calendar." Language models continue to push boundaries and evolve. OpenAI, the company behind ChatGPT, recently introduced a powerful new feature called function calling in their GPT models. Function calling simplifies the creation of chatbots that communicate with external tools and APIs, opening up a new realm of possibilities for AI-powered applications. In this article, we will delve into the concept of function calling, its implications, and its transformative impact on how we interact with AI systems by creating NewsGPT, a chatbot that brings you breaking news worldwide. View more...Building Pop-Up Compose Notifications in Android Using Kotlin and ComposeAggregated on: 2023-08-18 02:01:29 Compose is a modern UI toolkit for building native Android apps with ease. Since its introduction, Compose has revolutionized the way we create user interfaces by offering a declarative and composable approach. This powerful toolkit empowers developers to design dynamic, interactive, and visually appealing UIs with less boilerplate code. In this article, we will explore how to implement pop-up Compose notifications in an Android app using Kotlin and Compose. Pop-up notifications are a great way to deliver timely information to users and prompt them to take specific actions within the app. By leveraging Compose's capabilities, we can create attention-grabbing notifications that seamlessly blend with our app's overall design. View more...Weighing the Trade-Offs of Native vs. Cross-Platform Mobile App DevelopmentAggregated on: 2023-08-18 00:46:29 Mobile applications have become a crucial channel for delivering software solutions to users. However, it is vital to recognize that mobile apps are a part of the broader software development ecosystem. Applying the same engineering discipline and design rigor as any other serious software project is imperative to ensure success. This means carefully weighing the technology and the architectural advantages and disadvantages underpinning the solution. From an engineering standpoint, there are several options for building mobile applications, each with strengths and weaknesses. Careful consideration is required to ensure optimal selection for your project goals. Native and cross-platform app development approaches have unique characteristics and trade-offs when making informed decisions to build maintainable and scalable apps aligned with project goals. View more...JWT Token Authentication in Angular 14 and .NET Core 6 Web APIAggregated on: 2023-08-18 00:16:29 In this article, we will discuss JWT Authentication in Angular 14 step-by-step. If you want to learn the basics and details of the JWT Token, then check out this article. View more...NULL in OracleAggregated on: 2023-08-17 23:16:29 Key Points The special value NULL means no data, a statement of the fact that the value is unknown. By default, columns, and variables of any type can take this value unless they have a NOT NULL constraint. Also, the DBMS automatically adds a NOT NULL constraint to columns included in the table's primary key. The main feature of NULL is that it is not equal to anything, not even another NULL. You cannot compare any value with it using any operators: =, <, >, like ... Even the expression NULL != NULL will not be true because one cannot uniquely compare one unknown with another. By the way, this expression will not be false either because when calculating the conditions, Oracle is not limited to the TRUE and FALSE states. Due to the presence of an element of uncertainty in the form of NULL, there is one more state — UNKNOWN. View more...ETL vs. ELTAggregated on: 2023-08-17 21:01:29 At first glance, it may be difficult to discern the differences between ETL and ELT. While similar in appearance, the acronyms refer to different approaches to moving and processing data, revealing the evolution and growth of data over the years. ETL and ELT are processes used by data integration tools. Through each process, data is pulled from different sources and transformed into useful information. View more...APIs in Motion: Keep Your APIs Up-To-DateAggregated on: 2023-08-17 20:46:29 In the rapidly evolving world of technology, software applications have become the backbone of modern society. From mobile apps that streamline our daily tasks to web-based platforms that connect us globally, these applications rely on seamless communication and data exchange. This is where Application Programming Interfaces (APIs) come into play. Exploring the Reasons Behind Updating and Evolving APIs Over Time APIs have become the backbone of modern software development, revolutionizing the way applications are designed, built, and integrated. Their importance stems from their ability to facilitate communication and data exchange between diverse applications and services. At its core, an API, or Application Programming Interface, is a set of rules, protocols, and tools that allows different software applications to interact and communicate with each other. APIs act as bridges, enabling one application to access and use the services and functionalities provided by another application or platform. This interoperability allows developers to combine the strengths of various applications and create powerful integrated solutions. View more...Reactive Event Streaming Architecture With Kafka, Redis Streams, Spring Boot, and HTTP Server-Sent Events (SSE)Aggregated on: 2023-08-17 20:01:29 This article outlines a solution for streaming events from Kafka, forwarding them to Redis using its Stream API, and reading individual streams from Redis via its streaming API. The added complexity in this scenario is the need to stream events from an HTTP endpoint using Server-Sent Events (SSE) while ensuring that only events relevant to a specific client ID are processed and sent. Problem Statement Many companies have an existing Kafka infrastructure where events are being produced. Our goal is to set up a system that subscribes to Kafka messages but only processes events relevant to a specific client ID. These filtered events should be forwarded to Redis using its Stream API. Additionally, we need to establish an HTTP endpoint for Server-Sent Events (SSE) that allows the specified client to receive real-time event updates. View more...Best Practices for Writing Clean Java CodeAggregated on: 2023-08-17 19:46:29 Having spent a few years in the technology industry, mostly developing software, I’ve been accustomed to the reality that most of my time is spent working with different teams and reviewing code written by other software developers. Over the years, I’ve had diverse experiences working with code written by different developers. These experiences have fundamentally reinforced my appreciation for clean code. “Indeed, the ratio of time spent reading versus writing is well over 10 to 1. We are constantly reading old code as part of the effort to write new code. …[Therefore,] making it easy to read makes it easier to write.”- from Clean Code: A Handbook of Agile Software Craftsmanship (Uncle Bob) View more...Ops-Friendly Apache APISIXAggregated on: 2023-08-17 19:46:29 Though I always worked on the Dev side of IT, I was also interested in the Ops side. I even had a short experience being a WebSphere admin: I used it several times, helping Ops deal with the Admin console while being a developer. Providing a single package that Ops can configure and deploy in different environments is very important. As a JVM developer, I've been happy using Spring Boot and its wealth of configuration options: command-line parameters, JVM parameters, files, profiles, environment variables, etc. View more...Building and Sustaining an Open Source Community in the Context of OrganizationsAggregated on: 2023-08-17 19:01:29 At a time when collaboration and innovation are critical for an organization, an open-source development model is becoming ever more prominent. In this article, we delve into the world of open source and explore how it could revolutionize creative collaboration and push the boundaries of inclusive innovation within an organization and around the world. Open-source communities have laid the foundation for some of the biggest technological leaps we have seen in numerous domains, especially in software. Some examples include Linux OS, Android OS, Kuberates, Gradle, and Apache HTTP server. Typically, these projects are hidden from the visibility of end users but provide immense value to software development and enhance the productivity of developers, which has led to continuous innovation in the services we rely on today. Open source is not limited to technology, however. Wikipedia is a prominent example of an open-source artifact serving as a modern-day encyclopedia. View more...Control Access To Private Data Using Azure Storage Shared Access SignaturesAggregated on: 2023-08-17 18:46:29 Security and governance are two major blockers that either stop or delay the cloud journey of various customers. In this era of the digital world, almost everyone has shown their concerns about the security of their data. Some are concerned due to the nature of data like PII data, and some are concerned due to local compliance laws like GDPR in Europe. Business Problem While I was working on a review assignment, I found that the application was using the Azure Storage Shared access signature for distributing access to private data. Even the developer of the application was using the SAS token as best practice, but it was still having below challenges. View more...Introduction to the Stack Data StructureAggregated on: 2023-08-17 17:46:29 Data structures are essential tools in computer science and programming. They allow for the efficient storage and manipulation of data, which is crucial in developing software applications. One of the most widely used data structures is the stack, which is an abstract data type that operates in a last-in, first-out (LIFO) manner. In this article, we will take a detailed look at the stack data structure, including its definition, operations, implementation, and applications. Definition of a Stack A stack is a collection of elements where only two main operations are allowed: pushing an element onto the top of the stack and popping an element off the top of the stack. The elements in a stack are usually of the same type, and they are stored in a linear data structure, which can be implemented using an array or a linked list. View more...How To Level Up in Your Data Engineering RoleAggregated on: 2023-08-17 16:01:29 Data engineering is one of the fastest-growing jobs in tech. And that isn’t surprising given the value — and sheer amount — of data that companies are capturing today. IDC forecasts that by the end of 2025, more than 175 zettabytes of data will be created, captured, and consumed – up from 33 zettabytes in 2018. Many companies have access to vast, growing amounts of data sitting in warehouses or customer data platforms (CDPs) but still don’t truly understand the potential value of their data. Companies can’t afford to lose these critical insights when it comes to making informed business decisions. Enter Data engineers. Landing a role in data engineering isn’t just about technical acumen. Of course, technical skills are a critical piece of the role, but to become a great data engineer, you need to understand the bigger picture of what problem you are trying to solve. Here’s how to get the role — and grow in your data engineering career. Learn the Language of Data Data engineers design, manage, and optimize the flow of data within an organization’s databases and develop data pipelines for analytics. But if you zoom out, data engineers are more than data shepherds. They are enablers in the organization, giving self-serve data access to the rest of the company. They can derive a single source of truth from complex, evolving datasets, working with data science and line of business teams such as marketing and product functions to help promote data-driven decision-making within an organization. Essentially, data engineers act as the translator of data to non-technical teams. View more...The Enterprise Browser: A Security-Hardened Productivity Platform for the Future of Remote WorkAggregated on: 2023-08-17 14:16:29 A recent interview with Island’s founding team member Brian Kenyon at Black Hat 2023 sheds light on how the enterprise browser is poised to become a powerful platform for secure remote work. Island offers a version of the Chromium open-source browser customized for the needs of enterprises. According to Kenyon, the enterprise browser holds enormous promise as the interface through which companies distribute software, apply access controls, generate usage analytics, and enable productivity. Kenyon explains that browsers entered the workplace mainly as a portal for personal tasks like online shopping between meetings. Enterprises tried to limit liability by restricting certain sites but otherwise did little to manage browser usage. However, browsers now access critical cloud applications and sensitive corporate data. Despite this shift, employees still use the same consumer products like Chrome and Safari. View more...Java String: A Complete Guide With ExamplesAggregated on: 2023-08-17 14:01:29 In Java, the String class is one of the most fundamental and widely used classes. It represents a sequence of characters and serves as the backbone of text manipulation in Java programs. Strings are immutable, meaning their values cannot be changed once they are created. In this blog, we'll explore the Java String class and its important methods and provide examples to illustrate its usage. Creating Strings In Java, you can create a String object using either a string literal or the new keyword. The string literal is enclosed in double quotes, while using new explicitly creates a new String object. Here are examples of both approaches: View more...Improving Customer-Facing App Quality Using Tricentis TestimAggregated on: 2023-08-17 13:16:29 As a software engineer, I’ve been reminded that “change” is the only “constant” we experience. Honestly, that premise is why I am just as excited today as I was when I started my career in 1992. I’ve realized there are some “almost-constants” that exist in an industry driven by change. In this post, I will talk about the continued mindset toward allowing less-than-ideal test coverage for features before they are released. View more...Defensive Programming With Klojang CheckAggregated on: 2023-08-17 04:31:28 Unit testing and integration testing have long since become established practices. Practically all Java programmers know how to write unit tests with JUnit. IDEs will help you with it and build tools like Maven and Gradle and run them as a matter of course. The same cannot be said of its (sort of) runtime counterpart: Defensive Programming — ensuring your program or method starts with a clean and workable set of inputs before continuing with the business logic. Null checks are the most common example of this. Yet it often seems like everything beyond that is treated as part of the business logic, even when it arguably isn't. If a method that calculates a price needs some value from a configuration file, is the presence of the configuration file part of the business logic? Probably not, but it should be checked nonetheless. View more... |
|
|