News Aggregator


The Data Journey

Aggregated on: 2022-09-22 16:28:57

During the last few years, I talked to many retailers and other large tech companies dealing with Data. I've observed the same pattern repeatedly so far: these organizations are in the middle of three steps process, which usually takes more than 5 years.

View more...

Using Hazelcast in Spring Boot Running on Kubernetes

Aggregated on: 2022-09-22 16:28:57

Whereas Kubernetes is the target environment of application execution, you will not find here how to declare required services or deployment most optimally. Some basic Kubernetes configurations are just enough for demonstration purposes. Though, you can use the configurations as a starting point and improve them with the help of Kubernetes Documentation. The theme of Spring's Caching is not fully covered either. So, if you are interested in Cache Abstractions, please refer to the corresponding part of Spring Framework documentation.

View more...

How Does WebAuthn Work?

Aggregated on: 2022-09-22 13:58:57

In my previous post, I discussed why passwords are problematic at best and a severe security threat at worst. However, you probably currently have a password-based authentication solution.  Hopefully, you have implemented some Multi-factor Authentication. You might even have implemented Brute Force Password Protection and Breached Password Detection.  But in the end, you realize that passwords are still a problem.   Of course, after reading all that, you probably thought, “But what else is there?” Thankfully, some very smart people have been working on this problem.  They formed an organization, worked on the problem, and came up with a delightfully effective solution.

View more...

Microservices vs APIs: Understand the Difference

Aggregated on: 2022-09-22 13:28:57

If you are reading this blog, that means you have heard the terms: APIs and Microservices Development. But many folks have misconceptions that microservices are fine-grained web services or that APIs are equivalent to microservices. These all show fundamental misconceptions, so I created this article to break that out and talk about the key differences between Microservices and APIs. If you are one of them, this article will help you understand the difference between those two concepts.  APIs and Microservices both have equal weightage. In this blog, we will understand both APIs and microservices separately, how they both are different from each other, and how they fit together in modern-day web applications. 

View more...

An Introduction to DevOps

Aggregated on: 2022-09-22 12:28:57

DevOps is a big term, wide-reaching and applicable to many things that surround and support software development. For the uninitiated, DevOps can be hard to understand. Is it a culture? A guideline for development processes? A set of tools? Someone's job?

View more...

Rust and ScyllaDB NoSQL: 3 Ways to Improve Performance

Aggregated on: 2022-09-22 01:28:57

At ScyllaDB, we've been working hard to develop and improve the scylla-rust-driver. It’s an open-source ScyllaDB (and Apache Cassandra) driver for Rust, written in pure Rust with a fully async API using Tokio. You can read more regarding its benchmark results and how our developers solved a performance regression.  In different benchmarks, the Rust driver proved more performant than other drivers, which gave us the idea of using it as a unified core for other drivers as well. 

View more...

How a Background Remover Is Born

Aggregated on: 2022-09-21 22:28:56

Why Do I Need a Background Remover? A background removal tool is not really a new feature, but rather its importance has grown as the world shifted over to online working and learning over the last few years. And I did not find how important this tool could be until just two weeks ago. On a warm, sunny morning with a coffee on hand, I joined an online conference. During this conference, one of my colleagues pointed out to me that they could see my untidy desk and an overflowing bin in the background. Naturally, this left me feeling embarrassed. I just wish I could travel back in time to use a background remover. Now, I cannot travel in time, but I can certainly create a background removal tool. So, with this new-found motive, I looked online for some solutions and came across the body or head segmentation capability from HMS Core Video Editor Kit, and developed a demo app with it.

View more...

How I Found a Go Issue on ARM that Crashed the Database Server

Aggregated on: 2022-09-21 21:58:56

TiDB is an open-source, MySQL-compatible, distributed SQL database. Its architecture adopts a layered design. The storage layer is implemented in Rust, while the computing layer is implemented in Go. A distributed database like TiDB is a very complex project. Its performance depends on multiple factors, such as the operating system and the hardware platform it is running on, and the compiling language it uses. In this article, I will share a peculiar Go bug that caused TiDB to crash on the Advanced RISC Machine (ARM) platform.

View more...

Thinking Like a Hacker: Abusing Stolen Private Keys

Aggregated on: 2022-09-21 21:28:56

If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. – Sun Tzu, “Art of War” When you’re on the Blue Team, you’re expected to understand the systems you have to secure and the configurations to look out for. New vulnerabilities and attack paths are constantly being discovered, and it seems like there is an ever-growing list of things to not do wrong. Sometimes, though, we need to think beyond lists of vulnerabilities and put ourselves in the shoes of an attacker. In this series, we will dissect not just what an attacker can do to get access to credentials, but also what they would do after getting that initial access. We will walk through a different threat scenario in each part of the series and tell stories of malicious hackers that are either true, based on a true incident, or reasonably theoretical.

View more...

Using Pixie to Monitor Strimzi Clusters and Kafka Applications

Aggregated on: 2022-09-21 21:28:56

In this article, we are going to see how to deploy a Kafka cluster in Kubernetes using Strimzi and how to easily monitor it with Pixie. Kubernetes Setup We are going to use Google Cloud, but you can use any cloud provider or on-prem solution.

View more...

Comparing Two Arrays Using Dataweave

Aggregated on: 2022-09-21 21:28:56

While Dataweave 2.0 provides several out-of-the-box functions to transform the data, sometimes we need to orchestrate more than one such function to achieve the desired result. One such thing we often encounter is comparing two arrays and finding out the differences. Let's check out the different scenarios and see how we can achieve them. Scenario 1: Comparing Two Arrays With Identical Structure In this case, both arrays will have the same fields. If we want to see the items which are present in array 1 but not in array 2, we can use the "--" function.

View more...

The Block Allocation Policy of Virtual Distributed File System at the Source Code Level

Aggregated on: 2022-09-21 21:28:56

Alluxio workers are responsible for managing local resources, and they store data as blocks. Users can allocate different storage tiers as the resources for Alluxio workers, including MEM/SSD/HDD, which are further composed of directories.  How does an Alluxio worker decide which directory to put a block in when a user reads or writes data through Alluxio? In this article, we analyze the policies of block allocation from the source code.

View more...

Jeff Gothelf: Outcome-based Product Planning

Aggregated on: 2022-09-21 21:28:56

In this energizing 43rd Hands-on Agile session on outcome-based product planning, Jeff Gothelf clarified one thing: “Roadmapping is a flawed concept in the age of Agile. Maps, by their definition, are linear, and we don’t build linear products and services anymore. We build continuous systems.” Learn more about what he considers product roadmap flaws and what you can do about them. Outcome-based Product Planning Roadmapping is a flawed concept in the age of Agile. Maps, by their definition, are linear and we don't build linear products and services anymore. We build continuous systems. Nevertheless, we have to be able to create and provide some plans for our teams, leaders and customers to set expectations about the ongoing improvements and future of the services we build. How do we communicate that effectively in a continuous world? How do we ensure the voice of the customer is included in these plans?

View more...

Real-Time Streaming ETL Using Apache Kafka, Kafka Connect, Debezium, and ksqlDB

Aggregated on: 2022-09-21 21:28:56

As most of you already know, ETL stands for Extract-Transform-Load and is the process of moving data from one source system to another. First, we will clarify why we need to transfer data from one point to another; second, we will look at traditional approaches; finally, we will describe how one can build a real-time streaming ETL process using Apache Kafka, Kafka Connect, Debezium, and ksqlDB. When we build our business applications, we design the data model considering the functional requirements of our application. We do not take account of any kind of operational or analytical reporting requirements. A data model for reporting requirements is to be denormalized, whereas the data model for operations of an application is to be mostly normalized. So, for reporting or any kind of analytical purposes, we are required to convert our data model into denormalized form. 

View more...

CockroachDB Multiregion Abstractions for MongoDB Developers With Ferretdb

Aggregated on: 2022-09-21 21:28:56

What started as an experiment turned into a series of articles on FerretDB and CockroachDB. There are a lot of untapped opportunities realized by FerretDB backed by CockroachDB; some of those capabilities are computed columns with secondary indexes, partial indexes, constraints, spatial capabilities, JSONB operators, multi-region abstractions and of course correctness and consistency. Today, we're going to discuss CockroachDB multi-region capabilities and how they can help the MongoDB converts. High-level Steps Start a 9-node multi-region cluster (CockroachDB Dedicated) Start FerretDB (Docker) Multiregion REGIONAL BY TABLE GLOBAL Follower Reads REGIONAL BY ROW Considerations Conclusion Step-by-Step Instructions Start a 9-Node Multi-region Cluster (Cockroachdb Dedicated) I am going to use the same CockroachDB Dedicated cluster from the previous article. Please refer to the previous article for the detailed steps. You can get a 30-day trial of CockroachDB Dedicated following this link.

View more...

How to Solo Stake on Ethereum After The Merge

Aggregated on: 2022-09-21 20:28:56

Ethereum’s transition to Proof-of-Stake (dubbed The Merge) is easily the most significant and anticipated improvement of the blockchain network since its genesis in 2015. The Merge has been in the works for as long as Ethereum has been live, and it will occur at Total Terminal Difficulty (TTD) 58750000000000000000000, or somewhere between September 13th and 15th.   The Ethereum community, whether they are developers, stakers, or end-users, obviously have many questions related to preparing themselves for the Merge, depending on how they interact or build on top of the network. 

View more...

Infura’s Decentralized Infrastructure Protocol And Why It Matters

Aggregated on: 2022-09-21 19:43:56

At ETH Berlin recently, Infura announced plans for a new decentralized infrastructure network. This decentralized network has the potential to vastly improve how Web3 developers and end-users access and interact with the data on blockchains. Why is this a big deal? And what could it mean for Web3? Let’s take a look.

View more...

How to Secure Your APIs

Aggregated on: 2022-09-21 19:43:56

Today, APIs are used by nearly every company as a way to connect software applications and services. Many businesses rely on APIs so heavily that they see them as an essential part of their business strategy. This is because APIs make it easier for developers to access and integrate code from one application with another, leading to all kinds of new products, services, and experiences. But all this ease of use can also make APIs incredibly risky if not properly secured. For example, if a developer uses a third-party API with security loopholes -- like perhaps the API doesn’t require authentication or authorization -- there’s the potential that hackers could find and exploit those weak points. What’s more, if a business exposes its API to unauthenticated users, there’s the risk that someone could develop malicious software that interacts with the API in unauthorized ways. What Is API Security? API security is the practice of securing APIs against potential threats and risks. Every company that provides an API needs to carefully consider the risk to the business and customers associated with that API. The first step is to identify the potential threats against the API and then mitigate them by implementing a comprehensive set of controls and best practices. This ensures that only authorized users can interact with an API and prevents any malicious activity. API security is not just about protecting a company’s platform; it’s also about safeguarding the developer community that relies on that platform. APIs are at their most effective when developers are using them to create innovative solutions for customers. When security is poor on the API side, though, the entire ecosystem can suffer. This can lead to users abandoning certain solutions, developers losing trust in the API provider, and brand reputation damage.

View more...

Introduction to Kubernetes Extensibility

Aggregated on: 2022-09-21 19:43:56

Kubernetes offers a lot of benefits: an enormous ecosystem with plenty of actors, self-healing capabilities, etc. There's no free lunch, though. It also comes with downsides, chief among them its complexity and operating costs. However, the more I work with Kubernetes, the more I think its most significant asset is extensibility. If you need something that the platform doesn't provide by default, there's an option to develop it yourself and integrate it. In this post, I'd like to list such extension points.

View more...

Top Mobile App Development Frameworks

Aggregated on: 2022-09-21 19:13:56

The overall digital transformation of business requires organizations to develop custom products. Moreover, launching a company website alone is no longer sufficient—mobile applications become an integral part of a successful sales pipeline, even for small businesses. And there are some statistics behind it. An average American spends almost 90% of their mobile time (more than four hours a day!) on applications. There are already over six billion smartphone subscriptions worldwide. And this number is set to reach 7.7 billion by 2027. By March this year, there were 2.6 million apps in the Google Play Store. Since building enterprise applications became popular, the entire process has been simplified in many ways. Using frameworks is one of them. Here’s a guide to the best mobile app development frameworks that will help you understand the latest trends.

View more...

Advanced Maintenance of a Multi-Database Citus Cluster With Flyway

Aggregated on: 2022-09-21 17:43:56

In the previous post, fundamental concepts of the maintenance and administration of a Citus cluster were introduced. In this post, we will discuss those concepts in greater detail, with specific examples and solutions for common problems. Separation of Concerns The first topic that needs to be addressed is "what exactly goes into the maintenance scripts?"

View more...

The 5 Most Pivotal and Innovative Additions to OpenJDK 19

Aggregated on: 2022-09-21 17:13:56

Although OpenJDK 19 is not an LTS, it is still a significant release, in my opinion. It includes several game-changing features that will alter the Java landscape. Many features intrigue my interest, but there are five in particular that I can't wait to try out. Let's break those down and talk about them separately.

View more...

Elasticsearch TLS Activation: X-Pack Security

Aggregated on: 2022-09-21 16:43:56

TLS (Transport Layer Security) is the general name of a standardized encryption protocol for inter-network communications. Transfer Protocol, on the other hand, is a special name that Elasticsearch uses for data transfer. On the Elasticsearch side, the TLS structure is used to ensure data transfer between clusters (nodes) in an encrypted manner and to prevent nodes that do not provide the relevant encryption certificate from connecting to the existing cluster structure unannounced. Along with this, we will also activate the xpack.security module.

View more...

Java Observer Pattern With Spring AOP and a Custom Annotation

Aggregated on: 2022-09-21 16:13:56

The Java Observer Pattern is among the most interesting patterns. It allows the injection of some functionality into a system, or part of a system, with minimum impact on the existing code. In this article, we present a specific solution that implements this pattern, using features like Spring Aspect Oriented Programming (AOP), Spring BeanPostProcessor,  and custom annotations.  This solution explains how to extend a system by catching its main events and attaching the wanted functionality. We already explained a strategy to extend an existing system in this article: Decorator Pattern to Solve Integration Scenarios in Existing Systems. There we talked about the Java Decorator Pattern.  The main difference compared to that design is that here we do not replace an object with a decorated version, but we catch events with specific payloads and trigger new features on those events' occurrences. 

View more...

The Importance of Purpose-Built Embedded Analytics Software

Aggregated on: 2022-09-21 13:43:56

Not all analytics products have been designed to be embedded. Historically speaking, analytics software has undergone a tremendous transformation. From the first databases, structured data, and canned reports in the 1950s, ’60s, and 70s to today’s powerful and advanced analytics software that has become increasingly important for organizations of all industries and sizes for their ability to gain business insights and provide tailored responses to customers.

View more...

Top Challenges in Data Mesh and How a Data Product Platform Resolves Them

Aggregated on: 2022-09-21 13:28:56

The desire for more and better data encourages enterprises to elevate their management landscape, and data mesh is an integral addition to the stack. To put it simply, a mesh decentralizes the architecture and puts the domains in charge of the data capturing and sharing for the entire enterprise. The domain-driven design fits aptly in the hugely anticipated web 3.0. Add to it that the step ahead from traditional fabric solutions aims to bring down management costs, ensure faster streams, and ultimately think of data as a product. Mesh, being a relatively newer concept, attracts challenges for the data teams and expects a more holistic approach. While it made it to the list of hot trends in data and analytics last year, the ongoing 2022 and the coming year will only scale its adoption.

View more...

Non-blocking Database Migrations

Aggregated on: 2022-09-20 22:53:16

Database migrations are a common part of any web application. They are used to update the database schema to match the application's code. In a traditional web application, the database migrations are run synchronously, which means that the application is blocked until the migration is complete. This is not ideal, as it means that the application is unavailable to users during the migration. Long past the days when stopping the service for maintenance was acceptable; we need to be able to run migrations without blocking the application. It's easy to perform database migrations in small databases or if you have no load. But what if you have a large database and a lot of users?

View more...

What Are the Best Front-End Frameworks to Utilize?

Aggregated on: 2022-09-20 20:53:15

Front-end developers are responsible for creating the material users see on their displays. Unquestionably, they are attempting to employ the most acceptable front-end frameworks to deliver the best user experience.  Since many new businesses enter the market every year, the digital industry has become highly competitive. There was an era when only a few competitors established their digital presence and launched their goods and services.  

View more...

What Is Low-code and No-code? And, What’s Their Future?

Aggregated on: 2022-09-20 20:53:15

The need for developers in the market is at an all-time high. However, there is still a lack of talent in the market that can stall business projects for months. To solve it, businesses use low-code/no-code(LCNC) development to create products. It also gives rise to Citizen developers, subject-area specialists participating in the app development process using LCNC platforms.  Intrigued by the idea of developing an application without writing a single line of code? Then, keep reading as we’ll explore low-code/no-code, learn how it works, and understand its ecosystem. We'll also learn about the difference between low-code and no-code development platforms and also look at low-code/no code's future. Let’s get started.

View more...

The Definitive Guide to Cloud Computing

Aggregated on: 2022-09-20 20:23:15

You are working in your office. Suddenly the fire alarm goes off. You rush out. Your colleagues informed you that a short circuit in the IT department led to the fire outbreak. There is more bad news. The main server room had caught fire, and all the servers were affected. This news creates panic and frenzy amongst employees as it may result in the loss of critical company data. Also, employees might have to recreate important files and get them ready in a limited time, resulting in a high-stress environment. However, the CTO informs everyone that we have all the data backed up on the cloud. The data recovery process will complete in a few hours. The loss of data will be negligible. Everyone can resume work from tomorrow.

View more...

Lessons Learned From Programming at Google With Hyrum Wright and Titus Winters

Aggregated on: 2022-09-20 20:23:15

Today, we are releasing the full interview of one of our favorite episodes: Dan’s 2021 conversation with engineers-turned-authors, Hyrum Wright and Titus Winters. As two of the most senior staff engineers at Google, both guests brought a deep understanding of software engineering to the show: Hyrum is semi-famous as the "Hyrum" of Hyrum's Law, while Titus is responsible for managing 250 million lines of code.

View more...

How to Use SQL to Analyze and Visualize Data?

Aggregated on: 2022-09-20 19:23:15

The goal of every business is to perform efficiently, maximize profit and make strategically-guided decisions. In the current business world, the competition is high, and every business needs every edge and advantage they can get to improve its odds of success. Companies that want to stay in business and thrive in the current business world need to employ data analysis. Data analysis plays a role in making decisions more scientific and helping businesses operate more effectively.

View more...

Develop a Simple App: React, GraphQL, Spring Data JPA, UCP, and Oracle

Aggregated on: 2022-09-20 18:53:15

This blog is written to give a succinct description and example of a modern full stack microservice app including a React front-end service that conducts GraphQL queries against a Spring Boot Data JPA back-end service that in turn maps to an Oracle database. As such, I'll start right off with a link to the app source.

View more...

Database Automation with JOOQ

Aggregated on: 2022-09-20 18:53:15

This article will look at how we can automate database interaction in End 2 End automation using the JOOQ library in Java. When we do End 2 End automation of an application, we generally consider 2 parts.

View more...

Introduction to NVIDIA NeMo — Tutorial and Example

Aggregated on: 2022-09-20 18:23:15

NVIDIA NeMo is a toolkit for building new state-of-the-art conversational AI models. NeMo has separate collections for Automatic Speech Recognition (ASR), Natural Language Processing (NLP), and Text-to-Speech (TTS) models. Each collection consists of prebuilt modules that include everything needed to train on your data. Every module can easily be customized, extended, and composed to create new conversational AI model architectures. So let's explain briefly what is the ASR, NLP, and TTS models.

View more...

How to Build a PHP Login Based on a User Account

Aggregated on: 2022-09-20 17:08:15

Websites must have a user login from the client to perform basic tasks. Modern websites use this component most of the time to provide convenience for users. I will teach you today how to create a login system using PHP, MySQL, and Bootstrap (for the design).

View more...

Advantages Microcontainers Have Over Large Containers

Aggregated on: 2022-09-20 17:08:15

The best practices of contemporary development call for the adoption of Docker, Kubernetes, and other container technologies, particularly when adopting a microservices architecture. Enterprise application deployment and usage are changing as a result of containers. The mobility and enhanced efficiency of containers as such are their two key advantages. Software may be executed in containers without having to worry about dependencies or operating systems. As a result, the container streamlines your software architecture and enables you to forego creating a production environment with the appropriate settings and libraries because the container comes equipped with such features by default.

View more...

How To Build a Command-Line Text Editor With Java (Part 2)

Aggregated on: 2022-09-20 17:08:15

Let's continue building our Java-based, command-line text editor that we started here. This is Part 2 of the "How To Build a Command-Line Text Editor With Java" series. We will cover the following: 

View more...

Distributed SQL Essentials

Aggregated on: 2022-09-20 16:38:15

Distributed SQL databases combine the resilience and scalability of a NoSQL database with the full functionality of a relational database. In this Refcard, we explore the fundamentals of distributed SQL, including architecting for availability, handling schema design challenges, using JSON and columnar indexes, as well as assessing approaches to replication.

View more...

Which GitLab Backup Best Practices to Follow?

Aggregated on: 2022-09-20 14:23:15

Creating something new and unique is a difficult task. If you multiply it with the development process, every GitLab user understands that protecting the source code is one of the most demanding but challenging tasks. So, what is the best way to protect the DevOps team’s work? Find the balance and assurance that the development workflow won’t be interrupted or lost under no circumstances. One may ask: “What can happen to GitLab? It is one of the most reliable source code management (SCM) tool providers” Yeap, it is. Though unfortunately, there are a lot of threats like outages, ransomware, and downtime - imagine that even the entire GitLab server or GitLab database can go down. Thus, you and your team should always be ready for any disaster scenario. How? The best way to do it is to build a strong backup strategy for your GitLab data. Moreover, it is a good idea to integrate a default backup strategy into your DevSecOps process and CI/CD pipeline.

View more...

7 Invaluable Advantages of Using Amazon RDS

Aggregated on: 2022-09-20 14:08:15

Is managing and scaling your database becoming a bottleneck as your application grows? Wouldn’t it be great if new databases were made available for your application and capacity added whenever needed?  There might be a solution to address your database problems–  AWS's Relational Database Service (Amazon RDS). Many enterprises, including Netflix, Airbnb, Unilever, Salesforce, and more, use RDS for the convenience and value it offers. And even if you are a small organization, RDS offloads a sizeable chunk of infrastructure management to AWS so that your small teams can focus on more value-added work.

View more...

Java String Intern: Performance Impact

Aggregated on: 2022-09-19 23:23:15

java.lang.String#intern() is an interesting function in Java. When used in the right place, it has the potential to reduce the overall memory consumption of your application by eliminating duplicate strings in your application. To learn how the intern() function works, you may refer to this blog. In this post let’s discuss the performance impact of using java.lang.String#intern() function in your application. Intern() Function Demo To study the performance behaviour of the intern() method, we created these two simple programs:

View more...

Use of Priority and Priority Ranges in Camunda Jobs

Aggregated on: 2022-09-19 22:53:15

In this topic, will learn how to make use of priority and priority ranges in Camunda jobs and, how it gives us a way to run jobs on different Camunda job executors based on the job’s priority. Software Requirement:

View more...

How To Become a Super Human Software Developer

Aggregated on: 2022-09-19 22:23:15

There's a handful of software developers on the planet today that seems to be "superhuman software developers". Linus Torvalds, Alan Kay and Steve Wozniak are some of the primary candidates. They all have one thing in common, which is they've done a lot of the things that they're good at - Something I explain in my previous article. Becoming a superhuman software developer is actually incredibly easy. Do the same thing over and over again, extract learning from the process as you're iterating, and repeat a bajillion times. To write it out in code, imagine the following.

View more...

The Three - Wait: Four - Elements of Empiricism

Aggregated on: 2022-09-19 22:23:15

In its theory section, the Scrum Guide refers to the three elements of empiricism: transparency, inspection, and adaptation. However, a fourth element, foundational to enable empiricism, is hidden in a sentence on Scrum Values. Read on and learn more about the complete picture of Scrum’s empiricism. Empiricism Let’s start with what the Scrum Guide says about empiricism:

View more...

Tracking Aircraft in Real-time With Apache Pulsar and Apache Flink

Aggregated on: 2022-09-19 21:53:15

Use Case: Automatic Dependent Surveillance-Broadcast (ADS-B Analytics) Software Stack: Python 3.10 Apache Pulsar 2.10.1 Apache Pulsar Python Library Apache Spark Apache Flink Java JDK 17 Apache Maven SDKMan Raspian Linux  Hardware Stack: Flightaware Pro Plus Stick (Blue) 1090 MHz Antenna and Cable Raspberry Pi 4 with 2GB RAM USB-C Power Supply References:

View more...

New StackPod Episode: Implementing an SRE Practice

Aggregated on: 2022-09-19 21:53:15

For our latest StackPod episode, we invited Hyke’s DevOps team lead and AWS Cloud architect: Yousef Sedky. Axiom Telecom is one of the largest telephone retailers in the United Arab Emirates and Saudi Arabia, and Hyke, its sister company, is a distribution platform for mobile products. Yousef joined Hyke about 2.5 years ago. His first challenge was to build the architecture from scratch, which was a great experience for him. "All the logistics you don't know about when you're in a corporate company, you come to do it by yourself in a startup company," says Yousef. Yousef and his team learned a lot about DevOps principles and how to incorporate them into their practice, like CI/CD, infrastructure as code, production control, security, centralized logging and monitoring. 

View more...

Top 7 Observability Tools for a Rapid Digital Transformation

Aggregated on: 2022-09-19 21:23:15

Developers worldwide are adopting a microservices architecture to deploy their applications across distributed environments. The need for a comprehensive observability solution has naturally become more significant with the rise of distributed app architecture. Tracking and troubleshooting the components within the environment is challenging, though. Organizations need visibility into these components to understand their application behavior.  And that is where observability tools come into action. But before going deeper into observability tools, let’s understand what observability is. It’s a methodology to observe and regulate the systems autonomously. Organizations are gradually opting for polyglot microservices to reduce cloud complexities and enhance the productivity of their developers. 

View more...

Compliance Automated Standard Solution (COMPASS), Part 3: Artifacts and Personas

Aggregated on: 2022-09-19 19:53:15

In part 2 of this multi-part blog series on continuous compliance, we described our open-source SDK called Trestle which provides an implementation of the NIST Open Security Control Assessment Language (OSCAL) standard framework and the corresponding set of key compliance artifacts expressed as compliance as code. We mentioned that in addition to direct editing and manipulation of OSCAL documents, Trestle also provides capabilities for agile authoring of compliance artifacts as Markdown content and its conversion to OSCAL format. Further, in our first blog in this series, we described various personas and their role in the compliance processes. In this blog post, we will focus on how Trestle enables those diverse personas to collaboratively author the compliance artifacts by providing a variety of interfaces and authoring methods suitable to the broad set of skills of those personas, from editing Markdown and spreadsheets, to editing OSCAL JSON. We also describe how Trestle workflow automation supports the actions that various personas need to take in the compliance end-to-end flow. 

View more...

Stress-Free Deployment Options with Argo Rollouts

Aggregated on: 2022-09-19 19:53:15

Working as a software consultant allowed me to get to know different realities of different companies. These realities were not always the best, and they still aren't. Despite the propagation of DevOps culture for several years, even with the emergence of many tools that facilitate the delivery of software (and many of these tools being freely distributed), many development teams still suffer when they have to deploy software in a production environment. Stress, tension, fear, guilt, and frustration are some of the feelings involved when you don't have a healthy implementation strategy. What Is Progressive Delivery? Users expect their applications to be available at all times. IT professionals expect to deploy their software as quickly and smoothly as possible.

View more...