News AggregatorSimulating and Troubleshooting Thread Leak in ScalaAggregated on: 2023-04-12 18:45:14 In this series of simulating and troubleshooting performance problems in Scala, let’s discuss how to simulate thread leaks. java.lang.OutOfMemoryError: unable to create new native thread will be thrown when more threads are created than the memory capacity of the device. When this error is thrown, it will disrupt the application’s availability. Video: To see the visual walk-through of this post, click below: View more...Automating the IBM MQ Upgrade on Redhat OpenShift Using BuildConfigs as CI/CDAggregated on: 2023-04-12 17:45:14 In this article, I will walk you through the IBM MQ upgrade automatically using buildconfigs following that uses Image stream to trigger the new build for upgrade IBM MQ on OpenShift Container Platform 4.x cluster setup on Linux. Further, I will be creating ImageStream, Dockerfile, BuidConfig and triggering the build to upgrade IBM MQ on OCP. Prerequisite Verify that your OpenShift cluster is up and running. View more...7 Tips for Mobile App Project ManagementAggregated on: 2023-04-12 17:45:14 [This article was written by Monique Rivers] It’s safe to say that mobile app development is just as complex a process as any other IT project. That’s why strategies used in projects aimed at developing mobile apps are to a large extent similar to those used by managers in other fields. Here are practical tips for making sure you pass the 7 following steps of app development smoothly and efficiently. View more...Must-Have Tool for Anonymous Virtual LivestreamsAggregated on: 2023-04-12 17:15:14 Influencers have become increasingly important as more and more consumers choose to purchase items online — whether on Amazon, Taobao, or one of the many other prominent e-commerce platforms. Brands and merchants have spent a lot of money finding influencers to promote their products through live streams and consumer interactions, and many purchases are made on the recommendation of a trusted influencer. However, employing a public-facing influencer can be costly and risky. Many brands and merchants have opted instead to host live streams with their own virtual characters. This gives them more freedom to showcase their products and widens the pool of potential on-camera talent. For consumers, virtual characters can add fun and whimsy to the shopping experience. View more...How To Build for Payment Processing ResiliencyAggregated on: 2023-04-12 17:15:14 If you're developing applications for a business, then one of your most important tasks is collecting payment for goods or services. Sure, providing those goods or services is essential to keeping customers happy. But if you don’t collect payments, your business won’t be around for very long. In the dev world, when we talk about infrastructure, we often consider the resiliency of our servers and APIs. We don’t talk about payment processing in the same way. But we should. View more...Relearning Java Thread PrimitivesAggregated on: 2023-04-12 17:15:14 I’ve coded in Java since the first beta. Even back then, threads were at the top of my list of favorite features. Java was the first language to introduce thread support in the language itself. It was a controversial decision back then. In the past decade, every language raced to include async/await, and even Java had some third-party support for that… But Java zigged instead of zagging and introduced the far superior virtual threads (project Loom). This post isn’t about that. I think it’s wonderful and proves the core power of Java. Not just as a language but as a culture. A culture of deliberating changes instead of rushing into the fashionable trend. View more...Using CockroachDB CDC With Apache PulsarAggregated on: 2023-04-12 16:45:14 Previous Articles on CockroachDB CDC Using CockroachDB CDC with Azure Event Hubs Using CockroachDB CDC with Confluent Cloud Kafka and Schema Registry SaaS Galore: Integrating CockroachDB with Confluent Kafka, Fivetran, and Snowflake CockroachDB CDC using Minio as a cloud storage sink CockroachDB CDC using Hadoop Ozone S3 Gateway as a cloud storage sink Motivation Apache Pulsar is a cloud-native distributed messaging and streaming platform. In my customer conversations, it most often comes up when compared to Apache Kafka. I have a customer needing a Pulsar sink support as they rely on Pulsar's multi-region capabilities. CockroachDB does not have a native Pulsar sink; however, the Pulsar project supports Kafka on Pulsar protocol support, and that's the core of today's article. This tutorial assumes you have an enterprise license, you can also leverage our managed offerings where enterprise changefeeds are enabled by default. I am going to demonstrate the steps using a Docker environment instead. View more...How to Avoid Defect Leakages in Software TestingAggregated on: 2023-04-12 16:15:15 What Is a Defect Leakage? The basic answer is that it’s a malfunction that slipped past the whole squad and any test scripts in place, ending up in production and potentially affecting users. Defect Leakage is a metric used to determine the performance of QA testing, precisely how many defects are overlooked during QA testing. View more...Balancing Shift Left and Shift Right in Your DevOps StrategyAggregated on: 2023-04-12 15:45:14 Shift Left and Shift Right are two terms commonly used in the DevOps world to describe approaches for improving software quality and delivery. These approaches are based on the idea of identifying defects and issues as early as possible in the development process. This way, teams can address the issues quickly and efficiently, allowing software to meet user expectations. Shift Left focuses on early testing and defect prevention, while Shift Right emphasizes testing and monitoring in production environments. Here, in this blog, we will discuss the differences between these two approaches: Shift Left and Shift Right. View more...5 NAS Backup Strategies: Pros and Cons ExplainedAggregated on: 2023-04-12 14:45:14 A modern data-driven world makes organizations of different scales and sizes use NAS devices as their data storage extensively. The nature and use of that data may vary, but in most cases, organizations cannot afford to lose their NAS data assets under any circumstances. To keep control over data even after major disasters, an organization should implement a thorough NAS backup strategy. In this article, we explain the NAS backup definition, reasons to have a data protection strategy, and five main strategies to back up NAS devices. You'll be able to evaluate the pros and cons of every strategy yourself and pick the most suitable one for your infrastructure. View more...The Importance of Test-Driven Development in Software DevelopmentAggregated on: 2023-04-12 14:30:14 Software development has come a long way since the early days of programming. The importance of developing high-quality software has become increasingly important as businesses rely more heavily on technology to drive their operations. One method that has gained traction in recent years is Test-Driven Development (TDD). In this article, we'll explore what TDD is, why it's important, and how to implement it in your software development process. What Is Test-Driven Development? Test-Driven Development is a software development technique that emphasizes writing automated tests before writing the actual code. The process starts with writing a test case, then writing the code that satisfies that test case. Once the code has been written, the test is run to ensure that it passes. If the test fails, the code is revised until the test passes. This process is repeated until all the tests have passed and the software is considered complete. View more...Why Use Kubernetes for Your Enterprise?Aggregated on: 2023-04-12 14:30:14 Why use Kubernetes? An important question every organization should ask. After the cloud and virtualization technologies disrupted infrastructure management in the first landscape, containerization is taking it to the next level. The advent of Docker popularized containerization. When containers run into hundreds and thousands, it becomes challenging for administrators to orchestrate container lifecycle tasks. This is where container orchestration tools come to the rescue. Kubernetes is a leader when it comes to container orchestration. This blog answers why using Kubernetes is essential for your enterprise and a quick introduction to Kubernetes Architecture. View more...The Power of Influence in Your Career as a Software Engineer [Video]Aggregated on: 2023-04-11 20:15:14 As software engineers, we mainly talk about the power of tech skills and spending time learning new techniques. However, there is also the matter of influence that impacts your career as well. Why Should I Care About Influence? Usually, we only focus on the hard skill when discussing the software career path. That is a colossal mistake that several engineers, including me, have committed for a long time. In this post, I'll explain why influence is vital to your career. View more...How to Build a URL Shortener Web App With Flask FrameworkAggregated on: 2023-04-11 19:30:14 With the rapid growth in technology, URLs are generated to create a unique form of each URL by the URLs generator's APIs. People find it challenging to share long, comprehensive links with their friends or place them as a reference to their work. URL shorteners now reduce the lengths of each long URL to those short ones that can be understandable or mastered. In this article, we will learn how to build and run your link shortener on your machine for free using Flask framework and Python. What Is a URL Shortener? A URL shortener is a tool that takes a long, complex URL and generates a shortened, easier-to-recall version. The shortened URLs typically redirect to the original, longer URL when clicked. URL shorteners are commonly used for social media posts, email messages, and other situations where a long URL could be more convenient and easier to share. View more...Building an Optimized Data Pipeline on Azure Using Spark, Data Factory, Databricks, and Synapse AnalyticsAggregated on: 2023-04-11 18:30:14 Data processing in the cloud has become increasingly popular due to its scalability, flexibility, and cost-effectiveness. Modern tech stacks such as Apache Spark, Azure Data Factory, Azure Databricks, and Azure Synapse Analytics offer powerful tools for building optimized data pipelines that can efficiently ingest and process data on the cloud. This article will explore how these technologies can be used together to create an optimized data pipeline for data processing in the cloud. Ingesting Data With Azure Data Factory Azure Data Factory is a cloud-based data integration service enabling you to ingest data from various sources into a cloud-based data lake or warehouse. It provides built-in connectors for various data sources such as databases, file systems, cloud storage, and more. In addition, you can configure Data Factory to schedule and orchestrate data ingestion processes and define data flow transformations. View more...Johnston Harris: “QA Is the Wild West Today, and We Turn Cowboys Into Sheriffs”Aggregated on: 2023-04-11 18:30:14 Johnston Harris is the CEO and Co-Founder of Appsurify, Inc., a software testing company that uses AI and Machine Learning to automate testing processes and improve software quality. Appsurify aims to help companies accelerate their development processes while reducing costs and improving overall product quality. We’ve discussed the risks and drawbacks of the bloated test suits, challenges faced by QA teams, the ways to minimize the rift between testers and developers, shift testing left, and relying on cutting-edge AI-powered tools and human creativity. Yes, human QA engineers are still in the game! View more...How To Find Broken Links Using Cypress [With Examples]Aggregated on: 2023-04-11 18:00:14 Have you ever experienced a 404 error? From an end user’s perspective, a 404 error (or broken link) experience can be a complete turn-off. Apart from annoying end-user experience, broken links (or dead links) on a website can dampen the SEO (Search Engine Optimization) activity. The more 404 pages you have on your site, the fewer time users spend on the site. To reduce the bounce rate and build a top-notch online reputation for your website, it is essential to check for broken links using Cypress. It is relatively easy to check broken links on the website by performing Cypress testing compared to other test automation frameworks like Selenium. View more....NET on AWS – Persisting Application Data to S3 (Part 1)Aggregated on: 2023-04-11 17:30:14 Amazon S3 is the most commonly used managed storage solution in AWS. It provides object storage in a highly scalable and secure way. AWS guarantees 11 9s for its durability. Objects stored in S3 are shared access objects; shared meaning they can be accessed by different clients at the same time. S3 provides low latency for data, and it has high throughput (able to move data in and out of S3 quickly). S3 is highly available, durable, and can encrypt data. S3 provides access management, lifecycle management, and the ability to query-in-place (no need to move to a data lake). Static website hosting is another very popular feature of S3. View more...Lessons Learned From Picking a Java Driver for Amazon ElastiCache for Redis - Part 2Aggregated on: 2023-04-11 16:45:14 In part one of this series, we looked at Jedis as the Java-based Redis driver when used in combination with ElastiCache for Redis in clustered mode. We learned that during a failover, Jedis takes some time to figure out what the new primary is before it can restore the connection to the ElastiCache cluster. In this post, I’ll share some of the lessons learned from switching to Lettuce as the driver for our Java-based application. A Different Driver Lettuce, a Java-based driver for Redis, is the default driver for Redis when working with Spring Framework. Lettuce is a fully non-blocking Redis client built with Netty providing Reactive, Asynchronous, and Synchronous Data Access. View more...Rolling Numbers Animation Using Only CALayersAggregated on: 2023-04-11 16:45:14 I’m an iOS Engineer at Triumph Labs, where I develop TriumphSDK for game devs. Not so long ago, I got a task to completely reimplement UI and animations. One of the most interesting parts was implementing of balance view with rolling animation of the number in it. At the first sight, it looks pretty simple, but we needed a well-configured custom solution. Of course, I checked existing libraries that I could reuse and adjust this kind of animation for our needs. After the first try, I figured out that the libraries are not so adjustable, and we cannot control the animation of each number. I won’t go into details too much. However, I decided to make my own solution from scratch. View more...Handling Bad Messages via DLQ by Configuring JDBC Kafka Sink ConnectorAggregated on: 2023-04-11 16:15:14 Any trustworthy data streaming pipeline needs to be able to identify and handle faults. Exceptionally while IoT devices ingest endlessly critical data/events into permanent persistence storage like RDBMS for future analysis via multi-node Apache Kafka cluster. (Please click here to read how to set up a multi-node Apache Kafka Cluster). There could be scenarios where IoT devices might send fault/bad events due to various reasons at the source points, and henceforth appropriate actions can be executed to correct it further. The Apache Kafka architecture does not include any filtering and error handling mechanism within the broker so that maximum performance/scale can be yielded. Instead, it is included in Kafka Connect, which is an integration framework of Apache Kafka. As a default behavior, if a problem arises as a result of consuming an invalid message, the Kafka Connect task terminates, and the same applies to JDBC Sink Connector. Kafka Connect has been classified into two categories, namely Source (to ingest data from various data generation sources and transport to the topic) and Sink (to consume data/messages from the topic and send them eventually to various destinations). Without implementing a strict filtering mechanism or exception handling, we can ingest/publishes messages inclusive of wrong formatted to the Kafka topic because the Kafka topic accepts all messages or records as byte arrays in key-value pairs. But by default, the Kafka Connect task stops if an error occurs because of consuming an invalid message, and on top of that JDBC sink connector additionally won’t work if there is an ambiguity in the message schema. View more...What Are Microservices Architecture and How Do They Work?Aggregated on: 2023-04-11 16:15:14 In the era of mobile computing, app developers should be able to deploy actions quickly and make changes without redeploying the entire app. As a result, it has led to a new way of building software called "microservices." Microservices are small, self-contained parts of an app that each do their job and talk to each other through APIs. Even though these microservices are different, they work together to complete the job. Microservices are becoming an essential part of modern app architecture, so let's talk about what microservices architecture is, how they work, and why they are helpful. View more...Private DNS Zone With Azure HDInsight KafkaAggregated on: 2023-04-11 15:45:14 What Is HDInsight Kafka? Azure HDInsight Kafka is a cloud-based, managed Apache Kafka service offered by Microsoft Azure. Apache Kafka is an open-source, distributed streaming platform that allows for the processing and analyzing of high-volume, real-time data streams. Azure HDInsight Kafka provides a fully managed and scalable environment for deploying and running Apache Kafka clusters, allowing users to easily create, configure, and manage Kafka topics, producers, and consumers. It also provides integration with other Azure services, such as Azure Data Lake Storage, Azure Event Hubs, and Azure Stream Analytics, enabling users to ingest, process, and analyze large volumes of data in real-time. View more...Streaming in Mule 4: Processing Large Data SetsAggregated on: 2023-04-11 15:15:14 Mule is a lightweight enterprise service bus and integration framework provided by MuleSoft. The platform is Java-based and hence makes use of the JVM for process execution. It is the fundamental task in MuleSoft to integrate different systems, and there are scenarios where we take data from one system, then process it, and finally load it into another system (ETL), where these source and end systems can be Database, Salesforce, SFTP/FTP or Files. There can be various approaches we can adopt to achieve the above goal. But when processing a reasonable amount of data, one of the concerns designers and developers need to address is the potential of retrieving an enormous number of results in a single load session because if the size of the data being loaded into the JVM Heap Memory exceeds its size, we get the memory out of bound exception, ourapplication crashes, and the process execution fails. Some Conventional Solutions To address the problem we encountered in the above scenario, we can make use of the following logic: View more...Data Modernization Stages and Best PracticesAggregated on: 2023-04-11 14:45:14 Data is a priceless resource for any company. But, the pace of innovation using data differs from organization to organization. Organizations with sprawling legacy systems slow down innovation, while cloud-native ones rapidly benefit from modern analytics and AI through more straightforward implementation. Companies with sizeable on-site data environments may plan to upgrade their data and use AI to overcome business obstacles. However, the transition from on-site to AI may seem intimidating to them. View more...Team Mentoring and Learning PathAggregated on: 2023-04-11 14:00:14 Considering a lot of demand for the various skill sets of people for upgrading existing systems or for new projects, it is very challenging to prepare the best team for the project. A few successful processes could improve the situation; I have listed some of them below and hope they are helpful. View more...5 Best Java Frameworks for Web Development in 2023Aggregated on: 2023-04-10 22:45:14 Java is one of the most popular and widely used programming languages on earth. It is known for its reliability, performance, and compatibility across different platforms and devices. However, developing web applications with Java can be challenging and time-consuming without the help of frameworks. Frameworks are software libraries that provide a set of tools, features, and guidelines for building web applications. They simplify and speed up the development process by handling common tasks such as routing, data access, security, testing, and deployment. They also enable developers to follow best practices and write clean, maintainable, and reusable code. View more...API Governance: Best Practices and Strategies for Effective API ManagementAggregated on: 2023-04-10 22:45:14 API governance refers to the set of policies, procedures, and practices that organizations adopt to ensure the effective management and control of their Application Programming Interfaces (APIs). A well-designed API governance framework helps organizations to establish guidelines and best practices for developing, deploying, and managing APIs. It provides a structured approach to API development and helps ensure consistency in the APIs that are offered to internal and external stakeholders. Effective API governance also helps organizations to identify and mitigate risks associated with APIs, such as security vulnerabilities, compliance issues, and performance concerns. By implementing API governance best practices, organizations can optimize their API portfolio, improve collaboration across teams, and increase the value derived from their API investments. The diagram illustrates the various components that make up an API governance framework. At the center of the diagram is the API governance board, which is responsible for overseeing and managing the governance process. The board is made up of representatives from different business units and technology teams within the organization. View more...Cypress vs. Playwright: Which Is the Best Testing Tool?Aggregated on: 2023-04-10 19:45:14 Are you having trouble deciding between Playwright and Cypress for cross-browser testing? The choice is challenging and dependent on the situation because each tool has specific benefits and drawbacks. This article will assist you in understanding the tools when you have to choose between Cypress Or Playwright. View more...The Holy Grail of Agile-DevOps Value Stream Hunting: Actualizing DevOps Transition PurposeAggregated on: 2023-04-10 18:30:14 Value streams have been a central tenet of Lean thinking for decades, starting with Toyota and the Lean Manufacturing movement, and are now widely adopted across industries. Despite this, many businesses still need to harness the full potential of value streams to drive organizational change and achieve greater efficiency and effectiveness. Instead, they may focus narrowly on metrics like team velocity or production pipeline speed, missing the broader picture of the end-to-end system. In modern product development, understanding value streams is crucial to optimizing our ways of working and delivering value to customers. By mapping the path to value, we can gain visibility into our processes and identify improvement areas, such as code deployment bottlenecks or mismatches between personnel and roles. View more...A New Era of Data Analytics: Exploring the Innovative World of Data Lakehouse ArchitecturesAggregated on: 2023-04-10 16:45:14 In the previous article, we discussed the emergence of Date Lakehouses as the next-generation data management solution designed to address the limitations of traditional data warehouses and Data Lakes. Data Lakehouses combines the strengths of both approaches, providing a unified platform for storing, processing and analyzing diverse data types. This innovative approach offers flexibility, scalability, and advanced analytics capabilities that are essential for businesses to remain competitive in today's data-driven landscape. In this article, we will delve deeper into the architecture and components of Data Lakehouses, exploring the interconnected technologies that power this groundbreaking solution. The Pillars of Data Lakehouse Architecture A Data Lakehouse is a comprehensive data management solution that combines the best aspects of data warehouses and Data Lakes, offering a unified platform for storing, processing, and analyzing diverse data types. The Data Lakehouse architecture is built upon a system of interconnected components that work together seamlessly to provide a robust and flexible data management solution. In this section, we discuss the fundamental components of the Data Lakehouse architecture and how they come together to create an effective and convenient solution for the end user. View more...What Is a Streaming Database?Aggregated on: 2023-04-10 15:15:14 A streaming database is a type of database that is designed specifically to process large amounts of real-time streaming data. Unlike traditional databases, which store data in batches before processing, a streaming database processes data as soon as it is generated, allowing for real-time insights and analysis. Unlike traditional stream processing engines that do not persist data, a streaming database can store data and respond to user data access requests. Streaming databases are ideal for latency-critical applications such as real-time analytics, fraud detection, network monitoring, and the Internet of Things (IoT) and can simplify the technology stack. Brief History The concept of a streaming database was first introduced in academia in 2002. A group of researchers from Brown, Brandeis, and MIT pointed out the demand for managing data streams inside databases and built the first streaming database, Aurora. A few years later, the technology was adopted by large enterprises. The top three database vendors, Oracle, IBM, and Microsoft, consecutively launched their stream processing solutions known as Oracle CQL, IBM System S, and Microsoft SQLServer StreamInsight. Instead of developing a streaming database from scratch, these vendors have directly integrated stream processing functionality into their existing databases. View more...Container Security: Top 5 Best Practices for DevOps EngineersAggregated on: 2023-04-10 14:45:14 Containerization has resulted in many businesses and organizations developing and deploying applications differently. A recent report by Gartner indicated that by 2022, more than 75% of global organizations would be running containerized applications in production, up from less than 30% in 2020. However, while containers come with many benefits, they certainly remain a source of cyberattack exposure if not appropriately secured. Previously, cybersecurity meant safeguarding a single "perimeter." By introducing new layers of complexity, containers have rendered this concept outdated. Containerized environments have many more abstraction levels, which necessitates using specific tools to interpret, monitor, and protect these new applications. View more...Okta as Code: Identity Management in the Cloud Native EraAggregated on: 2023-04-10 14:15:13 We have previously written posts on how to manage uncodified legacy apps on different platforms like AWS. In this post, we'd like to look at the very popular Okta platform, which provides some of the largest companies in the world with cloud-based identity and access management (IAM) for secure authentication and authorization for applications, devices, and users. Okta is likely the most popular choice for organizations that need to manage access to their digital resources across multiple applications and environments, as it provides a range of features that make it popular for authentication and authorization, such as: View more...How To REALLY Do Code Reviews [Video]Aggregated on: 2023-04-10 12:00:13 Welcome to the follow-up to How To Do Code Reviews, with many moooooore details on the human factors involved in a code review, as well as several options on how to approach reviewing pull requests. Just a quick recap, what is the scenario? A user sent in a GitHub pull request for our Google Photos clone, which means we have to do a code review. How should you do such a review? What is or isn't important? Let's find out in this episode of Marco Codes. View more...Single Cloud vs. Multi-Cloud: 7 Key DifferencesAggregated on: 2023-04-09 01:00:13 The advent of the Internet has brought revolutionary changes in the IT world. One of the notable changes is that virtualization has advanced with the Internet to become an integral part of the IT infrastructure of modern organizations. As a result, companies are now relying on the virtual online entity housing data and services, commonly referred to as the cloud. The switch to the cloud was brought on by the exponential data growth in the last couple of decades. In fact, studies predict that by 2025, the cloud will be storing up to 100 zettabytes of data. What Is the Cloud? The cloud refers to a global network of remote servers, each with a unique function that are connected and work together as a unitary ecosystem. In simple terms, the cloud describes what we commonly know as the “internet.” This remote network of servers is designed to either store and manage data, run applications, or deliver content or a service such as streaming videos or accessing social media networks for anyone with an internet connection. View more...What Will Come After Agile?Aggregated on: 2023-04-09 01:00:13 I think that probably most development teams describe themselves as being “agile” and probably most development teams have standups, and meetings called retrospectives. There is also a lot of discussion about “agile,” much written about “agile,” and there are many presentations about “agile.” A question that is often asked is, what comes after “agile?” Many testers work in “agile” teams, so this question matters to us. Before we can consider what comes after agile, we need to consider what agile is — an iterative, incremental development methodology. Agile teams develop software in iterations and each iteration makes an increment toward the team’s goal. An agile team can decide, after an iteration or two, that the goal they are working towards should be changed and start to work on a new goal. Working iteratively makes the team agile as it can change direction quickly and easily. There are several agile methodologies and one of the most widely used methodologies is scrum. View more...Shaping the Future of IoT: 7 MQTT Technology Trends in 2023Aggregated on: 2023-04-09 00:15:13 Message Queuing Telemetry Transport (MQTT) is the standard messaging protocol for the Internet of Things (IoT). MQTT follows an extremely lightweight publish-subscribe messaging model, connecting IoT devices in a scalable, reliable, and efficient manner. It's been over 20 years since MQTT was invented in 1999 by IBM and 10 years since the popular open-source MQTT broker, EMQX, launched on GitHub in 2012. View more...Steps for Developers to Take Toward Green ITAggregated on: 2023-04-07 18:45:13 Even something as abstract as software has real-world consequences. Data centers consume an estimated 1% of global energy and these power-hungry servers represent a mere fraction of IT’s total energy use. It’s time for IT developers to get serious about reducing their carbon footprint. Going green can take many forms, including writing better code, making physical hardware changes, and changing workplace culture. IT professionals can use the following techniques to minimize environmental impact. View more...Kotlin Multiplatform for Mobile and OTT Cross-PlatformsAggregated on: 2023-04-07 18:15:13 A huge trend in the software industry is the creation of cross-platform apps. More and more businesses are aiming to develop applications that don't need to be written from scratch and can operate on various platforms. When it comes to cross-platform app development for mobile and OTT, there are a number of options, but Kotlin Multiplatform is rapidly gaining ground. Developers can create code that is cross-platform by using the toolkit known as Kotlin Multiplatform. It works with all the major platforms, including Windows, Linux, Android, and iOS. View more...Boldness in RefactoringAggregated on: 2023-04-07 17:45:13 The old engineering adage “Don’t touch it, it works” is terrible. Don’t listen to it. It might be OK at a small scale, but as time goes by, the bit rot spreads through your code and servers polluting everything. Large swaths of your system become “no-man's-land.” As you’re developing a new system, you must always “touch it” and make sure we hire engineers who aren’t afraid to do so. Yes, I get it. I said that sentence frequently in the past. I understand the motivation. Management doesn’t care about the bit rot in our future. They care about the here and now. Why are you wasting time on this feature? View more...Data Mesh Architecture: A Paradigm Shift in Data EngineeringAggregated on: 2023-04-07 15:15:13 Data engineering is a rapidly evolving field that is constantly challenged by the increasing volume, velocity, and variety of data being generated and processed by organizations. Traditional data engineering approaches are often centralized and monolithic, which can lead to challenges in scalability, agility, and flexibility. In recent years, a new architectural paradigm called Data Mesh has emerged as a novel way to address these challenges and enable more efficient and effective data engineering. Data Mesh is a distributed and domain-oriented data architecture that advocates for a paradigm shift in how data engineering is approached within organizations. It was first introduced by Zhamak Dehghani, a thought leader in the data engineering community, and has gained significant attention as a promising approach to modern data engineering. View more...What Is the Role of DevOps in Mobile App Development?Aggregated on: 2023-04-07 14:30:13 Do you want to take your mobile app development process to the next level? If you implement DevOps in developing apps, you can achieve impressive results. View more...Embracing Asynchrony in Java, Python, JavaScript, and GoAggregated on: 2023-04-07 13:45:13 As a software developer with years of experience working primarily with Java, I found myself intrigued when I recently switched to Python for a new project. The transition prompted me to explore the world of asynchronous programming in various languages, including Java, Python, JavaScript, and Golang. This article is a result of my exploration and personal experience with these languages, aiming to provide insight into asynchronous programming techniques and examples. Asynchronous Programming in Java When I first started programming in Java, I quickly became familiar with the concept of threads. Over time, I found that the Executor framework and CompletableFuture class offered more powerful and flexible ways to handle asynchronous operations. View more...How to Perform Component Testing Using CypressAggregated on: 2023-04-07 13:15:13 In this article, I am going to explain the following: How you can Set up the React component. How you can test React component with the help of Cypress. What Is Component Testing? Component testing, also known as unit testing or module testing, is a software testing technique that involves testing individual units or components of a software application. These units are typically isolated from the rest of the application and tested in isolation to ensure they function as intended. View more...Smart Contract Audits with ConsenSys Diligence Fuzzing - Fuzzing as a ServiceAggregated on: 2023-04-07 12:45:13 If you’re working with smart contracts—or even just exploring them—you probably already know that smart contract security is important. Smart contracts are immutable once deployed, and often involve significant amounts of money. Writing safe and reliable code before deployment should be top of mind. And as the adoption of blockchain accelerates, ensuring the security of smart contracts becomes even more important. One of the best additions to your smart contract audit is fuzzing, a dynamic testing technique that exposes vulnerabilities by generating and injecting random inputs into your smart contracts during testing. View more...My First Firefox ExtensionAggregated on: 2023-04-06 21:45:12 A couple of weeks ago, I spent the weekend creating another CFP submission helper in the form of a Firefox extension. It was not a walk in the park. To help others who may be interested in doing the same (and my future self), here's my journey. Context I've written multiple posts about my conference submission workflow. To sum up: View more...Step-By-Step Guide To Building a Serverless Text-to-Speech Solution Using Golang on AWSAggregated on: 2023-04-06 20:00:12 The field of machine learning has advanced considerably in recent years, enabling us to tackle complex problems with greater ease and accuracy. However, the process of building and training machine learning models can be a daunting task, requiring significant investments of time, resources, and expertise. This can pose a challenge for many individuals and organizations looking to leverage machine learning to drive innovation and growth. That's where pre-trained AI Services come in and allow users to leverage the power of machine learning without having extensive machine learning expertise and needing to build models from scratch - thereby making it more accessible for a wider audience. AWS machine learning services provide ready-made intelligence for your applications and workflows and easily integrate with your applications. And, if you add Serverless to the mix, well, that's just icing on the cake, because now you can build scalable and cost-effective solutions without having to worry about the backend infrastructure. View more...Visual Regression Testing Tutorial: Comprehensive Guide With Best PracticesAggregated on: 2023-04-06 19:00:12 Visual regression testing verifies that an application or website looks and behaves as expected and that there have been no unintended changes to the visual appearance or functionality. This process involves comparing a baseline application or website version with a current version and checking for visual differences. During visual regression testing, images of the application or website are captured and compared using specialized tools highlighting differences. There may be differences between the two versions, which indicate that the application's appearance or layout has changed or that a bug or issue needs to be fixed. View more...Attaining Document Security in FileNet Content Management SystemAggregated on: 2023-04-06 18:45:12 FileNet is a document management system developed by IBM that allows organizations to manage and store their digital content. Document Security is an essential aspect of any document management system, including FileNet. Important Considerations for FileNet Security 1. Authentication: FileNet provides various authentication mechanisms, such as LDAP, Kerberos, and Active Directory, to ensure that allows only authorized users can access the system. View more... |
|
|