News AggregatorUsing JSON Web Encryption (JWE)Aggregated on: 2023-01-03 15:59:14 In the previous article, we looked at signed JSON Web Tokens and how to use them for cross-service authorization. But sometimes, there are situations when you need to add sensitive information to a token that you would not want to share with other systems. Or such a token can be given to the user's device (browser, phone). In this case, the user can decode the token and get all the information from the payload. One solution to such a problem could be the use of JSON Web Encryption (JWE), the full specification of which can be found in RFC7516. View more...IoU Score and Its Variants for Deep LearningAggregated on: 2023-01-03 15:59:14 Scores and metrics in machine learning are used to evaluate the performance of a model on a given dataset. These provide a way to understand how a model is performing and also compare different models and choose the one that performs the best. In this article, we will focus on the IoU score, which stands for Intersection over Union. IoU is a widely used metric in the field of object detection, where the goal is to locate and classify objects in images or videos. We'll also identify limitations and solutions. View more...Microsoft Azure Backup ServiceAggregated on: 2023-01-03 15:29:14 Data backup and recovery from the Microsoft Azure cloud are made easy, secure, and affordable with the help of the Azure Backup service. Azure Backup is a one-click backup solution that is affordable, secure, and scalable based on your backup storage requirements. It is simple to set backup policies and safeguard a variety of enterprise workloads using the unified administration interface, including Azure Virtual Machines, SQL and SAP databases, and Azure file shares. View more...Integration Testing: Why Developers Heed Attention to ItAggregated on: 2023-01-03 14:44:14 Testing is an extremely important part of any software development process. It is an umbrella term used to refer to various stages involved in ensuring that a product performs adequately. One such stage of testing is integration testing. I and T is a term often used by software developers. It is an abbreviated form of the term integration and testing, also sometimes simply called string testing, thread testing, or integration testing. Software is made up of various modules; in this process of testing, a developer combines all the various modules of software and then tests them together. It is a vital part of any software development process because it helps understand not only how the different modules of software interact with each other but how smoothly they are able to work as a singular unit. What Is Integration Testing; Its Purpose and Its Objectives? If we had to understand what integration testing is clearly, an example of a pen would be perfect. A pen comprises three parts; its cap, its body, and its ink. All these parts are produced and manufactured separately. The quality check is also done individually for each part. However, a pen is not launched until all the parts are put together and tested as a single unit. How well a pen writes depends on how it performs when all the parts are put together and then tested as a whole. This is the process of integration testing in a nutshell. View more...A Guide to Implement Instagram-Like Filters in React NativeAggregated on: 2023-01-03 14:44:14 On Instagram, you can apply filters easily and get the desired result quickly. It has great functionality to modify photos with better output. Some clients may demand similar functionality in their custom react native applications. They required Instagram-like filters in the custom app. In context to the situation, we have created a step-by-step guide on how to integrate image editing, and filters like Instagram in react native. View more...ChatGPT vs. GPT3: The Ultimate ComparisonAggregated on: 2023-01-03 12:29:14 Introduction Language models are an essential part of natural language processing (NLP), which is a field of artificial intelligence (AI) that focuses on enabling computers to understand and generate human language. ChatGPT and GPT-3 are two popular language models that have been developed by OpenAI, a leading AI research institute. In this blog post, we will explore the features and capabilities of these two models and discuss how they differ from each other. ChatGPT A. Overview of ChatGPT ChatGPT is a state-of-the-art conversational language model that has been trained on a large amount of text data from various sources, including social media, books, and news articles. This model is capable of generating human-like responses to text input, making it suitable for tasks such as chatbots and conversational AI systems. View more...Engineering Manager: Resolving Organizational ConflictsAggregated on: 2023-01-03 02:29:13 This article is a follow-up to Engineering Manager: Resolving Intrapersonal Conflicts and Engineering Manager: Resolving Interpersonal Situations. In the previous articles, we talked about interpersonal conflicts, which are conflicts between two or more people that do not agree on topics such as what actions to take or what the priorities are. Today we will talk about organizational conflicts, common scenarios, and some tips on how to manage them in a professional environment. Organizational This conflict is associated with misalignment or disagreement between members of the organization and the organization's cultural values, strategic decisions, goals, or methodologies. Usually, this kind of conflict starts when people believe that their values, professional development, goals, or attitude are not aligned with the organization or with the management layer of their areas. View more...How Can MACH Architecture Boost Digital Transformation?Aggregated on: 2023-01-02 21:14:13 The world of technology is constantly evolving, and organizations of all sizes are looking for ways to stay competitive and drive innovation. Customer demands are changing, and so do the touchpoints. Unfortunately, being available at every touchpoint requires technology officers to invest in several technologies, which increases the complexity and cost of the organization’s technology infrastructure. View more...The Data WhispererAggregated on: 2023-01-02 20:44:13 The data whisperer is the function sitting between the business and the technologists. Bridging the gap between the builders and the users of AI and finding the proper management structure for AI governance. They are experts in using data analysis to help organizations better understand their customers and make more informed decisions. They have the ability to interpret large amounts of data and transform it into actionable insights that can inform business decisions. They are also skilled at visualizing data in ways that are easy to understand and interpret. They often work closely with marketing and sales teams to help them identify trends in customer behaviors, develop targeted campaigns, and optimize their overall performance. This is, in essence, the program manager who is very familiar with the technology enterprises landscape, with the foundational ability to understand, work with, and analyze data. View more...Installing Fedora 36 on Macbook Pro 13 Inch (Late 2011)Aggregated on: 2023-01-02 20:14:13 This weekend I decided to update my old Macbook Pro 13 inch from late 2011, with 125GB SSD and 8GB RAM. It's a machine I've taken on trips around the world and back in the day ran many a session, workshop, or demo on sharing all that developer goodness. Last time we checked, this was installed using Fedora 35, so how about an update to Fedora 36? View more...Pytest for Functional Test Automation With PythonAggregated on: 2023-01-02 20:14:13 Today’s modern businesses require faster software feature releases to produce high-quality products and to get to market quickly without sacrificing software quality. To ensure successful deployments, the accelerated release of new features or bug fixes in existing features requires rigorous end-to-end software testing. While manual testing can be used for small applications or software, large and complex applications require dedicated resources and technologies like python testing frameworks, automation testing tools, and so on to ensure optimal test coverage in less time and faster quality releases. PyTest is a testing framework that allows individuals to write test code in Python. It enables you to create simple and scalable test cases for databases, APIs, and user interfaces. PyTest is primarily used for writing API tests. It aids in the development of tests ranging from simple unit tests to complex functional tests. According to a report published by future market insights group, the global automation testing market is expected to grow at a CAGR of 14.3%, registering a market value of US$ 93.6 billion by the end of 2032. Why Choose Pytest? Selection of the right testing framework can be difficult and relies on parameters like feasibility, complexity, scalability, and features provided by a framework. PyTest is the go-to test framework for a test automation engineer with a good understanding of Python fundamentals. With the PyTest framework, you can create high-coverage unit tests, complex functional tests, and acceptance tests. Apart from being an extremely versatile framework for test automation, PyTest also has a plethora of test execution features, such as parameterizing, markers, tags, parallel execution, and dependency. View more...Adaptive Sampling in an IoT WorldAggregated on: 2023-01-02 20:14:13 The Internet of Things (IoT) is now an omnipresent network of connected devices that communicate and exchange data over the internet. These devices can be anything from industrial machinery monitoring, weather and air quality monitoring systems, and security cameras to smart thermostats and refrigerators to wearable fitness trackers. As the number of IoT devices increases, so does the volume of data they generate. A typical application of this data is to improve the performance and efficiency of the systems being monitored and gain insights into their users' behavior and preferences. However, the sheer volume makes it challenging to collect and analyze such data. Furthermore, a large volume of data can overwhelm both the communication channels and the limited amounts of power and processing on edge devices. This is where adaptive sampling techniques come into play. These techniques can reduce workload, maximize resource utilization requirements, and improve the accuracy and reliability of the data. View more...Best Practices to Create High-Performant Applications in Mule 4Aggregated on: 2023-01-02 19:44:13 In this blog, I would like to share a few best practices which can help in creating high-performant applications in Mule 4 from both Infrastructure and Coding perspectives. I will start with Best Practices from an Infrastructure standpoint (we will look at only CloudHub 1.0 as a deployment option here), then I will take you through Best Practices from a Coding standpoint (achieved via API Manager or while implementing the APIs/Applications in Anypoint Studio). View more...Microsoft Azure Virtual MachineAggregated on: 2023-01-02 19:44:13 What Is a Virtual Machine? It is a computer file known as an image that functions much like a real computer. One of the folders that contain everything is that one. Windows, Linux, and other operating systems can all run it. As a result, you have the flexibility to run several machines on a single physical computer. In addition, different operating systems are possible for various systems. The virtual hardware that each of these virtual machines offers includes CPUs, RAM, hard drives, network connections, and other similar components. View more...AI-Based Age Verification: What Role Can AI Play to Prevent Scams?Aggregated on: 2023-01-02 19:44:13 Artificial intelligence allows computers to make decisions that resemble those of humans and automates a certain task. It enables commonplace technology like age verification software, self-driving automobiles, and search engines. The technology is also used to authenticate consumer identities and prevent fraud. In March 2020, the Cam4 data breach exposed more than 10 billion data records, making it the greatest documented data leak as of August 2022. In 2013, Yahoo experienced the second-largest data breach in history. After an inquiry, the business revised its estimate, saying that three billion accounts were affected instead of the previous estimate of one billion exposed data records. View more...How to Make On-Call Work for EveryoneAggregated on: 2023-01-01 01:59:12 I never liked being on-call (slight understatement) or asking others to shoulder some of the load. Sometimes it feels like it's a penalty for being more involved and knowledgeable about our code and infrastructure. And it definitely is a big distraction from core development and innovation. But there really is no way to avoid it once you have a live product or website with paying customers. Somebody needs to be available just in case something goes wrong. View more...Leading Engineers in Uncertain Times: A Conversation with CircleCI, Blockchain.com, and Oliver WymanAggregated on: 2023-01-01 01:29:12 It's no secret this has been a difficult year for many companies in tech. The truth is, it's easy to be a leader when times are good. It's less easy in the midst of a storm. That's why we assembled a panel of some of the smartest engineering leaders we know at Interact to talk about the leadership principles that help guide an engineering organization no matter what is happening in the world. View more...An Immutable Mastodon HandleAggregated on: 2023-01-01 01:29:12 Whether Twitter crumbles remains to be seen, though some signs are telling. Whatever happens, I'm continuing to invest a bit in Mastodon. Last week, I showed how to sync one's content between Twitter and Mastodon. This week, I've set up a Mastodon handle on my domain that redirects to my profile page: I want to explain how I achieved it and the problems I'm still having. Mastodon 101 Mastodon is different from Twitter in that it's not centralized: it's a federation of Mastodon servers, run independently and connected — the Fediverse. To be precise, the Fediverse is more than Mastodon nodes, but let's not go that far. The first problem when one wants to create a Mastodon account is to choose the correct instance. My first choice was mastodon.social, but it was closed to new accounts at the time. I set my eyes on mastodon.top for no reason but that it was in the proposal list and was French. View more...Salesforce Functions With Heroku Data for RedisAggregated on: 2022-12-31 07:59:12 This article is part two of a three-part series on using Heroku Managed Data products from within a Salesforce Function. In part one, we focused on Salesforce Functions with Heroku Postgres. In part two, we’ll explore Salesforce Functions with Heroku Data for Redis. Finally, in part three, we’ll cover Salesforce Functions and Apache Kafka on Heroku. Introduction to Core Concepts What Is a Salesforce Function? A Salesforce Function is a custom piece of code used to extend your Salesforce apps or processes. The custom code can leverage the language and libraries you choose while being run in the secure environment of your Salesforce instance. View more...Jobs in Information Security (InfoSec)Aggregated on: 2022-12-31 03:44:12 Almost all of the people who respond to my #CyberMentoringMonday tweets each week say that they want to “get into InfoSec” or “become a Penetration Tester;” they rarely choose any other jobs or are more specific than that. I believe the reason for this is that they are not aware of all the different areas within the field of Information Security (InfoSec for short, and “Cyber” for those outside of our industry). I can sympathize; I was in the same position when I joined. I knew three Penetration Testers and lots of Risk Analysts and I had no clue that there were several other areas that may have interested me, or that they even existed. I knew I didn’t want to be a Risk Analyst, so I thought the only other option was pentester. Now I know that is not true at all. This article will detail several other areas within the field of Information Security in hopes that newcomers to our field can find their niche more easily. It will not be exhaustive, but I’ll do my best. Image by Henry Jiang of Oppenheimer & Co. The above image shows 8 different potential areas within the field of Information Security according to the author Henry Jiang: Governance, Risk, Career Development, User Education, Standards, Threat Intelligence, Security Architecture, and Security Operations. View more...How ChatGPT Is Revolutionizing the World of Natural Language ProcessingAggregated on: 2022-12-31 03:14:12 Natural language processing (NLP) has come a long way in recent years, and ChatGPT is playing a major role in its evolution. For those unfamiliar, ChatGPT is a chatbot platform that uses the power of artificial intelligence (AI) and machine learning (ML) to enable natural, human-like conversations with users. With ChatGPT, businesses and organizations can provide quick, accurate, and personalized responses to customer inquiries, improving the overall customer experience and streamlining operations. In this article, we'll explore how ChatGPT is revolutionizing the world of NLP, and how it's being used by businesses and organizations across various industries. We'll also delve into the benefits and limitations of ChatGPT, and discuss its potential impact on the future of NLP. View more...Myths of Application ModernizationAggregated on: 2022-12-31 03:14:12 Companies have started recognizing software as a strategic corporate asset to combat cutthroat competition. Today, modernization is no longer solely the concern of software-centric organizations. The approach also spans multiple functions, including sales, HR, and core IT, to name just a few. Here are a few myths that prevent organizations from recognizing the need to modernize their applications and hinder their growth in the long run. View more...Software Outsourcing Best Practices to FollowAggregated on: 2022-12-30 19:44:12 Lower costs, an enormous pool of talent, cutting-edge infrastructure, and easier market entry are just some of the perks that come with outsourcing software development. That's why it's no surprise that many businesses are looking to software outsourcing companies to expand their operations. But it's not smooth sailing all the way. Success in outsourcing requires a solid understanding of communication, management, and budgeting across multiple projects. This is where learning and applying software outsourcing best practices can make all the difference. View more...Learn Python with ChatGPTAggregated on: 2022-12-30 18:44:12 Prerequisite You need an OpenAI account before you can start interacting with ChatGPT. If you haven’t done so already, sign up for an account on OpenAI’s website. What Is ChatGPT? GPT (Generative Pre-training Transformer) is a type of language model developed by OpenAI that uses deep learning techniques to generate human-like text. ChatGPT is a variant of the GPT model that has been specifically trained to engage in conversation with humans. It is able to generate responses to user input by predicting the next word or phrase in a conversation based on the context of the conversation. ChatGPT is an example of a chatbot, which is a computer program designed to mimic human conversation in a chat or messaging interface. ChatGPT can be used for a variety of purposes, including entertainment, customer service, and education. View more...DevOps Best Practices for Effective Implementation in Your OrganizationAggregated on: 2022-12-30 17:44:12 Innovation in the IT sector provides an opportunity to improve people's quality of life. Keeping up with developing consumer trends and rapidly shifting customer behavior have been big issues for IT organizations throughout the world as the business has grown dramatically. "DevOps" is one of the latest developments in the IT sector. Large and medium-sized companies have already pushed the DevOps movement to reap benefits like increased productivity, low risk, easy maintenance, greater quality, cost-effectiveness, and exceptional outcomes. View more...Exploring Hazelcast With Spring BootAggregated on: 2022-12-30 17:44:12 For the use cases I am going to describe here, I have two services: courses-service and reviews-service: Courses-service provides CRUD operations for dealing with courses and instructors. Reviews-service is another CRUD operations provider for dealing with reviews for courses that are completely agnostic of courses from courses-service. Both apps are written in Kotlin using Spring Boot and other libraries. Having these two services, we are going to discuss distributed caching with Hazelcast and Spring Boot and see how we can use user code-deployment to invoke some code execution via Hazelcast on a service. View more....NET 7: Suspicious Places and Errors in the Source CodeAggregated on: 2022-12-30 17:14:12 .NET 7 has been released! It's time for us to dig into its source code and start looking for errors and strange code fragments. In this article, you'll see comments on our findings from the .NET developers. After all, they know the platform code better than anyone else. Buckle up! I analyzed the release code of .NET 7. View more...DevOps vs. SRE vs. Platform Engineer vs. Cloud Engineer; Substance or Semantics?Aggregated on: 2022-12-30 16:44:12 DevOps, as initially conceived, was more of a philosophy than a set of practices—and it certainly wasn't intended to be a job title or a role spec. Yet today, DevOps engineers, site reliability engineers, cloud engineers, and platform engineers are all in high demand—with overlapping skillsets and with recruiters peppering role descriptions with liberal sprinklings of loosely related keywords such as "CI/CD pipeline," "deployment engineering," "cloud provisioning," and "Kubernetes." When I co-founded Kubiya.ai, my investors pushed me to define my target market better. For example, was it just DevOps or also SREs, cloud and platform engineers, and other end users? View more...Kubernetes Labels: Expert Guide With 10 Best PracticesAggregated on: 2022-12-30 16:44:12 With Kubernetes labels, DevOps teams can troubleshoot issues faster, apply configuration changes en masse, and respond quickly to issues. Labels also give crucial insights into your costs, boosting your monitoring, allocation, and management capabilities. Following best practices when using labels helps you realize tremendous benefits from infrastructure visibility and efficient operations. Here’s everything you need to know about Kubernetes labels – what they are, how they work, when to use them, and the ten best practices to follow to build a solid labeling strategy. View more...Introduction to Microsoft Azure Cloud StorageAggregated on: 2022-12-30 15:44:12 Microsoft's cloud storage option for contemporary data storage scenarios is the Azure Storage platform. For a range of data objects, Azure Storage provides highly available, massively scalable, reliable, and secure cloud storage. Data items in Azure Storage are reachable via a REST API over HTTP or HTTPS from anywhere in the world. Azure Storage also provides client libraries for programmers using.NET Java, Python, JavaScript, C++, and Go to create apps or services. Azure PowerShell and Azure CLI are scripting languages developers and IT specialists can use to create data management or configuration jobs. Users can interact with Azure Storage using the Azure portal and Azure Storage Explorer. The Advantages of Azure Storage The following advantages are provided by Azure Storage services for programmers and IT specialists: View more...How To Add Three Photo Filters to Your Applications in JavaAggregated on: 2022-12-29 22:14:11 A unique image aesthetic makes a big difference in representing any personal or professional brand online. Career and hobby photographers, marketing executives, and casual social media patrons alike are in constant pursuit of easily distinguishable visual content, and this basic need to stand out from a crowd has, in turn, driven the democratization of photo editing and filtering services in the last decade or so. Nearly every social media platform you can think of (not to mention many e-commerce websites and various other casual sites where images are frequently uploaded) now incorporates some means for programmatically altering vanilla image files. These built-in services can vary greatly in complexity, ranging from simple brightness controls to gaussian blurs. With this newfound ease of access to photo filtering, classic image filtering techniques have experienced a widespread resurgence in popularity. For example, the timeless look associated with black and white images can now be hastily applied to any image upload on the fly. Through simple manipulations of brightness and contrast, the illusion of embossment can be harnessed, allowing us to effortlessly emulate a vaunted, centuries-old printing technique. Even posterization – a classic, bold aesthetic once humbly associated with the natural color limitations of early printing machines – can be instantly generated within any grid of pixels. View more...Math Behind Software and Queueing TheoryAggregated on: 2022-12-29 18:44:11 In this part of the Math Behind Software series, I will be taking a closer look at a branch of mathematics known as queueing theory and its potential applications in the world of software engineering. I will describe some basics around the queueing theory, explain the basic laws from said theory and show you the equations which can be used to estimate queue throughput. I will end with a short example of calculating service capacity with all the things explained earlier. Let’s start with a quick recap of what was described in the previous part, which can be found here. Contention and Coherency — Recap In the previous part of the series, I explained contention and coherency delay and their impact on the performance of our system. I brought up concepts like Amdahl’s Law, which is focused on measuring the impact of contention and Universal Scalability Law (Gunther’s Law) which additionally accounts for coherency delay. I described them and presented their equations. I also plotted graphs to show the difference in numbers between both Laws. View more...How To Use CSS Contain Property To Optimize BrowsersAggregated on: 2022-12-29 18:14:11 The integral part of web development is cascading style sheets, which are popularly called CSS. The library contains a long list of functions and properties that help us develop functionalities in a couple of lines rather than writing messy JS code. This may include position sticky, media queries, or setting up the aspect ratio for the web page. In my web dev experience, I always divided the functions and properties available in CSS into two partitions. One section contains easy out specific design-related items in web development, such as sticking an element to the top while the user scrolls. The other section contains better efficiency, optimization, and improvement of the development strategies according to the latest web development trends. View more...Digital Signature Implementation Using Angular 2 SignaturepadAggregated on: 2022-12-29 18:14:11 Create A New Angular Project Use the Angular CLI tool to create an Angular project. Execute the following command to create the project. ng new signaturePadProject Would you like to add Angular routing? Yes Which stylesheet format would you like to use? CSS What Is a SignaturePad? SignaturePad is used to sign a document digitally using a stylus or mouse cursor pointer. At the end of the document, there will be a box that allows the user to sign the document on a web application. After saving the document, the signature gets stored in a base64-type image. View more...Cloud Computing Trends for 2023Aggregated on: 2022-12-29 17:44:11 As we move into 2023 and beyond, every organization will eventually adopt cloud models. Existing cloud businesses will look at ways to streamline their processes for rapid growth and better business continuity. Here are my views on top cloud computing trends that organizations need to watch out for. View more...Top 5 Cucumber Best Practices for Selenium AutomationAggregated on: 2022-12-29 17:29:11 Do you know Cucumber is a great tool used to run acceptance tests using the plain-text functional descriptions with Gherkin? Behavior Driven Development strategy or BDD, as it is popularly known, is implemented using the Cucumber tool. The best part about using the Cucumber BDD framework are: View more...How DevOps Takes Advantage of AIAggregated on: 2022-12-29 16:44:11 Artificial Intelligence (AI) which encompasses Machine Learning (ML) and Deep Learning (DL), is one of the most widely adopted disruptive technologies by businesses and enterprises. The amount of data that DevOps teams need to handle has proliferated by multiples, making it increasingly difficult for teams to apply this data effectively to gain insights and address end-user concerns. The data explosion makes it difficult for teams to carry out critical and computation-intensive operations. AI can play a significant role in addressing this data explosion, thereby offloading human intervention for handling operations that demand intensive data processing. AI mimics the human brain and involves training computer systems to analyze from experience, like movie or product recommendation systems which are based on recurrent neural networks. In addition, home security and compliance systems deploy AI-based Natural Language Processing (NLP) techniques to grant authorization and access. View more...Binary Code Verification in Open Source WorldAggregated on: 2022-12-29 15:44:11 The IT industry has faced new security challenges with the growing popularity of Open Source Software (OSS). Although the challenges were always there, the number of applications based on OSS has highlighted the problem. Furthermore, as OSS stands out as the basis for many of the systems in the cloud, this increases the pressure because a bug in OSS exposes the whole ecosystem to risk. OSS, as an approach, was designed for free use, encouraging the developers' community to implement and build new applications and software based on it, as well as contributing to the code. This idea proved itself as the best functional approach in creating the code, improving it, and finding and fixing the bugs. However, at the current level of OSS implementation, the safety point seems to be lagging behind it. View more...Frontend Team Roles and Skills, Breaking the Silos and BordersAggregated on: 2022-12-28 17:44:10 About 15-20 years ago, web application developers had the knowledge and the technical skills necessary to create an application: HTML, CSS, JS, PHP/Python/ASP, Web Server Management, MySQL/Postgres (both data and service management), etc. With time the web applications became more complex with bigger requirements. New technologies, frameworks, and paradigms bounce into the development and pushed developers to specialize in some areas arising new roles from this specialization. View more...Distribution and Partitioning in Graph DatabasesAggregated on: 2022-12-28 17:44:10 What Is a Distributed System? Generally, a distributed system is a set of computer programs that work together across multiple independent servers to achieve a common goal. Those servers refer to those commodity servers instead of mainframes. The hardware for cross-server collaboration here is mostly based on Ethernet devices or higher-end RMDA devices. Why Do We Need a Distributed System? The main reason to build a distributed system is to replace the cost of expensive hardware devices with software technology and inexpensive hardware devices. Especially in most private server rooms, not public cloud or supercomputing conditions, procurement costs are an important basis for business decisions. View more...Providing Enum Consistency Between Application and DataAggregated on: 2022-12-28 17:14:10 Enum usage is a very common practice in the software world that helps write high-quality and low-maintenance code. However, enum values that are not kept in any place (Database, file, etc.) other than the code, make the monitoring and interpretation of data strictly dependent on the application code itself. The Problem Let’s consider a table like this: View more...Getting Started With CI/CD Pipeline SecurityAggregated on: 2022-12-28 17:14:10 The increasingly distributed nature of CI/CD frameworks has made organizations more vulnerable to attacks, which can range from threats to supply chains and servers to exploitations of the application code itself. In this Refcard, you'll learn about the primary focus areas of CI/CD pipeline security, review common pipeline threats and security challenges, as well as walk through seven steps to get started with securing your pipelines. View more...How to Use MQTT in JavaAggregated on: 2022-12-28 16:14:10 MQTT is an OASIS standard messaging protocol for the Internet of Things (IoT). It is designed as an extremely lightweight publish/subscribe messaging transport that is ideal for connecting remote devices with a small code footprint and minimal network bandwidth. MQTT today is used in a wide variety of industries, such as automotive, manufacturing, telecommunications, oil and gas, etc. This article introduces how to use MQTT in the Java project to realize the functions of connecting, subscribing, unsubscribing, publishing, and receiving messages between the client and the broker. View more...Load Balancing PatternAggregated on: 2022-12-28 15:14:10 Any modern website on the internet today receives thousands of hits, if not millions. Without any scalability strategy, the website is either going to crash or significantly degrade in performance—a situation we want to avoid. As a known fact, adding more powerful hardware or scaling vertically will only delay the problem. However, adding multiple servers or scaling horizontally without a well-thought-through approach may not reap the benefits to their full extent. The recipe for creating a highly scalable system in any domain is to use proven software architecture patterns. Software architecture patterns enable us to create cost-effective systems that can handle billions of requests and petabytes of data. The article describes the most basic and popular scalability pattern known as Load Balancing. The concept of Load Balancing is essential for any developer building a high-volume traffic site in the cloud. The article first introduces the Load balancer, then discusses the type of Load balancers; next is load balancing in the cloud, followed by Open-source options, and finally, a few pointers to choose load balancers. View more...How to Get Started With the Smart ParkingAggregated on: 2022-12-28 14:44:10 One of the key issues of a big city dweller is finding a parking space. Sure, you may have a big one at your home, but when a person goes out in the city, it can be an arduous task to get one space for your car. For the same reason, sometimes, people lose their jobs, face losses in business, etc. Though these issues may not seem real, the issue of parking is very real. As per stats, Americans lose close to $73 billion while looking for parking space. View more...Compliance Automated Standard Solution (COMPASS), Part 4: Topologies of Compliance Policy Administration CentersAggregated on: 2022-12-27 21:14:10 In the last post of this multi-part series, we introduced methodologies and technologies for the various compliance personas to collaboratively author compliance artifacts such as regulation catalogs, baselines, profiles, system security plans, etc. These artifacts are automatically translated as code in view of supporting regulated environments enterprise-wide continuous compliance readiness processes in an automated and scalable manner. These artifacts aim to connect the regulatory and standards’ controls with the product vendors and service providers whose products are expected to adhere to those regulations and standards. The compliance as code data model we used is the NIST Open Security Controls Assessment Language (OSCAL) compliance standard framework. Our compliance context here refers to the full spectrum of conformance from official regulatory compliance standards and laws, to internal enterprise policies and best practices for security, resiliency, and software engineering aspects. View more...Why Should I Comment My Code?Aggregated on: 2022-12-27 18:44:10 Today I want to write about why comments are so important in software development and how you can improve them. For me, the most disappointing thing about good source code is when it is insufficiently commented on. And this happens with closed code in the same way as with Open Source code. In the worst case, and this is usually the most common, the source code is not commented on at all. Especially in open-source projects, this is a disdain against the community reading your code. But even in internal software projects, I consider missing comments to be bad behaviour towards your colleagues, which should be avoided. Of course, we all know the funny answers in this context. “Good code doesn’t need any comments” or “Take a look into the source code if you don’t understand something.” Is it laziness or ignorance not to write comments? No, I believe that many developers simply do not know how to write good comments. For this reason, I would like to explain here a very simple rule on how to really improve your source code through comments. View more...How a Service Mesh Impacts Your Kubernetes CostsAggregated on: 2022-12-27 18:44:10 What Is a Kubernetes Service Mesh? A service mesh is a dedicated infrastructure layer for handling service-to-service communication in a distributed microservices architecture. It typically includes features such as service discovery, load balancing, routing, fault tolerance, and monitoring. It also provides a uniform way for services to communicate with each other. The goal of a service mesh is to reduce the complexity of managing communication between microservices and make it easier to scale and maintain a distributed system. View more...An Entity to DTOAggregated on: 2022-12-27 18:14:10 What Is DTO? Let’s start with the definition of DTO. According to Martin Fowler, DTO is: “An object that carries data between processes in order to reduce the number of method calls. When you're working with a remote interface, such as Remote Facade, each call to it is expensive. As a result, you need to reduce the number of calls... The solution is to create a Data Transfer Object that can hold all the data for the call.”So, initially, DTOs were intended to be used as a container for remote calls. In a perfect world, DTOs should not have any logic inside and be immutable. We use them only as state holders. Nowadays, many developers create DTOs to transfer data between application layers, even for in-app method calls. If we use JPA as a persistence layer, we can read an opinion that it is a bad practice to use entities in the business logic, and all entities should be immediately replaced by DTOs. We recently introduced DTO support in the JPA Buddy plugin. The plugin can create DTOs based on JPA entities produced by data access layer classes and vice versa – create entities based on POJOs. This allowed us to look at DTOs closer and see how we can use them on different occasions. For the sake of simplicity, we assume that we use Spring Data JPA to persist data and Spring Framework as the main framework in all our examples. View more...Top 7 Artificial Intelligence (AI) Technology Trends to Lookout For in 2023Aggregated on: 2022-12-27 18:14:10 Artificial Intelligence (AI) technology is making strides in almost every sector, from finance, automobile, and gaming to healthcare. From the moment individuals access e-commerce stores to shop for their favorite apparel or purchase groceries without leaving their comfort zones, its application is growing in almost every possible realm. Hence, the legacy of AI technology is closer to hitting $387.45 billion in 2022, with a projection to cross $1394.30 billion by 2029. Today, the world is experiencing a wave of AI-driven transformations in the global economy. Restaurants can curate menus based on customers' preferences, while chatbots are all set to assist users virtually without involving a human interpreter. AI technology is here to stay, setting new soon-to-be landmarks and leaving a long-staying impact worldwide. View more... |
|
|