News AggregatorUsing Salesforce Functions With Heroku PostgresAggregated on: 2022-12-20 21:14:06 This article is the first of a three-part series on utilizing Heroku Managed Data products from within a Salesforce Function. In this article, we will focus on use cases for Heroku Postgres. In parts two and three, we’ll discuss creating Salesforce Functions that use Heroku Data for Redis and Apache Kafka on Heroku. Introduction to Core Concepts What Is a Salesforce Function? A Salesforce Function is a custom piece of code used to extend your Salesforce apps or processes. The custom code can leverage the language and libraries you choose while running in the secure environment of your Salesforce instance. View more...Spring Boot Docker Best PracticesAggregated on: 2022-12-20 20:29:06 In this blog, you will learn some Docker best practices mainly focussed on Spring Boot applications. You will learn these practices by applying them to a sample application. Enjoy! 1. Introduction This blog continues where the previous blog about Docker Best Practices left off. However, this blog can be read independently from the previous one. The goal is to provide some best practices that can be applied to Dockerized Spring Boot applications. View more...Why Did We Choose Jakarta Faces for the UI of the Eclipse Starter for Jakarta EE?Aggregated on: 2022-12-20 19:44:06 After being taken care of by the Java Community Process (JCP), Java EE is now supported by the Eclipse Foundation as Jakarta EE. This means that we can focus more on open standards for governance, open-source development, and testing for compatibility. View more...EC2 Instances With SSH, WinSCP, and PuTTY [Videos]Aggregated on: 2022-12-20 18:44:06 "An Amazon EC2 instance is a virtual server in Amazon's Elastic Compute Cloud (EC2) for running applications on the Amazon Web Services (AWS) infrastructure." In this article, see a series of video tutorials that goes over how to create an EC2 instance on AWS as well as how to connect EC2 instances with SSH, WinSCP, and PuTTY. View more...How To Use Hashicorp Tools To Create a Secured Edge InfrastructureAggregated on: 2022-12-20 00:14:05 This article explains how to build a secure platform using HashiCorp’s stack; many of the steps are well documented, but we missed hints to iron out the wrinkles found in the process; here, we want to show how to glue together the whole procedure. We will highlight in detail the most critical parts explaining where we found issues and how we solved them, and leave references on the official tutorials, if sufficient, to prevent this article from getting too long and difficult to follow. The Physical Architecture As shown in the picture below, the physical architecture we want to achieve is composed of a Consul and Nomad cluster of five nodes: three of them are Control Plane nodes configured for High Availability (HA), while the remaining two are Data Plane nodes. View more...Why Data Cleaning Is Failing Your ML Models – And What To Do About ItAggregated on: 2022-12-19 23:44:05 Precise endeavors must be done to exact standards in clean environments. Surgeons scrub in, rocket scientists work in clean rooms, and data scientists…well, we try our best. We’ve all heard the platitude, “garbage in, garbage out,” so we spend most of our time doing the most tedious part of the job: data cleaning. Unfortunately, no matter how hard we scrub, poor data quality is often too pervasive and invasive for a quick shower. View more...Secure Smart Contract Tools: An End-to-End Developer’s GuideAggregated on: 2022-12-19 23:44:05 No doubt — writing secure smart contracts is hard. Even smart contracts written by senior developers can get hacked. And since these smart contracts often hold a high monetary value, the incentive to hack them is also high. Add in the immutability of web3, and getting security right becomes even more important. As a smart contract developer, smart contract security should be your top priority. In this article, I will walk through several of the security tools available at each stage of smart contract development. I'll review these tools, offer some opinions, and highlight some of my personal favorites. View more...A Brief Introduction to SBOM and How to Use It With CIAggregated on: 2022-12-19 23:14:05 1. What Is BOM? BOM stands for Bill of Materials, which has been used for quite a long time by the automotive industry as a method for the supply chain management. You might have heard of the term if you are familiar with the automotive industry. Even if you are not, don’t worry. View more...UX Is Growing as an Industry DriverAggregated on: 2022-12-19 20:29:05 Ask any Gen Z or even Millennial: What makes a business stand out? And you’ll likely receive answers that touch on accessibility and relatability. Two of these factors weigh heavily on modern consumers because they want to support brands that share their ethos or values, and they also want them to be easily obtained. When you think about how people used to walk to stores and browse around with no internet references, that’s archaic behaviour because everything now is driven by technology. A simple meal is no longer just walking into a restaurant or cafe and just filling up your tummy, it’s a flurry of searches to make sure that it checks the consumer’s expectations, whether from the yummy factor to how Instagrammable it is. If you think that travel is safe from this consumer behaviour, it cannot be further from the truth. View more...How To Create Column Charts With JavaScriptAggregated on: 2022-12-19 20:29:05 With data everywhere around, we should know how to graphically represent it to better (and faster) understand what it tells us. One of the most common data visualization techniques is column charts, and I want to show you how you can easily create interactive ones using JavaScript. A column chart is a simple, yet powerful way to display data when you need to compare values. From this tutorial, you will learn to make its different variations — basic single-series, multi-series, stacked, and 100% stacked column graphs — and apply effective customizations in a few more lines of JS code. View more...Architecture and Code Design, Pt. 2: Polyglot Persistence Insights to Use Today and in the Upcoming YearsAggregated on: 2022-12-19 19:44:05 This two-part series explores from a persistence perspective topics such as application architecture, code design, framework solutions, traps, and news of the Jakarta EE world that can help you design and architect better solutions in the upcoming years. In part one, we coved how potential behaviors that can add extra processing and resource consumption to your database's integration and got up to date with news on what's out there and what's coming for Java applications that rely on relational data storage integration. View more...4 Ways CSS :Has() Can Make Your HTML Forms Even BetterAggregated on: 2022-12-19 19:44:05 There’s been a lot of hype lately around the CSS :has() pseudo-class. And rightly so! It’s basically the “parent selector” we’ve been asking for for years. Today I want to focus on ways we can use :has() to make HTML forms even better. Preface In this article I’ll be working with custom form controls that look like this: View more...How TiDB Processes DML in Data MigrationAggregated on: 2022-12-19 19:44:05 TiDB, an open-source NewSQL database, features horizontal scalability, which shelters users from the complexity of cross-shard queries and operations. However, when users migrate from a sharding solution to TiDB, the complexity is still there. The TiDB Data Migration (DM) tool supports full data migration and incremental data replication from sharding databases to TiDB. This article explains how Sync, DM’s core component, processes Data Manipulation Language (DML) statements through the binlog replication workflow. It covers how Sync reads, filters, routes, converts binlog events, and optimizes executions. View more...Event-Driven FractalsAggregated on: 2022-12-19 17:29:05 Close-up of a Romanesco broccoli Message-passing applications are one of the main components of reliable distributed systems; above all, they make it feasible to decouple the "when" and "where" of a problem from "who does it how." Event-driven applications go one step further and give you the causal chain of your system as a first-class citizen. While the difference between an event-driven system and one that’s not event-driven is pretty clear and obvious to most software engineers, there are a gazillion ways to design such a system. Each has its own trade-offs and is useful in a specific context. The one I’m going to talk about in this article is modeling applications as state machines that compose and form a fractal-like structure — as each component is an application, and composed ones are also the same kind of application. View more...Build Test Scripts for Your IoT PlatformAggregated on: 2022-12-19 17:14:05 In a previous article, I introduced the open-source test tool JMeter and used a simple HTTP test as an example to demonstrate its capabilities. This article shows you how to build test scripts for complex test scenarios. The user interface displays a JMeter test script in the "tree" format. The saved test script (in the .jmxformat) is XML. The JMeter script tree treats a test plan as the root node, and the test plan includes all test components. In the test plan, you can configure user-defined variables called by components throughout the entire test plan. Variables can also thread group behavior, library files used in the test, and so on. You can build rich test scenarios using various test components in the test plan. View more...How to Build an Android Image Feed ApplicationAggregated on: 2022-12-19 16:14:05 This tutorial will discuss how to build an Android image feed application using Amity Social Cloud. By the end of this tutorial, you will have built your own social app capable of algorithmically ranking image posts in an aggregated feed from your community. We’ll start with prerequisites for creating a new network in Amity Portal and a project in Android Studio. Then we’ll discuss how to create the Gradle setup and initialize the Social SDK. After this, we’ll go through the implementation, and finally, we'll code the components and build out the screens. View more...Engineering Manager: Resolving Interpersonal SituationsAggregated on: 2022-12-19 15:44:05 This article is a follow-up to the Engineering Manager: Resolving Conflict Situations, Part 1. In the previous article, we talked about intra-personal conflicts which are associated with people themselves. Today we will talk about interpersonal conflicts, common scenarios, and some tips on how to manage them in a professional environment. Interpersonal Interpersonal conflict is between two or more people that do not agree on topics such as what actions to take, what the priorities are, or how to resolve a situation. This kind of conflict is the most frequent and is usually the easiest to solve, but if poorly managed can generate an atmosphere of resentment between people. View more...Surviving the IncidentAggregated on: 2022-12-19 11:44:05 This is an article from DZone's 2022 Enterprise Application Security Trend Report.For more: Read the Report A wave of cyber incidents in recent years, such as the SolarWinds supply chain attack, Accellion data breach, Exchange Server, and Log4j vulnerabilities, have exposed the "fragility" of modern businesses and the challenges in information security. The outcome of a cyber event can range from a minor business operations disruption to "crippling financial and legal costs" (Alan P., GCST). Despite how increasingly sophisticated threat actors have become, the typical attack scenarios remain the same, and thus analysts and responders can adequately address these events using previous tactics. View more...The Agile Compromise Calls for CourageAggregated on: 2022-12-19 08:29:05 Life means dealing with bad things that may or may not happen. We call them risks. We assess, evaluate, mitigate, accept, and sometimes blithely ignore them. Building complex and original software are inherently risky and the Agile way of working does not fix that. That’s why we need to be true to the value of courage. I’ll start my argument with a refresher on the topic and some practical examples. The dictionary defines risks as the likelihood of bad things happening. Equally important is the nature and extent of the damage when the risk becomes a reality. The exact balance between probability and consequences is the bread and butter of actuaries at insurance companies. Their models inform them how likely it is that an average dwelling goes up in flames, so they can put a price on the collective risk of their millions of customers. Several houses are certain to burn down each year and their owners need to be reimbursed. It’s a predictable risk. View more...Building a Secure Mobile App in the CloudAggregated on: 2022-12-19 03:59:05 This is an article from DZone's 2022 Enterprise Application Security Trend Report.For more: Read the Report Building secure mobile applications is a difficult process, especially in the cloud. We must consider that mobile platforms, like iOS and Android, have completely different architectures and quality guidelines. Also, we need to take care of our cloud architecture on the back end. In this article, we will have a look at the top six security vulnerabilities, OWASP's best practices for building/testing iOS and Android applications, and guidelines for iOS and Android. Last but not least, we will explore an example of DevSecOps for mobile applications. View more...What Is Continuous Merge?Aggregated on: 2022-12-18 20:44:05 Despite the workflow improvements that have been made with CI/CD, there are huge bottlenecks found in the pull request and code review process. These bottlenecks can be removed with continuous merge, a set of processes that make pull requests easier to pick up and code reviews quicker to merge. Let's look deeper into what continuous merge is and why it's needed View more...Build Your First App with JavaScript, Node.js, and DataStax Astra DBAggregated on: 2022-12-18 18:29:05 This is the first of a three-part app development workshop series designed to help developers understand technologies like Node.js, GraphQL, React, Netlify, and JavaScript to kickstart their app development portfolio. In this post, we’ll cover the fundamental concepts of website applications and introduce DataStax Astra DB as your free, fast, always-on database based on Apache Cassandra®. In the U.S. we spend almost 88% of our mobile internet time buried in apps like Facebook, Instagram, TikTok, and games. With nearly a million new apps released each year and 218 billion app downloads in 2020, learning how to build them is an essential step in any front-end developer’s career. View more...Improve Microservices Security by Applying Zero-Trust PrinciplesAggregated on: 2022-12-18 02:29:04 This is an article from DZone's 2022 Enterprise Application Security Trend Report.For more: Read the Report According to a 2020 Gartner report, it is estimated that by 2023, 75 percent of cybersecurity incidents will result from inadequate management of identities and excessive privileges. To a large extent, this is attributable to the increased number of identities used by modern cloud infrastructures. Applications run as microservices in fully virtualized environments that consist of dynamically orchestrated clusters of multiple containers in the cloud. View more...Gumbo Podcast: Your First Steps in Cloud-Native ObservabilityAggregated on: 2022-12-17 21:29:04 Last week, I was invited to share my experiences on the Data Protection Gumbo podcast with its host Demetrius Malbrough and we had a nice chat about my journey into cloud-native observability (o11y) since joining Chronosphere. The title of episode 171 is "Your First Steps in Cloud Native Observability." We covered questions surrounding the series of articles I've been writing called the O11y Guide, which takes you along on the journey as I go from an application development background into the world of cloud-native o11y. View more...Data Visualization Using PythonAggregated on: 2022-12-17 20:59:04 This tutorial is for beginners, and it guides you through the practical process of visualizing forex data, considering the least or no knowledge of Python. Let us have an overview of the libraries and setup we will use before we begin. You can quickly manipulate the data, including converting and storing it in various forms using pandas, an open-source Python library. For convenience, we will use the Jupyter Notebook, an open-source web app for creating documents and programming different languages. This tutorial shows you how to obtain, change, and store forex data from JSON API and explores pandas, Jupyter Notebook, and DataFrame during this process. View more...Get Started On Celo With Infura RPC EndpointsAggregated on: 2022-12-17 19:29:04 Onboarding the next wave of users to Web3 is a massive undertaking that many projects in the ecosystem are building for. One project with a unique approach to this is Celo, a layer-one blockchain network. Celo gives a superior new-user experience by being a mobile-first layer-1 blockchain that is easy to use with just a mobile phone. Your phone number acts as your address rather than a complex string, and the network allows users the option to pay gas fees with other tokens than the native currency. However, the user experience is just one side of the onboarding coin. Developer experience is the other. After all, a new network is just as good as the RPCs that let you use it. Only some developers have the resources to run a node. View more...Software Supply Chain Security ChecklistAggregated on: 2022-12-17 12:59:04 This is an article from DZone's 2022 Enterprise Application Security Trend Report.For more: Read the Report Software security is a critical part of any product, but it can be a second-class consideration for many projects when time and budget pressures are applied. It is not enough to deliver working software; our deliveries must also be trustworthy and secured against known vulnerabilities. For many applications, the security of thousands or even millions of Personal Information (PI) records — and even entire company networks — rests upon the security of our applications. View more...AWS Application ComposerAggregated on: 2022-12-17 00:59:04 A couple of weeks before, in AWS re:invent, Amazon made a lot of innovative announcements, and one of the announcements was the AWS Application Composer service, which allows a user to drag and drop elements to the Canvas and quickly design and deploy serverless applications. Introduction Application Composer service is in the preview phase as this is being written. It allows you to drag and drop a list of resources to a canvas, make connections between them and provide the required configuration. It allows you to design a workflow on the front end, and in the background, it generates the necessary code and template using the Serverless Architecture Model (SAM). SAM CLI is the tool you can use to quickly deploy this template to the AWS environment. View more...ELI5: How Does a TPM Work?Aggregated on: 2022-12-17 00:29:04 We all know that passwords leave a lot to be desired. They are a hassle for everyone. Fortunately, passwordless authentication is coming. Removing passwords from the authentication equation will be a welcome sight for users and software developers. You may have heard about passkeys, a standards-based solution that leverages biometrics and other technologies to make passwords obsolete. Most of the time, passkeys will leverage some type of biometrics to authenticate you to a given website or mobile application. View more...Debugging Program Control FlowAggregated on: 2022-12-17 00:29:04 As of now, I have published the first three videos of the course and will publish the fourth tomorrow. I plan to publish two videos per week on YouTube to maximize the impact but here, I'll only blog one lesson per week to avoid oversaturation. I shot about four hours of video content and still haven’t finished the 2nd module out of eight. This course will be very detailed and intensive. I’m working on the course platform right now, making good progress, and hope to publish it soon enough here. It might already be live by the time you read this! View more...Kubernetes Remote Development in Java Using Kubernetes Maven PluginAggregated on: 2022-12-16 22:44:04 Introduction In this article, we’re going to look at some pain points while developing Java applications on top of Kubernetes. We’re going to look at newly added functionality in Eclipse JKube’s Kubernetes Maven Plugin that allows your application running on your local machine to get exposed in Kubernetes Cluster. If you haven’t heard about Eclipse JKube or Kubernetes Maven Plugin, I’d suggest you read the following DZone articles first: View more...Complex Navigation in SwiftUIAggregated on: 2022-12-16 22:14:04 Navigation in SwiftUI has been a major focus of the framework from day one; however, when we tried to create an app that had a bit more navigation and view complexity, we ran into the first problems. Given the importance of navigation within an app, it has been revised and improved. In this WWDC 22′, they have published a new API to build complex navigation flows, making development easier. View more...DevSecOps Easter EggsAggregated on: 2022-12-16 21:29:04 This is an article from DZone's 2022 Enterprise Application Security Trend Report.For more: Read the Report Security can often feel like a Sisyphean endeavor. Day after day, we roll what feels like a growing pile of rocks up the hill, building resilience from threats, internal weaknesses, resourcing challenges, hostile politics, hubris, laziness, inertia. Sifting through potentially overwhelming issues — as well as too many tools — is a steady discipline cybersecurity professionals must master. Not to mention the accumulated fatigue that can cause you to gloss over the details and daily doings. View more...How to Block API Runtime ThreatsAggregated on: 2022-12-16 21:29:04 Everyone wants to stop threats. They really do. No one wants someone to break into their home or car. Nobody wants to be accosted on the street. We all want a safe environment wherever we go. But we have to hope for the best and prepare for the worst (and prepare to be surprised!). It’s the same with apps. No business wants its web or mobile apps to be under fire. It would be great if all the criminals would either honor the purpose of the apps and just leave them be, or simply not notice. View more...Light DOM and Lightning Web Components in SalesforceAggregated on: 2022-12-16 20:44:04 Lightning Web Components (LWC) from Salesforce are based on standard Web Components built using HTML and JavaScript. They are lightweight, easy to build, and perform well in modern browsers. When building LWCs, you’ll become familiar with the concept of composition: piecing together simple building-block components within the body of a more complex component. Regarding composition, LWC leverages the Shadow Document Object Model (DOM) web standard, which encapsulates the internal structure of a Web Component and makes it inaccessible to code and components outside of the component. The alternative to this approach is Light DOM, which Salesforce makes available in beta. View more...Securing Your Containers—Top 3 ChallengesAggregated on: 2022-12-16 20:14:04 A cost-effective and less sophisticated alternative to Virtual Machines (Containers) have revolutionized the application delivery approach. They have dramatically reduced the intake of IT labor and resources in managing application infrastructure. Yet, while securing containers and containerized ecosystems, software teams are met with many roadblocks. Especially for enterprise teams accustomed to more traditional network security processes and strategies. We’ve usually preached that containers offer better security because they isolate the application from the host system and each other. Somewhere we have made it sound like they’re inherently secure and almost impenetrable to threats. But how far-fetched is this idea? Let’s dive right into it. Let’s get a high-level view of what the market looks like. According to Business wire, the global Container Security Market size is projected to reach $3.9 billion by 2027, that’s a 23.5% CAGR. View more...How To Build a DAO With TruffleAggregated on: 2022-12-16 19:44:04 Since Satoshi Nakomoto introduced Bitcoin and the blockchain in his seminal 2009 whitepaper, the number of innovations brought to life has been staggering. Today, we have cryptocurrencies, NFTs, and other digital assets that can be created, owned and transferred without intermediaries. However, perhaps one of the most significant advancements achieved by blockchain and smart contracts is governance and the future of work. The aforementioned technologies make decentralized autonomous organizations, also referred to as DAOs possible. View more...DZone Community Awards 2022Aggregated on: 2022-12-16 18:44:04 Dear DZone Community, This year has seen a lot of changes for the DZone team. Some of them were hard, but overall, we are ending the year on a very high note with a ton of potential heading into 2023 and beyond. View more...DynamoDB Go SDK: How To Use the Scan and Batch Operations EfficientlyAggregated on: 2022-12-16 15:59:04 The DynamoDB Scan API accesses every item in a table (or secondary index). It is the equivalent of a select * from query. One of the things I will cover in this blog is how to use Scan API with the DynamoDB Go SDK. To scan a table, we need some data to begin with! So in the process, I will also go into how to use the Batch API to write bulk data in DynamoDB. You can use the BatchWriteItem API to create or delete items in batches (of twenty-five) and it's possible to you can combine these operations across multiple tables. View more...Architecture and Code Design, Pt. 1: Relational Persistence Insights to Use Today and On the Upcoming YearsAggregated on: 2022-12-16 09:29:03 This two-part series explores from a persistence perspective topics such as application architecture, code design, framework solutions, traps, and news of the Jakarta EE world that can help you design and architect better solutions in the upcoming years. In part one (this article), we'll understand how potential behaviors that can add extra processing and resource consumption to your databases integration and get up to date with news on what's out there and what's coming for Java applications that rely on relational data storage integration. View more...Cybersecurity Compliance: The Regulations You Need to FollowAggregated on: 2022-12-16 08:44:03 Abiding by compliance is the most straightforward and influential way to boost cybersecurity among countless strategies. Numerous security frameworks exist to guide different sectors with varying objectives in their unique digital environments to protect against cyber threats and secure personal information. What does each compliance framework offer, and do you need all of them to stay safe in technological spaces? View more...Apache Ranger and AWS EMR Automated Installation and Integration Series (5): Windows AD + Open-Source RangerAggregated on: 2022-12-16 01:29:03 Hopefully you have enjoyed the previous four articles in this series. In the last article of this series, we will introduce the last high applicability scenario: “Windows AD + Open-Source Ranger.” 1. Windows AD + Open-Source Ranger Solution Overview 1.1 Solution Architecture View more...What a DevOps Test Toolchain Is and Why It Matters for Your Mobile App DevelopmentAggregated on: 2022-12-16 00:29:03 The digital experience is now primary to our everyday lives. Our recent consumer report, Every Experience Matters, dove into quality and how it affects consumer behavior. We know, for example, that 20% of users will abandon a brand after encountering even one error on a mobile app. At the user level, everything comes down to customer experience. To meet these customer expectations for constant value delivery, companies have to continuously develop software and deliver hundreds or even thousands of releases every year. View more...Key Characteristics of Web 3.0 Every User Must KnowAggregated on: 2022-12-15 20:44:03 Web 3.0 is indeed the future version of the present-day Internet which will be purely based on public blockchains. Public blockchains refer to a record-keeping system known for carrying out crypto transactions. Unlike its predecessors, the key feature of Web 3.0 is its decentralized mechanism, translating to users using the Internet via services governed by major tech players, individuals, and users. The users will also get the privilege of controlling various parts of the Internet. Web 3.0 doesn't necessarily demand any form of "permissions," meaning that the governing bodies have no role to play in deciding the Internet service accessibility, nor is any "trust" required. Hence no intermediatory body is not necessary to carry out virtual transactions amongst different involved parties. Since these online agencies are involved in most of the data collection part, Web 3.0 will protect user privacy in a better manner. Decentralized Finance, or DeFi, is an integral component of Web 3.0 and has gained significant traction recently. It involves executing real-world financial transactions over blockchain technology without any assistance from banks or the government. Also, larger enterprises across different industries are now investing in Web 3.0, and this hasn't been easy to consider that their engagement won't be driving results in some centralized authority form. View more...Why DevSecOps Automation Is Important for Your BusinessAggregated on: 2022-12-15 19:29:03 DevOps has dramatically changed the way IT businesses operate and innovate. It enabled them to develop and deliver products at a speed and scale. Amid this paradigm shift, the business realized that the traditional "bolt-on" security techniques and manual controls that are reliant on legacy practices are not keeping pace with high-velocity, continuous delivery software development. Indeed, in the DevOps ecosystem, the security aspect was tackled by a separate security team and quality assurance teams at the end of the software development cycle (as an afterthought), which created an unacceptable bottleneck. And DevSecOps seeks to solve this security conundrum by integrating security practices and controls throughout the software development lifecycle (SDLC). DevSecOps addresses security issues as they emerge before they're pushed into production, when they're easier and less expensive to fix. Moreover, it makes the application and infrastructure security a shared responsibility of the development, security, and IT operations teams, rather than the sole responsibility of the security engineers. As security is backed into every phase of the DevOps lifecycle, the business can now build more secure, high-quality software at speed and scale. View more...Creating Self-Serve DevOps Without Creating More ToilAggregated on: 2022-12-15 19:29:03 My journey to co-founding Kubiya.ai was triggered by the very real pain of being a DevOps leader supporting both broader organizational goals along with the day-to-day support of software engineers and others. This is my story (or at least the somewhat interesting parts) of what it was like and how I found a productive approach to managing it all. DevOps Opening Hours: 2:45 p.m. until a Quarter to 3:00 p.m. It’s really not a joke. DevOps have no time. We need to make sure everything is running smoothly from development to production and often beyond. View more...Why I Switched from Ubuntu to openSUSEAggregated on: 2022-12-15 18:44:03 I've been using different flavors of Ubuntu for years, including its upstream parent, Debian, and derivatives like Linux Mint, but the more-recent additions like the Snap package tool and the flakiness of Network Manager led me to make the switch once and for all. It's been a great move. Though I have a Macbook for work, I've preferred Linux over Windows and macOS for my daily driver for the past 10 years. I do a mix of coding, writing, system testing, and a wide range of activities that make Linux fast and easy. When I need tools like VScode, bridge utilities for advanced network configurations, video-editing software, and plain old email, Linux is fast and comfortable. View more...How to Implement Geolocation Features in Apache ServerAggregated on: 2022-12-15 18:44:03 Geolocation, a technology is allowing you to find out where your visitor’s location by using an IP address, is a ubiquitous solution that has been used in many industries. For example, if you are using Google Analytics or Matomo to track your visitors, you are using the geolocation solution. If you embed a cool widget to automatically fill the country or region information, you are using the geolocation solution. To name a few. There are many reasons to implement geolocation, such as to better serve your audiences, to tailor make a better browsing experience, to monitor the buying pattern, to combat fraud, and so on. In this article, I’m going to show you how to implement the geolocation features in an Apache server and touch base on some usage scenarios. Here, I will use the IP2Location geolocation library for Apache, PHP programming language, and Debian OS. View more...7 DevOps Security Best Practices for 2022Aggregated on: 2022-12-15 18:14:03 The ability to ship software at speed has become imperative to stay competitive in today’s ever-evolving digital world. Fortunately, DevOps has enabled IT businesses to embrace speed by seamlessly collaborating with developers and operations teams and automating the processes across the software development lifecycle (SDLC). However, there’s a catch. While DevOps has indeed facilitated high-paced software delivery, the security considerations are often overlooked, which led to subpar application security. Moreover, security teams often considered security as an infrastructural component rather than an application design element. Basic practices such as firewalls that secure the borders are deemed sufficient. This approach fails utterly when applications are hosted in environments beyond enterprise infrastructure, such as the cloud, containers, or serverless computing platforms. Moreover, introducing security testing at the final phases of the software development lifecycle inherently causes friction, slowing business teams from realizing the speed and scale of unrestricted DevOps. View more...Scaling Your Compute Resources on SalesforceAggregated on: 2022-12-15 17:44:03 The Salesforce development platform offers many powerful features to provide your team with apps that can unlock new workflows. For many years, the platform has run on a trifecta of technologies: Visualforce (to view the data), Apex (to handle the data), and Salesforce itself (to store the data). Apex is like many other object-oriented languages, and it has a Java-like syntax. However, Apex runs directly on Salesforce servers, allowing developers to build and deploy an app without worrying about where to host it or how to secure their data. View more... |
|
|