News AggregatorStrategies for Kubernetes Cluster Administrators: Understanding Pod SchedulingAggregated on: 2023-03-20 19:45:00 Kubernetes has revolutionized container orchestration, allowing developers to deploy and manage applications at scale. However, as the complexity of a Kubernetes cluster grows, managing resources such as CPU and memory becomes more challenging. Efficient pod scheduling is critical to ensure optimal resource utilization and enable a stable and responsive environment for applications to run in. As a Kubernetes cluster administrator, understanding the nuances of pod scheduling is essential to maximize your cluster’s performance. In this guide, we will explore the strategies for managing pod scheduling in Kubernetes, from the basics to more advanced techniques. We will delve into the intricacies of pod scheduling, including how to optimize resource allocation, how to balance workloads, and how to manage node selectors and affinity rules. View more...Use AWS Controllers for Kubernetes To Deploy a Serverless Data Processing Solution With SQS, Lambda, and DynamoDBAggregated on: 2023-03-20 19:15:00 In this blog post, you will be using AWS Controllers for Kubernetes on an Amazon EKS cluster to put together a solution wherein data from an Amazon SQS queue is processed by an AWS Lambda function and persisted to a DynamoDB table. AWS Controllers for Kubernetes (also known as ACK) leverage Kubernetes Custom Resource and Custom Resource Definitions and give you the ability to manage and use AWS services directly from Kubernetes without needing to define resources outside of the cluster. The idea behind ACK is to enable Kubernetes users to describe the desired state of AWS resources using the Kubernetes API and configuration language. ACK will then take care of provisioning and managing the AWS resources to match the desired state. This is achieved by using Service controllers that are responsible for managing the lifecycle of a particular AWS service. Each ACK service controller is packaged into a separate container image that is published in a public repository corresponding to an individual ACK service controller. View more...Public Key and Private Key Pairs: Know the Technical DifferenceAggregated on: 2023-03-20 18:45:00 In public key cryptography, the combination of private and public keys is considered the primary component. Both the keys come in pairs. So a public or private key will only function with the associated public or private key. It means that one private key can only have one public key and vice versa. Before we get into the part where we explain how the combination works, let us first discuss each of the keys individually. So let’s get started with the private key first. View more...What Is Automated Testing in Software Testing?Aggregated on: 2023-03-20 18:45:00 Software testing is a significant part of assuring software quality, which provides confidence that the product is functioning as intended before installation. It can be done manually or automatically, requiring either human effort or the use of automation tools and frameworks, respectively. Broken software is more than just an annoyance for users. It is all about losing money. Of course, no software is completely bug-free. But for the best experience possible, bugs should be identified before they reach customers. This is where automated testing comes in handy. View more...Reinventing IBM | DevSecOps, AI, Quantum Computing w/ IBM Fellow Rosalind RadcliffeAggregated on: 2023-03-20 18:15:00 No company is immune to transformation, not even one with as storied a history as IBM. This week on Dev Interrupted, Rosalind Radcliffe, the CIO DevSecOps CTO at IBM, joins us to chat about how one of tech's greatest legacy companies is positioning itself for the future. View more...What Is JavaScript Slice? Practical Examples and GuideAggregated on: 2023-03-20 17:15:00 If you're new to coding, the term 'slice method' may be daunting. Put simply, the slice method is a powerful JavaScript tool that lets you extract sections of an array or string. It's one of those methods that, once you understand and can use, can make your developer life much easier! View more...Learn CSS Grid “The Easy Way”!Aggregated on: 2023-03-20 17:15:00 CSS Grid is a layout system for the web, allowing developers to create complex, responsive designs using rows and columns. Grid is used to make complex web design layouts more easily. In this article, we will explore the basics of CSS Grid with a step-by-step guide. Readers will discover how to create complex, responsive web designs using rows and columns with CSS Grid. First things first, we have to make a div and give it a class of containers or anything you want. View more...Modernizing Monolithic Databases: A Strategic ApproachAggregated on: 2023-03-20 16:00:00 This article discusses a strategy for modernizing complex domains with monolithic databases through four phases: decomposition, prioritization, coexistence, and targeted rollout. The approach offers benefits such as improved scalability, availability, and security of data, the reduced workload on legacy systems, early cutover of dependent systems, and incremental cost savings through on-demand pricing for data storage. Additionally, the strategy provides early availability of analytical data for data-driven decision-making through machine learning and artificial intelligence-led transformation, quick wins, and early data validation. Modernization refers to the process of updating an organization's systems, processes, and infrastructure to keep up with changing business needs and technological advancements. In today's fast-paced digital landscape, modernization is crucial for organizations to stay competitive and meet the expectations of their customers. View more...A Guide to Understanding XDR Security SystemsAggregated on: 2023-03-20 14:30:00 XDR is a security system that has been designed to collect, correlate and contextualize alerts from a range of different solutions across servers, applications, networks, endpoints, cloud workloads, and other areas. It incorporates SaaS-based, cloud-native technology. What Is XDR? XDR is a security system that has the following objectives: View more...Spring CloudAggregated on: 2023-03-20 13:15:00 Spring Cloud is an open-source framework that provides developers with a set of tools and services to build cloud-native applications. It provides a variety of modules that can be used to simplify the development of distributed systems and microservices-based applications. Some of the modules include Spring Cloud Config, Spring Cloud Netflix, Spring Cloud Sleuth, Spring Cloud Gateway, Spring Cloud Stream, and Spring Cloud Kubernetes. Details of Spring Cloud Modules Spring Cloud provides a set of modules that can be used to build cloud-native applications. Each module provides specific functionality that is required in building distributed systems and microservices-based applications. View more...Choosing the Right Framework for Your ProjectAggregated on: 2023-03-20 12:45:00 Frameworks have become a fundamental part of modern web development. They help developers build applications faster, reduce the amount of code required, and streamline the development process. However, with so many frameworks available, it can be challenging to choose the right one for your project. In this article, we will provide a beginner's guide to choosing the right framework for your project, covering key factors to consider and popular frameworks that you might want to explore. Factors to Consider When Choosing a Framework When choosing a framework for your project, there are several factors to consider. Here are some of the most important ones: View more...7 ChatGPT Alternatives for the Best AI Chat ExperienceAggregated on: 2023-03-20 11:00:00 ChatGPT is a large language model created by OpenAI that uses machine learning algorithms to generate human-like responses to text-based conversations. It is designed to understand and respond to natural language inputs, allowing it to converse with people on a wide range of topics. ChatGPT was trained on a massive corpus of text data, including books, articles, and websites, and uses a sophisticated neural network architecture to generate its responses. As a language model, ChatGPT can be used for a variety of applications, such as chatbots, virtual assistants, and text-based games. Why Go for a ChatGPT Alternative? There may be several reasons why someone would consider using a ChatGPT alternative. Here are a few possible reasons: View more...AWS CodeCommit and GitKraken Basics: Essential Skills for Every DeveloperAggregated on: 2023-03-19 19:44:59 Git is a source code management system that keeps track of the changes made to their codebase and collaborates with other team members. It is commonly used for source code management in software development, but it can track changes to any set of files. In a version control system, every time a file is modified, a new version is created and saved. This allows users to go back to previous versions of the file, and makes multiple engineers collaborate simultaneously without overwriting each other’s changes. View more...Reliability Is Slowing You DownAggregated on: 2023-03-19 16:44:59 Three Hard Facts First, the complexity of your software systems is through the roof, and you have more external dependencies than ever before. 51% of IT professionals surveyed by SolarWinds in 2021 selected IT complexity as the top issue facing their organization. Second, you must deliver faster than the competition, which is increasingly difficult as more open-source and reusable tools let small teams move extremely fast. Of the 950 IT professionals surveyed by RedHat, only 1% indicated that open-source software was “not at all important.” View more...How Data Scientists Can Follow Quality Assurance Best PracticesAggregated on: 2023-03-19 16:14:59 The world runs on data. Data scientists organize and make sense of a barrage of information, synthesizing and translating it so people can understand it. They drive the innovation and decision-making process for many organizations. But the quality of the data they use can greatly influence the accuracy of their findings, which directly impacts business outcomes and operations. That’s why data scientists must follow strong quality assurance practices. What Is Quality Assurance? In data science, quality assurance ensures a product or service meets the required standards. It refers to verifying data is accurate, complete, and consistent. The data must be free of inconsistencies, errors, and duplicates, and the scientists must properly organize and document it well. View more...gRPC on the Client SideAggregated on: 2023-03-18 15:59:59 Most inter-systems communication components that use REST serialize their payload in JSON. As of now, JSON lacks a widely-used schema validation standard: JSON Schema is not widespread. Standard schema validation allows delegating the validation to a third-party library and being done with it. Without one, we must fall back to manual validation in the code. Worse, we must keep the validation code in sync with the schema. XML has schema validation out-of-the-box: an XML document can declare a grammar that it must conform to. SOAP, being based on XML, benefits from it, too. View more...Steel Threads Are a Technique That Will Make You a Better EngineerAggregated on: 2023-03-18 14:59:59 Steel Threads are a powerful but obscure software design approach. Learning about Steel Threads will make you a better engineer. You can use them to avoid common problems like integration pain, and you can use them to cut through the complexity of system design. So Obscure It Was Deleted From Wikipedia in 2013 How unknown are Steel Threads? The concept was deleted from Wikipedia in 2013 because “the idea is not notable within Software Engineering, and hasn’t received significant coverage from notable sources.” Let’s add to the coverage, and also talk through why it is such a useful approach. View more...Getting a Private SSL Certificate Free of CostAggregated on: 2023-03-18 12:14:59 You work for any software deployment project, you deploy code in multiple environments and test it. You test the site with HTTP, not HTTPS. Why? you need an SSL certificate for it. Getting a certificate for a lower environment could be difficult considering the cost. There is a way by which you can get a wildcard certificate and configure it with your website. You can implement a PKI solution by using the AD CS (Active Directory Certificate Service) Windows Server role. View more...5 Steps for Getting Started in Deep LearningAggregated on: 2023-03-17 22:44:58 5 Steps for How to Learn About Deep Learning Learning about deep learning methods and technologies has made a surge with new powerful models displaying capabilities we have never seen before. AI models built for the average user like ChatGPT and DALLE-2 have brought a mainstream spotlight on artificial intelligence. Understanding the inner workings of deep learning can be as confusing. While the math and the development of a functioning AI model are extensive, the general idea can be broken down into easier steps to learn how you can get started on your journey. Let’s go over the basics of where to start to grasp the complex topic of artificial intelligence and deep learning. View more...Seamless Integration of Azure Functions With SQL Server: A Developer's PerspectiveAggregated on: 2023-03-17 22:44:58 Azure Functions Overview Azure Functions is a serverless compute service that enables developers to run code on-demand without having to worry about infrastructure. It provides an easy way to build and deploy event-driven, scalable, and cost-effective applications that can be triggered by a variety of sources such as HTTP requests, messages, and timers. In this article, we will explore how to invoke Azure Functions from SQL Server using C#.As a developer, you may need to integrate Azure Functions with SQL Server to leverage the power of cloud computing and enhance your applications. In this article, we will explore how to accomplish this using C#. Prerequisites Before we start, make sure you have the following: View more...DeveloperWeek 2023: The Enterprise Community Sharing Security Best PracticesAggregated on: 2023-03-17 22:14:58 For the first time since 2019, the "world's largest developer and engineering expo" was back in person, this time in Oakland in February: DeveloperWeek 2023! Approximately 2000 attendees, speakers, and exhibitors got together face to face to meet and talk about the state of the software industry. People came from all over the world to be part of this 15+ track event that covered everything from application and API design, to Kubernetes and Terraform deployment fundamentals, and basically everything in between. I got to give a talk as well on the state of cloud development environments, which I have written about here before. There was a noticeable thread around cybersecurity throughout all the tracks. As security becomes more and more of a focus for the enterprise, it should be no surprise to see so many talks about securing your data and your applications. Here are just a few highlights from some of the sessions centered around security from DeveloperWeek 2023. View more...Cucumber.js Tutorial With Examples For Selenium JavaScriptAggregated on: 2023-03-17 21:44:58 The relevance of using a BDD framework such as Cucumber.js is often questioned by our fellow automation testers. Many feel that it is simply adding more work to their table. However, using a BDD framework has its own advantages, ones that can help you take your Selenium test automation a long way. Not to sideline, these BDD frameworks help all of your stakeholders to easily interpret the logic behind your test automation script. Leveraging Cucumber.js for your Selenium JavaScript testing can help you specify an acceptance criterion that would be easy for any non-programmer to understand. It could also help you quickly evaluate the logic implied in your Selenium test automation suite without going through huge chunks of code. With a given-when-then structure, Behaviour Driven Development frameworks like Cucumber.js have made tests much simpler to understand. To put this into context, let’s take a small scenario. You have to test an ATM if it is functioning well. We’ll write the conditions that given the account balance is $1,000 and the card is valid, and the machine contains enough money. When the account holder requests $200, the cashpoint should dispense $200 and the account balance should be $800, and the card should be returned. View more...Different Ways To Rename Database ObjectsAggregated on: 2023-03-17 21:14:58 This article explains different methods to rename database objects. We can rename database objects by using any of the following methods: Rename database objects using SSMS. Rename database objects using the sp_rename stored procedure. To understand the concept with more clarity, I have explained the methods with simple examples. For demonstration, I have created a database named SchoolManagement. I have created a database schema using ChatGPT. There is an interesting article written on ChatGPT and how we can use it. You can read it here. The script to create the database and tables are following: View more...Fargate vs. Lambda: The Battle of the FutureAggregated on: 2023-03-17 21:14:58 Fargate vs. Lambda has recently been a trending topic in the serverless space. Fargate and Lambda are two popular serverless computing options available within the AWS ecosystem. While both tools offer serverless computing, they differ regarding use cases, operational boundaries, runtime resource allocations, price, and performance. This blog aims to take a deeper look into the Fargate vs. Lambda battle. What Is AWS Fargate? AWS Fargate is a serverless computing engine offered by Amazon that enables you to efficiently manage containers without the hassles of provisioning servers and the underlying infrastructure. When cluster capacity management, infrastructure management, patching, and provisioning resource tasks are removed, you can finally focus on delivering faster and better quality applications. AWS Fargate works with Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS), supporting a range of container use cases such as machine learning applications, microservices architecture apps, on-premise app migration to the cloud, and batch processing tasks. View more...How To Set Up and Run Cypress Test Cases in CI/CD TeamCityAggregated on: 2023-03-17 20:14:58 This article will cover how to set up and run Cypress test cases in CI/CD TeamCity. Cypress is a JavaScript-based end-to-end testing framework that can be used to test web applications. To execute Cypress test cases in a CI/CD pipeline using TeamCity, you can use the Cypress Test Runner as a build step in your pipeline. This can be configured to run the tests in a headless browser and generate test reports that can be used to track test results over time. Additionally, you can use TeamCity’s built-in features, such as notifications and analytics, to track the status of your tests and to be alerted when tests fail. Prerequisites User already logged into TeamCity. Code is already pushed to GitHub. For the demo, use the latest version (12.3.0) of Cypress. What Is TeamCity? TeamCity is a continuous integration and continuous delivery (CI/CD) server developed by JetBrains. It is used to automate the building, testing, and deployment of software projects. TeamCity provides a web-based interface for configuring and managing builds, as well as for viewing build results and statistics. View more...What To Know Before Implementing IIoTAggregated on: 2023-03-17 18:29:58 Anyone in the industrial space knows how important it is to update their business with the latest technologies and equipment. Companies with capabilities, such as predictive maintenance, higher visibility, and improved efficiency, often outperform their competitors, who may rely on outdated information or antiquated systems. One trend in the manufacturing industry many professionals are discussing is the Industrial Internet of Things (IIoT). IIoT technology offers plenty of benefits for manufacturers to improve their operations. Explore the assets of IIoT and discover some important considerations manufacturers should make before implementing this emerging technology. View more...Apache Kafka Is NOT Real Real-Time Data Streaming!Aggregated on: 2023-03-17 18:14:58 Real-time data beats slow data. It is that easy! But what is real-time? The term always needs to be defined when discussing a use case. Apache Kafka is the de facto standard for real-time data streaming. Kafka is good enough for almost all real-time scenarios. But dedicated proprietary software is required for niche use cases. Kafka is NOT the right choice if you need microsecond latency! This article explores the architecture of NASDAQ that combines critical stock exchange trading with low-latency streaming analytics. What Is Real-Time Data Streaming? Apache Kafka is the de facto standard for data streaming. However, every business has a different understanding of real-time data. And Kafka cannot solve every real-time problem. View more...Frontend Troubleshooting Using OpenTelemetryAggregated on: 2023-03-17 14:44:58 As with back-end development, observability is becoming increasingly crucial in front-end development, especially when it comes to troubleshooting. For example, imagine a simple e-commerce application that includes a mobile app, web server, and database. If a user reports that the app is freezing while attempting to make a purchase, it can be challenging to determine the root cause of the problem. That's where OpenTelemetry comes in. This article will dive into how front-end developers can leverage OpenTelemetry to improve observability and efficiently troubleshoot issues like this one. View more...Low-Code Development: The Future of Software DevelopmentAggregated on: 2023-03-17 13:44:58 Low-code development is a software development approach that aims to simplify the process of building applications by using a visual interface rather than traditional coding methods. This approach has gained significant attention in recent years as more and more organizations seek to improve their software development processes and speed up their time-to-market. In this article, we will explore the benefits of low-code development, its impact on the software development industry, and how you can implement it in your organization. View more...How Chat GPT-3 Changed the Life of Young DevOps EngineersAggregated on: 2023-03-17 13:44:58 Chat GPT has revolutionized the field of DevOps and changed the lives of young professionals in the industry. With its advanced natural language processing capabilities, the GPT-3 language model has made it possible to create intelligent chatbots and virtual assistants that can handle complex tasks and interact with users in a more human-like way. This has opened up new possibilities for automating DevOps workflows and improving the overall efficiency of software development processes. In this article, we'll explore how the integration of Chat GPT into DevOps workflows has transformed the way young DevOps professionals work and the impact it has had on their career growth. The GPT-3 language model has made it possible to create intelligent chatbots and virtual assistants that can interact with users in a more natural and human-like way. This has led to a significant increase in efficiency in DevOps workflows as chatbots can handle complex tasks such as creating and deploying new software releases, managing servers, and monitoring system health. In addition, by automating these processes, DevOps professionals are now able to focus on more strategic and high-level tasks that require their expertise, leading to increased job satisfaction and faster career growth. View more...Accelerating Enterprise Software Delivery Through Automated Release Processes in Scaled Agile Framework (SAFe)Aggregated on: 2023-03-17 01:44:58 Key Takeaways Accelerating enterprise software delivery through automated release processes in a SAFe environment can help organizations to improve their software product quality, agility, flexibility, visibility, security, and governance and stay competitive in a rapidly changing marketplace, maximizing business value, trust, and time to market. By automating and incorporating quality gates and security scans in the CICD pipelines, businesses may improve the quality of their software products, identify critical vulnerabilities, bugs, code smells, and security hotspots, and as a result, future tech debt will be decreased. View more...The 5 Books You Absolutely Must Read as an Engineering ManagerAggregated on: 2023-03-17 01:29:58 Continuous learning is one of the guiding principles that all people should apply in their life. Reading is an excellent tool to learn, and it is a habit that we should all be doing on a regular basis. Since I love reading books about different topics, in this article, I'm going to share four books that have helped me a lot to improve as Engineering Manager. When we read a book, we should always remember three important things: View more...Simulating and Troubleshooting BLOCKED Threads in Kotlin [Video]Aggregated on: 2023-03-17 01:29:58 In this latest article of the series about simulating and troubleshooting performance problems in Kotlin, let’s discuss how to make threads go into a BLOCKED state. A thread will enter into a BLOCKED state if it can’t acquire a lock on an object because another thread already holds the lock on the same object and doesn’t release it. Kotlin BLOCKED Thread Program Here is a sample program that would make threads go into a BLOCKED state. View more...Understanding DOM (Document Object Model)Aggregated on: 2023-03-17 00:59:58 Contents Introduction to the Document Object Model What is the DOM? View more...AWS IP Address ManagementAggregated on: 2023-03-17 00:59:58 In a recent project, I worked with a client who was managing over 100 accounts and recently adopted AWS Control Tower. Despite this, I noticed that the management of CIDR ranges was still a manual process and all IP ranges were being tracked through an Excel sheet in a centralized location. This approach proved to be a significant challenge, as it required a considerable amount of effort to maintain, calculate, and reclaim IP addresses every time. This was especially challenging for new IT team members who joined the IT operations team. AWS provides a powerful solution for managing IP addresses in your cloud environment through its IPAM (Internet Protocol Address Management) service. AWS IPAM allows you to automate IP address allocation and management, track IP address usage, and detect potential IP address conflicts. In addition to these features, AWS IPAM can be used in conjunction with AWS Control Tower to manage IP addresses across multiple accounts and VPCs in a centralized, standardized way. In this article, we will explore the features and benefits of AWS IPAM with Control Tower and discuss some best practices for using these services effectively. View more...How To Migrate From Oracle Database to YugabyteDB With YugabyteDB VoyagerAggregated on: 2023-03-17 00:29:58 In this article, I demonstrate how you can migrate a comprehensive web application from Oracle Database to YugabyteDB using the open-source data migration engine YugabyeDB Voyager. To improve the availability, scalability, and performance of their applications, many developers are migrating from traditional, single-server relational databases to distributed database clusters. Migrating to YugabyteDB allows engineers to use the well-known SQL interface, while also benefiting from the data-resiliency and performance characteristics of distributed databases. Whether you prefer reading or watching, let’s migrate a sample movie rental application to YugabyteDB. View more...Metrics Part 2: The DORA KeysAggregated on: 2023-03-16 23:59:58 The DORA metrics are pretty much an iceberg, with the five indicators sticking out above the surface and plenty of research hidden beneath the waves. With the amount of work that has been put into that program, the whole thing can seem fairly opaque when you start working with them. Let’s try to peek under the surface and see what’s going on down there. After our last post about metrics, we thought it might be interesting to look at how metrics are used on different organizational levels. If we start from the top, DORA is one of the more popular projects today. Here, we’ll tell you some ideas we’ve had on how to use the DORA metrics, but first, there have been some questions we’ve been asking ourselves about the research and its methodology. We’d like to share those questions with you, starting with: View more...PySpark Data Pipeline To Cleanse, Transform, Partition, and Load Data Into Redshift Database TableAggregated on: 2023-03-16 23:44:58 Data is the driving force behind many of today's businesses. With the ever-growing amounts of data available, businesses need to create optimized data pipelines that can handle large volumes of data in a reliable and efficient manner. In this article, we will discuss how to create an optimized data pipeline using PySpark and load the data into a Redshift database table. We will also cover data cleansing, transformation, partitioning, and data quality validation. Before diving into the code, let's take a quick look at the tools we will be using: View more...How To Execute Cypress E2E Test Cases Using CI/CD GitLabAggregated on: 2023-03-16 23:14:58 Cypress is an end-to-end testing framework that is used to test web applications. It is an open-source JavaScript-based framework that enables developers to write and run automated tests for their web applications in a simple and easy way. Cypress provides a fast, reliable, and easy-to-use testing experience for web developers. It allows developers to write tests in JavaScript, and its powerful features include automatic reload of tests, time travel debugging, and interactive debugging. Cypress also provides a dashboard to view test results and insights. View more...Use After Free: An IoT Security Issue Modern Workplaces Encounter UnwittinglyAggregated on: 2023-03-16 23:14:58 Workstations, laptops, and smartphones are no longer the only web-enabled electronic devices in workplaces. The rise of wearables and the Internet of Things has added more gadgets that connect to the internet at home. This has created more conveniences but also introduced new problems. One of the problems brought about by the reliance on smart web-enabled electronic devices is the expansion of cyber threats. New devices being added to the enterprise network become new attack surfaces. They create more opportunities for threat actors to exploit vulnerabilities and launch attacks. View more...Real-Time Analytics for IoTAggregated on: 2023-03-16 22:44:58 We’ve been hearing that the Internet of Things (IoT) would transform the way we live and work by connecting everyday devices to the internet for a long time now. While much of the promise of the IoT always seems to be "coming soon," the proliferation of IoT devices has already created a massive amount of data that needs to be processed, stored, and analyzed, in real-time. I’ve said for years—actually over a decade now—that if your IoT data isn’t timely, accurate, and actionable, you’re mostly wasting your time in collecting it. This is where the Apache Pinot® database comes in. Pinot is an open-source, distributed data store designed for real-time analytics. The high scalability, reliability, and low latency query response times of Pinot make it a great solution for processing massive amounts of IoT data. In this post, we will explore the benefits of using Pinot in IoT applications. View more...From Data Stack to Data Stuck: The Risks of Not Asking the Right Data QuestionsAggregated on: 2023-03-16 22:14:58 Companies are in continuous motion: new requirements, new data streams, and new technologies are popping up every day. When designing new data platforms supporting the needs of your company, failing to perform a complete assessment of the options available can have disastrous effects on a company’s capability to innovate and make sure its data assets are usable and reusable in the long term. Having a standard assessment methodology is an absolute must to avoid personal bias and properly evaluate the various solutions across all the needed axes. The SOFT Methodology provides a comprehensive guide of all the evaluation points to define robust and future-proof data solutions. However, the original blog doesn’t discuss a couple of important factors: why is applying a methodology like SOFT important? And, even more, what risks can we encounter if we’re not doing so? This blog aims to cover both aspects. View more...Multi-Cloud IntegrationAggregated on: 2023-03-16 20:44:58 Before we jump into the details, let’s answer the question: “What is cloud integration architecture?” Cloud integration architecture is the combination of the cloud components and several cloud providers that allows exchanging of data across several data centers. For example, imagine that we have a large banking solution. Some banks don’t want to migrate their core and secured data. They want to keep it in their on-premises data centers. However, they can’t avoid using clouds. They migrate existing projects, new projects that are starting, and even the whole call centers and back office to the cloud. Building this complex architecture requires knowledge of the integration service and tools that the clouds provide. View more...Sanity Testing Tutorial: A Comprehensive GuideAggregated on: 2023-03-16 20:14:58 Sanity testing is a type of software testing executed on the stable build of an application with minor code changes. It is also known as surface-level testing. A sanity test is performed to ensure the application works as expected after the bug fixes or changes in the code. In the Software Development Life Cycle, software testing is an integral part of ensuring the performance of the software application. It is performed to find any bug or error that could lead to the failure of the software application. Such failure could be costly for the organization as it could not provide the expected user experience. Hence, it is suggested to check everything before the release of the software application in the market. View more...The Stoic Scrum MasterAggregated on: 2023-03-16 20:14:58 TL; DR: The Stoic Scrum Master – Making Your Scrum Work #30 Can wisdom from the past still be relevant to today’s VUCA-determined world? I started reading Marcus Aurelius’ Meditations some time ago and found it intriguing; maybe it applies to “Agile?” In other words: is there something like a Stoic Scrum Master? If I understand Stoicism correctly, it is about living a life of virtue, which comprises wisdom, justice, courage, and moderation. (All of those can be further subdivided, see Stoic Ethics.) For whatever reason, I felt reminded of Scrum Values and thought: could it be that the first principles of “agile” haven’t been defined by the Agile Manifesto but by “Zeno of Citium in Athens in the early 3rd century BCE?” View more...Developing a Barcode Reader To Make Life EasierAggregated on: 2023-03-16 18:59:58 I recently came across an article saying that barcodes and barcode readers have become a mainstay of today's economies and our lives in general since they were introduced in the 1970s. So, I decided to test how true this is by seeing how often I come across barcode readers on a typical day of mine. And — surprise surprise — they turned out to be more important than I thought. View more...Intrusion Detection Through Cyber Deception: Disrupting Attacks With an Active DefenseAggregated on: 2023-03-16 18:29:58 We should do our best to ensure our network and pipeline perimeters are secure and make it hard for attackers to gain access. However, the reality is that intruders will stop at nothing to gain access, as evidenced by the Uber, CircleCI, and Dropbox breaches, just to name a few. Common to all of those incidents was the attacker's behavior once they were inside. Each time they quickly found and exploited hardcoded credentials, giving them further access. Since we know this is something attackers do time after time, it is time to turn this behavior against them by engaging in some blue team cyber deception and start planting honeytokens in our environments. View more...Rust vs Go: Which Is Better?Aggregated on: 2023-03-16 18:29:58 It is a question every programmer and developer has asked, and many others still ask, even when they have made their own decision. Rust vs. Go: Which one should I choose in 2023? Or which language to choose: Golang or Rust? Golang and Rust are the youngest programming languages in use today. Go was launched at Google in 2009, and followed by Go, Rust was launched at Mozilla in 2010. Selecting the ideal programming language is seen as an important preference to prosper in this dynamic environment. The situation is very complex for programmers to select any one language over the other and develop reliable and systematic applications. Developers are always updated with emerging technology, and they can easily deal with the regularly changing mechanisms. View more...Graph Augmented Intelligence and XAIAggregated on: 2023-03-16 17:59:58 There are broad-spectrum real-world applications that can be powered by graph technologies. Social networks dwell on graphs that best model how people follow and befriend each other; Biotech and pharmaceutical companies leverage graphs to understand protein interactions and chemical compounds efficacies; Supply chains, telco networks, and power grids are naturally presented as graphs for root-cause analysis; Financial transactions naturally form networks and fraud detections, smart recommendations or asset-liability management are possible to run across these networked data for improved productivity, prediction accuracy or business intelligence. Many industries are looking to graph’s smart (and deep) data processing capabilities to help with their businesses. The big-data era started around 2010, as more and more industries are interested in machine learning (and deep learning and AI) to boost their business predictability; some have been using deep learning and specifically varied neural networks to extract more predictive powers. There are three major problems lingering around, though: View more...How to Make Testing Progress VisibleAggregated on: 2023-03-16 17:59:58 Testing efforts can easily go under the radar or be hard to grasp. It’s important to remember that software testing is not only about running tests: it involves multiple crucial facets that contribute to creating better and better software. In this article, we share with you all what we do in order to help the team and the different stakeholders to be informed of the testing progress. Testing is aimed to provide information about the quality of our system and the risks that might affect the user experience and our business so that better decisions can be taken. All this in order to mitigate those risks and improve the quality and the experience of our users. View more... |
|
|