News AggregatorHow to Avoid Risks Before Implementing Industrial IoT SolutionsAggregated on: 2022-11-18 03:43:47 If you are wondering about the implementation of Enterprise IoT solutions, you understand that this process is rapidly developing all over the globe. Accoring to McKinsey Digital, 127 devices hooked up to the Internet for the first time every second in 2021, and in North America alone the worth of smart factories is expected to reach $500 billion in 2022. This trend is not surprising, as EIoT implementation helps to achieve a level of worker safety that was unattainable before, as well as new business models, and, therefore, new revenue flows. Using IoT devices, you will be able to get more information about manufacturing processes, employee and client behavior, and data that will help predict breakdowns and prevent downtime of equipment. Sounds tempting? All these benefits are achievable, but they depend on the company's ability to correctly assess the risks of EIoT implementation. View more...Performance Engineering Powered by Machine LearningAggregated on: 2022-11-18 03:13:47 This is an article from DZone's 2022 Performance and Site Reliability Trend Report.For more: Read the Report Software testing is straightforward — every input => known output. However, historically, a great deal of testing has been guesswork. We create user journeys, estimate load and think time, run tests, and compare the current result with the baseline. If we don't spot regressions, the build gets a thumbs up, and we move on. If there is a regression, back it goes. Most times, we already know the output even though it needs to be better defined — less ambiguous with clear boundaries of where a regression falls. Here is where machine learning (ML) systems and predictive analytics enter: to end ambiguity. View more...Spring Modulith: Have We Reached Modularity Maturity?Aggregated on: 2022-11-18 02:13:47 One of the main reasons to design microservices is that they enforce strong module boundaries. However, the cons of microservices are so huge that it's like chopping off your right hand to learn to write with the left one; there are more manageable (and less painful!) ways to achieve the same result. Even since the microservices craze started, some cooler heads have prevailed. In particular, Oliver Drotbohm, a developer on the Spring framework, has been a long-time proponent of the moduliths alternative. The idea is to keep a monolith but design it around modules. View more...LocalStack in Action (Part 1)Aggregated on: 2022-11-18 00:43:46 Provisioning AWS resources for your applications/organization can be complex—creating the AWS infrastructures (SQS, SNS, Lambda, S3...) with a fine-grained permissions model—and then trying to integrate your infrastructure with your applications will take time until you test it to ensure the whole flow is working as expected. In this article, I will introduce you to LocalStack, a cloud service emulator that runs in a single container on your laptop or in your CI environment. With LocalStack, you can run your AWS applications or lambdas entirely on your local machine without connecting to a remote cloud provider. View more...When To Use a Graph Database?Aggregated on: 2022-11-17 23:58:46 The use of graph databases has grown massively in recent years, and they are becoming promising solutions for organizations in any industry. Their increased flexibility makes it easier to leverage relationships and connections in a way that traditional relational databases can't do. But how do you know when to use a graph database? In this article, we explore what to consider if you’re thinking of using a graph database and show how the best approach may be to not use one at all. What Is a Graph Database? A graph database is a type of database that uses graph theory as the foundation for its data model. Graph databases consider connectedness as a first-class citizen, making them better suited to represent connected data than more old-school relational databases. View more...Cloud-Native Application SecurityAggregated on: 2022-11-17 21:58:46 Enterprises are rapidly adopting cloud-native architectures and design patterns to help deliver business values faster, improve user experience, maintain a faster pace of innovation, and ensure high availability and scalability of their products. Cloud-native applications leverage modern practices like microservices architecture, containerization, DevOps, infrastructure-as-code, and automated CI/CD processes. This Refcard will walk through the critical challenges of cloud-native application security, demonstrate how to build security into the CI/CD pipeline, and introduce the core patterns and anti-patterns of cloud-native application security. View more...7 Misunderstandings About PasskeysAggregated on: 2022-11-17 20:13:46 Rightfully Resistant to Change Password management is a thing that many people feel very strongly about. Many folks don’t like passwords and hope for a better way. But other folks have a solid system built around their password security and are rightfully very skeptical of systems that claim to improve on what they have. They have good reasons for liking their current setup and are hesitant to change what works for them. That’s wise. Passkeys Enter the Picture Thus many people are skeptical of passkeys, the new protocol from the FIDO Alliance that purports to drastically improve the safety, security, and user experience of logging in to websites and mobile applications. View more...GraphQL Trade-OffsAggregated on: 2022-11-17 19:43:46 It's very easy to fall in love with technology sold by professional marketers. However, software engineering is hard because there is no one solution to fit every case. GraphQL has been a focus for a couple of years already. Before you add this nice-looking abbreviation to your resume, I would like to share summarized points and thoughts on it based on production experience. There is fresh, good material from the famous Alex Xu I would like you to watch first, so I don't need to get into details or repeat them here. View more...SecureWV Lucky13: Malware, Ransomware, and Maturity ModelsAggregated on: 2022-11-17 19:13:46 When most people think about West Virginia, the John Dever song likely springs to mind, with the timeless words "Take me home, country road." Cybersecurity was certainly not at the top of the list of topics I associated with the "Mountain State," but that has changed now that I have met the local security community at SecureWV 2022. A Lucky Th1rt3en Years This year's theme was Lucky Th1rt3en, as this was the thirteenth get-together of the region's top security experts, working diligently to keep us all safe on the internet. Anyone lucky enough to attend in person saw two full days of sessions covering multiple aspects of cybersecurity, from deep dives into ransomware, to very technical talks on how malware is built, to becoming an incident responder superstar. If you didn't get the chance to attend in person, you are still in luck, as all the sessions were recorded and will be added to the SecureWV youtube channel. View more...Linked List Popular Problems Vol. 1Aggregated on: 2022-11-17 18:43:46 Aloha guys. Today we are trying to solve three popular linked list problems: Linked List Cycle, Middle of the Linked List, and Remove Duplicates from Sorted List. Let's start with my favorite Leetcode problem. View more...Using Mdspan Class Template to Handle Multi-Dimensional Arrays in C++Aggregated on: 2022-11-17 17:13:46 Although there are 4 million C++ programmers around the world, many of them lack the mastery needed to offer the services employers need. Therefore, there is still a shortage of these valuable experts. The reason C++ programmers have such excellent job security is that the language is complex and difficult to master. As a result, demand for programmers is surging these days. C++ programmers, in particular, can find stable employment. There are many great C++ jobs if you are a skilled programmer. View more...What Are SpeedUp and ScaleUp in DBMS?Aggregated on: 2022-11-17 15:58:46 In this article, we will discuss all the SpeedUp and ScaleUp in DBMS, two of the fundamental concepts from Parallel Processing for Databases that are used for tweaking databases. Speedup Data warehouses carrying several hundred gigabytes of data are now relatively typical due to the steady increase in database sizes. Even several terabytes of data can be stored in some databases, referred to as Very Large Databases (VLDBs). View more...How Well Do Developers and Non-Developers Work Together?Aggregated on: 2022-11-17 15:58:46 Product development is (almost always) a team sport. To build a successful product, multiple stakeholders must work together during the development cycle to get things done. This includes engineers (obviously), product and project managers, designers, QA, and even the folks in marketing and sales. View more...What Is CORS?Aggregated on: 2022-11-17 13:58:46 Cross-Origin Resource Sharing (CORS) is a mechanism that supports secure requests and data transfers from outside origins (domain, scheme, or port). For example, example.com uses a text font that's hosted on fonts.com. When visiting, the user's browser will make a request for the font from fonts.com. Because fonts.com and example.com are two different origins, this is a cross-origin request. If fonts.com allows cross-origin resource sharing to example.com, then the browser will proceed with loading the font. Otherwise, the browser will cancel the request. View more...Deploy IBM App Connect Enterprise Apps From CI/CDAggregated on: 2022-11-16 23:58:46 This post is about a repository I've shared on GitHub at dalelane/app-connect-tekton-pipeline. It contains an example of how to use Tekton to create a CI/CD pipeline that builds and deploys an App Connect Enterprise application to Red Hat OpenShift. The pipeline uses the IBM App Connect Operator to easily build, deploy and manage your applications in containers. The pipeline runs on OpenShift to allow it to easily be integrated into an automated continuous delivery workflow without needing to build anything locally from a developer's workstation. View more...Ending the DevOps vs. Software Engineer Cold WarAggregated on: 2022-11-16 23:13:46 If we were that metaphorical fly on the wall, following an all too common Slack conversation between a software engineer and DevOps engineers, it might go something like this: Software Engineer: This is gonna take forever. “I need a new environment for my app.” View more...Daily 10 Tech Q&A With BalaAggregated on: 2022-11-16 19:58:46 With the growing number of cyber security threats, it is essential for everyone to know, mitigate, monitor, and prevent attacks on your apps. I have started this technology series as a small contribution to sharing the knowledge of whatever I have gone through so far. I hope my efforts will be useful to many software engineering aspirants and professionals who wish to use this information in their day-to-day work. 1. What Are the Important Aspects to Consider in Order to Secure Your Applications? Authentication and authorization ( if your authentication part is compromised, hackers can easily penetrate into a user app and do whatever they want, so it is important to safeguard your authentication mechanism to the app, API, or system. Logging: Application logs are essential and, more importantly, without which you won’t be able to identify any security incident; application-specific data is used for investigation. You should follow the best practices as much as you can to log the data. Encryption on data: There are multiple encryption algorithms that I will cover at the end of the video today; it is safe when you encrypt the data while transmitting from sender to receiver. Decryption is done at the receiver level to get the actual data. 2. Why Should You Use WAF Along With a Firewall? Firewalls are the first level of protection that permits or blocks network traffic based on IP addresses and port numbers. It can allow traffic to default ports http80 and https443. View more...PromCon EU 2022: All Things in the Prometheus CommunityAggregated on: 2022-11-16 19:28:46 For two days last week, I was on-site at the PromCon EU 2022 event in Munich, Germany. This is a very well-organized community event focused on all things in the open-source Prometheus project, including, for example, PromQL and PromLens. This article will be a bit of an overview, rather than a review of each specific talk, covering what I saw and found interesting between the common discussions and chatting that happens between talks in the hallways. Often these overlapping session starting times prohibit one from seeing everything at a conference. View more...Modular Data Centers Are Better for the EnvironmentAggregated on: 2022-11-16 16:58:46 Data centers are the secret behind robust, successful networks — and they use a lot of energy. With every day leading humans to a more developed and connected world, these data centers are becoming focal points of the sustainability conversation for the tech sector. One of the top solutions experts present is modular data centers. These centers seek to optimize operations and energy efficiency for a greener future, but is the effort to make the shift worth it? How Different Are Modular Data Centers? Data centers are responsible for 1% of the world’s electricity demand. Though this doesn’t seem like a large number, it will only increase as technological needs increase. That translates to around 200 TWh of electricity, most of which runs on fossil fuels and isn’t optimized for current internet activity. View more...Why Use the NestJS Framework?Aggregated on: 2022-11-16 16:58:46 As a front-end developer, I would like to say that the NestJs framework was the best choice to start touching the backend part of the applications. I always asked my tutor about design patterns, clean architecture, and microservices. He then showed me the link to the NestJs’s fully completed and very well-structured documentation. It was a good discovery for me to get lost on this page and learn about decorators, providers, dependency injection, testing, authentication, and more topics from different areas. What Is NestJs? First of all, what is this NestJs? It is an open-source Node.js framework for developing challenging backend systems that use the design paradigm convention over configuration that eliminates the need for explicit configuration by allowing developers to utilize common tools and code in a particular way. View more...What Is Roles-Based Access Control (RBAC)?Aggregated on: 2022-11-16 16:28:46 Role-based access control (RBAC) is a security approach that uses roles to define what a user is and isn’t allowed to do. In an RBAC system, users are assigned roles with varying permissions for different resources, including files, databases, and applications. So, when a user tries to access a resource, the system will first find the roles associated with the user and then check if any of the roles have the appropriate permission. If so, the user is allowed to access the resource. If not, the user is denied access. View more...Native Dependency Injection in SwiftAggregated on: 2022-11-16 13:13:46 In this article, we are going to go through a couple of solutions to a common problem when developing mobile applications, and this is Dependency Injection. We all saw a project that was calling singleton classes from any part of the code without any security when writing data to them, battling with race conditions, and coupling implementations to all these issues. You can also find many third-party libraries that can help to solve or at least manage these problems, but many times we don’t want or we can’t add extra dependencies; in this case, a good approach is to implement the solution that fits your needs in a basic but sufficient way and with native code.To start with this, we will go through the problem first and see what would actually help us. Let’s say we have a class called AViewModel that needs to use ServiceA; the first thing to think of is to instantiate the service in the initializer or directly inside the class like this: View more...Model Drift in Computer Vision Models: Understanding the ProblemAggregated on: 2022-11-16 12:28:46 What Is a Computer Vision Model? Computer vision (CV) is a field within artificial intelligence and machine learning (ML) that involves computer programs interpreting the meaning of image and video inputs. A computer vision algorithm can analyze specific criteria in visual data and use its interpretations to implement predictive and decision-making tasks. Modern computer vision models are highly sophisticated and cover many use cases to automate critical decision-making systems and enhance business efficiency. As a type of machine learning algorithm, computer vision models are challenging to deploy. View more...Spring Boot for Cloud: ActuatorAggregated on: 2022-11-16 02:58:45 In previous articles, we talked about some features of Spring Boot that are very useful in the development phase of our system: we described simplified dependency management and API development, for instance. In this article, we are going to cover functionalities that are related to a production environment. When a Spring Boot application is finally in production, it needs all the tools to manage and monitor it. This is especially important in complex scenarios like those related to micro-service systems. Spring Boot provides an effective solution to provide the required functionalities, the Actuator. The Actuator is a Spring Boot module with a set of features available as HTTP or JMX endpoints, or even with a remote SSH shell. View more...Spring Boot for Cloud: REST API DevelopmentAggregated on: 2022-11-16 02:58:45 There are two main ways by which microservice applications can interact with each other: REST services and messaging systems. The REST approach is the most common and will be treated in this article. We will see how Spring boot can make the development process of REST APIs fairly easy, with the use of a set of useful annotations and some implicit background behavior, like the serialization of model objects to JSON format. Another important issue is related to the documentation and sharing of APIs, and we will see that these concerns are addressed effectively with a solution named Swagger. Integrating Swagger with Spring Boot allows us to generate the documentation from the source code, as a Swagger JSON file, and even browse and manage all the exposed REST services with a web user interface. View more...Spring Boot for Cloud: Configuration and DependenciesAggregated on: 2022-11-16 02:28:45 The natural choice to implement a micro-service application in the realm of the Spring framework would be to use the Spring Cloud set of modules. But those modules cannot work without a solid platform underneath. Spring Boot sits on top of the Spring framework and is an effective base for Spring Cloud libraries (from this consideration the title of this article "Spring Boot for Cloud" makes some sense). Spring Boot has some features that can be of great help in reducing the complexity of micro-service architectures: View more...NoSQL Migration EssentialsAggregated on: 2022-11-15 20:43:45 Need help with your NoSQL migration? Look no further than our "NoSQL Migration Essentials" Refcard. We walk through the primary steps for moving out of a relational database, plus important design principles to understand and consider in your migration process. Readers will review key concepts that range from denormalizing and modeling data to defining access patterns, designing primary keys and indexes, and creating an entity relationship diagram — all demonstrated with a simple site application example. As a bonus, readers can use the included JSON structure at the end to interact with a NoSQL playground. View more...Integration Tests With Arquillian Extensions on the Payara PlatformAggregated on: 2022-11-15 20:13:45 Arquillian is one of the most classical integration test frameworks for JVM (Java Virtual Machine)-based applications, currently maintained by Red Hat. Its main particularity consists in the fact that, in order to facilitate integration testing through the maven lifecycle, it allows the deployment of the tested applications on an embedded, managed, or remote Jakarta EE-compliant container, like Payara. From Manual To Automated Integration Testing Historically speaking, the integration testing process used to be a highly manual activity, consisting of deploying the application on the application server before running the test cases. This is especially due to the utilization of building tools like maven which default lifecycle provisions the integration test phase, named verify, just before install and deploy. This means that in-container integration tests cannot be performed in an out-of-the-box manner with such tools, because they are run before the deployment phase, despite the fact that, in order to be run, they require applications to be deployed. So, we find ourselves in a kind of circular problem here: in order to test the application we need to deploy it first, and, in order to deploy it, we need to test it first. This is why integration tests were traditionally performed manually. View more...The SQL Review Tool for DevelopersAggregated on: 2022-11-15 19:43:45 Treat SQL as code ("Why?" you may ask), which means all the reasons why we review other codes need to apply to SQL scripts. They interact straight with databases, and databases are too important. No matter how database vendors promise their products are stable and robust, databases are still pretty fragile. Even if we disregard the accidental "DROP TABLE" fiasco, ordinary queries like "SELECT FROM" can also overwhelm a database and bring it down. Let’s face it: databases are delicate, yet very few users understand how to treat them properly — meaning we should discipline the users’ behavior to some degree. Here’s where SQL review comes in. It is the practice of reviewing DDL and DML statements before applying them to the database. It is one of the most critical aspects of database schema management. In the past, DBAs were in charge of the database. They know the database best and, thus, should be the ones reviewing the SQL. This is reasonable, but there is a contradiction: developers (database users) cannot understand the many restrictions and want the most freedom. At the same time, DBAs insist that stability triumphs over everything. View more...7 Easy and Effective Tips for Learning a New Programming LanguageAggregated on: 2022-11-15 19:13:45 One of the important skills that can boost your career is — coding. Whether you are looking forward to getting a good position in the tech space or just want to create an app for fun, becoming a pro in coding will be the greatest asset to your professional and personal development. View more...The Missing Link in Cybersecurity: CultureAggregated on: 2022-11-15 19:13:45 Cybersecurity culture is vital to strengthening a business’s first line of defense: Employee security practices. Most cyberattacks on businesses today target employees first. By building a supportive workplace culture that motivates employees to improve their security awareness, businesses can reduce their cyber risks. How can business leaders go about creating a cybersecurity culture on their teams? A few core principles offer a good place to start. View more...Big Data and Cloud in Vertical Farming-based IoT SolutionsAggregated on: 2022-11-15 17:58:45 Vertical farming-based IoT solutions are one of the key emerging trends in the agriculture industry today. These solutions are not only providing accurate information on plant growth statistics but also making operations more sustainable. With these solutions, farmers can track energy usage and soil composition, verify air quality, temperature and moisture levels, etc. and perform operations in a more efficient manner. In addition to processing data at rest, the real-time processing of sensor data i.e., the ability to process data collected by various sensors as it arrives, would form the major building blocks of these kinds of solutions. However, traditional data processing systems fall behind in handling real-time data, unstructured data, and scaling on demand. This is the reason why the usage of big data on the cloud in IoT-based solutions is on the rise, as it would require querying continuous data streams and detecting conditions quickly within a small interval from the time of receiving it. While big data supports data storage and structured as well as unstructured data processing, whereas cloud services are used for cost-effective scalable infrastructure. View more...Three Ways To Separate Plain Text From HTML Using JavaAggregated on: 2022-11-15 17:28:45 On each webpage we visit, we are confronted with a huge variety of multimedia content, all of which is put together and presented using Hyper Text Markup Language (HTML). HTML is a basic programming language that many developers are familiar with, composed of elements that – when interpreted by a browser – typically form a coherent, organized, and intentional display with various customized elements. This code provides the framework for how we view images, videos, bodies of writing, hyperlinks, data entry fields, and anything else you can think of on a web page – and all that code is available for anyone to view with a simple right-click on any browser. Given the immense volume of formatting elements present in any complex HTML string, the actual subject of the code - the text contents and file paths buried within those strings - can be a bit difficult to access independently of those formatting specifications. If, for example, we want to review web copy and subsequently edit or manipulate that text in a meaningful way, we’re going to have a difficult time copying and pasting that information from the displayed web page directly. We’ll just end up with a mess of inconsistently formatted text riddled with hyperlinks, logos, disjointed tabs and spaces, and more. This isn’t to say that it can’t be done. We can, of course, copy small snippets of text from any web page and reformat those snippets to resemble their original form in rich text editors like Microsoft Word. The issue is that this “point and click” approach chews up valuable time in our workday, and if we need to scale up our operation to include multiple websites and thousands of characters worth of text, we’ll be doing ourselves a big disservice in the long run by attempting to do so manually. View more...How to Build Your Exchange Server Recovery Strategy to Overcome Ransomware AttacksAggregated on: 2022-11-15 14:13:45 Ransomware attacks on on-premises Exchange Servers are quite common as they store sensitive and confidential information and business data. The attackers often exploit vulnerabilities to gain access to the organization's network and steal or encrypt data for ransom. Even if attackers do not succeed in encrypting the data, they may leave a backdoor or cause other damage that can leave your server unusable or cause permanent data loss. That's why it's important to have a disaster recovery plan or recovery strategy ready to deal with such critical situations. View more...How I Used Render To Scale My Microservices App With EaseAggregated on: 2022-11-15 12:13:45 As a software lead and feature developer, I witnessed a team learn an important lesson about resource scaling and the cloud. Spoiler alert: the lesson was that if you’re not careful, scaling can get expensive! The team felt they had no choice but to keep increasing the number of instances for a given service that was under heavy load. When they finished scaling up, the number of instances was several times larger than the number of instances that were configured by default. What they didn’t realize at the time was that—despite the load returning back to a normal state—their extra instances remained in place. View more...Scrum Tools and Practices to Enhance an Incomplete FrameworkAggregated on: 2022-11-15 05:28:45 TL; DR: Scrum Tools, Part 1 “The Scrum framework is purposefully incomplete, […].” (Source.) This half-sentence is probably one of the more often misinterpreted statements of the Scrum Guide. On the one side, it defines the necessity to enhance Scrum with other practices and tools. On the other side, it is the reason that so many attempts to practice Scrum are simply botched, resulting in ScrumBut versions of epic diversity. So, let’s look at proven Scrum tools and practices enhancing a purposefully incomplete framework without defying or negating its first principles. Please note that the following Scrum tools and practices list is not complete. Please feel free to add more suggestions by commenting. View more...GitOps Using Flux and FlaggerAggregated on: 2022-11-15 04:43:45 GitOps as a practice has been in use since 2017 when Alexis Richardson coined the term. It transformed DevOps and automation. If you look at its core principles, it extends DevOps by treating Infrastructure as Code (IaC). Your deployment configuration is stored in a version control system (a.ka. Git), providing a single source of truth for both dev and ops. As the framework’s adoption increased, GitOps became the standard for continuous deployment in the cloud native space. Many agile teams adopt GitOps because of familiarity with git-based workflow for the release management of cloud-native workloads. View more...Top 7 Less Known Angular Features Every Developer Should KnowAggregated on: 2022-11-14 21:28:45 Every developer knows that Angular is a powerful framework. However, there are some less-known features of Angular that every developer should know. Angular is a JavaScript framework that is used for building web applications. It is one of the most popular frameworks and is used by many big companies. Angular has many features that make it a great choice for web development. View more...Top 10 MLOps Platforms to Manage and Optimize Machine Learning LifecycleAggregated on: 2022-11-14 20:58:45 Businesses continue transforming their operations to increase productivity and deliver memorable consumer experiences. This digital transition accelerates timeframes for interactions, transactions, and decisions. Additionally, it generates reams of data with brand-new insights into operations, clients, and competition. Machine learning helps companies in harnessing this data to gain a competitive advantage. ML (Machine Learning) models can detect patterns in massive amounts of data, allowing them to make faster, more accurate decisions on a larger scale than humans could. This enables humans and applications to take quick and intelligent action. As more businesses experiment with data, they realize that developing a machine learning (ML) model is only one of many steps in the ML lifecycle. View more...API Authentication Using Azure AD in IBM API ConnectAggregated on: 2022-11-14 20:28:45 API authentication is necessary to secure API access from any unauthorized user. There are several ways to secure APIs. OAuth token validation is used to authenticate the user. One of the methods is to use Azure AD as an OAuth provider to secure an API invocation. The Azure AD provides an authentication token when the user sends a request to the login URL with a valid client_id and client_secret to the microsoftonline.com login. Architecture The below sequence diagram shows the design of the OAuth authentication process when Azure AD is used as an OAuth provider to authenticate REST API access implemented in IBM API Connect. View more...Run Your Executables in Azure Data FactoryAggregated on: 2022-11-14 20:28:45 When migrating SQL Server from on-premises to the cloud, there is always an ask about how to migrate SSIS packages or other ETL jobs to the cloud. Azure Data Factory SSIS Integration Runtime (IR) offers to run SSIS packages in the cloud. However, in certain circumstances, those ETL jobs or SSIS packages run executables such as .EXE as a part of a workflow or ETL pipelines. It becomes more challenging if you are migrating SQL Server running on-premises to PaaS as there is no access to PaaS compute to run those executables. View more...Establishing Kubernetes Governance StrategyAggregated on: 2022-11-14 18:58:45 Decisions in a Cloud ecosystem are decentralized and fast-paced. Governance is all about bringing consistency and repeatability, ensuring quality never gets deprioritized. Mapping out a Kubernetes governance model helps in keeping the entire organization on track. Furthermore, policies proposed in the Kubernetes governance model are not meant to be limited to security baselines of resources and deployments. View more...DDoS Attacks: A Threat to Corporate IT SecurityAggregated on: 2022-11-14 18:58:45 Next to ransomware, which has been at the heart of cybersecurity concerns in recent years, distributed denial of service (DDoS) attacks are an equally crucial cyber threat for companies. The figures speak for themselves: 5.4 million DDoS attacks were recorded worldwide in the first half of 2022. They generally aim to make a data center inaccessible. The company's website and applications are suddenly blocked until the attack stops. These attacks should not be taken lightly, and it is crucial to guard against them to protect business activity. View more...Top Cloud Security Trends to Know Before Entering 2023Aggregated on: 2022-11-14 18:28:45 What if we had a cybersecurity crystal ball that would let us know the deep insights of what’s coming? Things are changing at the speed of light, from new attack vectors to new exploits. Such instantaneous ebbs and flows can make or break your preparedness to respond to future hazards efficiently and swiftly. As per the recent report by IBM and Ponemon Institute, the present cost of the breach in the company of the United States runs at $4.35 million on average. Several DevSecOps teams are planning to invest in dynamic application security testing (DAST), focusing on more tangible ROI, clear reporting, and noise reduction generated by inaccurate reports. View more...Managed MQTT Broker Comparison — Performance Test and DevelopmentAggregated on: 2022-11-14 14:58:45 This is the third article in the "Managed MQTT Broker Comparison" series. Link to the previous articles in the series: Managed MQTT Broker Comparison - Product Packages and Pricing View more...How to Do a T-Test in Python?Aggregated on: 2022-11-14 14:43:45 T-Test: The Most Popular Hypothesis Test In today’s data-driven world, data is generated and consumed on a daily basis. All this data holds countless hidden ideas and information that can be exhausting to uncover. Data scientists commonly approach this problem using statistics to make educated guesses about data. Any testable assumption regarding data is referred to as a hypothesis. Hypothesis testing is a statistical testing method used to experimentally verify a hypothesis. In data science, hypothesis testing examines assumptions on sample data to draw insights about a larger data population. View more...Commonly Occurring Errors in Microsoft Graph Integrations and How to Troubleshoot Them (Part 2)Aggregated on: 2022-11-14 13:43:45 Due to the switch from EWS to MS Graph, various companies have to adapt their digital products. In the first article, I have already covered a few issues you may face during such a transition to the Microsoft Graph REST API v1.0 with the MS Graph Java SDK. So, let's dive right into the following use cases. Read All Available Rooms and Room Lists of the Company (Getting Multiple Room Lists Is Not Possible) In many companies, rooms can be booked automatically when an Outlook appointment is created. This is possible because all rooms are assigned to an email address by the administration. By adding the email address of the resource to the attendees of the event, a booking process is automatically triggered, which checks if the room is available or not. There is also the option to create room lists, which also have their own email address. For this reason, we can start the availability check for multiple rooms at the same time. For instance, a room list can stand for a building.In case your business app has to get all rooms or room lists for a tenant. With the Microsoft Graph REST API v1.0, this can be done by using the Places API. The following example shows how to create a GET request in Java to read all rooms of a tenant (HTTP: GET /places/microsoft.graph.room): View more...Java for Testers: A Complete Step-By-Step GuideAggregated on: 2022-11-14 04:58:44 The idea behind test-driven development (TDD) is that if you want to write good code, you have to write tests for it first and then figure out how to make them pass. This makes it easy to know if your code does what you want it to do, and makes it easier to refactor your code to be better and more flexible than ever before. View more...SPF Record ExplainedAggregated on: 2022-11-14 04:13:44 Today, an SPF record is a must-have DNS record for reliable email delivery. It is a type of email authentication to protect your emails from being forged. This secures your reputation from phishers and spoofers. Find out more about the Sender Policy Framework to increase the credibility of your product. What Is an SPF Record? One of the DNS resource records is TXT. It is mostly used to denote facts about the domain and provide information to outside sources. It’s a must-have for email authentication. For example, an email comes from a server to your internet service provider (ISP). ISP can authenticate the email using a dedicated TXT type record, SPF record. This record contains data about the trusted servers authorized by your domain so, your ISP can identify a source an email is coming from and detect a forged email. SPF or Sender Policy Framework is a primary (but not the only) way to authenticate your email. View more...Request-Response With REST/HTTP vs. Apache KafkaAggregated on: 2022-11-13 21:43:44 Request-response communication with REST / HTTP is simple, well-understood, and supported by most technologies, products, and SaaS cloud services. Contrarily, data streaming with Apache Kafka is a fundamental change to process data continuously. HTTP and Kafka complement each other in various ways. This post explores the architectures and uses cases to leverage request-response together with data streaming in the control plane for management or in the data plane for producing and consuming events. Request-Response (HTTP) Versus Data Streaming (Apache Kafka) Prior to discussing the relationship between HTTP/REST and Apache Kafka, let's explore the concepts behind both. Traditionally, request-response and data streaming are two different paradigms. View more... |
|
|