News Aggregator


AI in FinTech: Opportunities and Challenges Defined

Aggregated on: 2022-10-05 13:43:21

Artificial Intelligence (AI) has been widely used to analyze and manage data in the financial sector. AI plays a key role in making a lending decision, offering customer support, protecting against fraud, predicting credit risk assessment, and many more. Knowing the advantages of AI, many modern FinTech companies are keen on adapting to AI technologies to improve their efficiency. The level of process automation and digital transformation activities is increasing in financial services. AI technology has seen rapid growth in the global financial industry. Based on industry data, experts have predicted that the global market size of AI in FinTech will reach USD 26.67 billion.

View more...

Developing With AWS Cost and Usage (CUR) Files

Aggregated on: 2022-10-05 13:43:21

If you have found this blog post, you have stumbled upon the bowels of AWS billing, a place where the complexity and variety of options are the whole reason cloud cost management tools exist. Welcome to Cost and Usage Reports (CUR), the raw firehose of billing data that provides the most detail about service cost and consumption on AWS, with files that grow to 10s or 100s of gigabytes. To work with CUR data, you will need to understand its schema, or data dictionary, which spans 10 tables and hundreds of columns. Fortunately, for most billing cases, only these tables will be relevant.

View more...

Inherent vs Residual Risk: Differences and Examples Explained

Aggregated on: 2022-10-05 12:43:21

What Is Risk Management? Risk management is one of the most essential processes that is carried out in companies and organizations. It can be explained as evaluating, recognizing, and managing the organization’s profits and resources risks. The concept is not new; however, how organizations look at risk has shifted. The significant risks of any organization include financial security, regulatory liabilities, strategic management, natural hazards, and other incidents. Companies usually establish the risk without considering the risks and can fail the operations whenever unseen risks occur. The failure to manage these risks properly will make it quite difficult for the organization to determine its long-term goals.

View more...

Appsec’s Agile Problem

Aggregated on: 2022-10-05 05:43:21

Agile development has a serious Appsec problem. Most Agile development teams suck at building secure software. But one of the reasons for this is that Appsec has a serious Agile problem. Most security experts don’t understand Agile development and haven’t come to terms with the way the way that Agile teams design and build software; with the way that Agile teams think and work; and especially with the speed at which Agile teams deliver software and make decisions.

View more...

Apple Vs Google: War of the Wearables

Aggregated on: 2022-10-05 05:13:21

In one of Apple’s latest TV adverts, ‘Strength’, they showcase some of the most popular fitness apps, integrating smart technology with tracking and analysis. The ad shows people using iPhone as part of their daily fitness routine – weighing themselves, swimming, running, doing weights – all with apps connected to iOS.

View more...

Android SMS popup - Part Four: Implicit Intents

Aggregated on: 2022-10-05 05:13:21

in part one , we captured sms messages using a broadcastreceiver. in , among a set of options, we chose to pass the needed sms information (sender, message and timestamp) as a serializable 'popmessage' object from the background to the foreground alert dialog that we constructed in : in this last section, we will complete this basic application by handling the user actions through button clicks. there are two actions the user may perform:

View more...

Appsec and Technical Debt

Aggregated on: 2022-10-05 05:13:21

Technical debt is a fact of life for anyone working in software development: work that needs to be done to make the system cleaner and simpler and cheaper to run over the long term, but that the business doesn't know about or doesn't see as a priority. This is because technical debt is mostly hidden from the people that use the system: the system works ok, even if there are shortcuts in design that make the system harder for developers to understand and change than it should be; or code that’s hard to read or that has been copied too many times; maybe some bugs that the customers don’t know about and that the development team is betting they won’t have to fix; and the platform has fallen behind on patches. It’s the same for most application security vulnerabilities. The system runs fine, customers can’t see anything wrong, but there’s something missing or not-quite-right under the hood, and bad things might happen if these problems aren't taken care of in time.

View more...

Analytics Improves Agile Effectiveness at the Enterprise Level

Aggregated on: 2022-10-05 03:13:21

Agile, which started off as a better and more practical method of software development proposed by a group of developers, is now transforming the way in which organizations are run. Agile is now adopted by banks, manufacturers, research & development centers, hospitals, and even airports for execution.  When the scale and reach of Agile increased, newer frameworks such as Scaled Agile Framework (SAFe), Large Scale Scrum, Nexus, and so on gained popularity. Enterprise agility and business agility is radically changing the way in which organizations are structured. 

View more...

Traditional vs. Modern Incident Response

Aggregated on: 2022-10-05 02:43:21

What Is Incident Response? An incident is an event (network outage, system failure, data breach, etc.) that can lead to loss of, or disruption to, an organization's operations, services or functions. Incident Response is an organization’s effort to detect, analyze, and correct the hazards caused due to an incident. In the most common cases, when an incident response is mentioned, it usually relates to security incidents. Sometimes incident response and incident management are more or less used interchangeably. However, an incident can be of any nature, it doesn’t have to be tied to security, for example:

View more...

Building Responsive Rails Apps With Hotwire

Aggregated on: 2022-10-04 21:13:21

If you're developing modern single-page applications with Ruby on Rails, you're most likely using some fancy JS framework for your UI to be updated nicely without page reloads. And there is not much you can do without using them; that's kind of a standard these days... until Rails got Hotwire. With Hotwire, you can get fast and responsive web applications without writing a ton of Javascript. Well, sounds great, but what is Hotwire? In this article, we'll go through the basics of Hotwire and build a sample app using it.

View more...

Secure By-Design Storage for Your SCM

Aggregated on: 2022-10-04 20:43:21

The widely adopted SCM tools we use today, GitHub and Gitlab, are built on the dated architecture and design of git. I recently happened upon this thread on HackerNews that talked about a lot of the pains we’ve spoken about in our article On Git and Cognitive Load. These aren’t the only issues with Git; many of them are just really simple missing features that are no longer aligned to our current engineering practices, take this post on Folder (Non)Tracking, and today I want to talk about common workarounds (AKA hacks) for secure storage with today’s SCMs. When we build applications, from mobile to desktop, across industries, we often have many configurations in order to connect our applications to external services. Some of these services are required at runtime (e.g., ad networks, configuration servers, analytics), and others at build time (e.g., code signing). We’ll dive into some of the challenges third-party services and imports introduce into our development processes.

View more...

How IoT and Big Data Solutions Transform Digital Healthcare Industry

Aggregated on: 2022-10-04 20:13:21

According to Precedence Research, the global digital health market will reach $1,011.07 billion in 2028. Experts anticipate IoT medical devices market will hit a $203.13 billion value in the same year. Almost exponential growth is mainly due to medical innovation and improving data processing in the healthcare sector.   The healthcare industry is humongous and complex, divided into many sectors, dealing with massive amounts of data that require strict organization and thorough analysis. With as much as human lives at stake, providers struggle to solve data-related issues and open new healthcare provision capabilities. 

View more...

Observability Is Cultural

Aggregated on: 2022-10-04 19:43:21

I’m guilty of applying the word "debugging" to practically anything. My kids' Legos won’t fit, let’s debug that. Observability is one of the few disciplines that actually warrant that moniker: it is debugging. But traditional debugging doesn’t really fit with observability practices. I usually call it “precognitive debugging." We need to have a rough idea in advance of what our debugging process will look like for effective observability troubleshooting. Note that this doesn’t apply to developer observability, which is a special case. That’s a more dynamic process that more closely resembles a typical debugging session. This is about more traditional monitoring and observability: where we need to first instrument the system and add logs, metrics, etc. to cover the information we would need as we will later investigate the issue.

View more...

Automate Amazon Aurora Global Database Using CloudFormation

Aggregated on: 2022-10-04 19:43:21

This article describes steps to automate AWS Aurora Global Database services using Cloud Formation, Lambda, and State Function. It also provides detailed steps to create a Global Database with sample code snippets.  Some of the features detailed in the article are:  Overview of Aurora Global Database Prerequisites  Creating an RDS Global Database  Failover  Conclusion Overview Amazon Aurora Global Database is designed for globally distributed cloud applications in AWS. It provides high availability and database resiliency by way of its ability to fail over to another AWS region. It allows a database to span multiple regions (AWS limits regions to a maximum of six), and it consists of one primary and up to five secondary regions in a global database cluster. Primary region can perform read and write operations, whereas the secondary region can perform read operations only. The way AWS facilitates this feature is by activating writer endpoints in the primary region and deactivating writer endpoints in secondary regions. Furthermore, Aurora replicates data from primary region to secondary regions, usually under a second.

View more...

Easily Update and Reload SSL for a Server and an HTTP Client

Aggregated on: 2022-10-04 19:13:21

This tutorial walks through the process of configuring your server or HTTP client to enable hot reloading of the SSL configuration at runtime. This will result in no longer restarting your server when the certificates need to be updated, and you won't need to recreate your HTTP client when you want to use your new certificates. In this tutorial, we will cover only a Spring Boot application with Jetty as an embedded server to demonstrate the basic configuration and the different ways to trigger an update. However, every server or HTTP client which uses a SSLContext, SSLServerSocketFactory/SSLSocketFactory, TrustManager or KeyManager to configure SSL can also enable hot reloading, including Scala and Kotlin-based servers and HTTP clients.  The hot reloading mechanism is provided by the SSLContext Kickstart library and all of the code examples shown in this tutorial can also be found on GitHub: Java Tutorials.

View more...

Location Privacy: What and Why?

Aggregated on: 2022-10-04 16:43:21

With modern GPS-aware devices, location data is widely collected and used for applications like traffic monitoring, route planning, friend-finding, advertisement deals, emergency services, etc. Location Based Service (LBS) is a service that is offered to users based on their location information. It is a convergence of technologies such as smartphones, the internet, and GIS that makes LBS possible. It is accessed by users from their mobile device, through the mobile internet available on the device while sharing their geographical location (and other required information) with the service provider.  The quality of service provided by the LBS depends on the type of service, underlying architecture, and the accuracy of the data collected. Highly precise data is collected for location-based services, which is either a single location update or continuous location updates depending on the kind of service. Analysis of such highly precise spatiotemporal data, when collected over an interval of time, can lead to the identification of individuals, estimation of trajectories (identification of popular source/destination points), and eventually their behavior. A lot of information about a person’s beliefs, preferences, religion, and health can be inferred by analyzing the location data.

View more...

Most Common Web Accessibility Problems to Solve For

Aggregated on: 2022-10-04 14:43:21

People’s experiences with the www (World Wide Web) aren’t equal. Web accessibility has truly become highly relevant than before. For specially-abled or those with physical disabilities, accessing sites isn’t always trouble-free. As per the current report to World Bank, 15% of the worldwide population lives with a disability, of which two to four percent face problems in functioning. In fact, World Health Organization’s current studies also mentioned that 1 billion folks live with a few forms of disability. In simple words, web accessibility is not given the major concern for everybody that it should be. Hence, business or technology enablers (e.g., service providers, app developers, product enterprises, etc.) need to concentrate on accessibility tests more than ever before. That is where web accessibility comes in. Web accessibility means making sure that folks of all capacity levels and several techniques of access can interact, comprehend, and enjoy using a site. With an accessible site, no one feels left out. Of course, there are several other reasons why organizations need to concentrate on accessibility while designing their site. 

View more...

AWS Cognito Overview and Step-By-Step Integration

Aggregated on: 2022-10-04 13:28:21

When an application needs server-side implementation, clients (such as mobile devices or browsers) must authenticate to the server. For instance, when someone uses Gmail to log into Facebook after having logged in before, they transmit certain identifying information to the Facebook server. User authentication for your application might be established in several different ways. However, the most suitable option, in our opinion, is to use AWS Cognito.

View more...

The Art of Deploying a Service Mesh

Aggregated on: 2022-10-04 12:58:21

Service mesh is the next logical step to overcoming security and networking challenges obstructing Kubernetes deployment and container adoption. Check out the benefits of deploying a service mesh here. With the increased adoption of Microservices, new complexities have emerged for enterprises due to a sheer rise in the number of services. Problems that had to be solved only once for a monolith, such as resiliency, security, compliance, load balancing, monitoring, and observability, now need to be handled for each service in a Microservices architecture.

View more...

Kubernetes Security: 10 Best Practices From the Industry and Community

Aggregated on: 2022-10-04 12:58:21

Kubernetes requires extensive configuration, and keeping container security at the right level is always challenging. One of the best ways to tighten your clusters’ security is by implementing tactics that have become industry standard. Here are the 10 most important ones. 10 Best Practices for Kubernetes Security 1. Don’t Keep Secrets in an Environment Variable It’s a good practice to have your objects use a secret in an environment variable since other parts of your system can access environment variables. That’s why it’s best to use secrets as files or take advantage of a secretKeyRef to minimize potential attacks.

View more...

Agile - What’s a Manager to Do?

Aggregated on: 2022-10-04 05:58:21

Agile - What’s a Manager to Do? As a manager, when I first started learning about Agile development, I was confused by the fuzzy way that Agile teams and projects are managed (or manage themselves), and frustrated and disappointed by the negative attitude towards managers and management in general. Attempts to reconcile project management and Agile haven't answered these concerns. The PMI-ACP does a good job of making sure that you understand Agile principles and methods (mostly Scrum and XP with some Kanban and Lean), but is surprisingly vague about what an Agile project manager is or does. Even a book like the Software Project Manager’s Bridge to Agility, intended to help bridge PMI's project management practices and Agile, fails to come up with a meaningful job for managers or project managers in an Agile world.

View more...

9 Ways to Boost Knowledge Worker Engagement

Aggregated on: 2022-10-04 05:58:21

In my previous post, “3 Reasons Why Knowledge Worker Engagement Is Decreasing”, I discussed the increasing pressure on organizations, the changing nature of work, and different reasons why employee engagement and thereby also productivity and innovation are eroding, especially in large and distributed organizations. I grouped these into three overall themes: complexity, inflexibility, and disconnectedness.Now what can an organization do to reverse this negative trend? It could strive for the opposite, of course, towards increased simplicity, flexibility and connectedness. Here are 9 things your organization can do to get moving in the right direction. Simplicity 1. Adopt a user-centric approach

View more...

3 Great Articles on Technical Debt

Aggregated on: 2022-10-04 05:28:21

Some great links about technical debt:Are bugs part of technical debt?Technical Debt - from metaphor to theory and practice (presentation)Special IEEE Explore issue on Technical Debt (Nov 2012)Must read if you're passionate about quality and have seen or heard some of the issues mentioned in these materials.

View more...

How Software Development Projects Can Benefit from the Discovery Phase

Aggregated on: 2022-10-04 05:28:21

A web development project that aims to become a success requires a bit more than an unrivaled idea, funding, and a brilliant team to bring it to life. Although these three components are essential, at least one more piece to the puzzle can make a big difference. During an interview for Amplifyre, Anton Oparienko (COO at Upsilon) shares insights about the importance of the discovery phase for software development projects and gives expert tips on how it can be used as leverage.

View more...

Value Stream Management Meets Engineering Analytics

Aggregated on: 2022-10-04 04:28:21

Value Stream Management (VSM) is about empowering delivery organizations to measure, mitigate, and monitor complexity. Simply put, it aims at improving the flow of value in your organization. The VSM Consortium recently released their highly anticipated report on The State of Value Stream Management Report 2022.   In this article, we recap some of the findings and look at it specifically from a software engineering and DevOps point of view. Can we capture some key lessons that lead to healthier and more productive engineering teams? What has worked and what has not? Can we simplify and adapt ideas of organizational change to create a thriving engineering organization?

View more...

Become an Elite Team With DORA Metrics

Aggregated on: 2022-10-04 04:13:21

Organizations have been attempting to measure software development productivity for decades. Too often, attention has concentrated on easily-quantifiable metrics like person-hours, lines of code committed, function points, or features added per sprint. Sadly, none of these have proven adequate at predicting team productivity. It’s such a complex problem that some have declared it impossible to solve. Despite these failed attempts, DORA set out to establish measures of development productivity.

View more...

README [Comic]

Aggregated on: 2022-10-04 02:28:21

View more...

The Importance of Monitoring in the Kubernetes ERA!

Aggregated on: 2022-10-03 22:43:20

Monitoring Kubernetes involves monitoring cluster resources and all the nodes, as well as monitoring pods, deployments, and services.  Know more about Kubernetes monitoring and why it is important for a seamless Kubernetes deployment here in this blog! Pearson, a leading education company, serving 75 million students across the world, uses Kubernetes to run some of its applications. The company states that there has been a rise of 15-20% in the productivity of developers after adopting this open-source container orchestration platform.

View more...

Go CDK! What This Means for the World of IaC

Aggregated on: 2022-10-03 22:13:20

CDK has landed, and the AWS community is hyped - it was all the rage at the last AWS re: Invent, and that’s why I’d like to talk about what CDK introduces to an IaC world.  CDK is a game changer for all things infrastructure as code for AWS resources, and in this post, I’m going to dive into why that is, what it introduces, and how you can get started and even migrate existing resources. So we’re on the same page; what exactly is AWS CDK?  CDK, AKA AWS Cloud Development Kit, is the successor of AWS’ CloudFormation that has been used to date for automating and codifying AWS cloud resources.  Because of CloudFormation’s inherent limitations, this opened the door for the popular infrastructure as code tools we have all grown to love, such as Terraform and Pulumi that, while they are not AWS native, still often delivered better IaC results than CloudFormation (particularly with diverse stacks).

View more...

Intro and Short Tutorial on Data Annotation With Label Studios

Aggregated on: 2022-10-03 22:13:20

What Is Data Annotation? Data annotation is the process of labeling each point of a dataset to show the actual output that the supervised machine learning model needs to predict. It is the process of categorizing and labeling data, meaning that the user would take each data point available and manually classify it for the machine learning model to use.  For example, to build a machine learning model that takes an image of a cat or a dog and can differentiate and predict which animal is found inside the given image, then the user will need (for example) to feed the model 1,000 images of both animals (500 images for cats and 500 for dogs). For this to work, before feeding the model these images, each image should be labeled as either a dog or a cat. Labeling each image into one of these two categories before running them through the model is what data annotation is.

View more...

Inspect the Contents of the Java Metaspace Region

Aggregated on: 2022-10-03 21:13:20

JVM Memory has the following regions: Young Generation Old Generation Metaspace Others region

View more...

How To Validate Names Using Java

Aggregated on: 2022-10-03 20:43:20

Names are an important part of our identity.  When someone we meet for the first time remembers our name the next time we see them, it communicates a level of respect, indulging our feeling of self-importance and strengthening the connection we feel with that person in return. Conversely, when we forget or incorrectly remember someone’s name - or when they do the same to us - that disappointing, negative impression might never go away.  As such, in any customer-centric business (and one might reasonably consider all businesses to be customer-centric), finding a way to record names correctly is the first step toward maintaining a positive, fruitful relationship with those customers in the future.  As the burden of recording and administrating names falls more and more exclusively to automated, client-facing web pages (for example, the "create an account" page found on many businesses' websites), a few important questions arise, such as: 

View more...

Data Privacy Mechanisms and Attacks

Aggregated on: 2022-10-03 20:13:20

A large volume of sensitive personal data is collected on a day-to-day basis by organizations like hospitals, financial institutions, government agencies, social networks, and insurance companies. The purpose of the organization can be to extract and publish useful information about the data while protecting the private information of individuals. Data privacy laws, regulations, and issues come up when an organization wants to share or publish private data of individuals while at the same time wanting to protect their personally identifiable information.

View more...

Introducing Kumologica CLI

Aggregated on: 2022-10-03 19:43:20

Kumologica SDK release is a major milestone for Kumologica products to be used in an enterprise environment. It combines all products into a single npm package. It elevates the command line interface as a primary interface for running designer, building binaries, testing and deployments. Kumologica SDK consists of 4 products:

View more...

Install Docker, Kubernetes and Minikube on Linux Mint

Aggregated on: 2022-10-03 17:43:20

1. Install Docker  Docker container packages up the code of an application and all its dependencies so that the application can run unchanged in any environment. A Docker container includes everything needed to run an application: code, runtime, system tools, system libraries, and settings. More about Docker here and here. In Linux Mint, open a terminal and type: 

View more...

Using CockroachDB CDC With Azure Event Hubs

Aggregated on: 2022-10-03 16:28:20

Previous Articles on CockroachDB CDC Using CockroachDB CDC with Confluent Cloud Kafka and Schema Registry SaaS Galore: Integrating CockroachDB With Confluent Kafka, Fivetran, and Snowflake CockroachDB CDC Using Minio as Cloud Storage Sink CockroachDB CDC With Hadoop Ozone S3 Gateway and Docker Compose Motivation Azure Event Hubs is a critical part of the Azure ecosystem. We're in the early stages of adopting Azure and while we focus on the official integration, I'd like to provide workarounds in the meantime. This tutorial is using enterprise changefeeds: you will need an enterprise license, access to a CockroachDB dedicated cluster, or enable billing in your CockroachDB Serverless cluster to activate enterprise features like CDC to Kafka.

View more...

Managing Application Dependencies in the Cloud: Strategies and Best Practices

Aggregated on: 2022-10-03 16:28:20

What Is Application Dependency Mapping? Application dependency mapping (ADM) enables you to create a comprehensive map of the entire ecosystem. It helps avoid blind spots that allow mistakes or breaches to occur. ADM solutions can identify and map all instances, applications, and communication channels across the ecosystem, including ports and services.  There are various ADM solutions, including vendor native, open source, and commercial vendor-agnostic tools. A vendor-agnostic solution can quickly and easily identify subnets, VPCs, and security groups on several cloud providers like Microsoft Azure, Google Cloud, and Amazon Web Services (AWS).

View more...

Docker Introduction, Architecture, and Command Details

Aggregated on: 2022-10-03 15:43:20

Docker Overview Its primary focus is to automate the deployment of applications inside software containers and the automation of operating system-level virtualization on Linux. It’s more lightweight than standard containers and boots up in seconds. Why Does Docker Come Into the Picture? Before Docker, all of us faced many issues. For example, when we built the application and after testing all the scenarios, we passed them to the QA environment, and then on the machines of QA members, we needed to take care of all the dependencies and versions of assemblies and frameworks. So there is a gap between the QA and the development team, and it also wastes time. So, when we use Docker, this problem will get sorted, and we can use Docker Images on any platform without too much configuration.

View more...

Data Quality Monitoring — You’re Doing It Wrong

Aggregated on: 2022-10-03 13:28:20

Occasionally, we’ll talk with data teams interested in applying data quality monitoring narrowly across only a specific set of key tables.  The argument goes something like: “You may have hundreds or thousands of tables in your environment, but most of your business value derives from only a few that really matter. That’s where you really want to focus your efforts.”

View more...

Top Posts of 2013: 10 Subtle Best Practices when Coding Java

Aggregated on: 2022-10-03 11:58:20

 this is a list of 10 best practices that are more subtle than your average   josh bloch effective java   rule. while josh bloch’s list is very easy to learn and concerns everyday situations, this list here contains less common situations involving   api / spi     design that may have a big effect nontheless.    i have encountered these things while writing and maintaining  jooq  , an  internal dsl  modelling sql in java. being an internal dsl, jooq challenges java compilers and generics to the max,  combining generics, varargs and overloading  in a way that josh bloch probably wouldn’t recommend for the “average api”.

View more...

10 More Common Mistakes Java Developers Make when Writing SQL

Aggregated on: 2022-10-03 11:58:20

i was positively surprised to see how popular my recent listing about   10 common mistakes java developers make when writing sql   was, both  on my own blog  and  on my syndication partner dzone  . the popularity shows a couple of things: how important sql is to the professional java world. how common it is to forget about some basic sql things. how well sql-centric libraries such as  jooq  or  mybatis  are responding to market needs, by  embracing sql  . an amusing fact is that users have even mentioned my blog post on  slick’s mailing list  . slick is a non-sql-centric database access library in scala. like  linq (and linq-to-sql) it focuses on language integration  , not on sql code generation. anyway, the common mistakes i listed previously are far from complete, so i will treat you to a sequel of 10 subtly less common, yet equally interesting mistakes java developers make when writing sql.

View more...

React Hooks - A Short Introduction

Aggregated on: 2022-09-30 20:44:02

In this tutorial, we'll go over how to use and understand React Hooks. This article is an extension of article how-to-manage-state-with-hooks-on-react-components. It has been expanded with other Hooks and logic and Lessons Learned. Here we create a simple product page with a shopping cart (see image 2). The shopping cart represents the memory (or the 'state') of the product page. The state generally refers to application data that must be tracked.

View more...

Improve Your Application's Serialization Through Efficient Object Marshaling

Aggregated on: 2022-09-30 20:14:02

Efficient code doesn't just run faster; if it's using less compute-resource, it may also be cheaper to run. In particular, distributed cloud applications can benefit from fast, lightweight serialization.  OpenSource Java Serializer Chronicle-Wire is an OpenSource Java serializer that can read and write to different message formats such as JSON, YAML, and raw binary data. This serializer can find a middle ground between compacting data formatting (storing more data in the same space) versus compressing data (reducing the amount of storage required). Instead, data is stored in as few bytes as possible without causing performance degradation. This is done through marshaling an object.

View more...

Deploying MWAA Using Terraform

Aggregated on: 2022-09-30 20:14:02

In a previous post, I showed you how to use AWS CDK to automate the deployment and configuration of your Apache Airflow environments using Managed Workflows for Apache Airflow (MWAA) on AWS. In this quick how-to guide, I will share how you can use Terraform to do the same thing. You will need:

View more...

Best Practices for Building a Cloud-native Data Warehouse or Data Lake

Aggregated on: 2022-09-30 19:29:02

The concepts and architectures of a data warehouse, a data lake, and data streaming are complementary to solving business problems. Storing data at rest for reporting and analytics requires different capabilities and SLAs than continuously processing data in motion for real-time workloads. Many open-source frameworks, commercial products, and SaaS cloud services exist. Unfortunately, the underlying technologies are often misunderstood, overused for monolithic and inflexible architectures, and pitched for wrong use cases by vendors. Let's explore this dilemma in a blog series. Learn how to build a modern data stack with cloud-native technologies. This is part 5: Best Practices for Building a Cloud-Native Data Warehouse or Data Lake. Blog Series: Data Warehouse vs. Data Lake vs. Data Streaming This blog series explores concepts, features, and trade-offs of a modern data stack using a data warehouse, data lake, and data streaming together:

View more...

Embedding a Microservice Into Another

Aggregated on: 2022-09-30 18:59:02

Embedding a microservice into another means that a microservice can be run in the same execution context as a parent microservice. Such a mechanism is natively available in Jolie, a service-oriented programming language. Since it is not a native mechanism available in mainstream technologies, it is not widely used. But it allows dealing with microservices from a new and different perspective that opens up new ways for composing them. In this article, I will explain why. What Is Embedding? In the following diagram, the main concept behind embedding is reported.

View more...

The 5 Must-Have Embedded Analytics Capabilities

Aggregated on: 2022-09-30 16:29:02

In today’s data-rich and fast-paced business environment, it is quite evident that an organization’s success heavily relies on data insights that embedded analytics software can provide them with. With this in mind, choosing the right embedded analytics software to integrate into your applications is crucial, and I know that is not an easy task. To help you narrow your search and better evaluate different software solutions that you might consider partnering with, I made this list of the 5 must-have embedded analytics capabilities so that you can make the best decision for your business.

View more...

EDI Integration Platforms: Benefits and Limitations

Aggregated on: 2022-09-30 15:44:02

While Electronic Data Interchange (EDI) has been extensively used since the late 1960s, there are many companies that rely on legacy systems for streamlining B2B transactions. Legacy B2B transactions, such as Purchase Orders, Invoices, Advance Ship notices, Sales Orders, and Functional Acknowledgement receipts, encompass a set of steps to process. In order to process these business transactions, companies need access to multiple paper documents and a lot of human intervention, which makes them prone to mistakes and risky errors. However, with the support of EDI, the use of paper documents is almost eliminated.  EDI empowers companies to automate data exchange between different applications across supply chain ecosystems. This particular process ensures that complex, bi-directional data is transferred and exchanged on time. According to a market report, the market size was expected to reach $2.1 billion by 2018 and $2.1 billion by 2020. But what are the benefits of EDI over legacy solutions of business communication and data exchange? 

View more...

Data Management With CI/CD

Aggregated on: 2022-09-30 15:44:02

I remember my first day as a junior dev. It’s still fresh in my mind like it was yesterday. I was terribly nervous and had no idea what I was doing. My anxiety must have been evident because a kind soul decided to take me under their wing. That day I learned how to write SQL in my PHP code to do interesting things with the database. Before I could start, though, I had to ask the database administrator (DBA) to create a few tables. I quickly realized that the DBA was the go-to person if you wanted to get anything done. Need a new column? Call the DBA. Does a stored procedure have to be edited? It was a job for the DBA. I looked up to him. He was such a superstar that I went on to be a DBA myself for a spell later in my career.

View more...

Getting Started With Robotic Process Automation

Aggregated on: 2022-09-29 22:14:01

Technologies such as artificial intelligence (AI), machine learning (ML), and natural language processing (NLP) have led the way to software robots that reduce the manual, time-consuming, and repetitive actions performed on digital platforms. The concept of automating tasks on digital platforms is called robotic process automation (RPA). RPA is a software robot that interacts with computer-centric processes and aims to introduce a digital workforce that performs repetitive tasks previously completed by humans. This Refcard introduces RPA technology, how it works, key components, and how to set up your environment.

View more...