News AggregatorThe Secret to Staying Relevant Amid Radical ChangeAggregated on: 2022-09-19 19:08:15 It's hard to ignore the fact that our ability to cram more and more transistors onto a microchip — Moore's Law — is showing signs of slowing down. So much so, that tech giants are designing custom chips so they don't have to wait for the next generation of silicon chips to run ever more powerful AI algorithms. Not to mention the growing urgency of climate change and the exponential growth of the trillion-dollar ESG (Environmental, Social, Governance) movement which will likely accelerate demand for faster, cheaper more energy efficient processors. All of which indicates that we could be on the brink of what innovation expert Greg Satell calls the post-digital age. In other words, perhaps it's time to rethink how we compete, collaborate, and bring new products to market. But more than that, argues Satell, perhaps it's time to make wider, deeper connections between talent, technology, and information rather than just moving fast and breaking things. View more...Build an Emoji-Making App EffortlesslyAggregated on: 2022-09-19 18:53:15 Emojis are a must-have tool in today's online communications as they help add color to text-based chatting and allow users to better express the emotions behind their words. Since the number of preset emojis is always limited, many apps now allow users to create their own custom emojis to keep things fresh and exciting. For example, in a social media app, users who do not want to show their faces when making video calls can use an animated character to protect their privacy, with their facial expressions applied to the character; in a live streaming or e-commerce app, virtual streamers with realistic facial expressions are much more likely to attract watchers; in a video or photo shooting app, users can control the facial expressions of an animated character when taking a selfie, and then share the selfie via social media; and in an educational app for kids, a cute animated character with detailed facial expressions will make online classes much more fun and engaging for students. View more...What's Difficult About Problem Detection? Three Key TakeawaysAggregated on: 2022-09-19 18:53:15 Welcome to episode 4 of our series "From Theory to Practice." Blameless’s Matt Davis and Kurt Andersen were joined by Joanna Mazgaj, director of production support at Tala, and Laura Nolan, principal software engineer at Stanza Systems. They tackled a tricky and often overlooked aspect of incident management: problem detection. It can be tempting to gloss over problem detection when building an incident management process. The process might start with classifying and triaging the problem and declaring an incident accordingly. The fact that the problem was detected in the first place is treated as a given, something assumed to have already happened before the process starts. Sometimes it is as simple as your monitoring tools or a customer report bringing your attention to an outage or other anomaly. But there will always be problems that won’t be caught with conventional means, and those are often the ones needing the most attention. View more...Implementing Authorization With User Roles (RBAC)Aggregated on: 2022-09-19 18:53:15 What Is Authorization? Authorization is about answering the question, “Is this user allowed to do a certain operation?”. This is different from Authentication, in which we answer the question, “Which user is this request coming from?” Both are essential to most applications, and as such, we first go through authentication flows to identify who the user is. Then we go through authorization flows in which we decide if the user has permission to do certain operations. View more...The Right Size for a High-Performing Agile Development TeamAggregated on: 2022-09-19 17:53:15 Generally speaking, smaller teams are better, and so do the agile teams. An agile development team should be between 3-9 people. However, modern CIOs believe that 7 is the magical number of an agile team. View more...DevOps and Sustainable SoftwareAggregated on: 2022-09-19 17:53:15 DevOps carries a great number of practices to improve the developing process and continuous enhancements to deliver software applications and services at a better speed and quality. DevOps mirrors business requests, and, as we’re witnessing devastating climate crises worldwide, surely ecological concerns should be within the DevOps set of goals too. View more...The Fire From GodsAggregated on: 2022-09-19 17:08:15 Warning: The following are notes I've taken during an analysis I made upon tools and methodologies for monitoring and observing distributed systems. After the work, I reviewed them to make them a little bit more discursive. My primary goal was to evaluate the use of Prometheus to observe systems enforcing the exposure of contextual metrics of the system's specific business. For sure my goal was not to become an expert in configuring and deploying Prometheus, so don't be disappointed. View more...Automating Microservices on AWSAggregated on: 2022-09-19 16:08:15 Organizations are rapidly moving towards cloud adoption. They are also looking at microservices and an agile way of development, deployment, and testing. With such rapid adoption, large organizations are facing many challenges. In large organizations, generally, there are multiple projects running simultaneously. All these projects would typically have a large number of microservices. This results in hundreds of microservices being under development and a number of individuals and teams with varying degrees of skills, expertise, and experience working on those. The first thing that companies complain about is the lack of proper tagging. With so many microservices being developed, it becomes impossible to trace them without proper tagging. Allocating costs to different projects is also done with the help of tags. Project names, application names, and environment names like DEV, QA, etc., among others, go a long way in managing resources on the cloud better. View more...Computational Aesthetics in Robotics Design and AutomationAggregated on: 2022-09-19 14:08:15 What Is Computational Aesthetics? Computational aesthetics studies the design and appearance of things created using computers. It is relatively new and still in its infancy. However, it has already had a significant impact on the way we think about robotics and automation. Computer aesthetics focuses on how computers can create perfect-looking designs without human interference or input. That means it can allow us to design robots without worrying about how they will look or function once produced. View more...3 Keys to a Successful Continuous Testing ImplementationAggregated on: 2022-09-19 13:23:15 Unless you’ve been hibernating for the past decade or two, I’m sure you have already become well aware of the benefits of continuous testing: reduced cost of development, less waste, improved system reliability, reduced risk upon release, and so on. Of course, you believe putting it into practice in the real world is not as simple as some vendors may have. It’s become clear that having a continuous integration tool configured will not mean that a team successfully achieves continuous testing. Fortunately, we now have more resources than ever to overcome this organizational challenge, such as the ACT Framework. Not long ago, my team and I also released our Ultimate Guide to Continuous Testing, which is very much in line with the philosophy of the ACT framework. In this post, I will share some key considerations and tips from the guide to successfully implement continuous testing. View more...How Sigma Rules Can Help Address the Cybersecurity Skills ShortageAggregated on: 2022-09-19 13:08:15 A global study by Information Systems Security Association (ISSA) and industry analyst firm Enterprise Strategy Group (ESG) shows that the alarming cybersecurity skills shortage problem raged on for the fifth consecutive year in 2021. This skills shortage, which affects 57 percent of organizations, has resulted in increasing workloads for cybersecurity teams, unfilled cybersecurity job vacancies, and high burnout levels among cybersecurity team members. A relatively new tool for cybersecurity teams called Sigma rules offers a mitigation option for the skills crisis. It may not completely eliminate the issue, but it can provide a significant contribution in giving teams breathing room as they deal with the serious impact of not having enough people to address aggressive and evolving cyber threats. View more...How To Create a Restful Web Service Using Tibco Business Works 6 (BW6) Or Container Edition (BWCE)Aggregated on: 2022-09-18 21:38:14 TIBCO Active Matrix Business Works is a middleware product which serves as an integrated foundation for mission-critical IT environments. Powered by a next-generation foundation that includes an Eclipse-based design-time, a powerful process engine and a modular OSGi-based run-time, Business Works 6 enables developers to create new services, orchestrate business processes and integrate applications in the shortest time possible. In this tutorial, we will see how to create a RESTful Web Service using TIBCO Business Works 6 (BW6) or Container Edition (BWCE). TIBCO Business Works Container Edition allows customers to leverage the power and functionality of TIBCO Active Matrix Business Works in order to build cloud-native applications with an API-first approach and deploy it to container-based PaaS platforms such as Cloud Foundry, Kubernetes and OpenShift or to similar Docker-supported cloud platforms. View more...Explaining Performance to Non-technical StakeholdersAggregated on: 2022-09-18 21:38:14 Whether you’re an e-commerce company, a SaaS provider, or a content publisher, understanding the performance of your website is important to everyone on the team—not just the developers. Performance is a huge part of the user experience and is directly tied to how well your website achieves its goals. But web performance is often measured in very technical terms, like Largest Contentful Paint, that cause most business folk’s eyes to glaze over. This language gap is a big part of the reason why many websites are so slow. Many only consider performance from their own perspective—“it’s fast for me”—and leave it at that. We simply lack the vocabulary to talk about the problem. View more...Principles for Building Kubernetes OperatorsAggregated on: 2022-09-18 21:08:14 The automation of data services on Kubernetes is increasing in popularity. And running stateful workloads on K8s means using operators. But engineers are often surprised by the complexity of writing a Kubernetes operator, which impacts end-users. The Data on Kubernetes 2021 Report found that the quality of Kubernetes operators was blocking companies from further expanding their data on Kubernetes footprint. Anynines CEO Julian Fischer – who has built automation tools for nearly a decade – knows a lot about dealing with the complexity of doing stateful on cloud-native platforms and distributed infrastructure such as Kubernetes. View more...Manage Redis on AWS From KubernetesAggregated on: 2022-09-18 20:08:14 In this blog post, you will learn how to use ACK with Amazon EKS for creating a Redis cluster on AWS (with Amazon MemoryDB). AWS Controllers for Kubernetes (also known as ACK) leverage Kubernetes Custom Resource and Custom Resource Definitions and allow you to manage and use AWS services directly from Kubernetes without needing to define resources outside of the cluster. It supports many AWS services including S3, DynamoDB, MemoryDB etc. View more...Apache Doris Storage Layer Design and Storage StructureAggregated on: 2022-09-17 17:38:13 Doris is an interactive SQL data warehouse based on MPP architecture, mainly used to solve near real-time reporting and multidimensional analysis. Doris's efficient import and query are inseparable from the sophisticated design of its storage structure. This article mainly analyzes the implementation principle of the storage layer of the Doris BE module by reading the code of the Doris BE module, and expounds and decrypts the core technology behind the efficient writing and query capabilities of Doris. It includes Doris column storage design, index design, data read and write process, compaction process, version management of Tablet and Rowset, data backup, and other functions. View more...GitHub Actions Security Best Practices [Cheat Sheet Included]Aggregated on: 2022-09-17 17:08:13 This article is the result of a collaboration with C.J. May. “GitHub Actions keep me up at night. I worry that a malicious actor will use GitHub Actions to inject code into one of my repositories unbeknownst to me.” Grayson Hardaway View more...New StackPod Episode: OpenTelemetry - the Future of Observability?Aggregated on: 2022-09-17 16:53:13 OpenTelemetry has been getting a lot of attention in the observability field. Moreover, in StackState’s latest release, we added support for OpenTelemetry traces. Melcom van Eeden, software developer at StackState, was one of our developer champions who made this possible. In addition to joining us on this episode of StackPod, he wrote a blog post on how to leverage OpenTelemetry with StackState and he recorded a tutorial video about the topic. Melcom is obviously very enthusiastic (and knowledgeable) about this technology. You can imagine we had to have Melcom on the StackPod to talk more about this “knight in shining armor,” as he calls it. Melcom has been doing software engineering for a long time. He started in school, picking IT subjects and building what he likes to call “weird stuff.” After school, Melcom started working in IT and got introduced to different databases and programming languages. “I think that piqued my interest,” he says. “I wanted to learn more about different languages and technologies.” View more...Compliance Automated Standard Solution (COMPASS), Part 2: Trestle SDKAggregated on: 2022-09-16 21:53:13 In part 1 of this multi-part blog series on continuous compliance, we detailed the personas and their role in the compliance processes. We concluded that the key to achieving compliance automation and hence continuous compliance is the compliance artifacts programmatic representation, as code, expressed in generic and standard security language terms. In this blog post, we introduce Trestle, our open-source implementation of the NIST Open Security Control Assessment Language (OSCAL) standard framework adopted as a workflow automation of compliance artifacts managed as compliance as code. Trestle enables those diverse personas to collaboratively author the compliance artifacts and offers a platform and OSCAL SDK for teams to automate their specific native processes and formats. Trestle implicitly provides a core opinionated workflow driven by its pipeline to allow standardized interlocks with other compliance tooling platforms. View more...git-secret: Encrypt and Store Secrets in a Git RepositoryAggregated on: 2022-09-16 19:23:13 In this tutorial, we will setup git-secret to store secrets directly in the repository. Everything will be handled through Docker and added as make targets for a convenient workflow. All code samples are publicly available in my Docker PHP Tutorial repository on GitHub. View more...10 Essential Metrics for Effective QA Process MeasuringAggregated on: 2022-09-16 14:23:13 The arrays of produced software are growing exponentially, which means that the amount of test coverage required to guarantee quality is increasing to the same extent. This also leads to that kind of causal relationship — more lines of code, more defects. So, in addition, to prepare the QA team for test automation and optimization, you also need to think about implementing an effective bug reporting tool. However, even with an effective web-based test case management tool in place, it is necessary to understand what progress metrics in software testing need to be applied in order to get a clearer picture of the efficient efforts of quality assurance. In this article, we will analyze what test metrics and measurements are considered essential, which of them are premier in the agile methodology, and which KPI is necessary to track the performance of the team. View more...What Is Encryption? — 6 Top Types of Encryption Methods + ExamplesAggregated on: 2022-09-16 13:53:13 In just 20 years, the internet has gone from being a theoretical tool to a central to every aspect of our daily activities, from communication and commerce to work and data storage. Encryption is a prevalent and practical security approach, making it an excellent alternative for protecting an organization's data. Encryption techniques for data are a reliable method for keeping sensitive data safe. View more...From Ethereum To Flow – An Introduction To The Flow BlockchainAggregated on: 2022-09-16 12:23:13 In the fast-paced world of Web3, there is no shortage of innovative new technologies to explore. If you are a Solidity developer looking to build on a blockchain that is faster, safer, and more scalable than Ethereum, then Flow is an option you can’t ignore. Flow was built from the ground up as an alternative to slower, less user-friendly layer 1 blockchains with its own custom-built smart contract language, one optimized for creating and managing digital assets. View more...Why Mutability Is Essential for Real-Time Data AnalyticsAggregated on: 2022-09-15 21:53:12 Successful data-driven companies like Uber, Facebook, and Amazon rely on real-time analytics. Personalizing customer experiences for e-commerce, managing fleets and supply chains, and automating internal operations require instant insights into the freshest data. To deliver real-time analytics, companies need a modern technology infrastructure that includes three things: View more...Disaster Recovery With Kafka Across the Edge and Hybrid CloudAggregated on: 2022-09-15 19:53:13 I spoke at QCon London in April 2022 about building disaster recovery and resilient real-time enterprise architectures with Apache Kafka. This blog post summarizes the use cases, architectures, and real-world examples. The slide deck of the presentation is included as well. What Is QCon? QCon is a leading software development conference held across the globe for 16 years. It provides a realistic look at what is trending in tech. The QCon events are organized by InfoQ, a well-known website for professional software development with over two million unique visitors per month. View more...OPAL + OPA VS XACMLAggregated on: 2022-09-15 19:23:12 Way back in 2013, various devs were either announcing or debating the death of XACML - yet XACML’s goal to promote a common terminology and interoperability between authorization implementations remains valid, and it still serves as a solid base to describe the structure of authorization architectures. The IAM landscape, authorization included, has evolved drastically in the past couple of years and allowed for new XACML alternatives to be created. This significant shift was a result of the rising demand for increasingly advanced authorization, which was generated by the growing complexity of applications and their migration to microservices and cloud-native structures. With advancements in technology, the emergence of shift-left and low/no-code developers, and the need for event-driven dynamic authorization - a replacement for XACML had to evolve. View more...5 Practices for Kubernetes Operations With Amazon EKSAggregated on: 2022-09-15 19:23:12 In the past several years, organizations of all sizes and verticals have helped to accelerate their IT development pipelines using containerized applications orchestrated by Kubernetes (K8s) and the cloud. But to achieve optimum efficiency, many of these organizations are looking to add other management services. One of the most popular choices for managed Kubernetes is Amazon Elastic Kubernetes Service (EKS). But as organizations expand the adoption of Amazon EKS, the number of K8s clusters and apps can lead to significant operational challenges, including observability, upgrade management, security, and developer productivity. View more...Arduino Data on MQTTAggregated on: 2022-09-15 18:53:12 MQTT is an OASIS standard messaging protocol for the Internet of Things (IoT) and one of the protocols supported by akenza. It is designed as an extremely lightweight publish/subscribe messaging protocol that is ideal for connecting remote devices with a small code footprint and minimal network bandwidth. MQTT is used in various industries. To run this project, we used akenza as an IoT platform, as it runs an open-source MQTT broker from Eclipse Mosquitto. By using a combination of MQTT and API functionalities, we have been able to automatically create Digital Twins for our device. As Hardware, we have chosen an Arduino Uno WiFi Rev2. 1. Configure the Arduino Device 1.1 Set up the WiFi Connection To have the Arduino Uno Wifi able to connect to WiFi, we used the WiFiNINA library, available in the Library Manager of Arduino IDE. 1.1.1 Manage Username and Password To manage Username and Password, we have created an additional header file called arudino_secrets.h " #define SECRET_PASS """ data-lang=""> #define SECRET_SSID "<your username>" #define SECRET_PASS "<your password>" 1.1.2 WiFi Connection Code The code to connect Arduino to WiFi is reported as below: #include "arduino_secrets.h" ///////please enter your sensitive data in the Secret tab/arduino_secrets.h char ssid[] = SECRET_SSID; // your network SSID (name) char pass[] = SECRET_PASS; // your network password (use for WPA, or use as key for WEP) WiFiClient wifiClient; void setup() { //Initialize serial and wait for port to open: Serial.begin(9600); while (!Serial) { ; // wait for serial port to connect. Needed for native USB port only } // attempt to connect to Wifi network: Serial.print("Attempting to connect to WPA SSID: "); Serial.println(ssid); while (WiFi.begin(ssid, pass) != WL_CONNECTED) { // failed, retry Serial.print("."); delay(5000); } Serial.println("You're connected to the network"); Serial.println(); } void loop() {}" data-lang=""> #include <WiFiNINA.h> #include "arduino_secrets.h" ///////please enter your sensitive data in the Secret tab/arduino_secrets.h char ssid[] = SECRET_SSID; // your network SSID (name) char pass[] = SECRET_PASS; // your network password (use for WPA, or use as key for WEP) WiFiClient wifiClient; void setup() { //Initialize serial and wait for port to open: Serial.begin(9600); while (!Serial) { ; // wait for serial port to connect. Needed for native USB port only } // attempt to connect to Wifi network: Serial.print("Attempting to connect to WPA SSID: "); Serial.println(ssid); while (WiFi.begin(ssid, pass) != WL_CONNECTED) { // failed, retry Serial.print("."); delay(5000); } Serial.println("You're connected to the network"); Serial.println(); } void loop() {} 1.2 Set up the MQTT Connection to akenza For security reasons, akenza only supports authenticated connections via MQTT. For this, we have chosen as library PubSubClient to manage our MQTT connection. This enables us to use username and passwords in our connection string. //MQTTClient mqttClient(WiFiClient); char host[] = "mqtt.akenza.io"; char clientid[] = "Arduino"; char username[] = ""; char password[] = ""; char outTopic[] = ""; PubSubClient client(host, 1883, callback, wifiClient); void setup() { if (client.connect(host, username, password)) { Serial.print("Connected to "); Serial.println(host); Serial.println(); boolean r = client.subscribe(outTopic); Serial.print("Subscribed to "); Serial.println(outTopic); Serial.println(); } else { // connection failed // mqttClient.state() will provide more information // on why it failed. Serial.print("Connection failed: "); Serial.println(client.state()); Serial.println(); } }" data-lang=""> #include <PubSubClient.h> //MQTTClient mqttClient(WiFiClient); char host[] = "mqtt.akenza.io"; char clientid[] = "Arduino"; char username[] = "<copy from Akenza Device Api configuration>"; char password[] = "<copy from Akenza Device Api configuration>"; char outTopic[] = "<copy from Akenza Device Api configuration>"; PubSubClient client(host, 1883, callback, wifiClient); void setup() { if (client.connect(host, username, password)) { Serial.print("Connected to "); Serial.println(host); Serial.println(); boolean r = client.subscribe(outTopic); Serial.print("Subscribed to "); Serial.println(outTopic); Serial.println(); } else { // connection failed // mqttClient.state() will provide more information // on why it failed. Serial.print("Connection failed: "); Serial.println(client.state()); Serial.println(); } } View more...Chaos Engineering: Metaspace OutOfMemoryErrorAggregated on: 2022-09-15 17:53:12 JVM memory has the following regions: JVM memory regions View more...Building a Computer Vision Model Using TensorFlowAggregated on: 2022-09-15 17:23:12 What Is Computer Vision? Computer vision (CV) is a major task for modern Artificial Intelligence (AI) and Machine Learning (ML) systems. It is accelerating almost every domain in the industry, enabling organizations to revolutionize the way machines and business systems work. Academically, it is a well-established area of computer science, and many decades' worth of research work have gone into this field to make it rich. The use of deep neural networks has recently revolutionized the field and given it new life. View more...Compliance Automated Standard Solution (COMPASS), Part 1: Personas and RolesAggregated on: 2022-09-15 16:53:12 This is the first part of our series of blog posts illustrating the challenges that organizations and cloud providers face when trying to achieve continuous compliance. The series will provide the key concepts, technologies, and industry standards that lead the way toward an operational, scalable, and effective end-to-end solution. We will start by introducing the compliance personas and their roles and actions in the compliance processes. Understanding the personas, their roles, and needs is key to the design and architectural decisions for the Governance, Risk, and Compliance (GRC) automation detailed in our follow-up blog posts. View more...Are You Crazy Still Using JSF?Aggregated on: 2022-09-15 16:23:12 JSF stands for Java-Server-Faces, which is a web technology that is underestimated by many people. I wonder why is that. And are you actually crazy if you still use JSF? I don’t think so, and I will share some of my thoughts. The Specification First of all, JSF is a specification which is an important advantage over all the other technologies that JSF is usually compared to. The specification is an open process that is accompanied by many developers for years to define a general solid standard for web applications. This specification process has recently taken place in the Eclipse Foundation, which sets up rules that follow very high-quality standards. This is one of the biggest advantages, as it guarantees that your web application is built on a solid core. Of course, other web frameworks also have large communities, but often these are represented by a single company that does not always take the developers into account. Angular from Google is just one example. View more...O11y Guide: Who Are the Cloud-Native Observability Players?Aggregated on: 2022-09-15 15:53:12 This is a continuation of the series taking you on my journey into the world of cloud-native observability. It's a world that is altering the way developers work in their daily jobs, creating new teams, and there are roles appearing to attempt to keep control of the cloud-native complexity that these large-scale architectures deliver. The first article in this series covered how developers have to deal with more than just code in a cloud-native world. It shared a look at cloud-native observability (o11y) and touched on what the three pillars are versus the three phases of observability. View more...How a DevOps Assembly Line Can Speed up Pipeline MovementAggregated on: 2022-09-15 14:53:12 DevOps has changed how code is managed between teams, breaking down silos and increasing productivity by merging developers and operations. It’s an approach founded on agile operations, and its popularity continues to grow within the developer community. Notable for its ability to promote the value of cross-collaboration across the entire lifecycle and pique the interest of many to enter its booming landscape, DevOps has continued to evolve throughout the years. As more and more businesses see the advantages of an agile working environment, there is an even greater need to introduce DevOps assembly lines to the mix. View more...Guide to Custom Software DevelopmentAggregated on: 2022-09-15 14:08:12 Custom software development is a procedure of establishing, designing, deploying, and maintaining software applications to meet the particular requirements of an individual and organization. Contrary to commercial off-the-shelf software (COTS), its main target is to cater to a broad set of requirements, solve particular problems, and permit it to be marketed as a product and distributed as well. For instance: Sitebuilder and Microsoft Office are international software development companies that are packaged and marketed as commercial products and service providers. They are classified to provide the generalized requirements of website development and office productivity. View more...How to Prepare Your Agile QA team for Test AutomationAggregated on: 2022-09-15 12:53:12 1. Dismiss the Wrong Goals It’s not unlikely for your team to be tempted by automation for the wrong reasons. If they are the only structure the QA team can justify the hassle with, you probably don’t really need it. Develop as a tester. Team members that want to grow as specialists deserve all the praise, but automation for the sake of it is not necessarily the answer. Automated tests are just one of the tools that help them find as many bugs as possible in the least amount of time. View more...Experimenting With Unique Constraints in CockroachDB, MongoDB and FerretDBAggregated on: 2022-09-14 22:23:12 Motivation Once I completed my first two articles, I realized there are a lot of possibilities exposed by proxying MongoDB collections through FerretDB backed by CockroachDB. CockroachDB has unique data domiciling capabilities available through multi-region abstractions, inverted and partial indexes, computed columns and of course strong consistency. Today, we're going to discuss unique constraints in MongoDB and CockroachDB. High-level Steps Start a 9-node multi-region cluster (CockroachDB Dedicated) Start FerretDB (Docker) Unique Indexes Considerations Conclusion Step-by-step Instructions Start a 9-Node Multi-region Cluster (Cockroachdb Dedicated) I am going to use the same CockroachDB Dedicated cluster from the previous article. Please refer to the previous article for the detailed steps. You can get a 30-day trial of CockroachDB Dedicated following this link. View more...Utilizing Google Cloud to Enable the Future of Intelligent Software TestingAggregated on: 2022-09-14 21:23:12 A few years ago, our team set out to solve a growing problem for today’s agile development teams: web application testing. We focused on QA automation because it is the most acute pain point for many teams hoping to realize their full DevOps potential. While there are dozens of solutions for testing application quality, most were built for a different era of installed, on-premise software that changed infrequently. In a cloud-native world that expects rapid development cycles, it was clear that a new solution was needed. Our goal was to create a test automation platform that would fit seamlessly into today’s fast-paced Quality Engineering (QE) landscape - a concept that urges teams to create a culture of quality where the silos kept QA and DevOps at odds no longer exist. We also wanted to simplify the test automation problem through the use of machine intelligence. We knew that modern QE teams wanted to avoid the burden of installing, configuring, managing, and scaling a testing solution, so we developed our platform to be a cloud-native SaaS. View more...Getting Started With Nose2 in PythonAggregated on: 2022-09-14 20:23:12 Nose2 is a popular test runner in Python that can detect the unit tests in your project and execute them. If you are familiar with unittest – Python’s standard library and prefer the same over other test automation frameworks in Python – then you should have a brief look at Nose2 Python. Nose2 Python is based on unittest and adds more value to the framework through its rich plugin ecosystem. In simple terms, Nose2 is an extension of the unittest module. Our earlier blog on Selenium Python Nose tutorial took a deep dive into the older version of Nose (1.3.7). It is still being used by a certain percentage of the development and test fraternity. View more...Overview of Android Networking Tools: Receiving, Sending, Inspecting, and Mock ServersAggregated on: 2022-09-14 20:08:12 Today all applications are connected to the Internet in one way or another. When developing simple applications, as a rule, there are no problems. Another thing is when the applications are complex, with many requests to the network. In this case, various tools and libraries can help you to work with the network and search for problems. We will study them in this article. I hope you will find something new, although some things seem familiar to you. Remarks and Assumptions First, I want to draw your attention to some remarks and assumptions: View more...7 Best CI/CD Pipeline Patterns for Deploying SoftwareAggregated on: 2022-09-14 18:23:12 Nowadays, enterprises look forward to delivering their software as early as possible. And for this, they must bridge the gap between rapid development and operational stability. Organizations can leverage approaches like CI/CD and DevOps to achieve this goal. But most enterprises get skeptical regarding the CI/CD vs. DevOps mystery. Despite systems becoming complex, our expectations for best performance remain the same. Therefore, having a safer and faster way of getting your changes into production is critical. Unfortunately, scripts would not be modified and executed multiple times. Also, you need to understand and differentiate various methodologies. View more...5 Reasons to Optimize Data Center Racking and EquipmentAggregated on: 2022-09-14 17:53:12 Today’s data centers are quite different from the physical centers of old. The standard physical and on-site infrastructure still exists and plays an important role. Still, virtual network applications, cloud environments, and well-balanced hardware – to share heavy loads – are the focus. It means administrators often have a little more room to play with if they want to optimize data center hardware and data center equipment. It’s also worth noting that data center racking – the proper placement of server racks – is just as crucial today as ever. The argument for data center optimization is indisputable. Data centers are at the heart of modern operations, considering that nearly every business or organization relies on digital technologies. If a central data center were to go down, it would hinder not just the local operation but also many customers across the country – maybe even across the globe. View more...Lean Roadmapping and OKRsAggregated on: 2022-09-14 15:38:12 In this energizing 42nd Hands-on Agile Lean Roadmapping session, Janna Bastow, the go-to-authority on product roadmaps, talked about being lean while creating and maintaining your roadmap and how objectives and key results (OKR) may help meet that challenge. Lean Product Roadmaps and How To Get There Janna Bastow’s presentation looks at modern product roadmapping best practices, including where lean roadmapping came from and how to put it to use in your organization. In addition, it covers practical tips on moving away from the old-school feature- and delivery-date-driven product roadmap and moving your team on to a leaner, more objective-focused track of product management using OKRs (Objectives and Key Results). View more...An In-Depth Guide to UAT (User Acceptance Testing)Aggregated on: 2022-09-14 15:08:12 User Acceptance testing is considered to be both unique and significant as the tester is someone who is not part of the organization and who has built the product. An end-user is the focal point of this testing method that is provided the necessary resources and the required team support to conduct testing in a real-time production environment. In this article, you will obtain detailed information about user acceptance testing. What Is User Acceptance Testing (UAT)? It is a testing method that verifies whether the software product or application is built according to the business and user-specific requirements. The end-user will be given the opportunity to test the product in a real-time environment and then provide their valuable feedback from a performance, functionality, usability, and user experience standpoint. Based on the feedback provided, the team will further modify or alter the product in order to improve its overall quality. View more...The Rise of Data JournalismAggregated on: 2022-09-14 14:38:12 It is not a secret that data has become an inescapable part of our daily lives. Between online communications, electronic business records, social media, and other types of passive and active data collection, the internet of things around us has massively encircled our day-to-day activities. There is data in every nook and corner of the world, whether it is about playing with numbers back in elementary school or working with large amounts of big data at your workplace. Data has meddled in our lives smoothly and has significantly made them simpler and faster. However, data consists of much more than just bits and numbers. View more...Cloud SQL Guidelines for Cloud Database AdministrationAggregated on: 2022-09-14 14:38:12 Cloud hosting is more common than ever. A growing number of organizations are resorting to cloud computing. Therefore, the market for cloud hosting services was over $405 billion last year and is growing around 19% a year through 2029. As more companies become reliant on cloud computing, they need to find efficient ways to organize databases stored in the cloud. Fortunately, Google offers a solution known as Cloud SQL. Pearson, Macy's, DISH, and AAA use Cloud SQL to manage their cloud databases. However, smaller companies use more specialized services, such as Amnesty, which offers Magento Open Source solutions for eCommerce companies. You will need to follow the guidelines listed below to make the most of it. View more...Implementing AI in Testing: Is It Worth It?Aggregated on: 2022-09-14 14:38:12 For context, artificial intelligence in this article refers to its modern state and not the ideal goal. We live in a world of narrow or weak AI, which beats humans at individual tasks such as trying out basic troubleshooting options faster than a developer would. We’re still years or decades away from truly strong AI that would do almost anything a human could. It means that artificial intelligence tests won’t happen without human input, but you can minimize the effort that much. How Does AI Implementation Improve the Software Testing Process? Artificial intelligence in software testing is the natural evolution of automated QA. AI test automation goes a step further than emulating manual work. “The machine” also decides when and how to run the tests in the first place. View more...Five Minute Cloud Lambda FunctionAggregated on: 2022-09-14 11:53:12 Serverless computing is pretty cool. You need something done in the cloud. It might be storing a GPS location. Or pulling some from a DB based on a few query parameters. But building a complete server instance would be overkill. You just need an API endpoint to accept a query and spit back a result. View more...Using Pausers in Event LoopsAggregated on: 2022-09-14 02:23:11 Typically in low-latency development, a trade-off must be made between minimizing latency and avoiding excessive CPU utilization. This article explores how Chronicle’s Pausers — an open-source product — can be used to automatically apply a back-off strategy when there is no data to be processed, providing balance between resource usage and responsive, low-latency, low-jitter applications. Description of the Problem In a typical application stack, multiple threads are used for servicing events, processing data, pipelining, and so on. An important design consideration is how threads become aware that there is work to do, with some general approaches including: View more...AWS Lightsail: Custom Domain and SSL SetupAggregated on: 2022-09-14 02:08:11 Previously, I've written about Amazon Lightsail, a Virtual Private Server (VPS) offering built on top of secure, reliable, and scalable AWS infrastructure. If you are new to Lightsail, I'll recommend reading the previous post, as we will be building on top of that learning. View more... |
|
|