News Aggregator


Your Pi-Hole Is a Rich Source of Data

Aggregated on: 2023-03-04 03:59:50

While a lot of my inspiration for blog posts come from talking with New Relic users, it's hard to share them as examples because their so specific and often confidential. So I find myself struggling more to find a generic "for instance" that's easy to understand and accessible to all everyone. Which should explain why I use my home environment as the sample use case so often. Even if you don't have exactly the same gear or setup I do, it's likely you have something analogous. On top of that, if you don't have the specific element I'm discussing, many times I believe it's something you ought to consider.

View more...

How Artificial Intelligence Is Transforming Cybersecurity

Aggregated on: 2023-03-04 03:59:50

As the use of artificial intelligence (AI) grows more widespread, it is finding its way into cybersecurity. According to research from Markets and Markets, global organizations are projected to spend $22.4 billion on AI solutions for cybersecurity this year. Usama Amin recently wrote a great article on the benefits of AI in cybersecurity. We wanted to cover some of the most specific advantages.

View more...

Java Sealed Classes: Building Robust and Secure Applications

Aggregated on: 2023-03-03 22:59:50

Java sealed classes were introduced in Java 15 as a way to restrict the inheritance hierarchy of a class or interface. A sealed class or interface restricts the set of classes that can implement or extend them, which can help prevent bugs and make code more maintainable.

View more...

Think Reactive and Native With Quarkus, Kotlin, and GraphQL

Aggregated on: 2023-03-03 21:14:50

Introduction In today’s world of software development, the terms “native” and “reactive” have gained significant popularity, becoming crucial considerations for developers, architects, and businesses alike. Regardless of whether you’re building front-end applications or back-end systems, the native and reactive approach has become a crucial component of modern software development’s non-functional requirements. This blog aims to explore the significance of these two concepts and why they have become so essential.

View more...

Building a Unified API Using GraphQL Joins

Aggregated on: 2023-03-03 20:44:50

GraphQL Joins lets developers join data from two different GraphQL services to create a unified GraphQL API without needing to write custom code or modify any underlying APIs. It enables you to quickly fetch data from across databases and other GraphQL services as if they were one schema to easily mix and match your data sources.  To create a join, you need to define the relationship between the two data sets you want to unify. Joins are typically based on a shared key between the two objects, such as an ID or name. Once the relationship is established, the query returns both data sets, allowing us to ask complex questions and receive a wealth of information in one response.

View more...

Microservices 101: Transactional Outbox and Inbox

Aggregated on: 2023-03-03 19:44:50

One of the fundamental aspects of microservice architecture is data ownership. Encapsulation of the data and logic prevents the tight coupling of services. Since they only expose information via public interfaces (like stable REST API) and hide inner implementation details of data storage, they can evolve their schema independently of one another. A microservice should be an autonomous unit that can fulfill most of its assignments with its own data. It can also ask other microservices for missing pieces of information required to complete its tasks and, optionally, store them as a denormalized copy in its storage.

View more...

Privacy-Preserving AI: What It Is and Why It Matters?

Aggregated on: 2023-03-03 16:44:50

Let's start with an example; suppose your employer uses an AI system to analyze employee data and make decisions about hiring and promotion. In that case, there's a chance it could use your race or gender as one of its criteria features for making those decisions. If this happens without your knowledge or consent, especially if you don't agree with how they're being used, then there could be legal implications for both the company and the employees. This problem has been at least partially addressed by restricting access to certain types of sensitive information like faces and gender while still allowing access through other channels such as text search terms or GPS coordinates. However, these solutions still don't fully solve all privacy concerns since there will always be ways around them. This problem has been at least partially addressed by restricting access to certain types of sensitive information like faces and gender while still allowing access through other channels such as text search terms or GPS coordinates, but these solutions still don't fully solve all privacy concerns since there will always be ways around them; someone could not take pictures without including any faces at all.

View more...

The Role of Artificial Intelligence and Machine Learning in Website Development

Aggregated on: 2023-03-03 16:14:50

Artificial intelligence (AI) and machine learning (ML) are two cutting-edge technologies that are revolutionizing the field of website development. AI refers to the ability of computers to perform tasks that typically require human intelligence, such as recognizing speech, understanding natural language, and making decisions based on data. On the other hand, ML is a subset of AI that involves training algorithms to learn from data and make predictions or decisions based on that learning. In website development, AI and ML can be used to automate repetitive tasks, optimize website elements, and improve the user experience. For example, AI-powered chatbots can provide 24/7 customer support, while ML algorithms can analyze user behavior to provide personalized content and recommendations. AI and ML can also help optimize website content for search engines, improve website security, and analyze user data to generate insights that can improve the user experience and drive conversions. 

View more...

Getting Started With Prometheus Workshop: Introduction to Prometheus

Aggregated on: 2023-03-03 16:14:50

Are you looking to get away from proprietary instrumentation? Are you interested in open-source observability but lack the knowledge to just dive right in? If so, this workshop is for you, designed to expand your knowledge and understanding of open-source observability tooling that is available to you today.

View more...

Make Your Security Policy Auditable

Aggregated on: 2023-03-03 15:14:50

Last week, I wrote about putting the right feature at the right place. I used rate limiting as an example, moving it from a library inside the application to the API Gateway. Today, I'll use another example: authentication and authorization. Securing a Spring Boot Application I'll keep using Spring Boot in the following because I'm familiar with it. The Spring Boot application offers a REST endpoint to check employees' salaries.

View more...

6 Best Habits That Would Make You a Good Developer

Aggregated on: 2023-03-03 15:14:50

Becoming a good developer requires more than just technical skills. While proficiency in programming languages and frameworks is essential, some habits and practices can help you stand out as a skilled and effective developer. Here are six habits that can make you a good developer:  1. Practice Continuously  Technology is constantly evolving, and as a developer, it's crucial to keep up with the latest trends and tools. A good developer should strongly desire to learn and constantly improve their skills. This means staying up-to-date with the latest programming languages, frameworks, and tools through reading blogs, attending conferences, and taking online courses. Continuously learning will help you stay ahead of the curve and be a valuable asset to any team.

View more...

What Is APIOps? And How to Be Successful at APIOps

Aggregated on: 2023-03-03 13:44:50

Since the first introduction of the term DevOps, it seems that new 'Ops" related terms pop up as quickly as technology trends. For example: AIOPs: Enhance and automate various IT processes with AI. MLOps: Develop, deploy, and manage machine learning. FinOps: Optimizing and managing cloud cost.  DevSecOps: Integrate security into the Software development lifecycle (SDLC). GitOps: Manage and deploy infrastructure and applications (code and configuration) using Git.  I bet the next Ops-related term will be ChatGPT-Ops ;-). Finally, an OPs term that has popped up in recent months is APIOps, but what does it mean, especially as APIs are not new and come in many different styles?

View more...

Please Pick a Number

Aggregated on: 2023-03-03 03:14:50

On Randomness in Data Picking a random number might seem to be a no-brainer for us humans. We just close our eyes and say the first number that comes to our minds. But is this really the case for computers? By design, they should be pretty predictable. With the same input data and program, the computer should always yield identical results.  Yet, randomness is very crucial in IT. For instance, random data is used to produce keys of certificates or access tokens. If the generated content could be predicted by attackers, then the application security would be compromised. 

View more...

32 Best JavaScript Snippets

Aggregated on: 2023-03-03 02:44:50

Hi there, my name is Rahul, and I am 18 years old, learning development and designing sometimes.  Today, I'd like to share some useful JavaScript code snippets I have saved that I think can help make your life as a developer easier.

View more...

Readability in the Test: Exploring the JUnitParams

Aggregated on: 2023-03-03 01:29:50

Making the test readable and maintainable is a challenge for any software engineer. Sometimes, a test scope becomes even more significant when we need to create a complex object or receive information from other points, such as a database, web service, or property file. You can use simplicity by splitting the object creation from the test scope using the JUnitParams. In this video tutorial, we'll learn how to use JUnitParams, the types, and how to simplify your tests with these techniques. The first question that might come to your mind is: "Why should I split the object from my test scope?" We'll start to enumerate some points and when this makes sense.

View more...

Build a Managed Analytics Platform for an E-Commerce Business on AWS (Part 1)

Aggregated on: 2023-03-03 00:14:50

With the increase in popularity of online shopping, building an analytics platform for e-commerce is important for any organization, as it provides insights into the business, trends, and customer behavior. But more importantly, it can uncover hidden insights that can trigger revenue-generating business decisions and actions.  In this blog, we will learn how to build a complete analytics platform in batch and real-time mode. The real-time analytics pipeline also shows how to detect distributed denial of service (DDoS) and bot attacks, which is a common requirement for such use cases.

View more...

A Simple Safety Net for Async EventHandlers

Aggregated on: 2023-03-03 00:14:50

When we discuss async EventHandlers, the first thing that comes to mind for many of us is that it’s the only exception that we seem to allow for the dreaded async void setup. When I had written about this before, I was excited that I was exploring a solution that involved actually allowing the async void to exist (without wanting to pull the rest of my hair out). For me, this was much more about some clever tricks we can use to overcome async EventHandlers than it was to provide solutions for avoiding the problem entirely. With that said, though, there was a lot of traction on the article, which I am very thankful for, and some folks expressed opinions that they’d rather solve async EventHandlers in a different way. I thought this was a great point, so I wanted to come up with an alternative approach that doesn’t fix async void, but it allows you to a-void it (see what I did there?) entirely while solving some of the challenges with async EventHandlers.

View more...

IAM Best Practices

Aggregated on: 2023-03-02 23:14:50

IAM stands for "Identity and Access Management." IAM provides answers to the fundamental question in DevOps: "Who can access what?" The roots of IAM go back to the early days of computing, where users of UNIX systems needed a username and password to access their accounts and files. As systems got more complex, grew in number, and larger pools of users needed access, identity management solutions like Lightweight Directory Access Protocol, LDAP, became increasingly popular, where a central team could manage access for multiple departments and roles.

View more...

Custom Tooltip Directives in Vue.js 3

Aggregated on: 2023-03-02 22:29:50

Custom directives in Vue.js 3 are one of those things where there is no compatibility with the previous version of the framework.  Working on the new version of the Inspector frontend dashboard I had the need to show tooltips in many different points of the application.

View more...

Mind the Gap

Aggregated on: 2023-03-02 22:29:50

Recently, I posted a tutorial on how I monitored my Raspberry-pi based "pihole" server using New Relic and Flex. Like many tutorials, what you read there is the end result, a narrative of the perfect execution of a well-conceived idea where all steps and variables are foreseen beforehand.

View more...

Running Databases on Kubernetes

Aggregated on: 2023-03-02 21:59:49

A few weeks ago, Kelsey Hightower wrote a tweet and held a live discussion on Twitter about whether it's a good idea or not to run a database on Kubernetes. This happened to be incredibly timely for me, since we at QuestDB are about to launch our own cloud database service (built on top of k8s)! "Rubbing Kubernetes on Postgres Won't Turn it Into Cloud SQL"

View more...

Microsoft Azure Service Fabric

Aggregated on: 2023-03-02 21:59:49

Introduction A distributed systems platform called Azure Service Fabric makes it simple to bundle, launch, and manage scalable and dependable microservices and containers. The considerable difficulties in creating and maintaining cloud-native apps are also addressed by Service Fabric. The high emphasis placed on developing stateful services by Service Fabric is one of its primary differentiators. You can run containerized stateful services created in any language or code using the Service Fabric programming architecture. In addition to Azure, you may create Service Fabric clusters anywhere, including on-premises Windows Server and Linux systems as well as other public clouds.

View more...

Deploying Go Applications to AWS App Runner: A Step-By-Step Guide

Aggregated on: 2023-03-02 20:29:49

In this blog post, you will learn how to run a Go application to AWS App Runner using the Go platform runtime. You will start with an existing Go application on GitHub and deploy it to AWS App Runner. The application is based on the URL shortener application (with some changes) that persists data in DynamoDB. Introduction AWS App Runner is a robust and user-friendly service that simplifies the deployment process of web applications in the AWS Cloud. It offers developers an effortless and efficient way to deploy their source code or container image directly to a scalable and secure web application without requiring them to learn new technologies or choose the appropriate compute service.

View more...

Sliding Window

Aggregated on: 2023-03-02 19:44:49

Aloha guys. We are going on about popular interview questions. Today we will solve a few problems with the sliding window approach.  Best Time To Buy and Sell Stock  Our first problem is taken from "LeetCode Algorithm Challenges: Best Time to Buy and Sell Stock."

View more...

How To Implement Video Information and Editing APIs in Java

Aggregated on: 2023-03-02 19:44:49

In the past 15+ years, online video traffic has experienced a dramatic boom utterly unmatched by any other form of content. According to data provided by Sandvine in their 2022 Global Internet Phenomena Report, video traffic accounted for 53.72% of the total volume of internet traffic in 2021, and the closest trailing category (social) came in at just 12.69%. As this report goes on to highlight, video traffic has become so pervasive that it’s now directly influencing traffic in other measurable content categories (such as on messaging, gaming, and social) where video content is frequently viewed and disseminated.   It must be said that this video traffic phenomenon primarily owes itself to modernizations in the scalability of streaming infrastructure, which simply weren’t present fifteen years ago. A proportionate level of demand for video content was (probably) always there, but the willingness to pause videos and sit through long, frustrating video buffer times certainly put a dent in that demand. Not only has near-infinitely scalable cloud storage reduced the burden of storing large video files, but CDNs (content delivery networks) deployed by video streaming and social media giants in this timeframe have all but eliminated those slow server-to-client buffering times, which initially plagued the user experience.

View more...

Is Observability Replacing Testing?

Aggregated on: 2023-03-02 19:14:49

Testing is a best-case scenario to validate the system's correctness. But, it doesn't predict the failure cases that may occur in production. Experienced engineering teams would tell you that production environments are not uniform and full of exciting deviations. The fun fact is – testing in production helps you test the code changes on live user traffic, catch the bugs early, and deliver a robust solution that increases customer satisfaction. But, it doesn't help you detect the root cause of the failure.

View more...

Learn Flask With an App Fiddle

Aggregated on: 2023-03-02 18:44:49

There is a conventional approach to learning a framework such as Flask: learn with a tutorial, then build something small, and gradually increase functionality. There are dozens to hundreds of such tutorials, and they are very helpful. Here we offer a complementary approach, one that entirely reverses the script.  Build a complete running project you can explore within a minute, then learn how to alter it, debug it - and then how to create it, literally in seconds.

View more...

How To Handle Secrets in Python

Aggregated on: 2023-03-02 18:44:49

We live in a world where applications are used to do everything, be it stock trading or booking a salon, but behind the scenes, the connectivity is done using secrets. Secrets, such as database passwords, API keys, tokens, etc., must be managed appropriately to avoid any breach. The need for managing secrets is critical for any organization. Secrets can be leaked in many ways, including through version control systems (never hardcode any secrets in your code), private messages, email, and other communication channels. If secrets are leaked, it can lead to a loss of trust, credibility, and even business. In some cases, leaked secrets can also lead to legal action. That’s why it’s so important to have a plan for managing secrets.

View more...

CloudNativeSecurityCon 2023: A Unique Community Event Focused On the Future of Open Source and Cloud Native Security

Aggregated on: 2023-03-02 18:14:49

The 2023 conference season officially kicked off on February 1st in Seattle. Over 1000 attendees, speakers, and security tool vendors gathered in Seattle for CloudNativeSecurityCon, the first stand-alone, in-person event of its kind. Over the course of 2 days and over 70 presentations, the cloud-native security community shared their knowledge about the state of open-source security. Along the way, we had some great times and conversations about SBOMs, SLSA, SCA, and the many security challenges we all face. With so much packed into the two days of the event, it would be impossible to cover it all, so here are just a few highlights.

View more...

Everything You Must Know About ChatGPT

Aggregated on: 2023-03-02 16:44:49

ChatGPT has become a global phenomenon and has brought in an era with AI-driven AI assistants. All over the world, people use ChatGPT in exciting ways to earn money, create courses, write film scripts and improve their productivity, increase their creativity, etc.

View more...

Top 4 Mobile App Development Trends to Watch for in 2023

Aggregated on: 2023-03-02 15:29:49

The world of mobile app development is changing at a rapid pace. So, in order to make successful and interesting apps, developers need to keep up with the latest trends. As we move into 2023, several emerging trends will likely shape the landscape of mobile app building. From using augmented reality and blockchain technology to the growing popularity of chatbots and voice assistants, these trends give developers exciting opportunities to make new, cutting-edge mobile apps. This article will explore the top four mobile app development trends in 2023. The Need for Mobile App Development Services Consumers spend more time on mobile apps because they find it convenient to manage their lives online. Considering this, our mobile app creation team will have to ensure that apps offer high-performing, seamless user experiences in 2023 to cater to changing client needs. Software developers and engineers can provide better mobile app solutions that meet client requests because they understand how the latest mobile app development trends can help grow your business.

View more...

A Complete Guide on How to Convert InputStream to String In Java

Aggregated on: 2023-03-02 14:59:49

Java provides a wide range of I/O classes to help developers work with different data sources and destinations. One of the most common use cases is converting an InputStream to a String. This is particularly useful when working with data streams from a network connection or reading from a file. This article will explore different ways to convert an InputStream to a String in Java. Understanding InputStream Before we dive into converting InputStream to a String, let's take a moment to understand what InputStream is. In Java, an InputStream is an abstract class representing a stream of bytes. It is a superclass of all classes representing an input stream of bytes. An InputStream can be used to read data from various sources, such as a file, a network connection, or a byte array.

View more...

Website Testing: A Detailed Guide

Aggregated on: 2023-03-02 14:29:49

Websites and web apps are growing in number day by day, and so are the expectations of people for a pleasant web experience. Even though the World Wide Web (WWW) was invented only in 1989 (32 years back), this technology revolutionized the world we know back then. The best part is that it has made life easier for us. For example, you no longer have to stand in long queues to pay your bills. You can get that done within a few minutes by visiting their website, web app, or mobile app. Building a website is also easier with endless web development frameworks in the market. Needless to say, the advent of the web has made the life we know so far simple and comfortable for us.

View more...

15 Best Practices on API Security for Developers

Aggregated on: 2023-03-02 01:59:49

APIs (Application Programming Interfaces) are used to connect software applications, allowing them to share data and functionality. APIs are an essential part of modern software development, enabling developers to create more powerful and complex applications. However, APIs can also pose a security risk if they are not properly secured. In this article, we will discuss API security and the best practices developers can use to secure their APIs. Why Should Developers Prioritize API Security? Protecting sensitive data: APIs often transmit and receive sensitive data, such as personally identifiable information (PII), payment card details, and health records. A security breach can lead to data theft, fraud, and identity theft, causing significant harm to individuals and organizations. Compliance and regulatory requirements: Many industries, such as finance, healthcare, and government, have strict regulatory requirements for data security and privacy. Developers must ensure that their APIs comply with these standards, such as GDPR, HIPAA, or PCI-DSS, to avoid legal and financial penalties. Reputation and brand image: A security breach can lead to negative publicity, loss of customer trust, and damage to the brand’s reputation. Consumers expect for their data to be secure when they use an organization’s services, and a security incident can quickly erode that trust. Financial losses: Security incidents can result in financial losses due to data theft, fraud, and legal fees. Organizations can also incur costs associated with remediation and recovery efforts. Cyber threats are on the rise: Cyber threats are evolving and becoming more sophisticated every day. Developers must stay vigilant and adopt best practices to prevent cyberattacks and data breaches. 15 Best Practices Developing secure APIs is crucial for protecting the data and resources of the API. Here is a checklist for developers that includes recommendations for securely developing APIs:

View more...

How To Parse URLs in JavaScript

Aggregated on: 2023-03-02 01:29:49

Have you ever wanted to understand how URLs work in JavaScript? If so, then you’ve come to the right place! In this article, we’ll be diving deep into the topic of URL parsing in JavaScript and understanding how to access certain data from a URL string. We’ll do so by breaking down the components of a URL into their individual parts—such as hostname, pathname, query, and hash—and taking each one for a spin.

View more...

The Unsung Heroes of Open Source: The Dedicated Maintainers Behind Lesser-Known Projects

Aggregated on: 2023-03-02 00:59:49

A few days ago, I read an article by the author of Core-js. To be honest, it was my first time hearing about Core-js. As someone who has written some front-end code and has been keeping up with open source projects, I feel a bit ashamed. However, there are many open source projects that are widely used but not well-known. In this article, I will take a closer look at a few of these unsung heroes of the open source world. I do not want to give them a business model or financial advice in this article. This largely depends on the author’s personal experience and values. I just want to raise more awareness about these open source projects.

View more...

Comparing the Top 3 Schema Management Tools

Aggregated on: 2023-03-01 23:14:49

Before deepening into the different supporting technologies, let’s create a baseline about schemas and message brokers or async server-server communication. Schema = Struct.

View more...

Getting Started With Bootstrap Testing

Aggregated on: 2023-03-01 22:29:49

“A small group of developers and I gathered to design and build a new internal tool and saw an opportunity to do more. We saw ourselves building something more substantial than another internal tool through that process. Months later, we ended up with an early version of Bootstrap to document and share common design patterns and assets within the company.” The above statement was said by Mark Otto, one of the developers of Bootstrap. Jacob Thornton, another developer, and they both worked in the Twitter organization, which is a popular social media website. However, even though we see a beautiful landscape as an end-user, the story differs for the developers responsible for building it. A website accessed by millions of people every day had to be (or needed to be) just perfect for each.

View more...

ChatGPT Will Change Content Creation for Good

Aggregated on: 2023-03-01 21:44:49

There are few recent technologies that have garnered the attention of generative AI.  According to tech investor Sequoia Capital, “Generative AI is well on the way to becoming not just faster and cheaper, but better in some cases than what humans create by hand.” Whether it’s being used for artwork, writing, or voice augmentation, the applications of generative AI are expanding beyond ‘just for fun’ to delivering real business value. We’re already seeing it take hold across industries. And it’s only the beginning of what is sure to be an exciting but challenging next generation of AI software and solutions. 

View more...

How To Solve Technical Debt: A Guide for Leaders

Aggregated on: 2023-03-01 21:14:49

Technical debt is unavoidable in the software development process. Properly managed, it can be a potent tool that can drive genuine competitive advantage, just like a financial loan. All too often, though, it gets out of hand. When we take on debts, we don’t understand the terms of, or when we don’t manage tech debt properly, there can be severe consequences. 

View more...

The Impact of AI on Telecoms Fraud Protection Strategies

Aggregated on: 2023-03-01 21:14:49

Telecoms fraud is a prevalent and ever-evolving issue that affects both business and individual customers in the telecommunications industry. It encompasses a range of fraudulent and abusive activities that can cause significant financial damage to companies and individuals alike. Ranging from well-established methods, including PBX hacking and SIMBox bypass, to newly evolving threats, such as flash calls and mobile money fraud, the tactics used by cybercriminals and fraudsters are constantly changing. Telecoms fraud is booming and costs the world $32.7 billion each year, per a joint report issued by Europol and Trend Micro. The consequences of telecoms fraud can be severe, resulting in not only financial damage but also damage to the brand reputation of telecoms companies. With the increasing use of artificial intelligence (AI) in fraud protection strategies, we set out to explore the impact of this technology on the fight against telecoms fraud.

View more...

Zero Trust Distributed Computing With WebAssembly and WasmCloud

Aggregated on: 2023-03-01 21:14:49

I recently gave a talk at CNCF Security Conference North America on the subject of zero-trust computing. In this post, I'll provide an overview of the material from that talk, discussing how zero-trust computing is supported at the module, runtime, capability, and cluster levels.  Zero Trust Distributed Computing I thought it might be a good idea to provide a recap and distillation of the material from the conference talk here. As we continue to preach, WebAssembly is far more than just another tool for building applications that run in the browser. We all firmly believe that it is a next-generation enabling technology for the cloud, the edge, and everywhere in between.

View more...

Angular vs. React: Which JS Framework Is Better?

Aggregated on: 2023-03-01 20:44:49

Where It Started: History of Angular and React Angular  AngularJS was developed by Google (by Igor Minar, a former Google employee) as an open-source framework for developing Single Page Applications (SPA).  Other companies such as Netflix, Microsoft, PayPal, and more are adopted Angular for their app. 

View more...

Login Flow With Google Identity Services and Firebase

Aggregated on: 2023-03-01 20:44:49

Most apps have some sort of authentication. For this post, we will see how this flow works using Google’s One Tap sign-in, Firebase, and Amity. The tech stack we will be using is:

View more...

Streaming-First Infrastructure for Real-Time Machine Learning

Aggregated on: 2023-03-01 19:44:49

Real-time machine learning refers to continually improving a machine learning model by feeding it actual data. A data analyst /scientist or a developer creates the model offline using a collection of the previous testing set. All sectors and industries try their best to fetch all possible benefits from machine learning, whether for cognitive research or auto-continuous processes. Consider a smart home assistant like Google Home or a smart activity tracking device, voice recognition systems such as Alexa or Siri, or automated cars. This artificial technology has advanced a lot.  Machine learning is more branched into other types, which are defined below:

View more...

Exploring Google's Open Images V7

Aggregated on: 2023-03-01 19:44:49

Open Images samples with object detection, instance segmentation, and classification labels loaded into the FiftyOne App. Image courtesy of Open Images Google’s Open Images dataset just got a major upgrade. The dataset that gave us more than one million images with detection, segmentation, classification, and visual relationship annotations has added 22.6 million point labels spanning 4171 classes.

View more...

The Future of Cybersecurity and How Artificial Intelligence Is Changing the Way

Aggregated on: 2023-03-01 19:14:49

Artificial intelligence (AI) is transforming the way we live and work in many ways, and cybersecurity is no exception. As AI becomes more and more advanced and accessible, it is changing the way we protect our systems and data against Cyber Threats. In this article, we will explore how AI is being used in cybersecurity today and how it is expected to evolve in the future. AI in Cybersecurity Currently, AI is being used in cybersecurity in various ways.

View more...

The YAML Document From Hell — JavaScript Edition

Aggregated on: 2023-03-01 19:14:49

I recently came across this blog post from Ruud van Asseldonk titled “The YAML Document From Hell.” I’ve always heard that YAML has its pitfalls, but hadn’t looked into the details and thankfully hadn’t been affected, mainly due to my very infrequent and simple use of YAML. If you are in the same boat as me, I recommend reading that article now, as I almost can’t believe I’ve avoided any issues with it. The article digs into the issues in the YAML spec itself and then describes what happens in Python’s PyYAML and Golang’s YAML library with an example file, the titular YAML document from hell. I wanted to see how things were in the JavaScript ecosystem.

View more...

DevOps for Developers — Introduction and Version Control

Aggregated on: 2023-03-01 18:44:49

I start some of my talks with a joke: back in my day, we didn’t have monitoring or observability. We’d go to the server and give it a kick. Hear the HD spin? It’s working! We didn’t have DevOps. If we were lucky, we had some admins and a technician to solve hardware issues. That’s it. In a small company, we would do all of that ourselves. Today this is no longer practical. The complexity of deployment and scale is so big it’s hard to imagine a growing company without an engineer dedicated to the operations. 

View more...

A Comprehensive Guide on How to Copy Objects in Python

Aggregated on: 2023-03-01 17:14:49

Python is a high-level, interpreted programming language that is widely used in the development of various applications. It provides rich features, including a dynamic type system, memory management, and built-in data structures. One of the core features of Python is its ability to copy objects. Copying objects in Python is a common task that developers need to perform while working on their applications. There are two types of copy operations that can be performed on objects in Python: shallow copy and deep copy.

View more...