News AggregatorBuild a WebAssembly Language for Fun and Profit: LexingAggregated on: 2022-10-11 02:58:25 WebAssembly (wasm) is a high-performance assembly-like format optimized for the web. Code targeting WebAssembly can run at near-native speeds while still benefiting from the safe environment of a browser VM. Wasm has opened up a whole new world of demanding desktop-class apps that can comfortably run in the browser. For example, AutoCAD was able to port decades of code to the web using wasm. Cases like AutoCAD’s have made it clear that wasm will be a major disruptive force in how web apps are developed. To facilitate the adoption of wasm, WebAssembly team developed a powerful compiler toolchain library called binaryen. Binaryen does a huge amount of heavy lifting for compiler authors. It offers dead code removal, code size reduction, and various performance optimizations out of the box. View more...Kubernetes Services ExplainedAggregated on: 2022-10-11 02:58:25 Kubernetes networking principles are really confusing, especially if you’re a beginner. Regardless of how well I followed the official documentation, I honestly didn’t understand a single damn thing! View more...Model Cards and the Importance of Standardized Documentation for Explaining ModelsAggregated on: 2022-10-11 01:28:25 Documentation is officially defined as material that provides official information or evidence that serves as a record. From a machine learning perspective, particularly with regard to a deployed model in a production environment, documentation should serve as notes and descriptions to help us understand the model in its entirety. Ultimately, effective documentation makes our models understandable to the many stakeholders we interact with. Whether we are deploying low-impact models serving basic and non-sensitive needs or high-impact models with significant outcomes, such as loan approvals, we have a responsibility to be transparent—not just to our end users, but to our internal stakeholders. Furthermore, it shouldn’t just be the data scientists who hold all knowledge underpinning a model—it should be open, accessible, and understandable to anyone. View more...Top Tips for Powerful Data-Driven StorytellingAggregated on: 2022-10-11 00:28:24 Do you struggle to communicate the insights behind your data powerfully? Is it a challenge getting the business to take action using the data at your disposal? Data storytelling is the critical "last mile" of communication that transforms your findings into actionable insights that will drive change and add value. View more...Open Banking Competitive Edge Through Data ArchitectureAggregated on: 2022-10-10 23:43:24 The banking system is changing. Rather than control everything themselves, financial service providers are looking at building a more horizontal system under the umbrella of a banking network. Banks, insurance agencies, loan providers, and so on are looking at ways to integrate their services with other providers. It’s the magic of open banking — a system where banks use APIs to provide third-party developers and service providers with automated, secure access to customer data so they can offer tailored solutions. This modularization allows them to focus on providing specialized services while still giving customers a connected experience — a win-win for everyone. View more...How to Automate Certificate Issuance to Kubernetes Deployments Using AutocertAggregated on: 2022-10-10 23:13:24 In public web browsing, TLS authentication happens in one direction — only servers present their certificates. Serving public web pages without authenticating the client's identity is reasonable, but it isn't for Kubernetes. If other entities are going to be accessing sensitive data on services/clusters, then it makes sense that the identity of such entities should be validated too. Using TLS everywhere is one of the Kubernetes team's recommendations for hardening cluster security and increasing resilience. View more...6 Advantages of Component-Based DevelopmentAggregated on: 2022-10-10 22:43:24 Component-based architecture can help you deliver optimized apps that respond to changing market needs. The best part is that you don’t need to employ expensive app experts to do it! Advantages of Component-Based Development Component-based development brings many advantages beyond just having reusable code bits in your software applications. The potential benefits are too many to mention here, but here are some of the important ones: View more...The Memorable Power of Agile StorytellingAggregated on: 2022-10-10 21:43:24 I like reading books about corporate dysfunction when they come in the shape of a compelling (fictional) narrative. Business writers know how storytelling can spice up dry theory and support their argument. Patrick Lencioni’s The Five Dysfunctions of a Team and Gene Kim’s Unicorn and Phoenix projects are good examples. It works for popular science too. In Snakes in Suits, psychologist Robert Hare, a renowned authority on psychopathy, explains for a lay readership the manifestations and biological foundations of this dark human design flaw. He interweaves the science with a chilling fictional narrative of a parasitic young suit slithering his way up the corporate ladder. So, when a coworker told me the other day about an especially glib colleague who lied, cheated, charmed, and flunked his way to job security, I immediately thought: psycho! In software, any rule or recommendation, whether it’s the Law of Demeter, SOLID principles, or the Agile Manifesto is the distillation of years of experience, spirited discussion, and plenty of compromises. Observing how teams work has led us to certain recommendations that boil the specific down to the generic. Stories are a wonderful aid to explain and justify such rules because they can show how the rules were arrived at in the first place. They supply the back story that reconnects the specific back to the generic. You need these to know and respect the justifications behind a principle. It’s not enough to learn a rule by heart if you want to apply it well. Concise lists of opinionated statements make for pithy posters, but the necessary back story is missing from the text. View more...Transit Gateway With Anypoint PlatformAggregated on: 2022-10-10 21:13:24 What Is AWS Transit Gateway? In simple terms, AWS Transit Gateway acts as a router in AWS, simplifying the network access between VPCs, on-premises data center, and third-party software. Transit Gateway helps provide increased visibility and control over the network by effectively merging the organization’s cloud resources and on-premises data center into one network topology. View more...Sprint Goal PrinciplesAggregated on: 2022-10-10 20:13:24 TL; DR: Nine Sprint Goal Principles In Scrum, the Sprint Goal serves as the spotlight that provides transparency to the Sprint Backlog, as the flag that allows the team to rally, and as the one thing that provides focus and cohesion. No Scrum team has ever been able to reap the benefits of the framework to the fullest extent without making the Sprint Goal a cornerstone of its efforts. The following nine Sprint Goal principles point at critical issues any Scrum team needs to consider on its path to excellence. The Purpose of the Sprint Goal According to the Scrum Guide The Scrum Guide characterizes the Sprint Goal as follows: View more...Creating a Risk-Aware Card ProgramAggregated on: 2022-10-10 19:13:24 Avid readers of my publications might recall my love of music and the Canadian power-trio Rush. When I focus on the recently-departed drummer of the band, I wonder “How did Neil Peart comprise solos, drum fills, and lyrics so melodically?” Then, I realized that Neil based his goals on a concise Jonathan Swift quote: View more...Quickly Setup LDAP User Directory for JiraAggregated on: 2022-10-10 17:13:24 In this article, I will discuss how we can configure the OpenLDAP user directory for Jira Data Center Setup. If you are looking for a Jira single node Data Center setup, follow my other article, Install Jira. This article would be helpful for those users who either just have basic LDAP knowledge or no LDAP knowledge. View more...What Is Transaction Management in Java?Aggregated on: 2022-10-10 16:43:24 Transaction Management in Java In this tutorial, we will discuss transaction management in Java using Examples. But before moving to Transaction management, we should know what transaction is, Therefore the following are some important points about transactions for better understanding: A transaction is a segment of program execution that accesses and can alter different pieces of data. A consistent database must be visible to a transaction. The database can briefly be unavailable during transaction execution inconsistent. The database is updated after the transaction is successfully completed (committed) and has to remain constant. A transaction's modifications to the database are finalized when it commits. Multiple transactions may run concurrently. There are two key challenges to address: Many types of failures, including hardware issues and system crashes. Execution of many transactions occurs simultaneously. Types of Transactions Every SQL query will be regarded as a transaction in JDBC. A database connection created with JDBC will operate in auto-commit mode (auto-commit value is TRUE). The SQL statement will automatically be committed upon execution. View more...A Guide to Process Mapping for Seamless Software TestingAggregated on: 2022-10-10 15:43:24 A process map is a planning and management tool that visually illustrates the steps, details, and flow of a process. Software testing is an investigation done on software to gain insights into the quality of the software. While many software developers may not want to admit it, the work of a Quality Assurance (QA) team in testing developers’ software is crucial to a software company. Customers would not be happy with a low-performance, buggy product or service (just imagine an automation testing process that doesn’t automate). But software testing can take time, and finding out the cause of a software bug can get difficult fast. This is where process mapping can help. View more...Google Cloud for Beginners — How to Choose a Compute Service?Aggregated on: 2022-10-10 15:13:24 We need a computing device to run your applications and services. Traditionally, we are used to making use of Virtual Machines in our data centers. However, cloud platforms provide you with greater flexibility. How do you choose to compute service in Google Cloud? Let’s find out! View more...Top Commonly Used JavaScript FunctionsAggregated on: 2022-10-10 14:28:24 Functions are one of the most important aspects of JavaScript. Without JavaScript functions, it would be very limited. functions in javascript are used to perform a certain action or task. They can be written into the code, or they can be created using the Function constructor. View more...DevSecOps: Explaining Best Practices, Benefits and ToolsAggregated on: 2022-10-10 13:58:24 Many sectors have adopted a more agile approach to development life cycles thanks to the widespread adoption of DevOps methodology and the resulting rapid product delivery and deployment. It has always been a problem for modern IT companies to design secure software while satisfying market speed and scale requirements. As a result, more than 52 percent of organizations forego security due to the concern of falling behind in terms of speed to market. View more...AWS Step Function for Modernization of Integration Involving High-Volume Transaction: A Case StudyAggregated on: 2022-10-09 23:43:24 The serverless offerings of AWS (or any other public cloud provider today) are getting more and more popular. One of the biggest reasons is of course not needing to think about infra (server provisioning and so on). The other reasons include the offerings themselves, which at times fit well into the technical need for finding solutions to the given problems. But on the other side, it remains a challenge to know the offerings in detail to leverage them properly. There could be always some new feature hidden deep inside the bulk of the documentation. Background A retail company decided to leverage the AWS Serverless offering for modernizing their on-premises integrations for order management business process. We can go serverless in the cloud in various ways, but the initial solutioning was decided to leverage the Step Function and Lambda Function along with some more integration offerings from AWS, namely SNS, SQS, and EventBridge. View more...Message Routing and Topics: A Thought ShiftAggregated on: 2022-10-09 23:13:24 I started my engineering career with a messaging middleware company out of the Bay Area, California, that came around just when CORBA was being retired, giving rise to MoM and other middleware technologies. Integration problems were classified as internal (EAI) vs. external (B2B) integrations. Terms like Enterprise Dial-Tone and Enterprise Bus were coined to define the problem and exemplify integration solutions. Fun time, indeed! We created a broker supporting concepts like Territories, Gateways, Adapters, and Visual Designer to design integrations, which I am proud to have been a part of. Performance was measured by message throughput, i.e., messages routed per second through the broker. With constraints of the day around CPU power, storage, and memory, we were tinkering with TCP windows, swap and page size, memory-mapped IO, all the tricks around multi-threading, and whatnot to get the best performance. View more...How to Change DAG Witness Server and Witness DirectoryAggregated on: 2022-10-09 14:58:24 Witness Server and Witness Directory are the most critical components of the Database Availability Group (DAG). DAG requires Witness Server or File Share Witness (FSW) and Directory to maintain the Quorum. In case of Witness Server failure, the Quorum is no longer maintained, leading to inconsistent DAG. In addition, the cluster may no longer respond or work, leading to downtimes if a disaster strikes. However, you can change the Witness Server and Witness Directory to maintain the Quorum and ensure high availability when the Witness Server has failed, is unavailable, or does not boot. View more...Golang vs. Python: Which Is Better?Aggregated on: 2022-10-08 22:28:23 Do you want to learn how to code but are a beginner? Which programming language should you start learning first? The languages that developers employ the most are those that are quick, simple to learn, and in-demand. View more...The Power of Open-Source RPA and Parallel ProcessingAggregated on: 2022-10-08 21:28:23 Over the past few decades, technology has made incredible leaps and bounds — from the creation of the internet to the development of AI. Waves of innovation have boosted enterprises’ productivity and reach, but with every new iteration, it becomes more complex to manage multiple technologies in your stack. A Brief History of Enterprise Technology Mainframes and customized homegrown platforms were the norm through the 1970s and 80s. ERP systems became the rage in the 90s and early 2000s. Most companies adopted these monolithic solutions to manage enterprise support functions and service delivery — and many still rely on them as core systems of record. View more...Need an AI Monitoring Solution? Build vs. BuyAggregated on: 2022-10-08 21:13:23 There are many factors to consider when deciding whether to buy or build your AI monitoring system. Ultimately, it comes down to whether you can accomplish the outcomes you set out to achieve with ML monitoring, at a cost you can afford, and in a timely manner. When It Makes Sense To Build 1. Your AI Program Is Immature; Your Needs Are Simple/Basic The need to monitor production AI often arises early, frequently before the company deployed its first ML models in the business. Data science teams universally understand the importance of visibility into data integrity and model fidelity over time, with the need for optimizations and improvements after deployment. However, in some cases, when you're still mainly experimenting or using only manual and offline processes, perhaps there is not a lot of data complexity, and perhaps the level of adoption in the business is still rather low, so the stakes are not very high. In these cases, these teams may just need a simple dashboard with basic alerting, and open-source tools such as Grafana or Kibana can address these needs at this point in time. View more...How to Train Devs to Disrupt IndustriesAggregated on: 2022-10-08 16:28:23 Not all dev orgs work in all situations. Especially if your dev org is looking to completely reshape and disrupt an entire industry. That’s why we were so excited to talk to Chris Bee, CTO of Lessen. View more...Using Redis on Cloud? Here Are Ten Things You Should KnowAggregated on: 2022-10-07 19:43:23 It's hard to operate stateful distributed systems at scale and Redis is no exception. Managed databases make life easier by taking on much of the heavy lifting. But you still need a sound architecture and apply best practices both on the server (Redis) as well as the client (application). This blog covers a range of Redis-related best practices, tips and tricks including cluster scalability, client-side configuration, integration, metrics etc. Although I will be citing Amazon MemoryDB and ElastiCache for Redis from time to time, most (if not all) will be applicable to Redis clusters in general. View more...5 Web Accessibility MythsAggregated on: 2022-10-07 19:13:23 Many websites which exist today are not accessible. This causes people with disabilities, especially those who use assistive technologies, to not interact with the web effectively. WebAIM conducted a study across the one million home pages and 50,829,406 distinct accessibility errors were detected—an average of 50.8 errors per page. According to UsableNet, web accessibility lawsuits are increasing in 2022 with almost 100 lawsuits per week. However, fear of litigation should not be the reason you should invest in web accessibility. There are over a billion disabled people on this planet and they should have the human right to access the web. Here are some of the myths which can stop companies and individuals from investing in proper web accessibility efforts: My Users Don’t Need It It is a mistake to assume that your users are not disabled and hence you don’t need to make your website accessible. However, it is important to keep in mind that most disabilities are invisible or non-apparent. According to Lime Connect, a disability organization in the US, 90% of disabilities on school campuses are invisible. A vast majority of the disabled population does not even disclose that they have a disability. In addition to this, disabilities are also temporary and situational. For example, having a temporary hand injury and having to use speech to text. Designing software with accessibility in mind benefits everyone, not just people with disabilities. Think about captions. Initially, captions were invented to help the Deaf/Hard of Hearing population but many of us use captions almost always while watching Netflix! View more...Understanding Kafka-on-Pulsar (KoP): Yesterday, Today, and TomorrowAggregated on: 2022-10-07 17:43:23 Apache Pulsar and Apache Kafka share a similar data model around logs. This makes it possible to implement a Kafka-compatible protocol handler so that Kafka users can migrate existing Kafka applications and services to Pulsar without modifying the code. It also allows these applications to leverage various Pulsar features such as multi-tenancy, infinite event stream retention, and serverless event processing. This is where the open-source project Kafka-on-Pulsar (KoP) comes in. Why Did the Community Develop KoP? To begin, I think it is important to answer a key question: “Why did you develop it?” As a maintainer of the KoP project, I notice that this is usually the first thing that comes to mind for a new community member. To answer this question, let’s have a quick look at the basics of Pulsar and Kafka. View more...Turbocharge Your Application Development Using WebAssembly With SingleStoreDBAggregated on: 2022-10-07 17:13:23 WebAssembly (Wasm) is a binary instruction format for a stack-based virtual machine. Wasm enables developers to use existing code from programming languages such as C, C++, and Rust as part of their application development process. However, Wasm is not just for the web, and today it is moving in exciting new directions. For example, one use-case would be to run Wasm code in a database system on the data already stored in the database system: an example of co-locating computation with data. Using Wasm to extend the capabilities of a database system opens up opportunities to develop many new applications. SingleStoreDB supports Wasm through Code Engine and, in this article, we'll see how to build a Wasm UDF to perform sentiment analysis on data already stored in SingleStoreDB. Introduction We'll need to perform a few steps to prepare our development environment, and the following sections will show how to do this. We'll also use Rust to create our Wasm UDF. Our code example will build upon the example described in the SingleStore blog post [r]evolution Summer 2022: Bring Application Logic to Your Data With SingleStoreDB Code Engine for Wasm. View more...Data Warehouse and Data Lake Modernization: From Legacy On-Premise to Cloud-Native InfrastructureAggregated on: 2022-10-07 15:28:23 The concepts and architectures of a data warehouse, data lake, and data streaming are complementary to solving business problems. Storing data at rest for reporting and analytics requires different capabilities and SLAs than continuously processing data in motion for real-time workloads. Many open-source frameworks, commercial products, and SaaS cloud services exist. Unfortunately, the underlying technologies are often misunderstood, overused for monolithic and inflexible architectures, and pitched for wrong use cases by vendors. Let's explore this dilemma in this article and learn how to build a modern data stack with cloud-native technologies. Data Warehouse Modernization Many people talk about data warehouse modernization when they move to a cloud-native data warehouse. What does data warehouse modernization mean? Why do people move away from their on-premise data warehouse? What are the benefits? View more...How Zero Trust Improves Ransomware ResponseAggregated on: 2022-10-07 14:28:23 There is an increased demand for cybersecurity analysts due to cybercriminal activity rising. Zero trust is the prime cybersecurity framework that analyzes and authenticates all users on a network. The same validation protocol runs regardless of whether you are inside or outside an organization. Ransomware attacks could affect everyone — businesses and individuals alike — so anyone working with sensitive data must implement systems like zero trust for sufficient protection. How does this benefit responses to ransomware attacks? View more...Decorating MicroservicesAggregated on: 2022-10-07 13:58:23 The Decorator pattern is used to modify the behavior of a target component without changing its definition. This idea turns out to be pretty useful in the context of microservices because it can give you a better separation of concerns. It might even be necessary because the target service might be outside your control. This text looks at how a decorator can be implemented as a service, particularly one that sits between clients and a target service. Example: an E-mail Service Let's introduce an example as a reference for our discussion. View more...Upload Single and Multiple Files Using the .NET Core 6 Web APIAggregated on: 2022-10-07 13:13:23 We will discuss single and multiple file uploads with the help of the IFormFile Interface and others provided by .NET and step-by-step implementation using .NET Core 6 Web API. Agenda Introduction Step-by-step Implementation Prerequisites .NET Core 6 SDK Visual Studio 2022 SQL Server Postman Introduction .NET provides an IFormFile interface representing transmitted files in an HTTP request. It also provides many properties like ContentDisposition, ContentType, FileName, Headers, Name, and Length. IFormFile also provides many methods, like copying the request stream content, opening the request stream for reading, and many more. Step-By-Step Implementation Step 1 Create a new .NET Core Web API. View more...Keep Calm and Respond: A Beginner's Heuristic to Incident ResponseAggregated on: 2022-10-07 04:43:22 A few years ago, when working as a software developer building and maintaining internal platform components for a cloud company, I deleted an application from production as part of a deprecation. I had double and triple-checked references and done my due diligence communicating with the company. Within minutes, though, our alerting and monitoring systems began to flood our Slack channels, in a deluge of signals telling me something wasn’t working. The timing was pretty clear; I had broken production. In medical dramas, the moment when things are about to go wrong is unmistakable. Sounds are muffled. High-pitched, prolonged beeps take over your ears. Vision blurs. When alarms sound, or danger is near, something takes over within you. Blood drains from your head, heat rises in your body, and your hands sweat as you begin to process the situation. Sometimes you confront the issue, sometimes you try to get as far away as possible, and sometimes, you just freeze. In my case, with red dashboards and a sudden influx of noise, I had turned into the surgical intern holding a scalpel for the first time over a critical patient, with no idea what to do. View more...How to Use MQTT in PHPAggregated on: 2022-10-07 03:58:22 PHP is a widely-used open-source multi-purpose scripting language, which can be embedded in HTML and is especially suitable for Web development. This article mainly introduces how to use the php-mqtt/client client library in PHP projects to implement the functions of connection, subscription, unsubscribing, message receiving and sending between MQTT client and MQTT server. View more...Configure Cucumber Setup in Eclipse and IntelliJ [Tutorial]Aggregated on: 2022-10-07 03:58:22 Selenium is a test automation framework extensively used by organizations looking to expedite the web-product testing process. As far as test automation frameworks in Java are concerned, TestNG is largely preferred by QA engineers for the development and enhancement of test suites. With the adoption of Agile methodology in the work environment, a diverse set of stakeholders like QAs, technical managers, and program managers — including non-technical team members — are willing to work collaboratively for the betterment of the product. The project lifecycle includes the business analysts and other stakeholders testing the application in a thorough manner. This is where the necessity to incorporate Behavior Driven Development (BDD) comes into the picture. Cucumber is a popular BDD tool that is widely used for test automation. View more...Top 5 Cloud-Native Message Queues (MQs) With Node.js SupportAggregated on: 2022-10-06 21:13:22 Message queues (MQs) allow you to run distributed services. This article will go over MQs in further detail. Then Discuss the benefits cloud-native provides for your application and why we need it for MQs. Finally, highlight the top five clouds native MQs that can be easily run with Node.js. The Beginning: Synchronous The application's scalability model is a tremendous consideration when rolling out your application. Take an example of a simple application using a request-response model. You have three major components to facilitate your services: a client, a server, and the database to process your system data. View more...Deploy Apache Pulsar With MetalLB on K3sAggregated on: 2022-10-06 17:28:22 Apache Pulsar is a distributed messaging and streaming system. Its unique architecture of compute-storage separation is born for cloud-native environments. As we run Pulsar inside containers in production, we might want to run some tests beforehand. This is also why I tried installing Pulsar on Kubernetes through the KubeSphere App Store in a previous blog. In this blog, I would like to try another way of installing Pulsar in the containerized environment by using K3s. What Is K3s K3s is a lightweight Kubernetes distribution developed by Rancher. It gets rid of some dependencies and components required for Kubernetes. As such, you can run K3s on smaller machines compared with Kubernetes. This also makes it very easy to use for development and testing purposes (you can also scale it for production). If you are new to Kubernetes or are frustrated by its complexity, K3s may be a great alternative to get started. View more...Engineering Manager: Continuous FeedbackAggregated on: 2022-10-06 16:58:22 Feedback is one of the most valuable tools to support people and company growth. What is feedback? It is any information about the product, workplace, company culture, team, workmates, or managers used as a basis for improvement. The feedback comes from many sources, but in this article, we focus on feedback between engineers and their engineering managers. The feedback goals, frequency, and methodology to achieve them are good indicators of the company's culture. For example, there are many companies where the goals are only focused on performance delivery and not on the growth of the people's career path or skills. View more...How to Migrate From Kubernetes Pod Security Policies (PSPs) to KyvernoAggregated on: 2022-10-06 13:43:22 Since its genesis, Kubernetes has been the go-to container orchestration solution for enterprises needing scalable containerized applications implemented on microservices architecture. It essentially deals with the Pod as the most basic unit, which may hold one or more containers. Since any application deployed within Kubernetes is executed through one or more Pods, it is important for the user to ensure that they are secure from misconfigurations and security breaches. Thus, Pod security is not just a major concern but a necessity for Kubernetes clusters and even more for business-critical applications. To fulfill this need, Kubernetes introduced PodSecurityPolicy in its v1.3 release. However, PodSecurityPolicy has been officially deprecated by Kubernetes in the v1.21 release and has been entirely removed in the v1.25 release, which was a step taken due to some major issues encountered by users throughout the years of its use that could not be addressed without introducing breaking changes (more details could be found on an official post made by Kubernetes). View more...Get Rid of Micromanagement: Introduce Project Ownership to Save the DayAggregated on: 2022-10-06 13:43:22 One of the most challenging management tasks for new and seasoned leaders is understanding how to delegate appropriately. Those struggling with delegation frequently appear as micromanagers, making their staff feel watched and distrusted. Most employees dislike being micromanaged. Thus it is in your best interest as a leader to stop this behavior before it has negative consequences such as low morale, lack of motivation, and staff turnover. View more...Python Developers Are Creating Disruptive AI Applications for HealthcareAggregated on: 2022-10-06 13:13:22 Python remains the best programming language for creating AI applications. Python developers are being commissioned to develop AI applications in countless industries. Healthcare is one of the sectors most impacted by their work. There are a number of important benefits of using Python to create AI applications for the healthcare sector. One of the most important applications is using Natural Language Processing (NLP). NLP applications can be used in healthcare for phenotyping, CDS system construction, and predicting the onset of various diagnoses. View more...5 Important Kubernetes Concepts Made EasyAggregated on: 2022-10-05 21:43:22 Kubernetes is the most popular open-source container orchestration solution. Getting Started with Kubernetes is NOT easy. View more...Rewriting the Apache APISIX Response-rewrite Plugin in RustAggregated on: 2022-10-05 20:43:22 Last week, I described the basics of how to develop and deploy a Rust plugin for Apache APISIX. The plugin just logged a message when it received the request. Today, I want to leverage what we learned to create something more valuable: write part of the response-rewrite plugin with Rust. Adding a Hard-coded Header Let's start small and add a hard-coded response header. Last week, we used the on_http_request_headers() function. The proxy_wasm specification defines several function hooks for each step in a request-response lifecycle: View more...Designing and Querying JSON in DatabendAggregated on: 2022-10-05 20:43:22 JSON (JavaScript Object Notation) is a commonly used semi-structured data type. With the self-describing schema structure, JSON can hold all data types, including multi-level nested data types, such as Array, Object, etc. JSON takes advantage of high flexibility and easy dynamic expansion compared with the structured data types that must strictly follow the fields in a tabular data structure. As data volume increases rapidly in recent years, many platforms have started to use and get the most out of semi-structured data types (such as JSON). For example, the JSON data is shared by various platforms through open interfaces, and the public datasets and application logs are stored in JSON format. View more...Develop a Full-Stack Java Application With Kafka and Spring BootAggregated on: 2022-10-05 20:13:22 What You Will Build You will build a full-stack reactive web app that sends and receives messages through Kafka. The app uses Spring Boot and Java on the server, Lit and TypeScript on the client, and the Hilla framework for components and communication. What You Will Need 20 minutes Java 11 or newer Node 16.14 or newer An IDE that supports both Java and TypeScript, such as VS Code. Technology Overview Kafka Apache Kafka is a distributed event streaming platform. You can think of it as a publish/subscribe system on steroids. Kafka producers can send messages to a topic, and consumers can then read those messages. However, unlike most pub/sub systems, the messages do not get removed from the topic when you read them. This allows you to perform stream processing to analyze, aggregate, or transform data from different events in real-time. View more...Treating Dev Bandwidth as Your Most Valuable ResourceAggregated on: 2022-10-05 19:43:22 The unofficial first rule of engineering: When the minds behind the world’s most valuable startup, Stripe, want to talk about making better dev orgs, you listen. In this episode of Dev Interrupted, Stripe’s Head of Engineering Smruti Patel joined us to talk about the daily, weekly, and yearly engineering decisions that have engineered the company’s meteoric success. View more...Mule Snowflake Operations With Snowflake ConfigurationAggregated on: 2022-10-05 19:13:21 In this post, we will cover a few operations in the Mule Snowflake Connector along with the Snowflake configuration for those operations (task, store procedure, multi-table insert, merge, row listener, and Snowpipe concept). Snowflake Access and Setup Snowflake Access for Development Sign-up process: Please create an account in Snowflake. Please note: Account name: We need to mention from the URL we can infer SB15234.ap-southeast-1. For the trial account, you would have 30 days. This allows you access to the same database with data. You can explore for your test and development. Select cloud hosting (Standard) and region (Asia Pacific), Cloud Provider AWS (out of any AWS, Google, Azure) would be fine. For the rest, enter the information asked based on which purpose you need. You will receive an activation mail along with a Snowflake-hosted URL, which will be used for the Snowflake login from the browser. For the first time, you need to set the user name and password for the Snowflake account. Enterprise work process: Generally enterprise applications or licensed applications would either allow single sign-on or they will create a service account for Snowflake access. 3. You can connect as well using Snowflake CLI. View more...Top 10 Programming Languages to Use in Cyber Security ProgrammingAggregated on: 2022-10-05 17:28:22 Humans use spoken languages daily to communicate with one another. But did you know thousands of programming languages are dedicated to facilitating human-machine communication? As digital systems become more important in our daily lives, so will the use of digital languages. Research by KX found that 45% of US students aged 16-23 can code or are learning a coding language. View more... |
|
|