News AggregatorEngineering Manager: Effective CommunicationAggregated on: 2022-11-05 01:43:39 In this article, a follow-up to the engineering manager series, we will analyze the challenges of communication and some tips to improve the process. There are many definitions of communication, but a simple way we could define it for the context of this article is a process by which information is exchanged between people, the organization and the employees, the engineering manager and the engineers, teams or departments. View more...Thinking Like a Hacker: Commanding a Bot Army of Compromised Twitter AccountsAggregated on: 2022-11-05 01:43:39 About This Series Last time, a malicious hacker got access to Poor Corp’s internal git repositories and used an open-source secret scanner to find and steal AWS keys. Using the stolen keys, the hacker gained deep access to Poor Corp’s major SaaS services and stole all their customer data. In this series, we will dissect not just what an attacker can do to get access to credentials, but also what they would do after getting that initial access. We will walk through a different threat scenario in each part of the series and tell stories of malicious hackers that are either true, based on a true incident, or reasonably theoretical. View more...AWS re:Invent 2022 — Join Us for the BuildOn.AWS TrackAggregated on: 2022-11-04 21:13:39 AWS re:Invent 2022 is right around the corner, and as always, it will offer plenty of learning opportunities for developers, engineers, and others who want to build new and innovative things on AWS. First held in 2012, AWS re:Invent is the company’s annual learning conference for the global cloud computing community. Scheduled to take place in Las Vegas, Nevada, from Monday, November 28, to Friday, December 2, it will feature over 1500 sessions. If you are joining us at AWS re:Invent 2022, then the BuildOn.AWS (BOA) track is definitely something to look out for! The sessions on this track are specially curated for builders with a focus on how to build real-world solutions, deep dive into the architecture and code. View more...How To Run Ganache in a BrowserAggregated on: 2022-11-04 17:43:39 When developing Web3 projects, it helps to have a local blockchain devnet for testing. Ganache is one of the most popular tools for this in the Ethereum ecosystem and part of Truffle. Ganache allows you to set up a local blockchain with different settings to thoroughly test your smart contracts before deployment. Seeing a local blockchain’s output in the terminal helps you to understand how your project will behave in a live environment. The ability to set the output to variables to manipulate some front-end code is even more useful. Some users may not know that you can do this by running Ganache in your browser. View more...Evolution of Technical Career After SeniorAggregated on: 2022-11-04 17:13:39 Just like engineering, the experience and impact of software creation are changing. The technical career also suffered this effect and has been changing over time. That's what we're going to talk about in this article: Staff-Plus Engineer. Indeed, this change will continue; software engineering is constantly evolving, so the positions also need to develop. View more...How To Stay Happy and Relevant as a Java Developer Over DecadesAggregated on: 2022-11-04 16:13:39 At this year’s Antwerp edition of the Devox Java conference, I attended some talks that managed to really inspire me, which is a rare gift. It made me think of my own 20+ year career as a developer and how I want/expect to spend the remainder. I like to share these thoughts here, giving credit to the excellent speakers where credit is due. Here are my three conclusions for the impatient: Been there, done that? I don’t buy it. You can never have been everywhere or done everything. The Java universe expands faster than anyone can keep up with, so don’t burn yourself out. The world needs excellent craftspeople more than it needs people to manage them. Don’t become a victim of the Peter Principle. If you aspire to a different job only for its status and are incompetent at it, you make more than one life miserable. Focus on Skills That Age Like Wine The biggest challenge is to stay relevant and sane in an ever-changing ecosystem. Choose your battles wisely, I say. Software products age like milk, not like wine or a Stradivarius violin. Language mastery gets rusty, however sharp your long-term memory. Your favorite JavaScript test framework has sprouted green hairs by the time you’re back from holidays. The half-life of technical relevancy is to two to five years (Learning through tinkering by Tom Cools). Is it any wonder some throw in the towel from pure frustration in trying to keep up? Apparently, the average developer is 28 and leaves the trade after 8 years, according to a statistic quoted by Tobias Modig (Get old, go slow, write code). Standard deviation is likely to be high, judging from the more senior attendees in the audience. So, take it with a pinch of salt. View more...Automation Testing vs. Manual Testing: Will Automation Replace Manual QA?Aggregated on: 2022-11-04 13:43:39 Software testing is one of the most rapidly growing tech industries. The software testing market is valued at $40 billion in 2021 and $40 billion in 2021 and an anticipated Compound Annual Growth Rate of 6% between 2022 and 2030. The importance of quality assurance in the software industry is not up for debate, which is proven time and time again by seemingly promising solutions that eventually fail due to the lack of testing. “How is a good software product different from a bad one? A good product is both well-developed and well-tested. A bad product can be well-developed or underdeveloped but always undertested. Testing separates good software from bad software and helps the stakeholders ensure that the product is consistent with everyone’s expectations and requirements.” View more...How Can I Use Selenium to Automate Shadow DOM Elements?Aggregated on: 2022-11-04 12:43:38 A shadow DOM element is one that has been programmatically added to an element with the use of JavaScript and whose content does not show up in the browser’s DOM. Automating Selenium tests on your website can save you time and money by ensuring the changes you make are not breaking anything or negatively impacting your user experience. There are multiple ways to do this, but in this guide, we will be going over how to automate shadow DOM elements using Selenium WebDriver. Locate the Host Element The first step is to locate the host element. The host element is the element that contains the shadow tree. It can be any type of element, such as a div, section, or span. Once you have found the host element, you need to use the findElement command to find the shadow root. In order to perform an action on the shadow root, we need to use the executeScript command. To perform an action on one specific node in the tree (e.g., all button nodes), we must find and identify it within our script (e.g., button). View more...The Buzz Around Blazor WebAssemblyAggregated on: 2022-11-03 20:13:38 Due to its potential to modernize web app development, Blazor WebAssembly is gaining huge traction, and the interest and adoption of the framework are growing every day. Not too long ago, C# programmers had to rely on JavaScript for high-end web app projects and use JavaScript to write code for browsers; however, things have drastically changed since Microsoft announced their WebAssembly technology at Build 2020. With it, the possibility of writing C# or running .NET code in the browser without add-ons and plugins is now possible. View more...CWE Top 25 of 2022: Review of ChangesAggregated on: 2022-11-03 20:13:38 The CWE Top 25 list reflects the most serious software security weaknesses. I invite you to read the updated top list to become aware of the changes that happened over the past year. We position the PVS‑Studio analyzer not only as a tool for searching for bugs in code but also as a static application security testing (SAST) tool. For a better understanding of trends and planning of diagnostic rules, there is nothing better than to look at the latest list of the most relevant security issues. There are several such lists, for example, OWASP Top 10, SANS Top 25, and CWE Top 25. View more...The Power of AI-Enabled Data ValidationAggregated on: 2022-11-03 19:13:38 Many organizations are sinking financial resources into improved solutions for data validation. This alleviates concerns over risks associated with making decisions based on poor data quality that could result in significant losses — or even potential company failure. Part of these investments includes innovating in the space of AI (artificial intelligence). The rapid acceleration of AI-enabled tools in today’s marketplace is because of the incredible benefits they represent in saving time, money, and human assets through automation. View more...5 Benefits of Detection-as-Code for Security EngineersAggregated on: 2022-11-03 18:43:38 Threat detection isn't a new concept, and detection and response teams have been around for decades. Today, security teams tasked with keeping their organizations safe must do so in a much faster world filled with ballooning amounts of data, sophisticated adversaries, and increasing cloud complexities. However, many teams are trying to combat threats with processes and approaches that are still designed for the past and tools that have yet to be kept up. In my ten years in incident response, I saw that while security teams had the skills and talent, they needed more effective approaches. What is the best tool that security practitioners can use today? Detection-as-code. Here's why. View more...Structured Error Messages for HTTP APIsAggregated on: 2022-11-03 18:28:38 Ever since I started to work on the Apache APISIX project, I've been trying to improve my knowledge and understanding of REST RESTful HTTP APIs. For this, I'm reading and watching the following sources: Books: At the moment, I'm finishing API Design Patterns. Expect a review soon. YouTube: I'd recommend Erik Wilde's channel. While some videos are better than others, they all focus on APIs. IETF RFCs: Most RFCs are not about APIs, but a friendly person compiled a list of the ones that are. Today, I'd like to introduce the "Problem Details for HTTP APIs" RFC, aka, RFC 7807. View more...Write Your Kubernetes Infrastructure as Go Code - Manage AWS ServicesAggregated on: 2022-11-03 17:58:38 AWS Controllers for Kubernetes (also known as ACK) is built around the Kubernetes extension concepts of Custom Resource and Custom Resource Definitions. You can use ACK to define and use AWS services directly from Kubernetes. This helps you take advantage of managed AWS services for your Kubernetes applications without needing to define resources outside of the cluster. Say you need to use an AWS S3 Bucket in your application that’s deployed to Kubernetes. Instead of using AWS console, AWS CLI, AWS CloudFormation etc., you can define the AWS S3 Bucket in a YAML manifest file and deploy it using familiar tools such as kubectl. The end goal is to allow users (Software Engineers, DevOps engineers, operators etc.) to use the same interface (Kubernetes API in this case) to describe and manage AWS services along with native Kubernetes resources such as Deployment, Service etc. View more...List of Dot Net Interview QuestionsAggregated on: 2022-11-03 17:28:38 One of the most powerful frameworks is NET, which can be used to build various apps for Windows Desktop, Web applications, Windows Phone applications, Windows Store applications, Windows Server, Windows Azure (cloud), Bot frameworks, and cognitive services. If you want to learn more about ASP, you can always try opting for asp.net training online. The demand for competent people that can manage the process of designing apps effectively in the .NET environment has shown to be an industry that is constantly expanding. Let us take a quick look at the asp.net interview questions. View more...Use JMH for Your Java Applications With GradleAggregated on: 2022-11-03 16:28:38 If you want to benchmark your code, the Java Microbenchmark Harness is the tool of choice.In our example, we will use the refill-rate-limiter project. Since refill-rate-limiter uses Gradle, we will use the following plugin for Gradle: View more...Guide to Create CSR for Code Signing CertificateAggregated on: 2022-11-03 15:28:38 Are you a programmer or firm that develops desktop, web, and mobile software or applications? If yes, you must have planned to publish it online so that users can download and install it on their devices. But today, users only install and use software with proper security measures. This can easily be handled by integrating a code signing certificate into your software products. View more...My Favorite Resources for System Design InterviewsAggregated on: 2022-11-03 13:28:38 Hello devs, if you are preparing for a system design interview and looking for the best resources to master software design and system design, then you have come to the right place. Earlier, I shared the best System Courses, Books, and System Interview Questions, and in this article, I will share the best places to learn system design. View more...A Comprehensive Guide to SOPS: Managing Your Secrets Like A Visionary, Not a FunctionaryAggregated on: 2022-11-03 03:43:38 1. Introduction to SOPS 1.1 What Is SOPS? First, let's cut to the chase and get straight to the elephant in the room: what's SOPS? SOPS, which is short for Secrets OPeration*S*, is an open-source text file editor that encrypts/decrypts files automagically—emphasis on the text editor, encryption, and automation. View more...9 Software Development KPIs That High-Performing Teams TrackAggregated on: 2022-11-03 03:13:38 Why Do Software Development KPIs Matter? The most important thing to have for a successful and efficient team in any field is “direction.” And there is no absolute “right” or “wrong” in it. It’s all a relative and contextual concept. And Software Development KPIs (Key Performance Indicators) act as that “north star” which keeps the team heading in the right direction. Software development KPIs are often confused with metrics. Metrics are numbers representing a fact whereas KPIs are things that matter to an organization. Choosing KPIs without evaluating the effects it brings to your team will do more harm than good. As an example “lines of code (LOCs)” could be a metric but should never be a “KPI” for a software development team. View more...API Mocking: Essential and RedundantAggregated on: 2022-11-03 02:43:38 I love contradictions where both states of truth can work at the same time. Case in point this tweet about mocking from the other week: If you use mocks, you are not testing. View more...Advanced BunkerizationAggregated on: 2022-11-03 00:58:38 In this article, I want to delve into some additional measures to the ones I exposed in my first article for Apiumhub, which add a fairly high level of control and protection of systems within our house. I will leave to the reader the choice of applying them or not, depending on their needs. Internal SSL Frequently, when we have a varied ecosystem of applications inside the internal network at home because they are usually part of personal projects, we underestimate internal security in favor of simple solutions such as using a VPN. View more...Implement DevSecOps to Secure Your CI/CD PipelineAggregated on: 2022-11-02 23:28:38 Before understanding DevSecOps, let’s understand what DevOps is. DevOps is the combination of cultural philosophies, practices, and tools that increase an organization’s ability to deliver applications and services at high velocity. In fast-moving projects, security often lags behind and is given low priority, which may lead to buggy code and hacks. Let’s see how we can reduce the risk of attack by integrating security into our DevOps pipeline. View more...Blasting Off Into Stargate Using HTTPieAggregated on: 2022-11-02 22:13:38 As a DataStax Developer Advocate, my job is to help our amazing teams provide you with the best possible experience with Cassandra and our products. Datastax Astra is built on Apache Cassandra. In addition to great documentation, Astra offers a robust free tier that can run small production workloads, pet projects, or just let you play—all for free, no credit card required. Cassandra can be tricky for hardcore SQL developers, because it uses a different slightly different query language (CQL), but when you get Astra, Stargate is there to let you interact with your data through APIs. Our open source Stargate product provides REST, GraphQL, and schemaless document APIs in addition to native language drivers. If you like them but don’t want to use our products, that’s fine! It’s completely open source and you can implement it on your own system. View more...Comparing Express With Jolie: Creating a REST ServiceAggregated on: 2022-11-02 22:13:38 Jolie is a service-oriented programming language, developed with the aim of making some key principles of service-oriented programming syntactically manifest. Express is a leading framework in the world of JavaScript for the creation of REST services. The concepts behind Express/JavaScript and Jolie are not that distant, but they are offered under different shapes: one aimed at building on top of JavaScript and Node.js, the other aimed at expressing these concepts declaratively. The aim of this article is to identify the first differences that arise between Express and Jolie in the development of a REST service by comparing how the same concepts are codified. View more...Everything You Need to Know About Programming and CodingAggregated on: 2022-11-02 19:58:38 Programming and coding are two fundamental concepts in computers and technology. Without these two things, our computers would be very limited in what they could do. Let's start with programming. Programming is creating a set of instructions that tell a computer what to do. These instructions are known as code, and they can be written in a variety of different languages. View more...EKS Security Checklist: 10 Best Practices for a Secure ClusterAggregated on: 2022-11-02 18:43:38 Kubernetes is riddled with security challenges. Inevitably, the same goes for managed Kubernetes services like Amazon Elastic Kubernetes Service (EKS). The best way to tighten your cluster security is to implement practices that have become industry standards recommended by the Kubernetes community. Here are the ten most EKS security tactics every team needs to protect its clusters. What Exactly Is Amazon EKS Security About? Amazon EKS is one of the most popular managed Kubernetes services out there. It allows teams to orchestrate their containers via Kubernetes without installing and operating the Kubernetes control plane or the infrastructure required for Kubernetes clusters to run. View more...What Is the Future of ReactJS?Aggregated on: 2022-11-02 18:43:38 React, Angular or Vue? JavaScript frameworks all seem to be on the rise, and it’s not easy for a developer to get a grasp on them all. On the contrary, businesses wander around in confusion about which is better suited for their project and why? Well, to get the answer, we suggest answering some questions such as: What are you building? What kind of data will your application process? Do you want to create an SEO-friendly website? And so on. View more...Spring Data JPA To Spring Data JDBC: A Smooth Ride?Aggregated on: 2022-11-02 18:43:38 “JPA is slow, complex, and brings too much pain." We can hear this often here and there. This “common opinion” makes architects consider migration from JPA to other technologies, even for the existing projects and despite great support from JPA development tools (IntelliJ IDEA Ultimate, JPA Buddy, etc.). The main complaints about JPA are: Lack of control over generated SQL queries Memory consumption due to L1 cache Hard to create complex queries with JPQL/HQL Hard to map complex query results to arbitrary classes View more...How Are CRUD Operations Used for File Handling in Java?Aggregated on: 2022-11-02 17:58:38 Java is a high-level language. Java programs generally execute on a terminal that is not stored; some programs need some source to store information fetched from the program that is in the form of a file. CRUD operations stand for Create, Read, Update and Delete. As said, some Java programs need some files to store information fetched from the program. A file stores different types of information, including text, images, videos, and more. View more...How Can We Read a JSON File in Java?Aggregated on: 2022-11-02 17:28:38 Read JSON File in Java To know about reading a JSON file in Java, first, we must know about the JSON file. JSON JSON is “JavaScript Object Notation.” The JSON is the simple format for storing and sending data. It is used when the data is transported from the server to the Webpage. It is used in the field of “Web Development.” View more...How a Data Privacy API Abstracts and Simplifies Privacy and ComplianceAggregated on: 2022-11-02 16:13:38 Navigating the world of privacy and compliance is no trivial task. On one side, we see a world that is becoming more and more privacy-conscious. On the other side, we see a proliferation of applications that compromise user privacy. In this tug-of-war, the landscape of what you can do with people’s sensitive personal data is continually changing. And just like a tug of war, lines are continually being drawn. For example, the General Data Protection Regulation (GDPR) applies to a major region of Europe consisting of multiple countries (the EU), each with its own set of data privacy laws. In the United States, individual states like California have been enacting legislation like the California Consumer Privacy Act (CCPA), which directly affects data privacy and compliance requirements in those states. View more...SSH vs X.509 CertificatesAggregated on: 2022-11-02 11:43:37 As a developer or systems administrator, you're probably used to SSHing into servers with key pairs. What if I told you there is a better and more secure way to manage SSH access? Think SSH certificates (And no, they’re not the same as TLS certificates) For most people, their knowledge of certificates lies within the confines of the X.509 digital certificates format — also known as TLS/SSL certificates — used by browsers to enable HTTPS. However, the X.509 certificate is not the only digital certificate format that exists; there is also the less-popular SSH certificate format created by OpenSSH. View more...Generating Unique Identifiers Based on Timestamps in Distributed ApplicationsAggregated on: 2022-11-01 22:43:37 We build applications that must process very high numbers of events with minimum latency. Generating unique IDs for these events using the traditional method of UUIDs introduces an unacceptable time overhead into our applications, so an alternative approach is needed. I recently wrote an article on how timestamps can be used as unique identifiers, as they are much cheaper to generate than other methods of generating unique identifiers, taking a fraction of a microsecond. View more...How to Use Python for Data ScienceAggregated on: 2022-11-01 20:43:37 Python and Its Use for Data Science Python is easy to learn, and its syntax is relatively simple. It is a popular language for data science because it is powerful and easy to use. Python is an excellent language for data analysis because it includes a variety of data structures, modules, and tools. There are many reasons why you should use Python for data science: View more...Why Affective Computing and Mindless AI Will Conquer the WorldAggregated on: 2022-11-01 19:13:37 Emotion and Technology Affective computing is a term that refers to the synergy between AI and psychology in order to understand and affect emotions. Another term for it could be emotional AI. It is a niche within AI that is not very popular, but I really believe it is going to become increasingly in popularity in the near future. Until very recently, machine learning did not have many things to say about psychology. We, of course, had sentiment analysis, but that’s that. In the last few years, some companies tried to combine psychometrics with machine learning in order to create improved psychometric questionnaires. However, I really believe that the advancements in effective computing and, what is now called mindless AI, are what is going to cause a potential paradigm shift. View more...8 Steps to a Winning Product Strategy Made Simple: What You Need to KnowAggregated on: 2022-11-01 19:13:37 You built a product, and it’s working well. You might even achieve your goals and start making a profit. But how do you know when you’re done building it? When do you need to create a new feature or add a new marketing channel? When you bring a product to market, you solve a problem for your users. But you’re not the only person who can solve that problem. In fact, you’re one piece in a much larger ecosystem — a network of developers, customers, and manufacturers — all working together to build a better product. It’s a complex ecosystem, and you need a product strategy that can help you navigate it. View more...Top Blockchain APIs for the DeveloperAggregated on: 2022-11-01 17:58:37 Blockchain technology is applied in many industries and is steadily gaining support and users' trust. Many start-ups and businesses try to develop unique web platforms or mobile apps with a wide range of blockchain usage. As the blockchain and crypto markets thrive, developers have many opportunities and projects to develop, like trading bots, payment applications, or business settlement solutions. In this article, we'll figure out how API is used for blockchain and how API integration might benefit the app. What Is Blockchain API? Application Programming Interface (API) integration is used to communicate with blockchain nodes or client networks. By doing so, it gets data and displays it to the user. APIs can be used for transactions, managing accounts, crypto trading, making analytics, and providing security. Top blockchain APIs are considered secure, easy to use, and reliable in the long run. Distributing data securely might be along with blockchain technology, but it's safer and more convenient. Choosing one is no easy feat, as the diversity of APIs is truly impressive. View more...Sorting in C#: OrderBy.OrderBy or OrderBy.ThenBy? What's More Effective and Why?Aggregated on: 2022-11-01 13:13:37 Suppose we need to sort the collection by multiple keys. In C#, we can do this with the help of OrderBy().OrderBy() or OrderBy().ThenBy(). But what is the difference between these calls? To answer this question, we need to delve into the source code. The article has three chapters: View more...Thinking Like a Hacker: AWS Keys in Private ReposAggregated on: 2022-11-01 02:43:37 About This Series Last time, we covered a scenario in which a threat actor found leaked RSA private keys used by a TLS wildcard certificate for “Poor Corp.” By chaining the leaked private key with DNS misconfigurations, the attacker was able to impersonate a Poor Corp subdomain and use it to create highly effective phishing emails. In this series, we will dissect not just what an attacker can do to get access to credentials, but also what they would do after getting that initial access. We will walk through a different threat scenario in each part of the series and tell stories of malicious hackers that are either true, based on a true incident, or reasonably theoretical. View more...The Differences Between Bash, Source, ".", and "./" ExecutionAggregated on: 2022-11-01 02:13:37 While working on Linux, you probably run across some files that are not executing in the way you expected — for example, you might have a file in your current directory but it does not run when you enter its name. You get file_name.sh command not found, but actually, the file is there. The file does not work, even having execution permission, because when you write something on the shell and run it, your $PATH variable gets checked. If there is any command matching inside $PATH directories, such as /usr/bin, it will execute. Unless there is a matching command, you are going to get the error. So you need to address the path to your file. Let’s create a simple Linux shell script and have execution permission on the script. The below examples are written in Bash Shell. View more...Geo-Distributed Microservices and Their Database: Fighting the High LatencyAggregated on: 2022-10-31 21:43:36 Ahoy, mateys! My development journey of the first version of the geo-distributed messenger has ended. So in this last article of the series, I’d like to talk about multi-region database deployment options that were validated for the messenger. View more...Infrastructure Monitoring — Best Practices, Must-Have Features, and Use CasesAggregated on: 2022-10-31 19:58:36 In 2017, Amazon faced an unfortunate four-hour outage, causing S&P 500 companies to lose $150 million. What was the cause? An erroneous command removed more servers than intended, causing system downtime. Although downtime is not an alien topic for developers, its impact can be deeply felt. Gartner estimates the average cost of downtime to be as high as $5600 per minute, which may build up to over $300k per hour. These are definitely scary numbers for any organization. But there’s no need to panic just yet! View more...JavaScript Data Visualization Libraries: How to Choose the BestAggregated on: 2022-10-31 18:58:36 Data visualization is required for the UI/dashboard of any program that focuses on data. It can be challenging to create accurate charts and infographics, but fortunately, many JavaScript libraries are available. However, there can be an overwhelming variety of options, each with advantages and disadvantages. You can use this article to choose a JavaScript data visualization library and learn more about its features. Here are the most important factors to consider while choosing the right JavaScript data visualization library for your project. View more...How To Convert Image Files Into GIF or WebP Format Using JavaAggregated on: 2022-10-31 18:58:36 If we’re preparing to reformat an image for a specific purpose online, the new format we choose needs to accurately reflect the use case we envision. Otherwise, we’ll inadvertently stifle our own efficiency and, most importantly, run the risk of slowing down our web page loading speeds. The same can be said for most file format selections: we wouldn't use Microsoft Word to create a spreadsheet, and we wouldn't use Excel to write an essay (even though both technically can be done). Choosing which image format to use requires us to think about the exact purpose we expect that file to serve. While the most ubiquitous formats we encounter online – namely JPG and PNG – provide well-known benefits for their respective use cases, they also come up short in certain key areas. For example, while the JPG format is widely used on website pages due to its high degree of compression (allowing web pages to run faster), this degree of compression sacrifices a meaningful amount of image quality, which we may not always be willing to lose. While PNG is a lossless format with built-in transparency features – perfect for displaying things like graphs, logos, and illustrations on a solid background – it notably lacks the ability to fit common online use cases such as image animation when the need arises. View more...Zero Party Data — Collection, Definition, Examples and TacticsAggregated on: 2022-10-31 18:58:36 More often, claims like “data are the new oil” or “data is the new electricity” appear in board meetings, research articles, and presentations, highlighting the data’s power and potential worldwide. However, with such global attention to data developments, one type of data has been largely overlooked - zero-party data. What Is Zero-Party Data and Why Is It Important? The term “zero-party” data was first introduced by Forrester Research in 2022, defining this type of data as data that customers intentionally and proactively share with a brand. Zero-party data can include purchase intentions, preference center data, personal contexts, and how an individual wants to be recognized by a brand. With GDPR, CASL, and CCPA guidelines, along with Google phasing out the third-party cookies support by 2023, companies across the globe are having a hard time collecting data as these regulations directly impact their ability to run effective marketing campaigns and serve customized content. These data laws make it difficult for companies to understand customers and their brand aspirations. View more...How to Use ngTemplateOutlet in Angular With ExampleAggregated on: 2022-10-31 16:43:36 In Angular, we use the ngTemplateOutlet directive to insert an external template into our component's view. This powerful feature allows us to reuse templates and keep our code DRY. The ngTemplateOutlet directive takes a template reference as its input. This template reference can be a local variable declared in our component's template or a reference to an external template. View more...Top KPIs for Software Development CompaniesAggregated on: 2022-10-31 16:43:36 A successful and high-yield generating software is one that offers potential customers what they are looking for. It helps solve their challenges and meet their certain requirements. In a software product development process, the whole team puts their energy into ensuring that the developed product offers what they want to achieve. During a software development process, you may need help finding a set of standard metrics to use in the process. However, you can choose from a range of effective KPIs and metrics according to your goals and long-term objectives. You may use the below-mentioned metrics for your project: View more...How to Restore Poison Messages (Or Dead Letters) From Memphis Broker vs RabbitMQAggregated on: 2022-10-31 12:43:36 What Is Service-Oriented Architecture? Service Oriented Architecture (SOA) involves splitting different parts of your application into services. That way, you can have services for Authentication, Batch-Processing, Managing Videos, Notifications, etc. Separating core functionalities into services help your platform to scale appropriately. You also get to enjoy the benefit of the whole system not breaking down when one service malfunctions. In addition, you can improve each service without tampering with others. View more...Are We There Yet? When Do We Move to GraalVM?Aggregated on: 2022-10-31 02:58:36 This is the perfect time to raise this point — just as Spring Native is coming to the forefront. Is it time to move to GraalVM? Spoiler: it depends. Yes, if you’re building serverless, probably no if you’re building pretty much anything else — with a few exceptions for some microservices. Before I begin, I want to qualify that I’m talking about native image (SubstrateVM) which is what most people mean when they say GraalVM. That specific feature took over a much larger and more ambitious project that includes some amazing capabilities such as polyglot programming. GraalVM native images let us compile our Java projects to native code. It performs analysis and removes unnecessary stuff, it can reduce the size and startup time of a binary significantly. I’ve seen 10-20x improvement to startup time, that’s a lot. Ram usage is also much lower sometimes by a similar scale but usually not as significant. View more... |
|
|