News AggregatorOpen Source Maintenance Is Community OrganizingAggregated on: 2023-03-07 20:14:52 About six months ago, I wrote a piece about the state of open-source commercialization that garnered some notice. Almost immediately after that, Hacker News featured a problematic piece of prose on the front page. The title is “Fix it, Fork it, F*ck off” (censorship is mine). I think this is a great sample of where OSS is failing commercially and as a movement. A lot of the attention in OSS goes into the code of conduct policies (which are important), but not enough goes into what it takes to build a successful open-source project. It isn’t just the coding. I’d argue that coding is often less important than this. The Clash of Entitlement I understand where the author is coming from. He’s writing from frustration. We put a lot of work into our OSS project, and an entitled end user can be difficult. I agree some people go over the line, but in my experience, this is less than 0.1% of complaints. It’s rare to have a truly toxic user. View more...Advanced JavaScript Technique: Reloading a Page With Location.reload(true)Aggregated on: 2023-03-07 19:44:52 Have you ever felt like you needed to start over, so you pressed the refresh button? Well, that’s exactly what you can do with a simple JavaScript technique. Whether you’re a beginner or an experienced JavaScript developer, it’s important to stay up-to-date on the latest advanced techniques. In this article, we’ll delve into the world of advanced JavaScript and show you how to use Location.reload(true) to reload a page with one quick command. We know that reloading a page can be a stressful process—especially if your page is filled with code. View more...How To Create Microsoft Azure Function App Using Azure Cloud PortalAggregated on: 2023-03-07 19:44:52 Create Function App Make a function app that allows you to organize functions into logical groups for simpler resource management, deployment, and sharing. Functions enable serverless code execution without the need to initially publish a web application or establish a virtual machine. Project Details To control costs and deploy resources, choose a subscription. For resource management and organization, use resource groups like folders. View more...Socket Programming in Python: Client, Server, and Peer-to-Peer LibrariesAggregated on: 2023-03-07 19:14:52 In this tutorial, you'll learn how to exchange data between a client and a server using Python socket programming and the Socket API. Later, this tutorial will discuss exchanging data directly between two or more Python clients using a hosted provider. The source code used in this tutorial can be found within the GitHub repository. Socket programming connects two sockets (a client socket and a server socket) and allows them to communicate bi-directionally in real time. Direct socket connections can benefit all real-time applications since data can be sent or received anytime. View more...OWASP Kubernetes Top 10Aggregated on: 2023-03-07 19:14:52 One of the biggest concerns when using Kubernetes is whether we are complying with the security posture and taking into account all possible threats. For this reason, OWASP has created the OWASP Kubernetes Top 10, which helps identify the most likely risks. OWASP's Top 10 projects are useful awareness and guidance resources for security practitioners and engineers. They can also map to other security frameworks that help incident response engineers understand Kubernetes threats. For example, MITRE ATT&CK techniques are also commonly used to register the attacker's techniques and help blue teams to understand the best ways to protect an environment. In addition, we can check the Kubernetes threat model to understand all the attack surfaces and main attack vectors. View more...Jakarta NoSQL 1.0.0-b5: How To Make Your Life Easier Around Enterprise Java and NoSQL DatabasesAggregated on: 2023-03-07 19:14:52 NoSQL databases have become part of the know-how of several organizations, even the most conservative ones, such as financial institutions. However, several tools and frameworks still need to be improved for several languages, such as Java. The Jakarta NoSQL specification was created to increase the developer experience between Java and NoSQL databases. This article will cover more details about the Jakarta NoSQL specification and its newest features. What Is Jakarta NoSQL? Jakarta NoSQL is a specification designed to easily integrate Java and NoSQL databases. It uses common annotations and specific APIs for each of the NoSQL database types: key-value, column family, document, and graph databases. View more...11 Observability Tools You Should KnowAggregated on: 2023-03-07 19:14:52 When organizations move toward the cloud, their systems also lean toward distributed architectures. One of the most common examples is the adoption of microservices. However, this also creates new challenges when it comes to observability. You need to find the right tools to monitor, track and trace these systems by analyzing outputs through metrics, logs, and traces. It enables teams to quickly pinpoint the root cause of issues, fix them and optimize the application performance, giving them the confidence to deliver code faster. View more...How To Automate an API Gateway MigrationAggregated on: 2023-03-07 18:29:52 Application Programming Interfaces (APIs) and API management are critical business assets. Today’s businesses are scaling APIs to meet different business needs with varying types of APIs, specifications, and functions across enterprise environments and complex architectures. Smart developers understand the business value of APIs and the need to have an API strategy independent of API gateways and host locations. Any workable API strategy must include gateway-agnostic APIs so they can run on-premises, in the cloud, or in a hybrid environment. APIs also must be easy to port to any new gateway provider. Whether the organization uses APIs custom-built by the DevOps team or purchased as Software-as-a-Service (SaaS), using APIs to connect applications throughout the organization requires effective API management. As the speed of business accelerates, APIs need to move faster as well, which means APIs need to be unified and self-service to be more agile and more portable. View more...The Three Daily Scrum Questions Won’t DieAggregated on: 2023-03-07 18:29:52 The Daily Scrum serves a single purpose: inspecting the progress toward the Sprint Goal by reflecting on yesterday’s learning. Then, if the need should arise, the Developers adapt their plan to accomplish the Sprint Goal. While the theory may be generally accepted, applying the idea to the practice is more challenging. One of the recurring issues is the continued popularity of the “three Daily Scrum questions” from the Scrum Guide 2017. Let’s reflect on why answering these obsolete Daily Scrum questions negatively influences the Scrum team. View more...Managing Multiple APIs Using an Adapter PatternAggregated on: 2023-03-07 18:29:52 Let's imagine the problem: Your company creates a B2B product that provides a service for some other companies. This service helps client-company to resolve very specific problems of their customers. This customer can communicate with our company web app and do some operations. The results of these operations should be reported to the other company side. Times go on, and now you have a few more clients that work by the same scheme. At first, you connect small companies one by one, but when you get to much bigger client companies, you discover that they use third-party API service providers and delegate all the integration problems to them. These API service providers act as a proxy for this toil of service reverse integration, which unifies the logic of cross-company communication on both sides. Due to the structure of presented business relationships, our company almost inevitably start to use a set of similar actions to communicate with dozens of different APIs for hundreds of clients in the future. View more...Modern Web Applications Authentication Using Face RecognitionAggregated on: 2023-03-07 17:59:52 With the development of digital technology, information systems are also constantly upgraded. In the past, we have developed many mature WEB application information systems. With the continuous improvement of security level, the traditional way of account login is getting worse and worse in the current user experience. For example, after you log in to the WEB application on one computer, when you change to another computer and enter the correct account and password to log in, the WEB application cannot determine whether it is you or someone else who logged in illegally because of the change of IP address and device. It will ask you to verify whether it is you again through email or mobile phone number. This security measure is reasonable, but it will make real users feel uncomfortable. If we add the facial authentication function in the user authentication module to confirm the current login user, this security measure can avoid a bad user experience. Facial authentication can be easily performed using FACEIO, and the amount of code added to WEB applications is very small. It provides online JavaScript libraries, which can be directly referenced in front-end web pages. Below the code View more...Pitfalls To Avoid When Switching To Virtual ThreadsAggregated on: 2023-03-07 17:59:52 Java virtual thread is a new feature available from JDK 19. It has the potential to improve the application’s availability, throughput, and code quality on top of reducing memory consumption. Video: To see the visual walk-through of this post, click below: View more...The Exponential Growth of Generative AI: Opportunities and ChallengesAggregated on: 2023-03-07 17:29:52 While the opportunities offered by generative AI are significant, there are also major challenges, such as the difficulty and cost of developing or maintaining large language models (LLMs), as well as their potential inaccuracy. The popularity of generative AI is growing increasingly. Artificial Intelligence is now a serious subject of conversation in every corner, from dinner parties to news channels or digital transformation actors. Of course, Artificial Intelligence technologies in general, and more specifically ChatGPT, did not come out of nowhere. As far back as 2020, the most enlightened experts were already predicting that generative AI would be an essential pillar of the next generation of AI. View more...Building a Rest API With AWS Gateway and Node.jsAggregated on: 2023-03-07 17:29:52 AWS Gateway is a powerful tool for building APIs that scale to meet the demands of modern web and mobile applications. With AWS Gateway, you can create RESTful APIs that expose your data and business logic to developers, who can then build rich, interactive applications that consume your API. REST API is an industry standard for building scalable, distributed web applications. With AWS Gateway, you can easily build a REST API that supports both GET and POST methods, as well as complex query parameters. You can also add support for other HTTP methods, such as PUT, DELETE, and HEAD. View more...The Problem With MTTR: Learning From Incident ReportsAggregated on: 2023-03-07 16:59:52 Tracking Mean Time To Restore (MTTR) is standard industry practice for incident response and analysis, but should it be? Courtney Nash, an Internet Incident Librarian, argues that MTTR is not a reliable metric — and we think she's got a point. View more...Write Optimized Spark Code for Big Data ApplicationsAggregated on: 2023-03-07 15:14:52 Apache Spark is a powerful open-source distributed computing framework that provides a variety of APIs to support big data processing. PySpark is the Python API for Apache Spark, which allows Python developers to write Spark applications using Python instead of Scala or Java. In addition, pySpark applications can be tuned to optimize performance and achieve better execution time, scalability, and resource utilization. In this article, we will discuss some tips and techniques for tuning PySpark applications. 1. Use Broadcast Variables Broadcast variables are read-only variables that can be shared across nodes in a Spark cluster. Broadcast variables can be used to efficiently distribute large read-only data structures, such as lookup tables, to worker nodes. This can significantly reduce network overhead and improve performance. In PySpark, you can use the broadcast function to create broadcast variables. For example, to broadcast a lookup table named lookup_table: View more...Secure APIs: Best Practices and MeasuresAggregated on: 2023-03-07 14:44:52 An API (Application Programming Interface) acts as an intermediary between two distinct software applications, enabling seamless communication and data exchange. By providing a standardized interface, APIs offer developers the ability to access specific functionalities or data from another software application or service without the need to understand or modify the underlying code. This results in more efficient development processes, improved interoperability between applications, and enhanced overall functionality. APIs represent a potent resource for developers as they offer a uniform approach to accessing data and functionality from various software applications and services, resulting in the creation of more efficient and effective software solutions. This not only streamlines the development process but also enhances the overall performance and scalability of the resulting applications. As the usage of APIs continues to rise, it is imperative that they are appropriately secured. Many industry-wide threats are the result of excessive or sensitive data being leaked through APIs. To mitigate this risk, it is essential to implement a shift left approach, which involves securing APIs from the development stage to maintenance. By integrating security measures at the earliest stage of the development process, developers can reduce the risk of potential vulnerabilities being introduced into the API. Additionally, regular maintenance and updates can ensure that any new vulnerabilities are identified and promptly addressed. Overall, implementing a shift left approach is critical to ensuring the security and protection of data being transmitted through APIs. View more...5 Ways to Secure a Virtual Machine in Cloud ComputingAggregated on: 2023-03-07 13:44:52 Organizations worldwide store 60% of their data in the cloud. The popularity of cloud computing will be undisputed in 2023 and is predicted to grow in future years. The main benefits of using cloud storage and computing services to run corporate VMs include data availability and the cost-efficiency of such infrastructures. However, focusing on cloud computing as your organization’s main data storage has downsides. The main concern here is data and cloud VM security: the nature of cloud infrastructures make providing the appropriate level of protection to data challenging. In this post, we explain: View more...Top 11 Git Commands That Every Developer Should KnowAggregated on: 2023-03-07 13:14:52 Git is a version control system that has become an essential tool for developers worldwide. It allows developers to keep track of changes made to a project's codebase, collaborate with others on the same codebase, and roll back changes when necessary. Here are the top 11 Git commands every developer should know. View more...Testing Repository Adapters With Hexagonal ArchitectureAggregated on: 2023-03-07 02:14:52 When applying hexagonal architecture (ports and adapters) with access to infrastructure elements like databases is done by the mean of adapters, which are just implementations of interfaces (ports) defined by the domain. In this article, we are going to provide two implementations of the same repository port, one in-memory and another based on JPA, focusing on how to test both implementations with the same set of tests. Context Many software solutions usually developed in the enterprise context have some state that needs to be persisted in a durable store for later access. Depending on the specific functional and non-functional requirements, selecting the correct persistence solution can be hard to make and most likely require an Architecture Decision Record (ADR) where the rationale of the selection, including alternatives and tradeoffs, is detailed. For persisting your application state, most likely, you will look at the CAP Theorem to make the most adequate decision. View more...Getting Started With AstroAggregated on: 2023-03-07 01:29:52 Web development, like most technologies, moves in waves and cycles. Static websites were all we had in the beginning. But, pretty soon, developers were hacking together the first server-generated sites thanks to Perl and PHP. This was the advance that would eventually kickstart frameworks like Laravel, Django, or Rails. Mobile devices would come to change how people consume the web. So long server-generated websites, hello client-rendered applications. The next wave brought frameworks that could give users a more app-like experience—without reloads—like React or AngularJS. View more...Building Custom Solutions vs. Buy-and-Build SoftwareAggregated on: 2023-03-06 23:14:52 The Challenges of Building a FIX Protocol The first day I was introduced to FIX was when I worked at an investment bank in London as a developer, I was told to write a feed handler to retrieve market data. Bear in mind that at this time, I knew nothing about FIX, apart from googling it for about 10 mins on the internet. With a touch of overconfidence and slight arrogance, I set to work coding a direct socket connection to the remote FIX endpoint, thinking, “How hard could it be?” So, What Is FIX? Financial Information eXchange (FIX) is both a market data format and a protocol: it is used by investment banks to place orders and receive market data and has become a global language in financial trading. The format of a FIX message controls how it is encoded. All FIX messages start with 8=FIX, which denotes the start of a FIX message. They then go on to list key and value pairs. The keys are represented as numbers (known as TagNumbers) followed by a = delimiter to delimit the values. Each key=value combination is then delimited by the \u0001 character, which is sometimes visually represented as either ^ or |. The value is often written in a semi-human-readable format. I say semi-human readable because most of the time it is human-readable, but all too often, FIX will use a single character to denote a state or type of message. These characters are not always that obvious. I agree that the character B for "Buy" and S for "Sell" makes sense, but other characters are used that make no sense. For example, D denotes a "New Order Single" message, which is a message that is often used when you wish to place an order with your counterparty. View more...Develop XR With Oracle, Ep. 5: Healthcare, Vision AI, Training/Collaboration, and MessagingAggregated on: 2023-03-06 23:14:52 This is the fifth piece in a series on developing XR applications and experiences using Oracle and focuses on XR applications of healthcare, vision AI, training and collaboration, and messaging, including other topics such as multi-platform development, etc. Find the links to the first four articles below: Develop XR With Oracle, Ep 1: Spatial, AI/ML, Kubernetes, and OpenTelemetryDevelop XR With Oracle, Ep 2: Property Graphs and Data VisualizationDevelop XR With Oracle, Ep 3: Computer Vision AI, and MLDevelop XR With Oracle, Ep 4: Digital Twins and Observability View more...Know Why Super Apps Are on Emerging RiseAggregated on: 2023-03-06 20:44:52 We all live in a technologically advanced world where software applications have become essential to life. If this software malfunctions, it isn’t incorrect to say that our daily lives could completely halt. As technology spreads worldwide, existing tech hubs have developed an upgraded platform called the ‘Super App.’ Although the term was coined by Mike Lazaridis (Founder of Blackberry) in 2010, its impact in the real world has recently increased. View more...Node.js vs Python: Which Suits Your Application?Aggregated on: 2023-03-06 20:29:52 Would you like to know the best technology for your web application? Have a glance at Node.js and Python. It is an arduous task to hand-pick the best platform that enables you to create a web application. Many were baffled to select one from a few. Here is a wide range of multiple featured technologies, which will facilitate you to identify the right one. We will discuss the differences between the various apps and their applications. View more...Product Security (DevSecOps Practices)Aggregated on: 2023-03-06 19:44:52 What Is Product Security? Product Security is a process within the Cybersecurity function which aims to deliver a secure product, which includes the organization's Web applications, Web services, Mobile applications, or any hardware manufactured. This focuses on considering security at every stage, starting from design, development, and implementation, i.e., the secure SDLC process. Product Security involves multiple activities, including threat modeling, Security testing (Static application security testing (SAST)), Dynamic application security testing (DAST), Penetration Testing, Secure coding practices, Incident response, and Continuous monitoring. The primary goal of product security is to protect the CIA (Confidentiality, Integrity, and Availability). View more...React Native vs Kotlin: A Quick ComparisonAggregated on: 2023-03-06 19:44:52 Mobile apps have become an emerging platform, and mobile app traffic is very high, with a well-appreciated response from the people. So, entrepreneurs are focusing on the mobile app development process to develop their businesses to the next level. To meet all the business requirements, many technologies are introduced, and many developers and businesses are confused with different languages and frameworks. View more...How To Use Linux ContainersAggregated on: 2023-03-06 19:14:52 Linux containers are a powerful solution for: Software standardization Acceleration of development and testing Effective resource management throughout the whole lifecycle of an application Here, we will provide a step-by-step guide to building Linux containers with applications intended for Cloud deployment. As an example, we will use BellSoft’s open-source Alpaquita Stream containers hosted on the Docker Hub Container Image Library. View more...20 Concepts You Should Know About Artificial Intelligence, Big Data, and Data ScienceAggregated on: 2023-03-06 18:29:52 Introduction Entrepreneurial ideas take advantage of the range of opportunities this field opens up, thanks to what is engineered by scientific profiles such as mathematicians or programmers. ALGORITHM. In Computer Science, an algorithm is a set of steps to perform a task. In other words, a logical sequence and instructions form a mathematical or statistical formula to perform data analysis. SENTIMENT ANALYSIS. Sentiment analysis refers to the different methods of computational linguistics that help to identify and extract subjective information from existing content in the digital world. Thanks to sentiment analysis, we can be able to extract a tangible and direct value, such as determining if a text extracted from the Internet contains positive or negative connotations. PREDICTIVE ANALYSIS. Predictive analysis belongs to the area of Business Analytics. It is about using data to determine what can happen in the future. The AP makes it possible to determine the probability associated with future events from the analysis of the available information (present and past). It also allows the discovery of relationships between the data that are normally not detected with less sophisticated analysis. Techniques such as data mining and predictive models are used. BUSINESS ANALYTICS. Business Analytics encompasses the methods and techniques used to collect, analyze, and investigate an organization's data set, generating insights that are transformed into business opportunities and improving business strategy. AE allows an improvement in decision-making since these are based on obtaining real data and real-time and allows business objectives to be achieved from the analysis of this data. BIG DATA. We are currently in an environment where trillions of bytes of information are generated every day. We call this enormous amount of data produced every day Big Data. The growth of data caused by the Internet and other areas (e.g., genomics) makes new techniques necessary to access and use this data. At the same time, these large volumes of data offer new knowledge possibilities and new business models. In particular, on the Internet, this growth begins with the multiplication in the number of websites, beginning search engines (e.g., Google) to find new ways to store and access these large volumes of data. This trend (blogs, social networks, IoT…) is causing the appearance of new Big Data tools and the generalization of their use. BUSINESS ANALYTICS (Business Analytics). Business Analytics or Business Analytics allows you to achieve business objectives based on data analysis. Basically, it allows us to detect trends and make forecasts from predictive models and use these models to optimize business processes. BUSINESS INTELLIGENCE Another concept related to EA is Business Intelligence (IE) focused on the use of a company's data to also facilitate decision-making and anticipate business actions. The difference with EA is that EI is a broader concept, it is not only focused on data analysis, but this is an area within EI. In other words, EI is a set of strategies, applications, data, technology, and technical architecture, among which is EA, and all this focus on the creation of new knowledge through the company's existing data. DATA MINING or data mining. Data Mining is also known as Knowledge Discovery in Database (KDD). It is commonly defined as the process of discovering useful patterns or knowledge from data sources such as databases, texts, images, the web, etc. Patterns must be valid, potentially useful, and understandable. Data mining is a multidisciplinary field that includes machine learning, statistics, database systems, artificial intelligence, Information Retrieval, and information visualization, ... The general objective of the data mining process is to extract information from set data and transform it into an understandable structure for later use. DATA SCIENCE. The opportunity that data offers to generate new knowledge requires sophisticated techniques for preparing this data (structuring) and analyzing it. Thus, on the Internet, recommendation systems, machine translation, and other Artificial Intelligence systems are based on Data Science techniques. DATA SCIENTIST. The data scientist, as his name indicates, is an expert in Data Science (Data Science). His work focuses on extracting knowledge from large volumes of data (Big Data) extracted from various sources and multiple formats to answer the questions that arise. DEEP LEARNING is a technique within machine learning based on neural architectures. A deep learning-based model can learn to perform classification tasks directly from images, text, sound, etc. Without the need for human intervention for feature selection, this can be considered the main feature and advantage of deep learning, called “feature discovery.” They can also have a precision that surpasses the human being. GEO MARKETING. The joint analysis of demographic, economic, and geographic data enables market studies to make marketing strategies profitable. The analysis of this type of data can be carried out through Geo marketing. As its name indicates, Geo marketing is a confluence between geography and marketing. It is an integrated information system -data of various kinds-, statistical methods, and graphic representations aimed at providing answers to marketing questions quickly and easily. ARTIFICIAL INTELLIGENCE. In computing, these are programs or bots designed to perform certain operations that are considered typical of human intelligence. It is about making them as intelligent as humans. The idea is that they perceive their environment and act based on it, focused on self-learning, and being able to react to new situations. ELECTION INTELLIGENCE. This new term, "Electoral Intelligence (IE)," is the adaptation of mathematical models and Artificial Intelligence to the peculiarities of an electoral campaign. The objective of this intelligence is to obtain a competitive advantage in electoral processes. Do you know how it works? INTERNET OF THINGS (IoT). This concept, the Internet of Things, was created by Kevin Ashton and refers to the ecosystem in which everyday objects are interconnected through the Internet. MACHINE LEARNING (Machine Learning). This term refers to the creation of systems through Artificial Intelligence, where what really learns is an algorithm, which monitors the data with the intention of being able to predict future behavior. WEB MINING. Web mining aims to discover useful information or knowledge (KNOWLEDGE) from the web hyperlink structure, page content, and user data. Although Web mining uses many data mining techniques, it is not merely an application of traditional data mining techniques due to the heterogeneity and semi-structured or unstructured nature of web data. Web mining or web mining comprises a series of techniques aimed at obtaining intelligence from data from the web. Although the techniques used have their roots in data mining or data mining techniques, they present their own characteristics due to the particularities that web pages present. OPEN DATA. Open Data is a practice that intends to have some types of data freely available to everyone, without restrictions of copyright, patents, or other mechanisms. Its objective is that this data can be freely consulted, redistributed, and reused by anyone, always respecting the privacy and security of the information. NATURAL LANGUAGE PROCESSING (NLP). From the joint processing of computational science and applied linguistics, Natural Language Processing (PLN or NLP in English) is born, whose objective is none other than to make possible the compression and processing aided by a computer of information expressed in human language, or what is the same, make communication between people and machines possible. PRODUCT MATCHING. Product Matching is an area belonging to Data Matching or Record Linkage in charge of automatically identifying those offers, products, or entities in general that appear on the web from various sources, apparently in a different and independent way, but that refers to the same actual entity. In other words, the Product Matching process consists of relating to different sources those products that are the same. Conclusion Today there are numerous data science and AI tools to process massive amounts of data. And this offers many opportunities: performing predictive and advanced maintenance, product development, machine learning, data mining, and improving operational efficiency and customer experience. View more...Understanding and Resolving a Common ErrorAggregated on: 2023-03-06 17:59:52 If you have ever encountered the ERR_SSL_VERSION_OR_CIPHER_MISMATCH error, you may have been puzzled by what it means and how to fix it. In this post, we will explain what causes this error and provide some tips on how to resolve it. What Is the ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error? The ERR_SSL_VERSION_OR_CIPHER_MISMATCH error is a common error that occurs when there is an issue with the SSL/TLS configuration of a client connecting to a server. When a client attempts to connect to a server over HTTPS, the two parties negotiate an SSL/TLS protocol and cipher suite to use for the connection. If the client and server cannot agree on a common protocol and cipher suite, the ERR_SSL_VERSION_OR_CIPHER_MISMATCH error may occur. View more...Paginating JOINs via jOOQ and DENSE_RANK()Aggregated on: 2023-03-06 17:44:52 Working With DENSE_RANK() DENSE_RANK() is a window function that assigns a rank to each row within a partition or result set with no gaps in ranking values. A simple example is shown here: Let's assume that we want to rank employees (EMPLOYEE) in offices (OFFICE) by their salary (EMPLOYEE.SALARY). Expressing this via jOOQ and DENSE_RANK() can be done as follows: View more...DevOps Automation Tools for SaaS CompaniesAggregated on: 2023-03-06 17:44:52 As DevOps has become mainstream now, it is time for businesses to stop thinking about what DevOps is and start leveraging the amazing benefits offered by DevOps automation tools. DevOps is a methodology that integrates development and operations teams to seamlessly collaborate throughout the product development lifecycle. While it started with Dev and Ops, the functionality is not limited to these two departments anymore. Based on your project requirements and niche, you can create cross-functional teams composed of members from development, design, testing, QA, security, business, etc. DevOps not only transforms business operations but also brings a culture change across the organization. View more...Java Bytecode: Journey to the Wonderland (Part 3)Aggregated on: 2023-03-06 16:44:52 Our previous article unpacked bytecode further and discussed ConstantPool. Today, I'll go through several resources for working with it now. Java bytecode is the Java Virtual Machine's (JVM) intermediate representation of Java code. While Java bytecode is not meant to be human-readable, it may be edited and manipulated for several reasons. This article examines the tools and methods used to change and work with Java bytecode. View more...An Overview of the Top 10 Programming Languages Used in the WorldAggregated on: 2023-03-06 14:59:52 Programming languages have become an integral part of modern technology and have allowed humans to automate and create complex systems that were once impossible. With the increasing demand for software development, it has become crucial to choose the right programming language for a particular project. In this article, we will take a look at the top ten programming languages used in the world. 1. Java Java has been at the top of the list for several years and is still considered the most popular programming language in the world. Developed in the mid-1990s by Sun Microsystems, it is now owned by Oracle Corporation. Java is a highly versatile language that can be used for developing mobile applications, web applications, desktop applications, and even for building large-scale enterprise applications. View more...The Future of Machine Learning: Trends to Watch in 2023Aggregated on: 2023-03-06 13:59:52 Machine learning has rapidly transformed the world of technology, and its impact can be felt across various industries and applications. As we look toward the future, it's clear that machine learning will continue to play an increasingly important role in shaping our world. In 2023, we can expect to see several new trends emerge in the field of machine learning that will have a significant impact on businesses, industries, and society as a whole. From explainable AI to federated learning and human-in-the-loop machine learning, the latest developments in machine learning promise to be both exciting and transformative. In this blog post, we'll explore some of the key trends to watch in the field of machine learning as we head toward 2023 and discuss the potential impact that these trends may have on the future of technology. Here are the most important statistics regarding machine learning in the business world: View more...How to Use End-to-End Encryption to Implement AuthenticationAggregated on: 2023-03-06 13:59:52 What is End-to-End Encryption? End-to-end encryption is a security mechanism that ensures that only the sender and intended recipient of a message can read its content. This mechanism is widely used in secure messaging applications to protect the privacy of users' communications. However, end-to-end encryption can also be used to implement authentication, which is the process of verifying a user's or system's identity. This article will discuss how to use end-to-end encryption to implement authentication. 1. Generate a Public-Private Key Pair The first step in implementing end-to-end encryption for authentication is to generate a public-private key pair for each user or system. Then, the public key is shared with other users or systems, while the private key is kept secret. View more...Test Design Guidelines for Your CI/CD PipelineAggregated on: 2023-03-06 04:14:51 When delivering software to the market faster, there is a critical need to onboard automated tests into your continuous delivery pipeline to verify the software adheres to the standards your customer expects. Your continuous delivery pipeline could also consist of many stages that should trigger these automated tests to verify defined quality gates before the software can move to the next stage and eventually into production (see Figure 1). Depending on the stage of your pipeline, your automated tests could range in complexity from unit, integration, end-to-end, and performance tests. When considering the quantity and complexity of tests, along with the possibility of having multiple stages in your pipeline, there could be many challenges when onboarding, executing, and evaluating the quality of your software before it is released. This article will describe some of these challenges. I will also provide some best practice guidelines on how your automated tests could follow a contract to help increase the delivery of your software to the market faster while maintaining quality. Following a contract helps to onboard your tests in a timely and more efficient manner. This also helps when others in your organization might need to troubleshoot issues in the pipeline. View more...Monolithic FirstAggregated on: 2023-03-06 03:29:51 In recent years, microservices architecture has become a popular buzzword in the software industry. The idea of breaking down a monolithic application into smaller, independent services that can be deployed and scaled independently sounds appealing. However, before you jump on the microservices bandwagon, there are a few things to consider. Monolithic architecture is an approach in which an entire application is built as a single, cohesive unit. It's a traditional architecture pattern that has been in use for a long time and has proven to be successful in many applications. With monolithic architecture, all the components of the application are tightly coupled, and it can be challenging to make changes to one component without affecting the others. View more...Unlocking the Power of AI in Law: The Intersection of Technology and EthicsAggregated on: 2023-03-06 03:29:51 Advances in artificial intelligence (AI) are enabling the design of increasingly powerful knowledge automation tools. According to McKinsey, this should generate an estimated annual value of between 5 and 7 trillion dollars by 2025. Among the fields concerned — law and justice. Predictive Justice The fields of law are based on mountains of texts and rules that make this automation of knowledge possible. We can think of the automated creation of reports, work contracts, sales contracts, regulations, and even laws. View more...What Is Kubernetes Dashboard and Its AlternativesAggregated on: 2023-03-05 21:29:51 What Is Kubernetes Dashboard Kubernetes provides a command line (CLI) component called “kubectl” for carrying core operations. But there are two significant hurdles to using CLI enterprise-wide The high learning curve for developers to adopt Kubernetes for deployment. Time-consuming and frustrating work for SREs and Ops team to monitor and troubleshoot multiple clusters at scale Dashboard by Kubernetes ( also known as Kubernetes Dashboard) is a web-based user interface to deploy applications into the Kubernetes cluster, monitor the health of all the resources and troubleshoot them in case of any issues. The application is helpful for DevOps, Ops, and SRE teams to manage Kubernetes resources such as Deployments, Statefulsets, Jobs, etc. One can quickly deploy an application using manifest files and update the help from the UI itself. View more...Unlock the Power of Jakarta EE With These Awesome Resources!Aggregated on: 2023-03-05 15:44:51 Jakarta EE is the open-source version of the Java EE platform, developed by the Eclipse Foundation. It is a standards-based platform for developing enterprise Java applications. It provides a set of APIs and tools to help developers build robust enterprise applications. The benefits of using Jakarta EE are numerous. It is a mature platform that provides a stable and reliable foundation for enterprise application development. Furthermore, it is an open-source platform, which means that developers can benefit from the collective knowledge and experience of the entire Java community. View more...Why You Should Consider an Eisenhower PlanAggregated on: 2023-03-05 15:44:51 Are you looking to increase your productivity and get more out of your day? An Eisenhower plan could be the answer. Named after President Dwight D. Eisenhower, this time management system is designed to differentiate tasks by importance and urgency. This allows you to focus on your most important tasks and make efficient use of your time. View more...The Evolution of Development and CodingAggregated on: 2023-03-05 04:14:51 I had the opportunity to catch up with Andi Grabner, DevOps Activist at Dynatrace during day two of Dynatrace Perform. I've know Andi for seven years and he's one of the people that has helped me understand DevOps since I began writing for DZone. We covered several topics that I'll share in a series of articles. View more...Leveraging Data Locality to Optimize Spark ApplicationsAggregated on: 2023-03-05 04:14:51 Data locality is an essential concept in distributed computing, particularly in PySpark. It refers to the ability to process data where it is stored, rather than moving the data to where the processing is done. In this article, we will explore how to take advantage of data locality in PySpark to improve the performance of big data applications. 1. Use Cluster Manager The first step in taking advantage of data locality in PySpark is to use a cluster manager that supports it, such as Apache YARN. YARN ensures that the data is processed on the same node where it is stored, reducing data movement and improving performance. View more...Sentiment Analysis Data Pipeline: What, Why, and How?Aggregated on: 2023-03-05 04:14:51 What Is Sentiment Analysis? In just 4 years, a whopping 6 billion users — that’s half of the world’s population — will be active on social media. And if you’re curious to know the time we spend on social media, it is a jaw-dropping 147 minutes daily. Any place where people spend so much time of their day is important from a business perspective. Many businesses realize this and invest heavily in analyzing data from social media. In most cases, businesses are concerned about the sentiments on social media regarding their brand. It helps them gain insights into the kind of sentiments that social media users have regarding their brand. View more...Building a Certificate Authority (CA) Server for Your Servers and Applications Free of CostAggregated on: 2023-03-04 17:14:51 In any organization, it is a best security practice to have an SSL certificate installed on servers, applications, and databases. To get an SSL certificate, the first step is to have or build a Certificate Authority (CA). SSL Certificates and CA make communication secure between client and server or application. If you do not have a CA ready internally or externally, you can not issue the certificate to any internal or external application. In that case, the risk of the application or server is at stake, as anybody can prove its identity and read critical data to harm the system. The CA is responsible for attesting to the identity of users, computers, and organizations. The CA authenticates an entity and assures the identity by issuing a digitally signed certificate. This article will focus on how to set up an internal CA for your organization. This provides better control to IT Admin over implementation and certificate life cycle management. You can use any number of SSL certificates free of cost. We will use a Windows server for it. View more...Journey to Event Driven, Part 1: Why Event-First Programming Changes EverythingAggregated on: 2023-03-04 17:14:51 Recently, all types of businesses are beginning to use automated systems to perform their functions effectively. With ever-growing and changing business requirements, there is a need for modern, robust applications that can constantly adapt to business needs. To create such applications successfully, you should choose the right architecture. One of the most efficient modern architectures is event-driven architecture. In this article, we will explain in detail how it works, the ways to implement it, and its main advantages. Why Does the Old Architecture Not Meet Modern Requirements? Modern applications are very different from those that were ten years ago. Now there are opportunities to store data in the cloud, split data storage into parts, and move data in real-time between different parts of the globe. Modern applications need to run continuously and seamlessly and be elastic, global, and cloud-based. View more...How Does SAFe Differ From LeSS?Aggregated on: 2023-03-04 16:14:51 During a practice meeting at my organization, a team member mentioned taking a class on LeSS (Large-Scale Scrum). Many questions were asked as to how LeSS differed from SAFe. I volunteered to present a comparison in a later meeting. The larger Agile community might benefit from this information as well. The below article will attempt to answer the following questions: What are the differences? Why do companies choose one over the other? How do the roles differ? How do the events differ? How do the certifications? What percentage of organizations use SAFe vs. LeSS? Does the organizational structure differ? What are the pros and cons of implementation? What is the average cost and time of education? What is the average time to fully implement? When was SAFe vs. LeSS published? Geographically, where is SAFe vs. LeSS being adopted? What Are the Differences Between SAFe and LeSS Frameworks? SAFe (Scaled Agile Framework) and LeSS (Large-Scale Scrum) are both frameworks used for scaling Agile practices to large organizations, but they have different approaches and principles. View more...Introduction to Maps in Oracle APEXAggregated on: 2023-03-04 15:14:51 Maps are a vital feature for many applications made in Oracle APEX. How to offer this functionality in your software? My name is Lech Cieślik, and I’m an experienced Oracle APEX Developer working at Pretius Low-Code. In this blog post, I’ll explain how to use the default Map Region component. I’ll also describe alternative solutions you can integrate with Oracle APEX to offer map functionality. Some of them might be better than Map Region in specific circumstances. View more...Ruby Adds Support for WebAssemblyAggregated on: 2023-03-04 04:29:50 Ruby has joined the ranks of languages capable of targeting WebAssembly with its latest 3.2 release. This seemingly minor update might be the biggest thing that has happened to the language since Rails, as it lets Ruby developers go beyond the back end. By porting their code to WebAssembly, they can run it anywhere: on the front end, on embedded devices, as serverless functions, in place of containers, or on the edge. WebAssembly has the potential to make Ruby a universal language. What Is WebAssembly? WebAssembly (commonly shortened as Wasm) is a binary low-level instruction format that runs on a virtual machine. The language was designed as an alternative to JavaScript. Its aim is to run applications on any browser at near-native speeds. Wasm can be targeted from any high-level language like C, Go, Rust, and now also Ruby. View more... |
|
|