News AggregatorHow Web 3.0 Is Steering the Future of DevOps ToolsAggregated on: 2022-11-07 18:28:41 Changing your tech stack is painful. Some companies limp along for years with things barely working, so they don’t have to change a thing. So when, in my previous position at AWS as Global DevOps Partnerships Leader, I heard that one of my customers, a NASDAQ Top-10 tech company, was making the complicated switch from a top CI/CD platform to GitHub Actions, I was immediately curious. Why would they do it? Features? Cost? A secret handshake between executives? Given the complexities, it had to be something major, but nothing added up. View more...Is React Native the Same as ReactJS?Aggregated on: 2022-11-07 18:28:41 React Native and ReactJS are excessively high-demand languages that are preferably used for both mobile and web development. If you hire the right React Native and ReactJS developers with the right skills, you could end up developing the best functional websites and applications. View more...Using the Milvus Vector Database for Real-Time QueryingAggregated on: 2022-11-06 16:13:40 In this article, we will continue to explain how different components in Milvus interact with each other to complete real-time data queries. Some useful resources before getting started are listed below. We recommend reading them first to better understand the topic in this post. View more...Geo-Routing with Apache APISIXAggregated on: 2022-11-05 19:43:39 Apache APISIX, the Apache-led API Gateway, comes out of the box with many plugins to implement your use case. Sometimes, however, the plugin you're looking for is not available. While creating your own is always possible, it's sometimes necessary. Today, I'll show you how to route users according to their location without writing a single line of Lua code. Why Geo-Routing? Geo-routing is to forward HTTP requests based on a user's physical location, inferred from their IP. There are many reasons to do that, and here is a couple of them. View more...Optimizing Distributed Joins: Google Cloud Spanner and DataStax Astra DBAggregated on: 2022-11-05 16:13:39 Distributed joins are commonly considered too expensive to use for real-time transaction processing. That is because, besides joining data, they also frequently require moving or shuffling data between nodes in a cluster, which can significantly affect query response times and database throughput. However, there are certain optimizations that can completely eliminate the need to move data to enable faster joins. In this article, we first review the four types of distributed joins, including shuffle join, broadcast join, co-located join, and pre-computed join. We then demonstrate how leading fully managed Relational and NoSQL databases, namely Google Cloud Spanner and DataStax Astra DB, support optimized joins that are suitable for real-time applications. Four Types of Distributed Joins Joins are used in databases to combine related data from one or more tables or datasets. Data is usually combined based on some condition that relates columns from participating tables. We call columns used in a join condition join keys and assume they are always related by equality operators. View more...Schedule Randomness With Gelato, Witnet, API3, and Chainlink VrfAggregated on: 2022-11-05 15:28:39 From roulette wheels to action-adventure games, randomness plays a major role in the gaming world. It is for any scenario where opponents or scenes are created dynamically and for those where users need “on the fly” randomness. This is a far cry from my memories of the 1980s, when gaming was a lot less enjoyable precisely because everything was predictable- if your character went on a mission once, the next time you played the mission would be exactly the same. As you can imagine, this got very boring very quickly. View more...Robust Hotlink Protection StrategiesAggregated on: 2022-11-05 14:58:39 Hotlinking refers to the practice of third-party web properties loading resources (most commonly images) directly from your own server. For example, if you operate the website yourbusiness.example, you may have an image at https://yourbusiness.example/infographic.png that you use within your website. A hotlink is when an unrelated property (for example, the site anotherbusiness.test) embeds that image directly on their website by reference to your server, for example using the following HTML code: View more...Secrets at the Command Line (Cheat Sheet Included)Aggregated on: 2022-11-05 14:28:39 If developers all share one thing in common, it is their use of the command line to get their jobs done. Many development tools don’t come with a graphical user interface (GUI) and rely on a command line interface (CLI). There are a lot of upsides to a CLI first or only approach. Once you master the command line, you can work more efficiently than a GUI might allow and gain the awesome superpower of scripting, allowing all of your tools to start working in concert. Scripting is the bedrock for building and managing software delivery pipelines and CI/CD workflows. However, there is nothing more intimidating, especially to a newer dev, than a blank terminal window with a blinking cursor awaiting your commands. There is no helpful UI to guide you toward your goal; you just have to know what to enter. All the burden of getting it just right falls on the developer's shoulders, and there is a lot to learn, especially when you factor in security. View more...Java’s New Threat ModelAggregated on: 2022-11-05 02:13:39 Over the last decade of cloud migration, the threat model against Java applications and the way that we need to defend them has shifted. OpenJDK has made one positive change in this area already by deprecating the old SecurityManager, a relic that protected a bygone era of AOL CDs and paper maps. The next positive change in security is to strengthen the supply chain of software components, know what’s running and what’s vulnerable, and communicate this information with non-technical experts whose data is at risk. Part of this threat model is driven by vulnerable libraries like last year’s Log4j. Although Log4j is a great logging library and was active on patching, many teams scrambled to identify where they needed to apply those patches. For individual Java developers or teams that knew their code and could deploy, the patch was simple — you updated a library and that was it. The reality though is that software moves fast and far, often leaving the locus of control of these technical experts to stakeholders that don’t have the expertise to manage a problem at this level. In a scramble, teams that did not know Java-specifics looked everywhere including .NET software and Python forums. The government of Quebec shut services down until they knew where Log4j wasn’t. This scrambling was not effective and does not protect our data. View more...Engineering Manager: Effective CommunicationAggregated on: 2022-11-05 01:43:39 In this article, a follow-up to the engineering manager series, we will analyze the challenges of communication and some tips to improve the process. There are many definitions of communication, but a simple way we could define it for the context of this article is a process by which information is exchanged between people, the organization and the employees, the engineering manager and the engineers, teams or departments. View more...Thinking Like a Hacker: Commanding a Bot Army of Compromised Twitter AccountsAggregated on: 2022-11-05 01:43:39 About This Series Last time, a malicious hacker got access to Poor Corp’s internal git repositories and used an open-source secret scanner to find and steal AWS keys. Using the stolen keys, the hacker gained deep access to Poor Corp’s major SaaS services and stole all their customer data. In this series, we will dissect not just what an attacker can do to get access to credentials, but also what they would do after getting that initial access. We will walk through a different threat scenario in each part of the series and tell stories of malicious hackers that are either true, based on a true incident, or reasonably theoretical. View more...AWS re:Invent 2022 — Join Us for the BuildOn.AWS TrackAggregated on: 2022-11-04 21:13:39 AWS re:Invent 2022 is right around the corner, and as always, it will offer plenty of learning opportunities for developers, engineers, and others who want to build new and innovative things on AWS. First held in 2012, AWS re:Invent is the company’s annual learning conference for the global cloud computing community. Scheduled to take place in Las Vegas, Nevada, from Monday, November 28, to Friday, December 2, it will feature over 1500 sessions. If you are joining us at AWS re:Invent 2022, then the BuildOn.AWS (BOA) track is definitely something to look out for! The sessions on this track are specially curated for builders with a focus on how to build real-world solutions, deep dive into the architecture and code. View more...How To Run Ganache in a BrowserAggregated on: 2022-11-04 17:43:39 When developing Web3 projects, it helps to have a local blockchain devnet for testing. Ganache is one of the most popular tools for this in the Ethereum ecosystem and part of Truffle. Ganache allows you to set up a local blockchain with different settings to thoroughly test your smart contracts before deployment. Seeing a local blockchain’s output in the terminal helps you to understand how your project will behave in a live environment. The ability to set the output to variables to manipulate some front-end code is even more useful. Some users may not know that you can do this by running Ganache in your browser. View more...Evolution of Technical Career After SeniorAggregated on: 2022-11-04 17:13:39 Just like engineering, the experience and impact of software creation are changing. The technical career also suffered this effect and has been changing over time. That's what we're going to talk about in this article: Staff-Plus Engineer. Indeed, this change will continue; software engineering is constantly evolving, so the positions also need to develop. View more...How To Stay Happy and Relevant as a Java Developer Over DecadesAggregated on: 2022-11-04 16:13:39 At this year’s Antwerp edition of the Devox Java conference, I attended some talks that managed to really inspire me, which is a rare gift. It made me think of my own 20+ year career as a developer and how I want/expect to spend the remainder. I like to share these thoughts here, giving credit to the excellent speakers where credit is due. Here are my three conclusions for the impatient: Been there, done that? I don’t buy it. You can never have been everywhere or done everything. The Java universe expands faster than anyone can keep up with, so don’t burn yourself out. The world needs excellent craftspeople more than it needs people to manage them. Don’t become a victim of the Peter Principle. If you aspire to a different job only for its status and are incompetent at it, you make more than one life miserable. Focus on Skills That Age Like Wine The biggest challenge is to stay relevant and sane in an ever-changing ecosystem. Choose your battles wisely, I say. Software products age like milk, not like wine or a Stradivarius violin. Language mastery gets rusty, however sharp your long-term memory. Your favorite JavaScript test framework has sprouted green hairs by the time you’re back from holidays. The half-life of technical relevancy is to two to five years (Learning through tinkering by Tom Cools). Is it any wonder some throw in the towel from pure frustration in trying to keep up? Apparently, the average developer is 28 and leaves the trade after 8 years, according to a statistic quoted by Tobias Modig (Get old, go slow, write code). Standard deviation is likely to be high, judging from the more senior attendees in the audience. So, take it with a pinch of salt. View more...Automation Testing vs. Manual Testing: Will Automation Replace Manual QA?Aggregated on: 2022-11-04 13:43:39 Software testing is one of the most rapidly growing tech industries. The software testing market is valued at $40 billion in 2021 and $40 billion in 2021 and an anticipated Compound Annual Growth Rate of 6% between 2022 and 2030. The importance of quality assurance in the software industry is not up for debate, which is proven time and time again by seemingly promising solutions that eventually fail due to the lack of testing. “How is a good software product different from a bad one? A good product is both well-developed and well-tested. A bad product can be well-developed or underdeveloped but always undertested. Testing separates good software from bad software and helps the stakeholders ensure that the product is consistent with everyone’s expectations and requirements.” View more...How Can I Use Selenium to Automate Shadow DOM Elements?Aggregated on: 2022-11-04 12:43:38 A shadow DOM element is one that has been programmatically added to an element with the use of JavaScript and whose content does not show up in the browser’s DOM. Automating Selenium tests on your website can save you time and money by ensuring the changes you make are not breaking anything or negatively impacting your user experience. There are multiple ways to do this, but in this guide, we will be going over how to automate shadow DOM elements using Selenium WebDriver. Locate the Host Element The first step is to locate the host element. The host element is the element that contains the shadow tree. It can be any type of element, such as a div, section, or span. Once you have found the host element, you need to use the findElement command to find the shadow root. In order to perform an action on the shadow root, we need to use the executeScript command. To perform an action on one specific node in the tree (e.g., all button nodes), we must find and identify it within our script (e.g., button). View more...The Buzz Around Blazor WebAssemblyAggregated on: 2022-11-03 20:13:38 Due to its potential to modernize web app development, Blazor WebAssembly is gaining huge traction, and the interest and adoption of the framework are growing every day. Not too long ago, C# programmers had to rely on JavaScript for high-end web app projects and use JavaScript to write code for browsers; however, things have drastically changed since Microsoft announced their WebAssembly technology at Build 2020. With it, the possibility of writing C# or running .NET code in the browser without add-ons and plugins is now possible. View more...CWE Top 25 of 2022: Review of ChangesAggregated on: 2022-11-03 20:13:38 The CWE Top 25 list reflects the most serious software security weaknesses. I invite you to read the updated top list to become aware of the changes that happened over the past year. We position the PVS‑Studio analyzer not only as a tool for searching for bugs in code but also as a static application security testing (SAST) tool. For a better understanding of trends and planning of diagnostic rules, there is nothing better than to look at the latest list of the most relevant security issues. There are several such lists, for example, OWASP Top 10, SANS Top 25, and CWE Top 25. View more...The Power of AI-Enabled Data ValidationAggregated on: 2022-11-03 19:13:38 Many organizations are sinking financial resources into improved solutions for data validation. This alleviates concerns over risks associated with making decisions based on poor data quality that could result in significant losses — or even potential company failure. Part of these investments includes innovating in the space of AI (artificial intelligence). The rapid acceleration of AI-enabled tools in today’s marketplace is because of the incredible benefits they represent in saving time, money, and human assets through automation. View more...5 Benefits of Detection-as-Code for Security EngineersAggregated on: 2022-11-03 18:43:38 Threat detection isn't a new concept, and detection and response teams have been around for decades. Today, security teams tasked with keeping their organizations safe must do so in a much faster world filled with ballooning amounts of data, sophisticated adversaries, and increasing cloud complexities. However, many teams are trying to combat threats with processes and approaches that are still designed for the past and tools that have yet to be kept up. In my ten years in incident response, I saw that while security teams had the skills and talent, they needed more effective approaches. What is the best tool that security practitioners can use today? Detection-as-code. Here's why. View more...Structured Error Messages for HTTP APIsAggregated on: 2022-11-03 18:28:38 Ever since I started to work on the Apache APISIX project, I've been trying to improve my knowledge and understanding of REST RESTful HTTP APIs. For this, I'm reading and watching the following sources: Books: At the moment, I'm finishing API Design Patterns. Expect a review soon. YouTube: I'd recommend Erik Wilde's channel. While some videos are better than others, they all focus on APIs. IETF RFCs: Most RFCs are not about APIs, but a friendly person compiled a list of the ones that are. Today, I'd like to introduce the "Problem Details for HTTP APIs" RFC, aka, RFC 7807. View more...Write Your Kubernetes Infrastructure as Go Code - Manage AWS ServicesAggregated on: 2022-11-03 17:58:38 AWS Controllers for Kubernetes (also known as ACK) is built around the Kubernetes extension concepts of Custom Resource and Custom Resource Definitions. You can use ACK to define and use AWS services directly from Kubernetes. This helps you take advantage of managed AWS services for your Kubernetes applications without needing to define resources outside of the cluster. Say you need to use an AWS S3 Bucket in your application that’s deployed to Kubernetes. Instead of using AWS console, AWS CLI, AWS CloudFormation etc., you can define the AWS S3 Bucket in a YAML manifest file and deploy it using familiar tools such as kubectl. The end goal is to allow users (Software Engineers, DevOps engineers, operators etc.) to use the same interface (Kubernetes API in this case) to describe and manage AWS services along with native Kubernetes resources such as Deployment, Service etc. View more...List of Dot Net Interview QuestionsAggregated on: 2022-11-03 17:28:38 One of the most powerful frameworks is NET, which can be used to build various apps for Windows Desktop, Web applications, Windows Phone applications, Windows Store applications, Windows Server, Windows Azure (cloud), Bot frameworks, and cognitive services. If you want to learn more about ASP, you can always try opting for asp.net training online. The demand for competent people that can manage the process of designing apps effectively in the .NET environment has shown to be an industry that is constantly expanding. Let us take a quick look at the asp.net interview questions. View more...Use JMH for Your Java Applications With GradleAggregated on: 2022-11-03 16:28:38 If you want to benchmark your code, the Java Microbenchmark Harness is the tool of choice.In our example, we will use the refill-rate-limiter project. Since refill-rate-limiter uses Gradle, we will use the following plugin for Gradle: View more...Guide to Create CSR for Code Signing CertificateAggregated on: 2022-11-03 15:28:38 Are you a programmer or firm that develops desktop, web, and mobile software or applications? If yes, you must have planned to publish it online so that users can download and install it on their devices. But today, users only install and use software with proper security measures. This can easily be handled by integrating a code signing certificate into your software products. View more...My Favorite Resources for System Design InterviewsAggregated on: 2022-11-03 13:28:38 Hello devs, if you are preparing for a system design interview and looking for the best resources to master software design and system design, then you have come to the right place. Earlier, I shared the best System Courses, Books, and System Interview Questions, and in this article, I will share the best places to learn system design. View more...A Comprehensive Guide to SOPS: Managing Your Secrets Like A Visionary, Not a FunctionaryAggregated on: 2022-11-03 03:43:38 1. Introduction to SOPS 1.1 What Is SOPS? First, let's cut to the chase and get straight to the elephant in the room: what's SOPS? SOPS, which is short for Secrets OPeration*S*, is an open-source text file editor that encrypts/decrypts files automagically—emphasis on the text editor, encryption, and automation. View more...9 Software Development KPIs That High-Performing Teams TrackAggregated on: 2022-11-03 03:13:38 Why Do Software Development KPIs Matter? The most important thing to have for a successful and efficient team in any field is “direction.” And there is no absolute “right” or “wrong” in it. It’s all a relative and contextual concept. And Software Development KPIs (Key Performance Indicators) act as that “north star” which keeps the team heading in the right direction. Software development KPIs are often confused with metrics. Metrics are numbers representing a fact whereas KPIs are things that matter to an organization. Choosing KPIs without evaluating the effects it brings to your team will do more harm than good. As an example “lines of code (LOCs)” could be a metric but should never be a “KPI” for a software development team. View more...API Mocking: Essential and RedundantAggregated on: 2022-11-03 02:43:38 I love contradictions where both states of truth can work at the same time. Case in point this tweet about mocking from the other week: If you use mocks, you are not testing. View more...Advanced BunkerizationAggregated on: 2022-11-03 00:58:38 In this article, I want to delve into some additional measures to the ones I exposed in my first article for Apiumhub, which add a fairly high level of control and protection of systems within our house. I will leave to the reader the choice of applying them or not, depending on their needs. Internal SSL Frequently, when we have a varied ecosystem of applications inside the internal network at home because they are usually part of personal projects, we underestimate internal security in favor of simple solutions such as using a VPN. View more...Implement DevSecOps to Secure Your CI/CD PipelineAggregated on: 2022-11-02 23:28:38 Before understanding DevSecOps, let’s understand what DevOps is. DevOps is the combination of cultural philosophies, practices, and tools that increase an organization’s ability to deliver applications and services at high velocity. In fast-moving projects, security often lags behind and is given low priority, which may lead to buggy code and hacks. Let’s see how we can reduce the risk of attack by integrating security into our DevOps pipeline. View more...Blasting Off Into Stargate Using HTTPieAggregated on: 2022-11-02 22:13:38 As a DataStax Developer Advocate, my job is to help our amazing teams provide you with the best possible experience with Cassandra and our products. Datastax Astra is built on Apache Cassandra. In addition to great documentation, Astra offers a robust free tier that can run small production workloads, pet projects, or just let you play—all for free, no credit card required. Cassandra can be tricky for hardcore SQL developers, because it uses a different slightly different query language (CQL), but when you get Astra, Stargate is there to let you interact with your data through APIs. Our open source Stargate product provides REST, GraphQL, and schemaless document APIs in addition to native language drivers. If you like them but don’t want to use our products, that’s fine! It’s completely open source and you can implement it on your own system. View more...Comparing Express With Jolie: Creating a REST ServiceAggregated on: 2022-11-02 22:13:38 Jolie is a service-oriented programming language, developed with the aim of making some key principles of service-oriented programming syntactically manifest. Express is a leading framework in the world of JavaScript for the creation of REST services. The concepts behind Express/JavaScript and Jolie are not that distant, but they are offered under different shapes: one aimed at building on top of JavaScript and Node.js, the other aimed at expressing these concepts declaratively. The aim of this article is to identify the first differences that arise between Express and Jolie in the development of a REST service by comparing how the same concepts are codified. View more...Everything You Need to Know About Programming and CodingAggregated on: 2022-11-02 19:58:38 Programming and coding are two fundamental concepts in computers and technology. Without these two things, our computers would be very limited in what they could do. Let's start with programming. Programming is creating a set of instructions that tell a computer what to do. These instructions are known as code, and they can be written in a variety of different languages. View more...EKS Security Checklist: 10 Best Practices for a Secure ClusterAggregated on: 2022-11-02 18:43:38 Kubernetes is riddled with security challenges. Inevitably, the same goes for managed Kubernetes services like Amazon Elastic Kubernetes Service (EKS). The best way to tighten your cluster security is to implement practices that have become industry standards recommended by the Kubernetes community. Here are the ten most EKS security tactics every team needs to protect its clusters. What Exactly Is Amazon EKS Security About? Amazon EKS is one of the most popular managed Kubernetes services out there. It allows teams to orchestrate their containers via Kubernetes without installing and operating the Kubernetes control plane or the infrastructure required for Kubernetes clusters to run. View more...What Is the Future of ReactJS?Aggregated on: 2022-11-02 18:43:38 React, Angular or Vue? JavaScript frameworks all seem to be on the rise, and it’s not easy for a developer to get a grasp on them all. On the contrary, businesses wander around in confusion about which is better suited for their project and why? Well, to get the answer, we suggest answering some questions such as: What are you building? What kind of data will your application process? Do you want to create an SEO-friendly website? And so on. View more...Spring Data JPA To Spring Data JDBC: A Smooth Ride?Aggregated on: 2022-11-02 18:43:38 “JPA is slow, complex, and brings too much pain." We can hear this often here and there. This “common opinion” makes architects consider migration from JPA to other technologies, even for the existing projects and despite great support from JPA development tools (IntelliJ IDEA Ultimate, JPA Buddy, etc.). The main complaints about JPA are: Lack of control over generated SQL queries Memory consumption due to L1 cache Hard to create complex queries with JPQL/HQL Hard to map complex query results to arbitrary classes View more...How Are CRUD Operations Used for File Handling in Java?Aggregated on: 2022-11-02 17:58:38 Java is a high-level language. Java programs generally execute on a terminal that is not stored; some programs need some source to store information fetched from the program that is in the form of a file. CRUD operations stand for Create, Read, Update and Delete. As said, some Java programs need some files to store information fetched from the program. A file stores different types of information, including text, images, videos, and more. View more...How Can We Read a JSON File in Java?Aggregated on: 2022-11-02 17:28:38 Read JSON File in Java To know about reading a JSON file in Java, first, we must know about the JSON file. JSON JSON is “JavaScript Object Notation.” The JSON is the simple format for storing and sending data. It is used when the data is transported from the server to the Webpage. It is used in the field of “Web Development.” View more...How a Data Privacy API Abstracts and Simplifies Privacy and ComplianceAggregated on: 2022-11-02 16:13:38 Navigating the world of privacy and compliance is no trivial task. On one side, we see a world that is becoming more and more privacy-conscious. On the other side, we see a proliferation of applications that compromise user privacy. In this tug-of-war, the landscape of what you can do with people’s sensitive personal data is continually changing. And just like a tug of war, lines are continually being drawn. For example, the General Data Protection Regulation (GDPR) applies to a major region of Europe consisting of multiple countries (the EU), each with its own set of data privacy laws. In the United States, individual states like California have been enacting legislation like the California Consumer Privacy Act (CCPA), which directly affects data privacy and compliance requirements in those states. View more...SSH vs X.509 CertificatesAggregated on: 2022-11-02 11:43:37 As a developer or systems administrator, you're probably used to SSHing into servers with key pairs. What if I told you there is a better and more secure way to manage SSH access? Think SSH certificates (And no, they’re not the same as TLS certificates) For most people, their knowledge of certificates lies within the confines of the X.509 digital certificates format — also known as TLS/SSL certificates — used by browsers to enable HTTPS. However, the X.509 certificate is not the only digital certificate format that exists; there is also the less-popular SSH certificate format created by OpenSSH. View more...Generating Unique Identifiers Based on Timestamps in Distributed ApplicationsAggregated on: 2022-11-01 22:43:37 We build applications that must process very high numbers of events with minimum latency. Generating unique IDs for these events using the traditional method of UUIDs introduces an unacceptable time overhead into our applications, so an alternative approach is needed. I recently wrote an article on how timestamps can be used as unique identifiers, as they are much cheaper to generate than other methods of generating unique identifiers, taking a fraction of a microsecond. View more...How to Use Python for Data ScienceAggregated on: 2022-11-01 20:43:37 Python and Its Use for Data Science Python is easy to learn, and its syntax is relatively simple. It is a popular language for data science because it is powerful and easy to use. Python is an excellent language for data analysis because it includes a variety of data structures, modules, and tools. There are many reasons why you should use Python for data science: View more...Why Affective Computing and Mindless AI Will Conquer the WorldAggregated on: 2022-11-01 19:13:37 Emotion and Technology Affective computing is a term that refers to the synergy between AI and psychology in order to understand and affect emotions. Another term for it could be emotional AI. It is a niche within AI that is not very popular, but I really believe it is going to become increasingly in popularity in the near future. Until very recently, machine learning did not have many things to say about psychology. We, of course, had sentiment analysis, but that’s that. In the last few years, some companies tried to combine psychometrics with machine learning in order to create improved psychometric questionnaires. However, I really believe that the advancements in effective computing and, what is now called mindless AI, are what is going to cause a potential paradigm shift. View more...8 Steps to a Winning Product Strategy Made Simple: What You Need to KnowAggregated on: 2022-11-01 19:13:37 You built a product, and it’s working well. You might even achieve your goals and start making a profit. But how do you know when you’re done building it? When do you need to create a new feature or add a new marketing channel? When you bring a product to market, you solve a problem for your users. But you’re not the only person who can solve that problem. In fact, you’re one piece in a much larger ecosystem — a network of developers, customers, and manufacturers — all working together to build a better product. It’s a complex ecosystem, and you need a product strategy that can help you navigate it. View more...Top Blockchain APIs for the DeveloperAggregated on: 2022-11-01 17:58:37 Blockchain technology is applied in many industries and is steadily gaining support and users' trust. Many start-ups and businesses try to develop unique web platforms or mobile apps with a wide range of blockchain usage. As the blockchain and crypto markets thrive, developers have many opportunities and projects to develop, like trading bots, payment applications, or business settlement solutions. In this article, we'll figure out how API is used for blockchain and how API integration might benefit the app. What Is Blockchain API? Application Programming Interface (API) integration is used to communicate with blockchain nodes or client networks. By doing so, it gets data and displays it to the user. APIs can be used for transactions, managing accounts, crypto trading, making analytics, and providing security. Top blockchain APIs are considered secure, easy to use, and reliable in the long run. Distributing data securely might be along with blockchain technology, but it's safer and more convenient. Choosing one is no easy feat, as the diversity of APIs is truly impressive. View more...Sorting in C#: OrderBy.OrderBy or OrderBy.ThenBy? What's More Effective and Why?Aggregated on: 2022-11-01 13:13:37 Suppose we need to sort the collection by multiple keys. In C#, we can do this with the help of OrderBy().OrderBy() or OrderBy().ThenBy(). But what is the difference between these calls? To answer this question, we need to delve into the source code. The article has three chapters: View more...Thinking Like a Hacker: AWS Keys in Private ReposAggregated on: 2022-11-01 02:43:37 About This Series Last time, we covered a scenario in which a threat actor found leaked RSA private keys used by a TLS wildcard certificate for “Poor Corp.” By chaining the leaked private key with DNS misconfigurations, the attacker was able to impersonate a Poor Corp subdomain and use it to create highly effective phishing emails. In this series, we will dissect not just what an attacker can do to get access to credentials, but also what they would do after getting that initial access. We will walk through a different threat scenario in each part of the series and tell stories of malicious hackers that are either true, based on a true incident, or reasonably theoretical. View more...The Differences Between Bash, Source, ".", and "./" ExecutionAggregated on: 2022-11-01 02:13:37 While working on Linux, you probably run across some files that are not executing in the way you expected — for example, you might have a file in your current directory but it does not run when you enter its name. You get file_name.sh command not found, but actually, the file is there. The file does not work, even having execution permission, because when you write something on the shell and run it, your $PATH variable gets checked. If there is any command matching inside $PATH directories, such as /usr/bin, it will execute. Unless there is a matching command, you are going to get the error. So you need to address the path to your file. Let’s create a simple Linux shell script and have execution permission on the script. The below examples are written in Bash Shell. View more... |
|
|