News Aggregator


Migrating Monoliths to Microservices in Practice

Aggregated on: 2022-08-30 19:23:03

There have been amazing articles on the subjects of migrating from a monolith to a microservice architecture, e.g., this is probably one of the better examples. The benefits and drawbacks of the architecture should be pretty straightforward. I want to talk about something else, though: the strategy. We build monoliths since they are easier to get started with. Microservices usually rise out of necessity when our system is already in production. However, there are a lot of questions that arise when deciding when to do the migration or not – how do you decide the boundaries of a service? How do you verify the self-healing properties of your microservice architecture?

View more...

Instant Apps, Customize in Codespaces

Aggregated on: 2022-08-30 18:23:03

It's not so hard to create a single endpoint API or a "Hello, World!" page.  But what about creating a complete microservice: multiple endpoints with CRUD services, business logic enforcement, and a multi-page application?  Well, that's a horse of an entirely different feather. In this article, we'll show how to use open source technologies to:

View more...

What to Learn First: Docker or Kubernetes?

Aggregated on: 2022-08-30 17:23:03

When it comes to app development, many people wonder what to choose, Docker or Kubernetes. However, both technologies are vital to proper containerization. Accordingly, learning them at the same time can move you ahead of the competition and turn you into a demanded professional. When we speak of container technologies, both Docker and Kubernetes are open-source leaders. While many people are trying to figure out which one to learn first, they are basing their decision on a misconception.

View more...

Is IntelliJ Making Us Stupid? It's Complicated

Aggregated on: 2022-08-30 15:53:03

My last Java certification is the SCJP 6 from 2010, so when the OCP 17 came out, I thought it high time for a refresher. I am setting aside an hour every day when I’m at my brightest, which is after coffee and before breakfast. I'll share my personal study tips later, but it's more credible if I first pass the exam. So, I found another topic to distract me from my studies that I want to dwell on. It’s the effect that modern IDEs and resources like Stack Overflow are having on our brains. Once you dig into the 900+ pages of schoolwork that is the OCP Study Guide, you’re painfully reminded that they have been making us lazy and maybe even a bit stupid.  Granted, the sheer number of facts to digest would have been less overwhelming if I had kept up more closely with the state of the art over the last decade. Several new features have been added, of whose existence I was at best only aware. After fifteen years of using Java, you tend to rely on tried and tested ways, for which there is no excuse of course. It’s a classic example of not sharpening the saw, so shame on me. 

View more...

AWS Lambda Timeout and How to Overcome It

Aggregated on: 2022-08-30 15:23:03

It’s happened to the best of us. You’re in the middle of a task when all of a sudden, the inevitable lambda timeout occurs. Running into a timeout can feel like a bit of a setback when you’re trying to focus on running your application. At worst, timeouts can ultimately lead to a negative impact on the overall user experience, and a non-optimized application is bound to result in a loss of users, which can lead to financial repercussions. 

View more...

Using JWT in a Microservice Architecture

Aggregated on: 2022-08-30 13:53:03

In a monolithic architecture, all the subsystems are in one application: authentication and authorization, session manager, business logic, etc. If we are talking about microservice architecture, some things get more complicated. Microservices In a microservice architecture, as a rule, authentication/authorization is a separate service.

View more...

How Does Routing Work?

Aggregated on: 2022-08-30 04:23:02

Purpose of Routing Routes are created to allow nodes to communicate data packets across networks. In order to route data packets to their destination, they travel along a series of links, each link having a single direction (one-way). A link is formed by joining two adjacent routers together; the router at either end of a link is called the ingress or egress router. The purpose of routing is to find the best path between two points. Routers exchange information about what routes exist between them using standard protocols. When a packet of data arrives at a router, the router will examine its header to determine where it should send the packet. If the router does not know how to reach the specified destination address, it sends the message to an adjacent router via a neighboring node. Each router stores a table of addresses it knows about. These tables are known as routing tables.

View more...

Using Machine Learning to Automate Kubernetes Optimization

Aggregated on: 2022-08-30 01:53:02

Note: This is the third article of a series covering Kubernetes resource management and optimization. In this article, we explain how machine learning can be used to manage Kubernetes resources efficiently. Previous articles explained Kubernetes resource types and requests and limits. As Kubernetes has become the de-facto standard for application container orchestration, it has also raised vital questions about optimization strategies and best practices. One of the reasons organizations adopt Kubernetes is to improve efficiency, even while scaling up and down to accommodate changing workloads; however, the same fine-grained control that makes Kubernetes so flexible also makes it challenging to effectively tune and optimize.

View more...

Commonly Occurring Errors in Microsoft Graph Integrations and How to Troubleshoot Them (Part 1)

Aggregated on: 2022-08-30 01:23:02

With the release of Exchange Server in 2007, Microsoft also introduced Exchange Web Services (EWS). These SOAP-based APIs allow developers to access Microsoft Exchange products such as calendars, contacts, etc. over the internet. As part of the Office 365 product launch, Microsoft also released the new REST-based Office 365 Unified APIs, later known as the MS Graph APIs, in 2015. Microsoft announced in 2018 that there would be no more active development for the EWS APIs. The Exchange Web Services no longer meet today's security and maintenance requirements. For this reason, the various EWS APIs will be gradually shut down from 2022 on and replaced by the MS Graph APIs. An overview of services already accessible via the MS Graph APIs can be found in the current documentation from Microsoft. Due to the switch to MS Graph, various companies have to adapt their digital products.  In this article series, we will discuss some of the lessons learned during such a transition to Microsoft Graph REST API v1.0 with the MS Graph Java SDK.

View more...

Understanding Consistency Level in the Milvus Vector Database

Aggregated on: 2022-08-29 21:23:02

Have you ever wondered why sometimes the data you have deleted from the Milvus vector database still appear in the search results? A very likely reason is that you have not set the appropriate consistency level for your application. Consistency level in a distributed vector database is critical as it determines at which point a particular data write can be read by the system. Therefore, this article aims to demystify the concept of consistency and delve into the levels of consistency supported by the Milvus vector database. What Is Consistency?Before getting started, we need to first clarify the connotation of consistency in this article, as the word "consistency" is an overloaded term in the computing industry. Consistency in a distributed database specifically refers to the property that ensures every node or replica has the same view of data when writing or reading data at a given time. Therefore, here we are talking about consistency as in the CAP theorem. For serving massive online businesses in the modern world, multiple replicas are commonly adopted. For instance, online e-commerce giant Amazon replicates its orders or SKU data across multiple data centers, zones, or even countries to ensure high system availability in the event of a system crash or failure. This poses a challenge to the system - data consistency across multiple replicas. Without consistency, it is very likely that the deleted item in your Amazon cart reappears, causing a very bad user experience. Hence, we need different data consistency levels for different applications. And luckily, Milvus, a database for AI, offers flexibility in consistency level, and you can set the consistency level that best suits your application. Consistency in the Milvus Vector DatabaseThe concept of consistency level was first introduced with the release of Milvus 2.0. The 1.0 version of Milvus was not a distributed vector database, so we did not involve tunable levels of consistency then. Milvus 1.0 flushes data every second, meaning that new data are almost immediately visible upon their insertion and Milvus reads the most updated data view at the exact time point when a vector similarity search or query request comes. However, Milvus was refactored in its 2.0 version, and Milvus 2.0 is a distributed vector database based on a pub-sub mechanism. The PACELC theorem points out that a distributed system must trade off between consistency, availability, and latency. Furthermore, different levels of consistency serve different scenarios. Therefore, the concept of consistency was introduced in Milvus 2.0, and it supports tuning levels of consistency. Four Levels of Consistency in the Milvus Vector DatabaseMilvus supports four levels of consistency:  strong, bounded staleness, session, and eventual. And a Milvus user can specify the consistency level when creating a collection or conducting a vector similarity search or query. This section will continue to explain how these four levels of consistency are different and which scenario they are best suited for. 1. StrongStrong is the highest and the most strict level of consistency. It ensures that users can read the latest version of data. An illustration of strong consistency.

View more...

How to Make a Chart in JavaScript With Chart.js?

Aggregated on: 2022-08-29 20:53:02

There are many JavaScript libraries for drawing different charts, from line charts, bars, graphs, and much more.  If you're trying to learn how to show data dynamically on your website using JavaScript, Chart.js is one of the libraries you can test.

View more...

Product Backlog Refinement

Aggregated on: 2022-08-29 20:08:02

The Product Backlog refinement is a continuous process to create actionable Product Backlogs, enabling a Scrum Team to run Sprint Plannings at a moment’s notice. Consequently, refinement is about creating alignment among all team members about the Why, the What, the How, and probably even the Who regarding the upcoming work for the Scrum team’s Product Goal. As a result, Product Backlog refinement is a critical success factor as it drastically increases the team’s capability to deliver valuable Increments regularly.  The following 14 first principles describe in broad strokes the foundation of a successful approach to refinement.

View more...

Automating Java Application Deployment Across Multiple Cloud Regions

Aggregated on: 2022-08-29 20:08:02

Ahoy, matey!  If you want to read back over my progress up to this point, the links to the previous articles detailing my journey are at the end of this article. 

View more...

A Comprehensive Agile Testing Methodology for Effective Software Development

Aggregated on: 2022-08-29 19:23:02

Software testing plays a crucial role in the agile software development environment. Agile testers act as a bridge between product owners/stakeholders and developers and thus work collaboratively. Through this, an ongoing feedback loop is formed, which improves the quality of a software product or application methodically and consistently. This article will teach you the strategic importance of agile testing methodology in a software development environment. What Is an Agile Testing Methodology? It is a software testing process that works on the principles laid down by agile software development. The iterative development methodology aligns with the agile testing methodology, where the customer requirements are focused on and worked accordingly. Agile testing methodologies adopt a continual approach. The testing is initiated in the initial stages of the project development. There is continual interaction between the product owner, developers, testers, and other key members to ensure a good quality software product or application is being built.

View more...

The Future of Observability: Central Teams as the Standard

Aggregated on: 2022-08-29 19:23:02

In this episode of the Future of Observability video series, Chronosphere co-founder and CEO Martin Mao shares his insights with Technical Writer Chris Ward about the importance of central observability teams across an organization. Chris: What is a central observability team, and why might companies need one?

View more...

The CDI Event: How to Archive Success on the Open-close Principle

Aggregated on: 2022-08-29 19:23:02

When we talk about a good design on Java and OOP, the first thing that might come to mind is the SOLID principle; it brings five easy steps or at least a sign if the code is going in the right direction. CDI for sure helps you to archive the code in the proper order. Today, we'll explain how to take advantage of CDI with CDI and get the Open close principle. If you forget the SOLID principle, don't worry, we'll put it here to remember what does mean SOLID:

View more...

Prototype Pattern in JavaScript

Aggregated on: 2022-08-29 18:53:02

As a sound JavaScript developer, you must write clean, easy-to-understand, and maintain code. You solve exciting and unique problems that might not require unique solutions. You may have written code that resembles the solution to a complex problem you encountered before. Although you may not acknowledge it, you were using Design patterns. Design patterns refer to a general reusable and repeatable solution for a common set of problems while developing a software solution. Design patterns are not a finished project to be transformed directly into the source code. However, it is a template that helps developers understand the way to solve different problems with different solutions in multiple scenarios.

View more...

How We Built Our Documentation on Docusaurus

Aggregated on: 2022-08-29 18:53:02

It requires an ample amount of time, effort, and resources to produce great, user-friendly documentation. Good documentation is fundamental to the way engineers get started with a product and ultimately use it in the long run, which makes it essential to both user retention and growth. Building our documentation at Courier was a task we, therefore, took very seriously. We originally created our documentation for a very small, specific audience with specific uses for Courier. Over time, however, as our user base, their use cases, and our product itself has grown, we needed to improve and expand our documentation in order to cover our bases. This time, we wanted to make it scalable and focus on a great user experience. We decided to use Docusaurus to do so, which allowed our engineers to collaborate and update our documentation more efficiently. Here’s how we built our documentation and what we learned in the process that might be useful to you.

View more...

A Beginner’s Guide to Understanding Encryption Vs Decryption

Aggregated on: 2022-08-29 17:08:02

A computer system must promise or at least assure privacy and confidentiality when it transmits sensitive or personal data. A simple system, unless equipped with the proper technology, cannot stop any unauthorized access to cyber criminals. And in this computer era, data tampering needs no introduction as it is not something unheard of. So if you want to prevent or altogether stop the mishap, one of the best ways is to alter the data as it will prevent unauthorized access.  The technique employed to alter the data is known as cryptography, and this process takes place in two phases- encryption and decryption of information. So if you want to find out what encryption vs. decryption is all about, keep reading:

View more...

Cybersecurity Solution Highlights From Black Hat 2022

Aggregated on: 2022-08-29 15:53:02

I had the opportunity to meet with 12 cybersecurity solutions providers during the 25th Black Hat Cybersecurity Conference. I observed three trends at this conference that are represented by the solutions the following companies offer:  

View more...

Github Package Search App Using Next.js

Aggregated on: 2022-08-29 15:53:02

Every day as part of the development, we search for open source packages in Github using google. It will be time taking process as we need to search for the keywords, get into each Github repository to check the below items to choose the packages: Is it completely open source to change it or use for the commercial app? Whether it is not archived or is some active community working for it?  Does it have a lot of issues?  What are the languages used in this repository?  How much is the size of the package, so it doesn't make my project bulkier? When did the recent update happen?  I want to develop a simple search app where we get all the information required to choose the package in one shot. It will also help any development team as a handy tool to choose the Github packages. 

View more...

What Is Encryption and How Does It Work?

Aggregated on: 2022-08-29 15:23:02

What Is Encryption? Encryption encodes data, so only programs that know how to decode it can read it. It uses an algorithm—a set of ordered steps—to alter the information so that the receiving party can't read it without applying a similar algorithm to return it to its original state. Encoding data is called encrypting. Decoding is called decrypting. The original unencrypted data is called plaintext, while we refer to the encrypted data as ciphertext. So, we encrypt plaintext into ciphertext and decrypt the ciphertext back into plaintext.

View more...

From IBM Integration Bus to App Connect Enterprise Containers

Aggregated on: 2022-08-28 02:08:01

This article is part of a series. For the previous article, see Moving an App Connect Flow Using MQ onto Containers.  One of the most common integration points is a database, and App Connect is well suited to connecting to a significant variety of datastores. One of the most common protocols used to connect to databases is ODBC, so that is the example that we will work through in this post. 

View more...

Painless WebSocket Tests with Spock Framework

Aggregated on: 2022-08-28 01:38:01

Many Spring Boot web applications require you to go beyond the usual REST endpoints and start accepting WebSocket connections. Meanwhile, plain JUnit tests have fallen out of fashion, and suddenly everyone is talking about the potential of Spock. All these changes sound thrilling, and you’d like to try the novel approach.

View more...

The Four Mistakes You Make Building Permissions

Aggregated on: 2022-08-28 01:38:01

Access control is a must in almost any application, yet most developers end up building and rebuilding it time and time again — forced to refactor with new customer, product, or security demands coming in. Why? Usually, they make one or more of four crucial mistakes that prevent them from having a flexible access control layer that can be upgraded without having to rebuild it every time a new product demand comes in.

View more...

All the Questions You Were Afraid to Ask About SBOM

Aggregated on: 2022-08-28 00:53:01

During many recent security incidents, we hear a lot of messages about the lack of knowledge of the code dependencies, attacks to the software supply chain, Software Bill of Materials (SBOM), digital signatures, provenance, attestation, and so on. The fact is, every time a new vulnerability appears in the landscape, we usually need to spend a lot of time and effort to detect the real impact on the applications and services that are running in our environment.

View more...

OpenTelemetry: A Quarkus Superheroes Demo of Observability

Aggregated on: 2022-08-28 00:53:01

Are you building microservices? Do you struggle with observability and with capturing telemetry data between distributed services? This article shows how to quickly and easily introduce OpenTelemetry into a distributed system built on Java with Quarkus. This combination allows you to visualize the interactions between all the microservices within an overall system. The article introduces the official Quarkus sample application, Quarkus Superheroes, deploys it on the free Developer Sandbox for Red Hat OpenShift, and demonstrates how to collect and visualize telemetry data in order to observe microservices' behavior.

View more...

What Are Source Maps and How to Properly Use Them

Aggregated on: 2022-08-28 00:23:01

You are debugging a web app for a client but the minified version of the JavaScript and CSS code makes it impossible to understand what statements the browser is actually executing. You could break down the original code line by line in your editor putting some console.log() statements here and there, or try debugging it from its transformed state.

View more...

Serverless is the New Timeshare

Aggregated on: 2022-08-27 20:23:01

We have shared amnesia. When I speak to younger developers about past technologies, I often get blank stares. To be fair, some of that is because I’m a bit “intense” or “weird” but some of that is because. Huh? Really? Did we have that? Case in point XA transactions and 2PC (Two Phase Commit). We have a young generation that’s completely ignorant of that capability and the fact that this was “a thing”. Did the requirement for transaction management somehow vanish?

View more...

5 Super Fast Ways To Improve Core Web Vitals

Aggregated on: 2022-08-27 19:23:01

Does your website take more than 3 seconds to load? Is your website struggling with a high bounce rate? Then it requires immediate attention.

View more...

Definition of Done Theses

Aggregated on: 2022-08-27 17:08:01

Given the importance of a viable Definition of Done for a Scrum team’s success, it has always puzzled me how complacent or ignorant many Scrum teams are regarding their Definition of Done. So, let me share with you the ten first principles of this critical Scrum success factor to improve your team’s effectiveness, team spirit, and reputation. The Purpose of the Definition of Done According to the Scrum Guide The Scrum Guide characterizes the Definition of Done as follows:

View more...

Is Visual Comparison Testing the Future?

Aggregated on: 2022-08-27 14:08:01

Visual comparison testing, as the name implies, is the process of testing software applications by focusing on their visual components. It is part of the test strategy for most quality assurance (QA) teams, but the way it is implemented and the tools used differ widely. To optimize DevOps and QA workflows, the technical leadership has to deploy an up-to-date system architecture, which has to fulfill the business goals at a justified cost and pace. In an Agile development scenario, managing outcomes can be tricky due to variabilities in business requirements and the technical landscape.

View more...

Here Is How To Develop UIs Faster in ReactJS

Aggregated on: 2022-08-26 22:53:01

It’s 2022, and React has a huge ecosystem to help developers bring complex UIs to life faster. Furthermore, with the extensive support of ReactJS libraries, there is hardly any case when a developer has to build a component from scratch. However, not every ReactJS UI developer is aware of the best practices to build UIs faster in ReactJS. Therefore, I’ll be discussing the top five approaches (which I personally use) for building UIs quicker in a ReactJS project. So without further ado, let’s get started:

View more...

Hibernate and JPA Tutorial: Crash Course [Video]

Aggregated on: 2022-08-26 18:53:00

Ever looked for a comprehensive tutorial to Hibernate and JPA that is fun and entertaining at the same time?  The video tutorial below is a crash course into the Hibernate and JPA universe. From mapping annotations and SessionFactory setup to HQL and criteria queries, we cover all the basics you’ll need to get started with Hibernate and JPA.  What’s in the Video? There are so many terms when it comes to Hibernate: Hibernate (i.e., JPA, HQL, JPQL, and SQL) that we first have to understand what Hibernate is and what problem it tries to solve. The core problem is mapping between Java classes and relational database tables.

View more...

A Hybrid Approach to Continuous Application Authorization

Aggregated on: 2022-08-26 14:53:00

Applications need to maintain logged-in “sessions” for all users that use their app. Once a user logs in, they can continue to access parts of the application without having to log in (i.e., authenticate) again and again for each subsequent request made to the server. There are two main ways to do this: one is JSON Web Tokens (JWTs), and the other is session tokens. Both have pros and cons. Now, there’s a hybrid approach that takes advantage of the best of both.  JWTs and Session Tokens: Pros and Cons With JWTs, the user data is stored client-side within the token itself. This makes JWTs a popular session management solution among developers looking to reduce their server load and improve latency. One downside is that session cancellation can be more difficult because the validation happens client-side rather than server-side. Due to the client-side validation, this can cause greater security concerns because you can’t easily revoke the underlying session if there’s a threat.

View more...

Android Development Trends With AI and Machine Learning in Testing

Aggregated on: 2022-08-26 14:23:00

Nowadays, applications are not just made for mobile devices but also for e-readers, gadgets, and other Internet-connected devices. There is a vast number of available Android devices, and as you have probably realized, apps are becoming smarter as well. QA professionals often test such features using browser-independent and cross-platform software testing, which makes use of machine learning (ML) and artificial intelligence (AI).

View more...

What Is WBAdmin and How Does It Work?

Aggregated on: 2022-08-26 12:23:00

Backups are important. They give you peace of mind and protect you against data corruption, malware infection, or ransomware attacks. Major operating system vendors come with their backup utility. Take Windows, for example: here, you get Windows Backup and Restore functionality (GUI-based) and its command-line counterpart, WBAdmin.

View more...

Advanced Cloud Security

Aggregated on: 2022-08-25 21:23:00

Cyber threats have become more sophisticated. Hence, it is a good idea to utilize the expertise of public cloud providers to better manage assets against security threats. Cloud security is a collection of proactive measures to protect your cloud assets from internal and external threats. In this Refcard, we will walk through common cloud security challenges, continuous security for cloud infrastructure, and advanced strategies for securing cloud workloads.

View more...

Debugging a Node js Express API in VS Code Debugger

Aggregated on: 2022-08-25 18:23:00

Why When we create software, we rarely do it without errors. API creation isn’t exempt from this fact, so sooner or later, we’ll need to debug it. In JavaScript, the first stop for a debugging task is often logging to the console, but using a debugger can give us a more integrated experience. Node js is a cross-platform and open source JavaScript runtime environment that allows the JavaScript to be run on the server side.

View more...

Guide to Install NPM and Node JS on Mac and Windows

Aggregated on: 2022-08-25 17:53:00

With exponential growth and demand for full-stack development, JavaScript has become a reliable technology for developing a full-fledged business application. Several backend and frontend frameworks and libraries are available, which are based on JavaScript and are highly compatible with each other. Node JS is a technology that professionals appraised for fabricating a scalable server-side for robust and responsive applications.

View more...

Creating a Better CTO Playbook With Dama Financial's CTO Zach Goldberg

Aggregated on: 2022-08-25 17:23:00

Fact: There are guidebooks for everything in programming except for actually leading, managing, and inspiring programmers. That’s why I was so happy to have my friend Zach Goldberg on the podcast.

View more...

Importance of Kubernetes in IoT Applications

Aggregated on: 2022-08-25 17:23:00

Kubernetes is a service used for deploying cloud-native applications. As cloud applications are associated with our IoT devices and products, that is where we get the requirement of building IoT applications with Kubernetes. IoT analytics is moving from the cloud to the edge because of security, latency, autonomy, and cost. However, distributing and managing loads to several hundred nodes at the edge can be a complex task. So, a requirement that arises to distribute and manage the loads on edge devices is to use a lightweight production-grade solution such as Kubernetes.

View more...

How to Build Accountability In Your Team

Aggregated on: 2022-08-25 16:53:00

Imagine you've built a team of people who are all-stars at their individual roles. Every one of them is exceptional and has the potential to become a leader at another company. But they won’t because they don’t have accountability on their team.  If you’re reading this, it means you’re the team leader or aspire to be one someday. You understand that teams are responsible for their outputs, not just their inputs. You know that to build your team and its effectiveness, you need to create a culture where people take ownership of their performance, and working together as a unit is more important than competing against each other for personal gain. 

View more...

Java Bytecode Simplified: Journey to the Wonderland (Part 2)

Aggregated on: 2022-08-25 16:23:00

Our previous article introduced bytecode and discussed what it includes. This article will delve a bit deeper into ConstantPool. Highlights Bytecode is a representation that is abstract in nature. They are fictitious codes for a fictitious machine known as the Java virtual machine. The Java virtual machine is a piece of software that interprets bytecode. The JVM is a stack-based computer. Real CPUs are register-based systems and execute machine code. Java is compiled into bytecode, an intermediate form, which is then executed by the just-in-time (JIT) compiler, which generates machine code. Before going any further, let's explore javap, which is a very handy tool for deconstructing byte code.

View more...

Ruby on Rails vs Python for Web Development

Aggregated on: 2022-08-25 14:23:00

What Is Ruby? Ruby is a dynamic, object-oriented script-based programming language. The purpose is to combine the advantages of all scripting programming languages in the world. Ruby is written in the C programming language with the same basic capabilities as Perl and python. Ruby was first created by a Japanese programmer named Yukihiro Matsumoto, initiated from Yukihiro's desire to create a scripting language that has object orientation capabilities. Indeed, at that time, object-oriented programming languages were developing, but there was no scripting that supported object programming.

View more...

Renovate, a Dependabot Alternative

Aggregated on: 2022-08-24 22:22:59

I won't introduce Dependabot. Lots and lots of developers use it daily on GitHub. I do use it as well. However, it suffers from two drawbacks: While it's perfectly integrated with GitHub, integrations with other platforms are less seamless. It's limited in the list of ecosystems it supports For example, I generally use Docker Compose files for my demos. When necessary, I use Kubernetes. Dependabot supports none.

View more...

Template-based PDF Document Generation in Javascript

Aggregated on: 2022-08-24 21:22:59

Document generation is a very common requirement in the life of a developer. Whether it is an e-commerce site, Management app, or anything. It can be invoice generation, insurance document preparation, doctors prescription, HR Offer generation, Payslip generation and you could think of tons of use cases.  There always will be a need for document generation. From a developer's perspective, there are a few common approaches to getting this job done. 

View more...

Maintenance of a Multi-Database Citus Cluster

Aggregated on: 2022-08-24 20:22:59

This guide is designated for database administrators (DBA) who manages an on-premise cluster of PostgreSQL nodes with Citus, an extension for PostgreSQL for horizontal scalability and columnar storage. Every DBA at some point reaches a threshold when manual maintenance of a cluster becomes an arduous chore, and the necessity of some automated solution becomes more and more apparent. Here will be discussed an example of such an automated solution.

View more...

Develop XR With Oracle, Ep 4: Health, Digital Twins, Observability, and Metaverse

Aggregated on: 2022-08-24 19:22:59

This is the fourth piece in a series on developing XR applications and experiences using Oracle and focuses on XR applications of computer vision AI and ML and its related use in the metaverse.  Find the links to the first three articles below:  Develop XR With Oracle, Ep 1: Spatial, AI/ML, Kubernetes, and OpenTelemetry Develop XR With Oracle, Ep 2: Property Graphs, Data Visualization, and Metaverse Develop XR With Oracle, Ep 3: Computer Vision AI, ML, and Metaverse As with the previous posts, here I will again specifically show applications developed with Oracle database and cloud technologies, HoloLens 2, Mixed Reality Toolkit, and Unity platform.

View more...

How to Bring the Power of Security Guardrails to Your Application Security Program

Aggregated on: 2022-08-24 19:22:59

Organizations should not expect developers to be security experts; that's not what they have been trained to be, and it's not their job. Instead, organizations should use application security teams to enable developers by giving them access to secure frameworks, libraries, and defaults, making the most secure option the easiest choice. Security guardrails are designed to help organizations do exactly that.  Visualizing how security guardrails will benefit your developer and security teams will help you get started. This article provides some essential steps you can implement to bring security guardrails into your AppSec program. 

View more...