News AggregatorSynchronizing Basic Product Data From MySQL With DolphinDB Cached TablesAggregated on: 2022-12-09 16:14:00 DolphinDB is a high-throughput distributed time-series database, specially designed for big data analysis scenarios in industrial IoT (IIOT) and finance. Data analysis in DolphinDB is often conducted based on the basic product information (such as the SKU, size, and storage of a device) from an external business platform, which conventionally runs on a relational database. To associate external product information with the time series data in DolphinDB, you can use the cached tables to save the external data fetched through plugins (MySQL, MongoDB, CSV file, etc.) in memory with regular synchronizations. View more...Simplifying A/B/n Testing of Backend ServicesAggregated on: 2022-12-09 14:44:00 A/B/n testing, or split testing, is a testing process by which user traffic is randomly distributed between two or more versions of an application (or application component). Business metrics are evaluated to identify a winning version — the version which results in the greater profit or business value. For example, a shopping application might use revenue and user engagement as business metrics. We focus on A/B/n testing of backend services deployed in Kubernetes. For example, in the figure below, the frontend might be a Node.js based online store. It relies on a backend recommendation service to make product suggestions to users. We are interested in A/B/n testing multiple versions of the recommendation service. In the figure, we have two versions, v1 (the current or default version) and v2 (the candidate version). View more...The State of Deepfakes in Cyber AttacksAggregated on: 2022-12-09 13:44:00 AI-generated deepfake content is all over the internet today and is getting harder to spot. These fake photos, videos, or audio clips can feature real and fictional people. Hackers and scammers have begun using this technology in elaborate cyber attack campaigns, from phishing attacks to interfering in national security matters. Here is a look at what deepfakes are, how they are made, and how AI systems are fighting deepfake cyber attacks. What Are Deepfakes? Deepfakes are heavily-doctored fraudulent video or audio clips that closely match a real person’s appearance, voice, intonation, and speaking patterns. Typically, the deepfake creator will use a machine learning algorithm to train an AI system using numerous video and audio samples. The AI essentially becomes an expert on the subject’s mannerisms to such a degree that it can create a believable fake clip of the person saying or doing things they have never actually done. View more...Secure Shell Protocol: Everything You Need to KnowAggregated on: 2022-12-09 13:14:00 Secure shell is a common term often used when studying computer networks. In simple terms, SSH secure shell refers to a secured network protocol that helps access remote computers securely in a network. However, it is much more complicated than it sounds. So in this blog, we will study all about secure shell protocol. Also, we will explore its working, its concepts, and the mechanisms it leverages for safe remote access. Let us start! View more...I Misunderstood Scalability in a Distributed SystemAggregated on: 2022-12-08 22:43:59 "Is the application scalable?" asked the manager. It was almost halfway through the weekly system roadmap meeting. I thought we were done with all the tech parts and would soon move to business-related questions. The architect of my team cleared his throat and answered, "It can easily handle double the usual load." View more...Top 5 Network Security Risks in 2023Aggregated on: 2022-12-08 20:28:59 Network security refers to the technologies, processes, and policies used to protect networks, network traffic, and network-accessible assets from cyberattacks, unauthorized access, and data loss. Organizations of all sizes need network security to protect their critical assets and infrastructure. Modern network security takes a layered approach to protect the many edges of the network and the network perimeter. Any element of the network could be an entry point for attackers—endpoint devices, data paths, applications, or users. Because organizations face numerous potential threats, it is common to deploy multiple network security controls designed to address different types of threats at different layers of the network and infrastructure. This is called a defense in-depth security approach. View more...How to Choose the Right Messaging System for Your OrganizationAggregated on: 2022-12-08 20:13:59 In terms of messaging technologies, we have dozens of popular options on the market, while each of them may only support certain use cases in the queuing and streaming space. Before I explain how to choose the right messaging system, I think it’s worth taking some time to explain message queuing and streaming first. With a basic understanding of these concepts, we will then look at some core and advanced capabilities required for a messaging system for a modern data architecture. After that, I will give a high-level overview of Apache Pulsar, a cloud-native messaging and streaming platform, and explain what makes Pulsar suitable for some common messaging scenarios. Queuing: Decoupling A message queue (also known as a queue) is used to store messages with a first-in-first-out (FIFO) data structure. Messages stay on a queue until they are consumed by other applications or systems. Many programming languages have built-in message queues as data pipelines between tasks for asynchronous decouplings, such as java.util.Queue in Java. View more...12 Ways To Optimize Your JavaScript Journey in 2023 and BeyondAggregated on: 2022-12-08 20:13:59 JavaScript has emerged as the prominent scripting language among the next cohort of developers. It is an incredible tool for front-end programming, building interactive, feature-loaded websites, and fast and smooth web applications. Every front-end programmer knows JavaScript, however, when used without knowledge, it can make things worse. Poor JavaScript code can impact the website's performance, rendering speed, and load time. In this blog post, we will share some tips to help you optimize your JavaScript journey for the future. Let’s have a look: 1. Minify JavaScript code for small file — Minifying code is not similar to obfuscating code. However, both are ways of converting JavaScript — to be more complex to read or to make it smaller. Minifying accomplishes the latter and can shrink file sizes to reduce page load times. Line breaks, extra spaces, comments, etc., all increase the size of a JavaScript file and affects the pace at which the page loads. Minifying the code solves this problem. View more...Xmake v2.7.3 Released: Package Components and C++ Modules Incremental Build SupportAggregated on: 2022-12-08 19:43:59 Xmake is a lightweight cross-platform build utility based on Lua. It is very lightweight and has no dependencies because it has a built-in Lua runtime. It uses xmake.lua to maintain project builds and its configuration syntax is very simple and readable. We can use it to build projects directly like Make/Ninja or generate project files like CMake/Meson. It also has a built-in package management system to help users solve the integrated use of C/C++ dependent libraries. View more...Physical Device vs Real Device Cloud Testing: A Detailed GuideAggregated on: 2022-12-08 18:58:59 Physical device testing has been on the market for a long time. Even today, you can’t deny the importance it holds in the world of testers. In this age of automation testing and real device cloud testing, physical device testing still has the same reverence owing to its unwavering vitality in usability testing and hardware functionality testing, such as camera and GPS. Yet, if you want to reduce your overall project cost, you need to opt for a smarter solution that would enable features such as performing cross-browser testing at scale. That’s when real device cloud testing comes to your aid. It comes with its own sets of advantages, such as cloud storage, access to communication tool integration, testing with the latest virtual browsers and OS versions, and much more. View more...Flutter for Building MVPs – What Makes It an Optimal Choice?Aggregated on: 2022-12-08 17:28:59 Development time is the most prioritized factor we need to consider while developing any application. Before any product launches, it must go through the testing phase for its validity, performance, and feasibility. It will surely help you save from money loss and damage to your reputation. Suppose you plan to get into a contract with a custom mobile app development company for developing a mobile application. In that case, you are indeed opting for the best mobile app development frameworks that fit your organizational goal. And with so many mobile app development frameworks available in the market, you might get confused about which framework to choose. But now, keep your worries aside. Because Flutter is one of the most essential and ultimate solutions for MVP that can take you towards your end goal true soon. View more...Why Choose AWS as a “Well Architecture Framework”?Aggregated on: 2022-12-08 15:43:59 Enterprises have a growing need to upgrade their apps and methods for delivering digital experiences to millions of people. One such approach is serverless. Tech executives are now rethinking their strategy in response to the desire to boost agility and lowering total operational overhead and costs. They had to reconsider how they could effectively, easily, and flawlessly design serverless. View more...SQL Commands: A Brief GuideAggregated on: 2022-12-08 15:43:59 SQL stands for Structured Query Language. And SQL is used for communication with the database for accessing, creating, updating the data stored in the database. SQL allows the user to do the following: View more...Top 10 AI and Data Science Trends in 2023Aggregated on: 2022-12-08 14:43:59 Artificial Intelligence and Data science is the popular topic right now in the global tech market. Numerous sectors throughout the world are benefiting from autonomous systems, cybersecurity, automation, RPA, and several other advantages provided by AI models. To enhance productivity and efficiency seamlessly, tech and data-driven businesses need to be aware of emerging artificial intelligence developments. While with its data-centric awareness of the target and particular audience, data science is surely going to transform every industry. To survive in the global digital industry, businesses must be aware of some of the popular AI and data science trends or predictions. View more...API Test AutomationAggregated on: 2022-12-08 00:58:59 APIs are an integral part of software development in any small/mid/large scale application. This means that testing of these APIs will dramatically improve the efficiency of the entire application. There are several benefits to API Testing, including: View more...How To Modify HTTP Request Headers in Java Using Selenium WebdriverAggregated on: 2022-12-08 00:13:59 One of the most common test automation challenges is how do we modify the request headers in Selenium WebDriver. As an automation tester, you would come across this challenge for any programming language, including Java. Before coming to a solution, we need to understand the problem statement better and arrive at different possibilities to modify the header request in Java while working with Selenium WebDriver Tutorial. In this Selenium Java tutorial, we will learn how to modify HTTP request headers in Java using Selenium WebDriver with different available options. View more...Should You Learn Amazon RDS or DynamoDB?Aggregated on: 2022-12-08 00:13:59 Modern-day application stores a lot of information and data to understand customer expectations and deliver personalized solutions. All these pieces of information are stored in databases. Now, developers can leverage data from databases using various methods. What confuses them most is the choice of service or method they need to pick in order to manage their database. They can pick either relational or non-relational methods of managing databases. In terms of tools and services, there exists a plethora of services in the market that developers can pick. All these options are enough to make a developer trip over! In this article, I have tried to address whether one should pick Amazon RDS or Dynamo DB. But before we can proceed to that, let’s have a quick look at the difference between relational and non-relational databases. Understanding Relational vs. Non-Relational Databases There are two different approaches to constructing a database — relational and non-relational databases. View more...How To Mitigate API Risks During DevelopmentAggregated on: 2022-12-07 23:13:59 It takes a lot of development time, quality assurance, and bug fixes to deploy a fully functional API. What most development teams skip is the security and risk management necessary to ensure the safety of the customer and corporate data after deployment. In many development teams, the security of the API is left to monitoring, logging, and future penetration testing. Unfortunately, this leaves the API vulnerable to attackers who can find exploits before you do. Instead of leaving security to after-deployment strategies, a “shift left” approach incorporates security scanning into current development lifecycles and has shown to be much more effective at reducing risks. Many Development Teams Skip Crucial Security Validation for Faster Code Deployment Deployment velocity (speed) is often a priority in enterprise API development. While rapidly deploying features to an API is important, developers might sacrifice security for speed, which leaves endpoints open to common exploits. This can be especially dangerous for organizations that process and return sensitive data using public-facing APIs. View more...Web Resource Caching: Server-SideAggregated on: 2022-12-07 20:43:59 The subject of Web resource caching is as old as the World Wide Web itself. However, I'd like to offer an as-exhaustive-as-possible catalogue of how one can improve performance by caching. Web resource caching can happen in two different places: client-side - on the browser and server-side. In the previous post, I explained the former; this post focuses on the latter. While client-side caching works well, it has one central issue: to serve the resource locally, it must first have it in the cache. Thus, each client needs its cached resource. If the requested resource is intensive to compute, it doesn't scale. The idea behind server-side caching is to compute the resource once and serve it from the cache to all clients. View more...Project Documentation: How to Guarantee Your Project Endures With High QualityAggregated on: 2022-12-07 20:43:59 Documentation, I know, right now, you are preparing to leave this post. Documentation is not a buzzword topic, such as microservices, Kubernetes, cloud-native, etc. However, it guarantees a scalable, maintainable, and healthy project. Let's explain how to keep a better project tactically through Documentation. Why Do We Need Documentation? The first question around Documentation is why. Why should you spend time on Documentation instead of the code? Software development is expensive, and we must ensure this project will have a long life. To make it possible, we need to make life easier for a future engineer, who eventually might be yourself. View more...Regular Expressions With C# and .NET 7Aggregated on: 2022-12-07 20:28:58 This article is an (adapted) excerpt from the book C# 11 and .NET 7 – Modern Cross-Platform Development Fundamentals, and takes you step-by-step through creating a console app to explore regular expressions via some cool new .NET 7 features: the [StringSyntax] attribute and source-generated regular expressions. Pattern Matching With Regular Expressions Regular expressions are useful for validating input from the user. They are very powerful and can get very complicated. Almost all programming languages have support for regular expressions and use a common set of special characters to define them. Let's try out some example regular expressions. View more...Projections/DTOs in Spring Data R2DBCAggregated on: 2022-12-07 19:43:58 When dealing with Spring Data JPA or Spring Data R2DBC, we all know that everything revolves around entities. You usually create a repository, and in most cases, it either extends the JpaRepository<T, ID> for Spring Data JPA or the R2dbcRepository<T, ID> for Spring Data R2DBC, and then you’re ready to talk to the database. With the repository in place, things are pretty straightforward: you either use the standard already-provided interface methods, you write derived-query methods, or you can use the @Query annotation to write custom stuff. Up until here, everything’s nice. As I said, everything revolves around entities (with minor exceptions, you can get a primitive return type with a custom query like an Int or String), so as a response, you’ll always get an Entity/List<Entity> for JPA and Mono<Entity>/Flux<Entity> for R2DBC. However, there are certain scenarios when you either don’t want to fetch the entire entity because some columns are redundant/not-needed or, even more, you need to construct a POJO from something completely different from your entity, yet still somehow related. Think about a group by, some counts, or some mapping at the database level, and by default you can’t do that – your repos are bound to entities. That is when projections and DTOs come into play. For Spring Data JPA there is already a fair amount of documentation/info around (official documentation, Vlad Mihalcea, Thorben Janssen, and so on). This is not the case when it comes to Spring Data R2DBC (we still have amazing documentation here). View more...3 Reasons for the Mounting Demand for Smart Cloud-Native Application DevelopmentAggregated on: 2022-12-07 18:43:58 “Business agility, scalability, and flexibility are critical to succeeding in the contemporary digital environment. With cloud-native application development, companies can attain all these success parameters.” Cloud-based solutions ensured connectivity, accessibility, availability, and business continuity when the COVID-19 crisis forced companies to build remote working models. Gradually, as companies started to realize the benefits of technological advancements, including Microservices, APIs (Application Programming Interfaces), Kubernetes containerization, and server-less architecture, the demand for cloud-native application development mounted simultaneously. View more...What Are the Biggest Struggles With Implementing Security for a Blockchain Project?Aggregated on: 2022-12-07 17:43:58 For a while now, it has been talked about how blockchain is slowly making its way into the different spheres of life. Now, it has become almost an indistinguishable part of the technological world. Blockchain technology is a prominent illustration of how security principles in financial transactions and information transmission have transformed. Blockchain depends on cryptography, decentralization, and consensus to provide transactional trust. It provides a special data structure along with built-in security features. However, many firms and early adopters are experiencing persistent blockchain security issues. View more...Responsive vs Adaptive Design: Which One Is Better?Aggregated on: 2022-12-07 16:43:58 Having an online presence meant designing a website that would only be seen and displayed on a desktop and maybe a laptop computer screen. Now, though, if you are planning to design a website, a plethora of screen sizes and resolutions need to be considered — from a handy device (mobile) to a laptop or tablet screen. And if your web design doesn’t display correctly on any of the devices, a user will quickly move on. The era we’re living in, where people prefer using mobile devices for visiting websites. However, there is a significant increase in the number of mobile devices. It’s vital for businesses to make their website visibility on smartphones and tablets. View more...Proven Ways to Make Huge Profits From Your Android AppAggregated on: 2022-12-07 15:43:58 Android is a leading mobile operating system worldwide, with a global market share of 71%. This is quite significant compared to iOS, which accounts for only 28% of smartphone users. Hence, targeting Android users is a wise decision to make huge profits. However, with the way the app market is progressing to become competitive, with an average of over 3,700 new Android apps launched daily, you must plan your Android app development astutely to get desired results. Moreover, app development can be very daunting, especially for beginners. You need to be quite decisive regarding your choices regarding the technologies used, the type of app development company, revenue models, and the type of market you are going to enter. This post highlights some critical aspects to consider to ensure maximum profitability from your Android app development project. Tips to Ensure Increased Profits From Android App Development These simple yet critical aspects must be focused on by an app owner while developing an Android app to ensure maximum returns from a project. View more...A Look at the Top 5 AI Applications in 2023Aggregated on: 2022-12-07 14:58:58 An artificial intelligence system is one that uses machine-based methods to predict, recommend, or make decisions that affect real or virtual environments based on certain human-defined goals. It has become apparent over the past few years that AI applications are rapidly gaining traction across a wide range of industries. “The United States' private investments in artificial intelligence (AI) amounted to nearly 23.6 billion U.S. dollars in 2020, the most of any nation. China, with 9.9 billion U.S. dollars in AI funding, ranks second.” A report recently published by a leading data and research firm Statista reveals so. View more...Catastrophic Backtracking: How Can a Regular Expression Cause a ReDoS Vulnerability?Aggregated on: 2022-12-07 03:28:58 Regular expressions come in handy when you need to search for and replace text. However, in some cases, they may cause the system to slow down or even make vulnerable to ReDoS attacks. Introduction ReDoS is a subtype of a DoS attack. The aim of a ReDoS attack is to halt an application or cause it to slow down via an inefficient regex. View more...Control Your Kubernetes Cluster Compute Resources With ResourceQuotaAggregated on: 2022-12-07 02:58:58 A Word About Kubernetes Cluster Resources Kubernetes is a container orchestration platform. It is very popular for deploying container-based workloads. Kubernetes clusters could spread across many nodes. These nodes are physical or virtual machines spread across geographies and deployed at various data centers, ensuring high availability for the cluster. These machines have a lot of computing resources aggregated at the cluster level and are at the disposal of the workloads that get deployed in the cluster. These computing resources include CPU and memory capabilities. Apart from that, the cluster also has a constraint on the number of API objects it can hold. The latest Kubernetes version supports 110 pods per node, as there are also constraints on assigning IP addresses. View more...5 Books for QA EngineersAggregated on: 2022-12-07 02:58:58 Today, I’d like to recommend some helpful books for QA engineers. Grab a cup of coffee and jot down some notes and suggestions from these software testing books. 1. Testing Computer Software, by Cem Kaner, Hung Q. Nguyen, and Jack Falk This book is a real classic that should be read by specialists, starting at the junior level. It differs from other books for QA engineers primarily in its attachment to the conditions of the real world, using the example of well-known Silicon Valley development companies. View more...Data-Based Decision-Making: Predicting the Future Using In-Database Machine LearningAggregated on: 2022-12-07 02:58:58 In just a few short years, machine learning (ML) has become an essential technology that companies deploy in almost every aspect of their business. Previously the preserve of giant institutions with deep pockets, the ML market is rapidly opening up. Every kind of business can now leverage ML to minimize repetitive manual processes, automate decision-making, and predict future trends. At almost every stage of any business task, ML is making processes smarter, streamlined, and speedier. In recent years, technological advances have helped to democratize access and drive adoption of ML by reducing the time, skill level, and number of steps required to gain ML-driven predictions. So rapid has growth been that the global ML market is expected to expand from $21 billion in 2022 to $209 billion by 2029. Tools such as declarative ML and AutoML are helping enterprises to access powerful, business-critical predictive analytics. Taking these approaches one step further, in-database ML is a new technique that’s gaining ground. It allows businesses to easily put questions to their data and rapidly get answers back using standard SQL queries. View more...Organizing Talent: Return of the Data Center of ExcellenceAggregated on: 2022-12-07 02:28:58 Will Larson (writer of "An Elegant Puzzle" – recommended read) may have said it best when he wrote that one of the best kinds of reorganization is the one you don’t do. However, data leaders inevitably reach a point where, due to team growth or evolving business demands, things just don’t work. Faced with these challenges, data organizations may swing back-and-forth between centralized vs. decentralized organizational structures until they achieve the right balance. View more...Apache Ranger and AWS EMR Automated Installation and Integration Series (2): OpenLDAP + EMR-Native RangerAggregated on: 2022-12-07 00:58:58 In the first article of this series, we got a full picture of EMR and Ranger integration solutions. From now on, we will start to introduce concrete solutions one by one. This article is against “Scenario 1: OpenLDAP + EMR-Native Ranger.” We will introduce the architecture of solution, give detailed installation step descriptions, and verify installed environment. 1. Solution Overview 1.1 Architecture In this solution, OpenLDAP plays the authentication provider, all user accounts data store on it, and Ranger plays the authorization controller. Because we select the EMR-native Ranger solution, which strongly depends on Kerberos, a Kerberos KDC is required. In this solution, we recommend choosing a cluster-dedicated KDC created by EMR instead of an external KDC. This can help us save the job of installing Kerberos. If you have an existing KDC, this solution also supports it. View more...Code Churn: An Analysis of Troublesome Workflows and Possible CountermeasuresAggregated on: 2022-12-06 23:28:58 The volume of activity taking place in engineering teams can be mind-boggling, making engineering teams rather difficult to manage. Successful engineering managers, however, are adept at steering their teams to success by tactfully monitoring and using software metrics. Software metrics enable visibility, and acquiring a complete understanding of the software delivery process from concept to production can help in the discovery of bottlenecks or process concerns that, when solved or optimized, can enhance the engineering team's health and efficiency. View more...A Maven Archetype for Jakarta EE 10 ApplicationsAggregated on: 2022-12-06 22:58:58 Jakarta EE 10 is probably the most important event of this year in the Java world. Since this fall, software editors providing Jakarta EE-compliant platforms are working hard to validate their respective implementations against the TCK (Technology Compatibility Kit) supplied by the Eclipse Foundation. At Payara, as much as in bigger companies like Oracle, Red Hat, or IBM, they aren't left behind, and, as of last September, they announced the availability of the Payara 6 Platform, declined in three versions: Server, Micro, and Cloud. As an implementation of Jakarta EE 10 Web, Core, and Micro Profile, Payara Server 6 is itself proposed in two editions: Community and Enterprise. But how does this impact Java developers? What does it mean in terms of application development and portability? Is it easier or more difficult to write and deploy code compliant to the new specifications than it was with Release 9 or 8 of the Jakarta EE drafts? Well, it depends. While any new Jakarta EE release aims at simplifying the whole bunch of the API (Application Programming Interface) set and at facilitating the developers' work, the fact that, on a total of 20 specifications, 16 have been updated, and a new one has been added, shows how dynamic the communities and the working groups involved in this process are. Which isn't without some difficulties when trying to transition to the newest releases with a minimal impact. View more...Docker Best PracticesAggregated on: 2022-12-06 20:28:58 In this blog, you will learn some Docker best practices mainly focussed on Java applications. This is not only a theoretical exercise, but you will learn how to apply the best practices to your Dockerfiles. Enjoy! 1. Introduction Writing Dockerfiles seems easy: just pick an example from the internet and customize it to fit your needs. However, many examples are good for a development environment but are not production worthy. A production environment has more strict requirements especially concerning security. Besides that, Docker also provides guidelines for writing good Dockerfiles. It is just like writing code: you may know the syntax, but that does not mean you can write clean and good code in that specific programming language. The same applies to Dockerfiles. With this blog, you will learn some best practices, guidelines you can apply when writing Dockerfiles. The previous sentence deliberately says can apply and not must apply. It all depends on your use case. View more...Run Java Microservices Across Multiple Cloud Regions With Spring CloudAggregated on: 2022-12-06 19:43:58 If you want to run your Java microservices on a public cloud infrastructure, you should take advantage of the multiple cloud regions. There are several reasons why this is a good idea. First, cloud availability zones and regions fail regularly due to hardware issues, bugs introduced after a cloud service upgrade, or banal human errors. One of the most well-known S3 outages happened when an AWS employee messed with an operational command! View more...Hosting .NET Core Web API Image With Docker Compose Over HTTPSAggregated on: 2022-12-06 19:13:58 We are going to talk about the SSL Certificate configuration for secure communication over the HTTPS using .NET Core Web API and Docker after running our application inside the docker container using docker-compose. Prerequisites Visual Studio 2022 Docker Desktop .NET Core 6 SDK Introduction HTTPS is a standard internet protocol that makes the data to be encrypted and a more advanced and secure version of the HTTP protocol. SSL stands for Secure Sockets Layer and standard technology, which keeps secure our application over the internet. SSL is the part of HTTPS protocol, and it takes care of the encryption of data. It enables a secure connection and prevents hacker attacks because of its encryption algorithm and many security layers. Implementation of .NET Core Web API Application Step 1 Create a new .NET Core Web API application. View more...Platform Engineering Trends You Need to KnowAggregated on: 2022-12-06 19:13:58 Platform engineering is constantly evolving. PlatformCon 2022, the virtual conference created by and for platform engineers, is proof. Platform engineering is the “discipline of designing and building toolchains and workflows that enable self-service capabilities for software engineering organizations in the cloud-native era. Platform engineers build what is often called an Internal Developer Platform (or IDP) that covers the operational necessities of the entire life cycle of an application.” View more...How To Use ggshield To Avoid Hardcoded Secrets [Cheat Sheet Included]Aggregated on: 2022-12-06 19:13:58 Most developers love working in the terminal, tying together all sorts of tools with command line interfaces, CLIs, via scripting. Working with CLIs is powerful, but it can be challenging to initially learn all the ways a tool can help you do your work. While the only real way to learn any tool is by using it, one time-tested method to get over the learning curve is to keep a short list of common commands, as well as concept recaps, on hand for using the tools. At the same time, it is pretty common to adopt a tool for one or two specific functions, without investigating what other commands a tool offers. For example, just think about how many Git commands you use regularly out of the 164 currently available commands. Getting a holistic view of how a command line tool is structured and the possible commands can help you make better use of the platform. View more...PX or REM in CSS? Just Use REMAggregated on: 2022-12-06 18:13:58 CSS has a lot of different units that you can choose from. In many cases, there is one unit that’s clearly better than any others. However, one question that seems to come up throughout my career is whether you should use pixels or rems on certain properties where it doesn’t seem to make a clear difference. View more...Advantages and Disadvantages of Data Replication in Distributed DatabasesAggregated on: 2022-12-06 18:13:58 Scope of the Article In this article, we will discuss “Advantages and Disadvantages of Data Replication in Distributed Databases”. First, we will learn about Data Replication and then discuss Data Replication in Distributed Databases. The process of keeping and maintaining several copies of your important data on other machines is known as data replication. Next, we will be discussing the advantages and disadvantages of data replication in distributed databases. Now, let us get into the main topic “Data Replication, its advantages and disadvantages” View more...Bolster Intelligent Document Processing With Robotic Process AutomationAggregated on: 2022-12-06 15:58:58 Over the past few years, there have been countless new technology developments that have advanced the workforce — from video and chat platforms that keep employees connected to automation solutions that boost productivity. One of the more popular developments has been intelligent document processing (IDP), used to extract data from structured and unstructured content to automate high-volume, repetitive document processing tasks. In fact, IDP has become so popular that, in 2022, the IDP market size was estimated to be at about 1.1 billion USD, but according to Research and Markets, it’s expected to grow to 5.2 billion USD by 2027. Despite the popularity of IDP, there are some iterations of the tool that lack the processing power needed to automate complex end-to-end business processes. Fortunately, robotic process automation (RPA) can step in to bolster your tech stack and solutions. View more...Introduction to Interface-Driven Development (IDD)Aggregated on: 2022-12-06 15:58:58 During my work on different projects and using different languages, frameworks, styles, and idioms, I found out that there are no silver bullets on how to design software. Starting from a set of requirements we need to implement, we have preferences that we should first write code and then test; on the other side, we have the TDD approach emerging for years now, as well as some other approaches (design-first, etc.). Here I want to explain one approach that I find to work very well when designing and implementing software, especially if it is a component or library. The main question here is how you start designing your code. Do you start with some kind of drawing, write tests first (TDD), or start imidate with an implementation? View more...PWA vs AMP: Which One Is Better?Aggregated on: 2022-12-06 15:28:58 Mobile apps are way better and more convenient than desktop or web platforms. Yet, they are not the most comfortable option that the industry offers. In the web development industry, the sky's the limit. And you will see many growth factors and technologies in it. To hit the highest level of user satisfaction and to outrun competitors, inventive people opt-in favor of a Progressive Web App (PWA) or Accelerated Mobile Page (AMP). View more...Flow & Cadence Best Practices, Patterns, and Anti-PatternsAggregated on: 2022-12-06 12:13:58 Throughout this article series, we’ve introduced you to the Flow blockchain, its smart contract language Cadence, and some of the most essential tools developers should know, all while comparing and contrasting to Ethereum. In this article, we will talk about best practices and patterns that should be followed when using the Cadence language and developing solutions on the Flow network, as well as patterns to avoid. View more...Securing Developer Tools: A New Supply Chain Attack on PHPAggregated on: 2022-12-06 04:43:58 Supply chain attacks are a hot topic for development organizations today. Last year, in the largest ever software supply chain attack, a backdoor infected 18,000 SolarWinds customers. Earlier this year, a security researcher was able to breach Apple, Microsoft, PayPal, and other tech giants using a new supply chain attack technique. The underlying design exploited by these attacks is that all modern software is built on top of other third-party software components, often without clear visibility of all the downloaded packages. And while reusing many components allows to speed up the development process, infecting the supply chain is a very effective and subtle attack vector to compromise many organizations at once. View more...5 Trends That Will Shape Application Security in 2023Aggregated on: 2022-12-06 04:13:57 The digital transformation and cloud-native movements are driving DevOps practices and open-source code libraries increase the speed at which applications are developed and delivered. However, security has not always been a top priority in the DevOps journey. In order to ensure that applications are secure, it is essential to make security a part of the process. Organizations can achieve this integration by including security in the development process, automating security tasks, and fostering a culture of security throughout the entire organization. I’ll outline five current trends shaping the future of application security and how modern AppSec programs can get ahead of the curve by reducing developer friction, integrating security into CI/CD pipelines, and making security a first-class citizen of software development workflows. By understanding and acting on these trends, organizations can make security a more integral part of their software development process. View more...DevOps Best Practices for FinTechsAggregated on: 2022-12-06 03:43:57 The nature of FinTech makes customized DevOps a necessity. Most modern, sophisticated companies recognize the value of developing a DevOps culture that removes organizational silos, changes how they do business to deliver value rapidly, and creates iterative feedback loops to enable continuous improvement. However, there are several unique aspects of the FinTech industry that make a tailored approach to DevOps vital. Delivering innovative value to the customer while navigating an ever-changing regulatory and security scene is challenging, but a FinTech-centric approach to DevOps will help you succeed. View more...Flutter vs React Native vs XamarinAggregated on: 2022-12-06 03:13:57 As per the report, smartphone users across the globe will rise to 3.8 billion by 2021. Isn’t it a huge number? However, most smartphone users use three different mobile platforms - iOS, Android, and Windows. However, among the plethora of mobile app development platforms to choose from, developers face the ever-looming question of which one would be the best one. You will find many mobile app development frameworks such as Native app development, Hybrid app development, Cross-platform app development, and PWAs. But if you have a limited budget and want maximum exposure, then cross-platform app development will turn out to be the right choice for you. View more... |
|
|