News AggregatorData Governance Is Ineffective Without AutomationAggregated on: 2023-02-20 19:44:44 Data governance is one of the most important undertakings for businesses today. Regulations like the GDPR and CCPA require organizations to have thorough insight and control over their data, and the costs of poor-quality information keep climbing. An effective governance strategy addresses both, but creating and implementing such a program is often easier said than done. More than 90% of enterprise leaders plan data initiatives for the coming year, yet more than half report struggling to pull any business value from their information. Many of these companies realize the importance of data governance in achieving their goals, but their strategies frequently fall short. For many organizations, that's because they rely too heavily on manual processes. View more...Source Code Management for GitOps and CI/CDAggregated on: 2023-02-20 19:44:44 This is an article from DZone's 2023 DevOps Trend Report.For more: Read the Report GitOps has taken the DevOps world by storm since Weaveworks introduced the concept back in 2017. The idea is simple: use Git as the single source of truth to declaratively store and manage every component for a successful application deployment. This can include infrastructure-as-code (e.g., Terraform, etc.), policy documents (e.g., Open Policy Agent, Kyverno), configuration files, and more. Changes to these components are captured by Git commits and trigger deployments via CI/CD tools to reflect the desired state in Git. View more...Building a RESTful API With Go and GinAggregated on: 2023-02-20 19:44:44 When it comes to building an API, Go is an extremely popular programming language choice to build powerful RESTful APIs. The language is super lightweight, has many different libraries and frameworks available, and is easy to run. One of the frameworks supported by Go is Gin. Gin is a web framework written in Golang that offers great performance and scalability, amongst other features. According to the Gin website, “Gin features a Martini-like API, but with performance up to 40 times faster than Martini”. This tutorial will build a simple REST API using Go and Gin. The API endpoint will allow a user to retrieve a credit score rating. Of course, we won’t be linking up to any backend systems to pull a credit score but will instead use a random number generator to generate the score and return it to the user. Although simple, this tutorial will show you the basics of REST API development with Go and Gin. Pre-requisites Before we start, we must ensure that a couple of prerequisites are completed. To follow along and run this tutorial, you will need to: View more...Testing Challenges Related to Microservice ArchitectureAggregated on: 2023-02-20 19:44:44 If you are living in the same world as I am, you must have heard the latest coding buzzer termed “microservices”—a lifeline for developers and enterprise-scale businesses. Over the last few years, microservice architecture emerged to be on top of conventional SOA (Service Oriented Architecture). This much more precise and smaller architecture brought in many benefits. Enough to make the business more scalable in a fly-by paralleling development, testing, and maintenance across various independent teams. Considering how different this approach is from the conventional monolithic process, the testing strategies that apply are also different. With different testing strategies emerge different testing challenges. By far, everyone in the tech world is aware that microservice architecture is useful in delivering a more responsive and agile application. Some major organizations, such as Netflix, Nike, Facebook, etc., have backed their performance based on this architecture. View more...Implement In-Memory Cache in the NET Core APIAggregated on: 2023-02-20 18:44:44 Caching is very popular nowadays in the software industry because it will improve the performance and scalability of the application, as we see with many web applications like e-mail and Facebook, and how responsive they are and how great the user experience is while using them. This is because there are a lot of users using the internet. So if an application has huge network traffic and demand, we need to take care of many things that help us improve the performance and responsiveness of the application. So because of that, one of the solutions is caching, and that’s why caching comes into the picture. What Is Caching? The cache is the memory storage that is used to store the frequent access data in the temporary storage; it will improve the performance drastically, avoid unnecessary database hits, and store frequently used data into the buffer whenever we need it. View more...Deploy a Kubernetes Application With Terraform and AWS EKSAggregated on: 2023-02-20 18:14:44 When it comes to infrastructure provisioning, including the AWS EKS cluster, Terraform is the first tool that comes to mind. Learning Terraform is much easier than setting up the infrastructure manually. That said, would you rather use the traditional approach to set up the infrastructure, or would you prefer to use Terraform? More specifically, would you rather create an EKS cluster using Terraform and have Terraform Kubernetes deployment in place, or use the manual method, leaving room for human errors? As you may already know, Terraform is an open-source Infrastructure as Code (IaC) software platform that allows you to manage hundreds of cloud services using a uniform CLI approach and uses declarative configuration files to codify cloud APIs. In this article, we won’t go into all the details of Terraform. Instead, we will be focusing on Terraform Kubernetes deployment. View more...Retesting Tutorial: A Comprehensive Guide With Examples and Best PracticesAggregated on: 2023-02-20 15:44:44 Retesting is a process of validating a specific feature whose function failed during the previous test. It is done to verify whether the test cases reported with some bugs during the execution time are fixed. In the software development lifecycle, the major crucial elements are testing the software's functionality, performance, security, and other aspects, which involves checking the software for any errors. However, the major challenge is validating the software's working in line with the target audience. It is crucial to ensure the effectiveness and dependability of the developed software, and here retesting dives in as the savior. View more...Development of SaaS ApplicationsAggregated on: 2023-02-20 14:29:44 SaaS is the most popular and widely used category of cloud computing (the other two are IaaS and PaaS), offered to users and businesses who prefer a subscription software model and simple platform maintenance. In addition, SaaS is an excellent option for both experienced entrepreneurs and startup founders with ambitious goals due to its consistent revenue and secure code. Definition of a SaaS Application SaaS, or Software-as-a-Service, is a subscription-based model of delivering software and applications over the Internet without users needing to manage, install, and upgrade the software themselves. It is developing Software as a service application (e.g., Slack, Dropbox, Gmail, and Google Drive) that replaces offline software and can be accessed from any compatible device. Cloud service providers handle all aspects of a SaaS application. View more...What ChatGPT Means for Customer Support and the Role of Vector DatabasesAggregated on: 2023-02-20 13:59:44 Most organizations consider customer service an overhead while it is an opportunity. It allows you to drive continued value from the customer even after the sale. Successful businesses understand that customer service doesn't just help you retain customers but also gain more revenue. It is an underrated tool to enhance your marketing and sales efforts through referrals, testimonials, and classic word-of-mouth. However, it is critical to service customers in real-time without delays. With the emergence of AI, this requirement is rather achievable. With AI, it is possible to support your customers across their journey by assisting them on the go. Also, the possibilities could be more realistic with AI-led chatbots and machine learning (ML) capabilities like NLP and instant data analysis. Finally, with the growing adoption of vector databases, businesses can tap into unstructured data to cater to their customers. View more...Modernize and Gradually Migrate Your Data Model From SQL to NoSQLAggregated on: 2023-02-20 12:44:44 This article was authored by AWS Sr. Specialist SA Alexander Schueren and published with permission. We all like to build new systems, but there are too many business-critical systems that need to be improved. Thus, constantly evolving system architecture remains a major challenge for engineering teams. Decomposing the monolith is not a new topic. Strategies and techniques like domain-driven design and strangler patterns shaped the industry practice of modernization. NoSQL databases became popular for modernization projects. Better performance, flexible schemas, and cost-effectiveness are key reasons for adoption. They scale better and are more resilient than traditional SQL databases. Using a managed solution and reducing operational overhead is a big plus. But moving data is different: it’s messy and there are many unknowns. How do you design the schema, keep the data consistent, handle failures, or roll back? In this article, we will discuss two strategies that can help transition from SQL to NoSQL more smoothly: change data capture and dual-writes. View more...Dynatrace Perform: Day TwoAggregated on: 2023-02-20 03:29:44 The second day of Dynatrace Perform kicked off with a great discussion between Kelsey Hightower, distinguished developer advocate at Google Cloud Platform, and Andi Grabner, DevOps evangelist at Dynatrace. The theme of their discussion was redefining the boundaries of people, processes, and platforms. There were so many great insights in this discussion; I will cover it in much greater detail in a separate article. My key takeaways from their discussion: View more...A Guide to CSS Color FunctionsAggregated on: 2023-02-20 01:59:44 Hey, there fellow developers! Today, we’re going to dive into the world of CSS color functions. You might have used CSS to change the color of an element on a web page, but have you ever heard of CSS color functions? If not, tighten your seat belts because you’re about to learn something new and super useful! View more...Build an AI Chatroom With ChatGPT and ZK by Asking It How!Aggregated on: 2023-02-20 01:29:43 Recently, ChatGPT has become extremely popular. People ask ChatGPT to help them with their essays, homework, or even how they can make money. With a similar idea, I think it would be interesting to build a chatroom application by consulting with ChatGPT. To start with something simple, I plan to build a chatroom web application that allows users to input their messages and have a conversation with ChatGPT. The resulting app will look like this: View more...From Watson to ChatGPT: AI Chatbots and LimitationsAggregated on: 2023-02-20 00:14:44 The release of ChatGPT and the responses it provided brought back the Conversation AI to the forefront and made Conversation AI available to everyone through a simple web interface. We saw many creative ways to use ChatGPT and how it might impact the future and questions around whether it will replace the Google Search engine and jobs. Well, let’s address this question with the below analysis. View more...Protecting User Data in Microsoft 365: A Step-by-Step GuideAggregated on: 2023-02-20 00:14:44 Introduction Microsoft 365 is a popular productivity suite used by organizations of all sizes. While it offers a wealth of features and benefits, it also poses security challenges, especially in terms of protecting user data. With cyber threats on the rise, it's more important than ever to ensure that your Microsoft 365 user accounts and data are secure. In this article, we'll provide a step-by-step guide to help you safeguard your Microsoft 365 environment against data loss. We'll cover the threat landscape, Microsoft 365 security features, best practices for securing user accounts, and data backup solutions for Microsoft 365. With the information and recommendations provided in this guide, you'll be well-equipped to protect your organization's valuable data and ensure business continuity. Understanding the Threat Landscape Data security is a critical issue for all organizations that use Microsoft 365. With the increasing sophistication of cyber threats, it's essential to be aware of the potential risks to your user accounts and data. The following are some of the common types of data loss that organizations face in a Microsoft 365 environment: View more...TestNG Framework Tutorial: A Comprehensive GuideAggregated on: 2023-02-19 23:29:44 TestNG is a Java-based open-source test automation framework. It covers a broader range of test categories: unit, functional, end-to-end, integration, etc. This framework is quite popular among developers and testers for test creation due to its useful features like grouping, dependence, prioritization, ease of using multiple annotations, etc. Another reason for its popularity is that it helps them organize tests in a structured way and enhances the scripts' maintainability and readability. Although it is developed along the same lines as NUnit and JUnit, its advanced features make it a much more robust framework in comparison to its peers. View more...Event Streams Are Nothing Without ActionAggregated on: 2023-02-18 02:59:42 Each data point in a system that produces data on an ongoing basis corresponds to an Event. Event Streams are described as a continuous flow of events or data points. Event Streams are sometimes referred to as Data Streams within the developer community since they consist of continuous data points. Event Stream Processing refers to the action taken on generated Events. This article discusses Event Streams and Event Stream Processing in great depth, covering topics such as how Event Stream Processing works, the contrast between Event Stream Processing and Batch Processing, its benefits and use cases, and concluding with an illustrative example of Event Stream Processing. View more...Which Tool Is Better for Code Completion — Azure Data Studio or dbForge SQL Complete?Aggregated on: 2023-02-18 02:59:42 If you have SQL code completion tools, you can increase your daily productivity by about 2-4 times. With context-sensitive suggestions, advanced code formatting, and productivity tools, you can streamline your daily routine and focus on the things that really matter. View more...Are Industrial IoT Attacks Posing a Severe Threat to Businesses?Aggregated on: 2023-02-18 02:59:42 What is the Industrial Internet of Things (IIoT)? IIoT refers to using interconnected devices, sensors, and machines in industrial settings. These devices can monitor and analyze data from various systems, giving businesses real-time insights into their operations. For example, a factory might have IIoT sensors installed throughout its assembly lines. Each sensor will collect information about what's happening in that factory area, such as temperature levels or product quality. This information is then collected by a server (or “hub”) that aggregates the data from each sensor and displays it on an interactive map for easy viewing. View more...What Is the Cyber Resilience Act and Why It’s Important for Open SourceAggregated on: 2023-02-18 02:29:42 The Cyber Resilience Act (CRA) is an interesting and important proposal for a European law that aims to drive the safety and integrity of software of all kinds by extending the “CE” self-attestation mark to software. And it may harm Open Source. The proposal includes a requirement for self-certification by suppliers of software to attest conformity with the requirements of the CRA, including security, privacy, and the absence of Critical Vulnerability Events (CVEs). The Open Source Initiative has submitted the following information to the European Commission’s request for input on its proposed Cyber Resilience Act text. View more...Cypress vs. Puppeteer: A Detailed ComparisonAggregated on: 2023-02-18 02:29:42 The availability of various tools in the market has often kept you thinking about which tool is appropriate for testing the web application. It is important to test the web application to ensure that it functions as per the user’s requirement and gives a high-end user experience. End-to-end testing is an approach that is designed to ensure the functionality of the applications by automating the browsers to run the scenario of particular actions made by end users. To accomplish this, Cypress and Puppeteer have commonly used tools, and their detailed comparison is the main focus of the blog. The use of Cypress has increased in the recent year for web automation testing addressing issues faced by modern web applications. Now, Puppeteer is also widely accepted for web automation testing. This triggered debate on Cypress vs. Puppeteer. To have a piece of good information on the testing tools and Cypress vs. Puppeteer’s detailed comparison is crucial. View more...Machine Learning Is Even Disrupting the Process of Reverse Phone LookupsAggregated on: 2023-02-18 02:29:42 Machine learning technology is becoming increasingly important for many applications. According to one recent analysis, global businesses and consumers spent over $14.9 billion on machine learning technology in 2021. One of the many ways that machine learning is with reverse lookups. Murto Hilali published an interesting article in Towards Data Science on the benefits of using machine learning to handle phone lookups. View more...Beat the Machine Learning Interviews at FAANG — Part 1Aggregated on: 2023-02-18 01:59:42 Cracking a machine learning interview at companies like Facebook, Google, Netflix, Snap, etc., really comes down to nailing a few patterns that these companies look for. In this article, I plan to share my experience interviewing with these companies and also how I went about preparing. About Me I have six years of experience working as a Machine learning engineer at Meta. I have been part of two teams at Meta. I was an early ML engineer of a misinformation modeling team working on hoax classification models. After three years at misinformation, I moved to the Instagram Ads ranking team, where I’m part of the core-optimization team building and improving upon Ads ranking models across all surfaces on Instagram (Feed, Stories, Reels, etc.) View more...How To Build an Effective CI/CD PipelineAggregated on: 2023-02-18 01:29:42 This is an article from DZone's 2023 DevOps Trend Report.For more: Read the Report Continuous integration/continuous delivery (CI/CD) pipelines have become an indispensable part of releasing software, but their purpose can often be misunderstood. In many cases, CI/CD pipelines are treated as the antidote to release woes, but in actuality, they are only as effective as the underlying release process that they represent. In this article, we will take a look at a few simple steps to create an effective CI/CD pipeline, including how to capture and streamline an existing release process, and how to transform that process into a lean pipeline. View more...The Ultimate Guide What To Look Out for in Web HostingAggregated on: 2023-02-18 01:29:42 Web hosting is a service that allows individuals and organizations to make their websites accessible on the internet. When you create a website, you need a place to store all of your website's files, such as HTML, CSS, and images. Web hosting companies provide servers, which are powerful computers that are connected to the internet, where you can store and run your website's files. When you sign up for a web hosting service, you are essentially renting space on a server to host your website. Depending on the type of web hosting plan you choose, you may have access to a range of features and resources, including disk space, bandwidth, email accounts, and databases. View more...How To Make Vite Hot Module Replacement Work on WindowsAggregated on: 2023-02-18 01:29:42 As many of my followers already know, we recently started the renovation of the Inspector dashboard UI with a fresh new design and a modern technology stack. In this article, I will explain why we decided to leave Webpack and embrace Vite as assets build tool and Hot Module Replacement. I will show you how to use HMR (hot module replacement) on Windows working with a VM as a development environment. Since we use Laravel Homestead as a development machine, we struggled a bit to figure out how to properly use this new front-end development environment. View more...How To Collect and Ship Windows Events Logs With OpenTelemetryAggregated on: 2023-02-18 00:14:42 If you use Windows, you will want to monitor Windows Events. A recent contribution of a distribution of the OpenTelemetry (OTel) Collector makes it much easier to monitor Windows Events with OpenTel. You can utilize this receiver either in conjunction with any OTel collector: including the OpenTelemetry Collector. In this article, we will be using observIQ’s distribution of the collector. Below are steps to get up and running quickly with the distribution. We will be shipping Windows Event logs to a popular backend: Google Cloud Ops. You can find out more on the GitHub page here. What Signals Matter? Windows Events logs record many different operating system processes, application activity, and account activity. Some relevant log types you will want to monitor include: View more...How To Test IoT SecurityAggregated on: 2023-02-17 23:14:42 Though the Internet of Things (IoT) has redefined our lives and brought a lot of benefits, it has a large attack surface area and is not safe until it is secure. IoT devices are an easy target for cybercriminals and hackers if not properly secured. You may have serious problems with financial and confidential data being invaded, stolen, or encrypted. It is difficult to spot and discuss risks for organizations, let alone build a comprehensive methodology for dealing with them, without practical knowledge of what IoT security is and testing it. Realizing the security threats and how to avoid them is the first step, as Internet of Things solutions require significantly more testing than before. Integrated security is frequently lacking when it comes to introducing new features and products to the market. View more...Multi-Tenant Architecture for a SaaS Application on AWSAggregated on: 2023-02-17 22:14:42 SaaS applications are the new normal nowadays, and software providers are looking to transform their applications into a Software As a Service application. For this, the only solution is to build a multi-tenant architecture SaaS application. Have you ever wondered how Slack, Salesforce, AWS (Amazon Web Services), and Zendesk can serve multiple organizations? Does each one have its unique and custom cloud software per customer? For example, have you ever noticed that, on Slack, you have your own URL “yourcompanyname.slack.com?” Most people think that, in the background, they created a particular environment for each organization—application or codebase—and believe that Slack customers have their own server/app environment. If this is you, you might have assumed they have a repeatable process to run thousands of apps across all their customers. Well, no. The real solution is a multi-tenant architecture on AWS for a SaaS application. View more...A Seemingly Simple Question: What Are Design Patterns?Aggregated on: 2023-02-17 20:14:42 In the software industry, there are a range of topics you hear debates about in almost every company. I believe the design patterns story is one of them. You can find countless posts, articles, and Quora/Stackoverflow answers acting for or against them. For instance, the other day, I came across this old Quora question: “Why do programmers talk less about design patterns now? Which patterns (if any) are still valuable?” View more...Competition of the Modern Workloads: Serverless vs Kubernetes on AWS [Video]Aggregated on: 2023-02-17 19:14:42 This is a recording of breakout sessions from AWS Heroes at re:Invent 2022. Posted with permission. Both serverless and Kubernetes have benefits for your operational production environments, but how do you choose? In this video session, we will have a “battle” between the serverless and the Kubernetes approach examining use cases and insights from each speaker's experience. After an overview of each architecture and the AWS services that are a part of it like databases, queues, and more, we will compare: View more...Misconceptions About No-Code Mobile App TestingAggregated on: 2023-02-17 18:44:42 It's no secret that a No-Code Revolution is afoot, bringing with it a wide variety of new approaches and solutions that were once impossible. Some of the more visible examples of this ongoing shift are websites like Squarespace and Wix, allowing users to produce websites without any knowledge of code. Still, a wide variety of other solutions are also finding their way into the domains of specialists, including formerly tedious and complex areas like the medical industry and testing the apps we use throughout our daily lives. However, as with any fundamental shift in the technological landscape, the No-Code Revolution is sometimes met with misconceptions. Some of the criticisms I've encountered are valid—no-code is, after all, an evolving and developing technology—but others are based on the reception of older forms of the technology, and others are simple misunderstandings. View more...GKE Security: Top 10 Strategies for Securing Your ClusterAggregated on: 2023-02-17 16:44:42 Security is one of the key challenges in Kubernetes because of its configuration complexity and vulnerability. Managed container services like Google Kubernetes Engine (GKE) provide many protection features but don’t take all related responsibilities off your plate. Read on to learn more about GKE security and best practices to secure your cluster. Basic Overview of GKE Security GKE protects your workload in many layers, which include your container image, its runtime, the cluster network, and access to the cluster API server. View more...Architect Data Analytics Engine for Your Business Using AWS and ServerlessAggregated on: 2023-02-17 16:44:42 This article was authored by AWS Sr. Developer Advocate, Wojciech Gawronski, and published with permission. According to the estimates, by 2030, humans will generate an ocean of data up to 572 zettabytes, which is equal to 572 million petabytes. This poses the question: How can you prepare IT infrastructures for that without inflating infrastructure costs and spending hours on maintenance? Secondly, how can organizations start producing insights from gathered information without worrying about capacity planning, infrastructure, and operational complexities? One of the answers is by using Serverless Data Analytics in AWS Cloud. View more...Backup Vs. Disaster Recovery: What Are the Key Differences?Aggregated on: 2023-02-17 15:14:42 Backup and disaster recovery are two critical components of a comprehensive data management strategy for businesses of all sizes. However, while both terms are often used interchangeably, they refer to two distinct processes. This article will examine the key differences between backup and disaster recovery and the role each plays in protecting your organization's data. What Is Backup-as-a-Service? Backup is a critical component of a comprehensive data management strategy for businesses of all sizes. It refers to the process of copying and storing data in a secure location to ensure that it can be restored in the event of data loss due to hardware failure, accidental deletion, or other similar incidents. This is done to minimize the impact of data loss on an organization and to ensure that critical systems and processes can continue to function even in the event of data loss. The backup process typically involves creating a copy of all vital data and storing it securely, such as a secondary hard drive, a cloud storage service, or a tape backup. In addition, backups are usually performed regularly so that the most up-to-date version of data is always available for restoration. View more...Top 10 Resources for Learning SolidityAggregated on: 2023-02-17 14:44:42 If you want to become a smart contract developer on Ethereum, then you need to learn Solidity. Whether your goal is DeFi, blockchain gaming, digital collectibles (NFTs), or just web3 in general, Solidity is the foundational language behind the innovative projects on Ethereum. But where should you start? In this article, we’ll look at 10 great ways you can learn Solidity. Whether you're a beginner or an experienced web2 developer, this guide will help you not only get started with Solidity, but master it. We’ll look at all the best online courses, tutorials, documentation, and communities that can help you on your journey. View more...Shift-Left: A Developer's Pipe(line) Dream?Aggregated on: 2023-02-17 14:14:42 This is an article from DZone's 2023 DevOps Trend Report.For more: Read the Report The software development life cycle (SLDC) is broken. In fact, the implementation steps were flawed before the first project ever utilized Winston Royce's implementation steps. View more...Strategy for Combating New Threat Actors and Emerging Cyberattacks and RisksAggregated on: 2023-02-17 14:14:42 With the cyber threat landscape growing constantly and cyberattacks becoming more sophisticated, it is imperative for any organization to be well-prepared with a clear and actionable cyber defense strategy. As noted by Chuck Robbins, Chairman, and CEO at Cisco, during his keynote at the RSA Conference 2021, cybercrime caused an estimated 6 trillion USD in damage globally in 2021 (1). Furthermore, the damage caused by cybercrime globally is estimated to grow about 15% per year, reaching 10.5 USD by 2025 (2). With remote working becoming a norm during post covid-19 pandemic in many organizations, the enterprise network perimeter has shifted, and more vulnerable points have been created. The Cyber security strategy needs to adapt to emerging attacks. This article proposes a security strategy that builds upon the well-established Defense-in-Depth concept, complemented by a more recent paradigm known as Zero trust. After giving a brief overview of both concepts, we will provide more details on specific actions that, if implemented correctly, will increase your organization’s capabilities in combatting emerging cyberattacks and risks. View more...OpenTelemetry Auto-Instrumentation With JaegerAggregated on: 2023-02-17 03:59:42 In earlier days, it was easy to deduct and debug a problem in monolithic applications because there was only one service running in the back end and front end. Now, we are moving toward microservices architecture, where applications are divided into multiple independently deployable services. These services have their own goal and logic to serve. In this kind of application architecture, it becomes difficult to observe how one service depends on or affects other services. To make the system observable, some logs, metrics, or traces must be emitted from the code, and this data must be sent to an observability back end. This is where OpenTelemetry and Jaeger come into the picture. View more...What Is a Message Queue?Aggregated on: 2023-02-17 03:29:42 Implementation of messaging protocols is a fundamental communication component for modern applications. Different application components require transmitting messages while ensuring reliable and efficient communication. A good example of ensuring reliable message exchange is implementing queues. Once a message is assigned to the queue, its destination is already established. This message will always get delivered. Moreover, if the destination is busy or not connected, the queue will hold that message until the destination gets back. You require a message queueing system to implement these advanced queuing operations like message persistence, message priority, scheduled messages, time-to-live, and so on. Let's dive into and understand message queueing in detail. What Is a Message Queue? A message contains a payload of the actual data being sent or received. These messages are sent by a producer and received by a consumer. On the other side, a queue stores and manages the flow of these messages in a sequential first-in, first-out (FIFO) order until a consumer retrieves them. It holds the messages waiting to be processed. These messages will then enqueued and dequeued in the order they are received to ensure asynchronous communication between the sender and the receiver. View more...17 Open Source Projects at AWS Written in RustAggregated on: 2023-02-17 00:44:47 This article was authored by AWS Senior Software Developer Engineer, Tim McNamara, and published with permission. Lots of people have been investigating Rust recently. That raises an important question: “Is Rust actually useful for me?” While we can’t tell you whether it’s appropriate for your use case, we can share some examples of where it’s been useful for us. View more...A Beginner's Guide to Infrastructure as CodeAggregated on: 2023-02-17 00:44:47 This is an article from DZone's 2023 DevOps Trend Report.For more: Read the Report Infrastructure as Code (IaC) is the practice of provisioning and managing infrastructure using code and software development techniques. The main idea behind IaC is to eliminate the need for manual infrastructure provisioning and configuration of resources such as servers, load balancers, or databases with every deployment. As infrastructure is now an integral part of the overall software development process and is becoming more tightly coupled with application delivery, it's important that we make it easier to deliver infrastructure changes. View more...Open-Source Authorization as a ServiceAggregated on: 2023-02-17 00:44:47 Background Information The story starts back in 2007 when our founders, Omri Gazitt and Gert Drapers, were working on what would eventually become Azure Active Directory. At that time, Active Directory was a keystone workload for Windows Server. It enabled IT admins to map users and groups into the roles that enterprise apps exposed. However, when enterprise software moved to the cloud, there was no longer a server operating system that could authenticate the user and keep track of what groups they’re a member of. As a result, every cloud application was forced to reinvent both authentication and authorization. The Azure Access Control Service and Azure Active Directory were early efforts towards reimagining identity and access for the age of SaaS and cloud. View more...How To Reduce the Impact of a Cloud OutageAggregated on: 2023-02-16 23:59:42 Can you prevent a cloud outage from negatively impacting your business? It isn’t always possible to anticipate cloud outages, but there are steps you can take to minimize their impact on your team. How can you get started preparing for a cloud outage? 1. Implement a Multi-Cloud Strategy A survey by TechTarget found over 80% of organizations use a multi-cloud strategy. There are many reasons for this widespread adoption, including preventing cloud outages. Multi-cloud strategies involve diversifying cloud providers rather than relying on one. View more...Regression Testing Tutorial: Comprehensive Guide With Best PracticesAggregated on: 2023-02-16 23:29:42 Regression testing is a software testing process executed after making modifications or upgrades to a software application and re-tests the application areas that may have been affected by the fix. It can be performed manually and automatically by running a specific set of test cases. When a software product undergoes alterations in the existing features, bug fixes, and the addition of new features, regression testing aims to ensure that after these alterations, the product works as expected. View more...O11y Guide: Building Your First DashboardAggregated on: 2023-02-16 23:29:42 In this installment of the series covering my journey into the world of cloud-native observability, I'm continuing to explore an open-source dashboard and visualization project. If you missed any of the previous articles, head on back to the introduction for a quick update. After laying out the groundwork for this series in the initial article, I spent some time in the second article sharing who the observability players are. I also discussed the teams that these players are on in this world of cloud-native o11y. For the third article, I looked at the ongoing discussion around monitoring pillars versus phases. In the fourth article, I talked about keeping your options open with open-source standards. In the fifth installment in this series, I talked about bringing monolithic applications into the cloud native o11y world. In my sixth article, I provided you with an introduction to a new open-source dashboard and visualization project and shared how to install the project on your local developer machine. The seventh article explored the API and tooling provided by the Perses project. Finally, in my previous article, I covered the open dashboard specification that you need to follow to start creating your first dashboard. View more...GraphQL vs Protobuf: Differences, Similarities, and UsesAggregated on: 2023-02-16 22:44:42 Both GraphQL and Protocol Buffers (Protobuf) are types of formats for transferring data between client and server. Each has its own set of advantages and disadvantages, and are used in different contexts, depending on the specific requirements of an application. GraphQL is a query language and API runtime designed to provide a consistent and flexible way to fetch and manipulate data. It enables clients to specify the exact data required and makes it simple to evolve APIs over time without breaking existing client code. View more...Azure ObservabilityAggregated on: 2023-02-16 22:44:42 In this article, we will explore Azure Observability, the difference between monitoring and observability, its components, different patterns, and antipatterns. Azure Observability is a powerful set of services provided by Microsoft Azure that allows developers and operations teams to monitor, diagnose, and improve the performance and availability of their applications. With Azure Observability, you can gain deep insights into the performance and usage of your applications and quickly identify and resolve issues. View more...AWS Overlay IP in SAP LandscapesAggregated on: 2023-02-16 22:14:42 Overlay IP is a special case of networking in AWS, which is of critical importance in SAP environments that require High Availability setup. In this article, we will understand why Overlay IP is needed, technical details on how this works, and design patterns in SAP that utilize it. What Is Overlay IP In AWS networking, the private IP address within a VPC binds itself to a network interface of an EC2 instance for providing network connectivity. As the binding happens in a static manner and the instance lies within a zone, this creates a challenge for the high availability scenarios that are set up across zones. In such scenarios, the client applications will expect a single IP address for application connectivity; however, the same cannot be achieved with a static IP address. View more... |
|
|