News Aggregator


The Challenges of a JavaFX Reboot

Aggregated on: 2022-08-12 08:36:47

In Jonathan Giles's post An FX Experience Retrospective, he starts by looking at the history of JavaFX and focuses on "what has happened in the world of JavaFX" in 2011. I was highly skeptical of JavaFX prior to JavaOne 2010 (see here and here for examples), but started to think more positively about it after the JavaOne 2010 and JavaOne 2011 announcements related to JavaFX.  One thing that has been a little tricky about learning JavaFX since JavaOne 2011's big announcements have been knowing for certain whether a particular resource on JavaFX applies to JavaFX 1.x or JavaFX 2.x. Reading the An FX Experience Retrospective post provided a different perspective on the risks and challenges Oracle and the JavaFX team has faced in making this major overhaul.

View more...

Clojure: Destructuring

Aggregated on: 2022-08-12 08:36:47

In The Joy of Clojure (TJoC) destructuring is described as a mini-language within Clojure. It's not essential to learn this mini-language; however, as the authors of TJoC point out, destructuring facilitates concise, elegant code. Making Code More Understandable One of the scariest things for those who are just now learning how to do some coding is the fact that they have to try to figure out what a seemingly impossible set of rules and structures means for the work that they are trying to do. It is not easy at all, and many people struggle with it in big ways. 

View more...

Busting PermGen Myths

Aggregated on: 2022-08-12 08:06:47

In my latest post I explained the reasons that can cause the java.lang.OutOfMemoryError: PermGen space crashes. Now it is time to talk about possible solutions to the problem. Or, more precisely, about what the Internet suggests for possible solutions. Unfortunately, I can only say that I felt my inner Jamie Hyneman from MythBusters awakening when going through the different "expert opinions" on the subject. I googled for current common knowledge about ways to solve java.lang.OutOfMemoryError: PermGen space crashes and went through a couple dozen pages that seemed more appropriate in Google results. Fortunately, most of the suggestions have already been distilled into this topic of the very respected StackOverflow. As you can see, the topic is truly popular and has some quite highly voted answers. But the irony is that the whole topic contains exactly zero solutions I could recommend myself. 

View more...

Bad or Good? Behavior Driven Development within Scrum.

Aggregated on: 2022-08-12 06:36:47

I wanted to explore the possibility of using JBehave to formalize scrum's definition of done. The idea being to encapsulate a definition of done as a JBehave scenario. So in true scrum style I decided to timebox 4 hours of work dedicated to JBehave. From a scrum point of view BDD can be used to turn the definition of done into a test artifact. The team produces scenarios for each task. With JBehave a scenario file describes the required behavior and test steps it will need to pass to be considered done. I.e Given some prerequisites, perform some action and expect some results. See the JBehave project for more detail as this is only a simple example.

View more...

The Digital Finance Revolution, Open Banking, and APIs

Aggregated on: 2022-08-12 04:21:47

Technological innovation is disrupting the financial industry. In the last couple of years, many fintech banks and digital finance startups have emerged. These new firms, like Simple, Chime, Varo, and Moven, claim to offer consumers more choice, better service, and lower costs. Meanwhile, global giants like PayPal and Amazon are exploring offering select banking features. Nonetheless, many of the big players in fintech are also transforming digitally. What Is Driving the Open Banking Movement? Application Programming Interfaces (APIs) are at the heart of the digital finance revolution, along with the shift towards open banking around the world, meaning that banks are increasingly giving third parties access to their financial data. First developed in the UK, open banking has since spread to the EU, directly stimulated by regulatory initiatives. These include the Second Payment Service Directive (PSD2), which compels banks to provide their customer data to third-party providers (TPPs) through open APIs.

View more...

How to Govern Terraform States Using GitLab Enterprise

Aggregated on: 2022-08-12 04:06:47

Terraform has become the nearly ubiquitous way to provision services in a cloud native era. However, when we start to build our infrastructure using Terraform’s as-code approach, there are a few things we need to consider in order to be able to manage these operations at scale, for a diversity of decentralized services, and for distributed teams. At Firefly, we often encounter the challenges of managing IaC at scale as part of our effort to help organizations discover and manage their many cloud assets. Terraform Management at Scale With the mass adoption of Terraform, it has become the de facto tool for developers to build and manage their cloud infrastructure at scale. Most companies today, who rely heavily on Terraform for their infrastructure management, choose to do so with an orchestration tool. These tools complement the suite of tools Hashicorp provides to help get a handle on the many modules and providers, frameworks, and services being provisioned with the sheer scale of cloud operations — as well as a remote backend to maintain the state for your infrastructure.

View more...

How I Created a Smart Video Clip Extractor

Aggregated on: 2022-08-12 03:36:47

Travel and life vlogs are popular among app users: Those videos are telling, covering all the most attractive parts in a journey or a day. To create such a video first requires significant editing efforts to cut out the trivial and meaningless segments in the original video, which used to be a job for video editing pros. This is no longer the case. Now we have an array of intelligent mobile apps that can help us automatically extract highlights from a video, so we can focus more on spicing up the video by adding special effects, for example. I opted to use the highlight capability from HMS Core Video Editor Kit to create my own vlog editor.

View more...

Custom Validation in Mule 4 Using Mule SDK

Aggregated on: 2022-08-12 03:36:47

Custom Validation in Mule Validators are operations that validate the Mule Message without changing the message. Validators can produce these effects: If the condition the validator demands is fulfilled, the flow continues, and the Mule Message remains the same. If the condition the validator demands is not fulfilled, an error is thrown. Today we will be creating a custom validation that will validate whether a currency is valid or not. 

View more...

Rust’s Ownership and Borrowing Enforce Memory Safety

Aggregated on: 2022-08-12 02:06:47

Rust’s ownership and borrowing might be confusing if we don't grasp what's really going on. This is particularly true when applying a previously learned programming style to a new paradigm; we call this a paradigm shift. Ownership is a novel idea, yet tricky to understand at first, but it gets easier the more we work on it. Before we go further about Rust’s ownership and borrowing, let’s first understand what “memory safety” and “memory leak” are and how programming languages deal with them.

View more...

5 Data Models for IoT

Aggregated on: 2022-08-12 00:51:47

Apache Cassandra is a rock-solid choice for managing IoT and time series data at scale. The most popular use case of storing, querying, and analyzing time series generated by IoT devices in Cassandra is well-understood and documented. In general, a time series is stored and queried based on its source IoT device. However, there exists another class of IoT applications that require quick access to the most recent data generated by a collection of IoT devices based on a known state. The question that such applications need to answer is: Which IoT devices or sensors are currently reporting a specific state? In this blog post, we focus on this question and provide five possible data modeling solutions to efficiently answer it in Cassandra. Introduction The Internet of Things (IoT) is generating massive amounts of time series data that needs to be stored, queried, and analyzed. Apache Cassandra is an excellent choice for this task: not only because of its speed, reliability, and scalability but also because its internal data model has built-in support for time-ordered data.

View more...

Getting Started With Kubernetes

Aggregated on: 2022-08-11 22:51:47

Containers weighing you down? Kubernetes can scale them. To build a reliable, scalable containerized application, you need a place to run containers, scale them, update them, and provide them with networking and storage. Kubernetes is the most popular container orchestration system. It simplifies deploying, monitoring, and scaling application components, making it easy to develop flexible, reliable applications. This updated Refcard covers all things Kubernetes, exploring core concepts, important architecture considerations, and how to build your first containerized application.

View more...

4 Reasons MSPs Should Monitor Their GitHub Footprint

Aggregated on: 2022-08-11 21:21:47

In recent years, resorting to MSPs has become very popular for companies wanting to accelerate the digitization of their businesses. With this surge in popularity, MSPs are broadening their range of responsibilities and now face the question: how to ensure we can meet our cybersecurity responsibilities? In this article, we will see why monitoring in real-time code-sharing platforms such as GitHub should be a top priority for any MSP.

View more...

How to Choose the Right Digital Experience Monitoring Solution

Aggregated on: 2022-08-11 21:21:47

Today’s business landscape is increasingly competitive, demanding that companies maintain an agile mindset when differentiating their products and services from competing brands. For many organizations, this differentiation comes in the form of better user engagement strategies designed to improve the availability and reliability of web services and applications. But while most businesses understand the basic concept of managing the “digital experience” of their customers, many do not recognize the key ingredients to its long-term success—performance monitoring and optimization.

View more...

Five Steps to Building a Tier 1 Service that Is Resilient to Outages

Aggregated on: 2022-08-11 20:21:47

Tier 1 services are critical to a company’s profitability. They address the primary use cases for the organization’s products or support its underlying vital infrastructures, such as a product search service for an e-commerce site, a content posting service for a social media app, or a payment processing framework. Building a robust Tier 1 service, either a front-facing platform that powers customers' experience or the backend services behind that platform, is crucial to driving a positive customer journey.  Tier 1 services should be resilient to outages because availability issues can lead to mistrust and dissatisfied customers. A bad encounter with a website or an app that locks up or is painfully slow (latency), especially when there are other options in the same business sector, can spell disaster for the company behind the service. That is why it is important to build these services right the first time.

View more...

On Some Aspects of Big Data Processing in Apache Spark, Part 1: Serialization

Aggregated on: 2022-08-11 19:51:47

Many beginner Spark programmers encounter a "Task not serializable" exception when they try to break their Spark applications into Java classes. There are a number of posts to instruct developers on how to solve this problem. Also, there are excellent overviews of Spark. Nonetheless, I think it is worthwhile to look at the Spark source code to see where and how tasks get serialized and such exceptions are thrown to better understand those instructions.   This post is organized as follows:

View more...

Conceptual Architecture — Conversational AI/NLP based Platform

Aggregated on: 2022-08-11 18:21:47

This document provides Conceptual Architecture for Conversational Artificial Intelligence (AI) / Natural Language Processing (NLP) based Platform for Customer Support and Agent Services. This document highlights  Traditional Conversational Platform and its limitations. Key capabilities of AI/NLP Based Conversational Platform that are required to make the platform efficient which addresses the end-to-end need. Conceptual Architecture or Building blocks Conversational AI/NLP Platform to address the limitations. High-Level technology mapping of the conceptual architecture. Benefits of the Platform Traditional Conversational Platforms & Limitations Traditionally, many of the companies use Interactive Voice Response (IVR) based platform for customer and agent interactions. The following diagram depicts typical IVR-based platform that are used for customer and agents interactions.

View more...

Hide Your API Keys With an API Proxy Server

Aggregated on: 2022-08-11 16:51:47

In this article/tutorial, we are going to create an API Proxy Server using NodeJS, and the main reason behind this is to show you how to hide public API keys and not expose them in the public like I was doing in the past. All of us have created an application once just to get to know a new library or a framework, and the best way to achieve this is to use an open API (like TMDB). Most of these open APIs require adding the API key in the request URL or in the headers before making the request. Either way, the API key can be stolen and used by people that are not actually own this key. As a result, you may end up with a suspended account, or your application not work as you've expected it to.

View more...

Google Search Results Scraping With Node JS

Aggregated on: 2022-08-11 15:51:47

In this post, we will learn to scrape Google organic search results using Node JS. Requirements Before we start, we will install these packages, which we will use further in the tutorial:

View more...

How Big Data Is Shaping the Future of HR Analytics

Aggregated on: 2022-08-11 14:21:47

Big data has taken the business world by storm in recent years - to the point where the global market is forecasted to reach a whopping $103 billion by 2027, more than doubling its value in less than a decade. From healthcare to manufacturing to retail, almost every industry benefits from big data, and the world of HR is no different. Big data is revolutionizing how HR teams discover and manage problems by providing insights into employee behavior and patterns, which is helping companies increase retention rates, engagement levels, and overall employee performance. But exactly what is big data? What are some of its applications in human resource analytics? Here's everything you need to know.

View more...

Key Highlights from the New NIST SSDF

Aggregated on: 2022-08-11 04:51:47

The Software Development Lifecycle (SDLC) is a methodology for designing, creating, and maintaining software. There are different variations of the SDLC including waterfall, spiral, and agile. Regardless of which of these variations an organization uses it’s important for an organization to have secure software development practices. There are three primary reasons for this according to the National Institute of Standards and Technology (NIST):

View more...

5 Steps to Rethink High Severity to Save Developer Productivity

Aggregated on: 2022-08-11 04:51:47

Sev-1s are sapping developer productivity. Security remediations occupy a growing portion of developers’ time. For their part, developers often resent spending time on code fixes rather than adding new features or shipping new versions. Their concern is justified. In 2021, nearly 35% of all published Common Vulnerabilities and Exposures (CVEs) were classified as critical (Sev-1). The volume of all vulns published continues to skyrocket. Over 18,000 were published in 2022, the fourth record year in a row. The dirty secret? A Sev-1 that might be an existential threat for one organization may represent a very low risk to another. For example, let’s consider a vulnerable logging component. In one company, it’s used in their most critical customer-facing app. In another, it is nested in an application in a test environment not connected to enterprise networks. In the first organization, the Sev-1 is a juicy target. In the second organization, it is unreachable and largely irrelevant. Or, in another example, the developers overseeing that same logging component running on finance apps may have sanitized potential data pathways to the logging component, reducing attackability.

View more...

GitHub Events Are Booming! Are Bots the Reason?

Aggregated on: 2022-08-11 03:51:47

The OSS Insight website displays the data changes of GitHub events in real time. GitHub events are activities triggered by user actions on GitHub, for example, commenting and forking a repository. In nearly seven weeks, GitHub events increased by about 150 million, from 4.7 billion to 4.85 billion. GitHub's events are booming! This post dives deeply into GitHub event trending, why GitHub events are surging, and whether GitHub's architecture can handle the increasing load.

View more...

Azure Databricks Automated Testing Using Great Expectations and C#

Aggregated on: 2022-08-11 03:21:47

We all know how important data testing is in this digital transformation world. ETL testing mainly consists of ensuring that data has safely traveled from its source to its destination. Data processing is prone to errors, and you may end up with some data loss, corrupted, or irrelevant data as a result of various issues during the transformation phase. This is why ETL testing is so important: it ensures that nothing has been lost or corrupted along the way. To validate the data, the tester usually writes the ETL script or SQL by hand. The scripts will be run against the source and destination, and the results will be compared to validate the data. In this article, we'll look at how we can use Great Expectations, Databricks, and C# code to automate data quality and completeness tests.

View more...

Why Should You Choose ReactJS for Your Next Project?

Aggregated on: 2022-08-11 03:21:47

We have to think too much before it’s ready to deploy — from hiring a developer to wireframing to finding a target audience to platform. With ever-changing technologies, innovation in the development framework makes it possible to decrease development time. The less time you spend on developing, the faster you deploy the app in the market.  However, the time of development depends on the technology framework you choose. Faster development is one of the many reasons why cross-platform applications are preferred over native apps. However, many big companies and brands are using React Native nowadays. It’s one of the leading mobile app development frameworks that is used and trusted by Facebook, Skype, Instagram, Airbnb, and many more.

View more...

SRE: From Theory to Practice: What’s Difficult About Tech Debt?

Aggregated on: 2022-08-11 03:21:47

In episode 3 of "From Theory to Practice," Blameless’s Matt Davis and Kurt Andersen were joined by Liz Fong-Jones of Honeycomb.io and Jean Clermont of Flatiron to discuss two words dreaded by every engineer: technical debt. So what is technical debt? Even if you haven’t heard the term, I’m sure you’ve experienced it: parts of your system that are left unfixed or not quite up to par, but no one seems to have the time to work on. Pretend your software system is a house. Tech debt is the leak in your sink that you’ve haven’t gotten around to fixing yet. Tech debt is the messy office you haven’t organized in a while. It’s also the new shelf you bought but haven’t installed. To-do’s quickly build up over time. Even if certain tasks are quick, there are just so many of them that it’s tough to know where to start.

View more...

A BGP Guide for the Non-Network Engineer

Aggregated on: 2022-08-11 02:51:47

What Is BGP? Border Gateway Protocol (BGP) is the Internet’s primary routing protocol. It has been described as the protocol that “makes the Internet work” because it plays such an important role in allowing traffic to move quickly and efficiently. The original function of BGP was to carry internet reachability information between edge routers (it is sometimes described as a reachability protocol). It has since expanded to also carry routes for VPNs, IPv6, Multicast, and a range of other data. BGP provides network stability as it guarantees routers can rapidly adapt to send packets via a different connection if one Internet pathway goes down. It does this by exchanging routing information across the Internet, through the use of BGP-speaking routers and routing tables.

View more...

Pull Request vs. Merge Request

Aggregated on: 2022-08-10 21:51:46

When it comes to choosing a Git management tool, you need to consider various factors as it significantly affects the workflow and efficiency of the development process. One of the most important aspects to think about is how collaboration among all team members is organized in this application. Here are some questions we are going to answer in this article:  Is there any difference between Pull requests and Merge Requests? How to work with Pull Requests in Bitbucket? How to work with Merge Requests in GitLab? How to get insights into Your Team Performance in Bitbucket? How to improve your development process? What Is the Difference? Pull Request in Bitbucket and GitHub or Merge Request in GitLab are the features made for more convenient code review and change management. Though they have different names, these features are equivalent, as they both do the same git merge command to merge feature branches or forks with the existing code. In essence, the requests are simply short messages to other developers describing the changes made to a branch. Sending it will ask your colleges to review the changes before merging them.

View more...

CockroachDB TIL: Volume 8

Aggregated on: 2022-08-10 21:51:46

This is my series of articles covering short "today I learned" topics as I work with CockroachDB. Read the previous installments: Volume 1 Volume 2 Volume 3 Volume 4 Volume 5 Volume 6 Volume 7 Topics Topic 1: Generate workload data Topic 2: Convert hex keys to human-readable form Topic 3: Show all K/V pairs within the requested range Topic 4: Using pgpass with the cockroach binary Topic 5: Get table size from CLI Topic 1: Generate Workload Data The standard approach to generating workload data, say for tpcc workload, has always been the following:

View more...

Modern Strategy Pattern in Functional Java

Aggregated on: 2022-08-10 21:21:46

There's a way to think about design patterns that stuck with me. Like Venkat said at the beginning of his 2019 Devoxx talk, they are a lot like grandma's recipes. We all love when our grandmas cook for us. But try to ask for the recipes —the amount of flour or sugar to use is never precise. And when you prepare the food yourself, it comes out completely different. In our biggest Java project at Evojam right now, we have tweaked the recipe for strategy pattern. We added our personal touch with a pinch of enums and functional syntactic sugar. As always, the easiest way to explain it is with an example. Let's jump right into it.

View more...

10 Best Infrastructure-as-Code Tools for Automating Deployments in 2022

Aggregated on: 2022-08-10 21:21:46

IT technologies continue to evolve at an unprecedented pace. From cloud computing to DevOps and artificial intelligence (AI) to internet of things (IoT), the technology landscape has unlocked potential opportunities for IT businesses to generate value. The enterprise IT infrastructure has become crucial for modern-day digital business. It is because it facilitates the compute, network and data capabilities required to run business-critical software applications. The key role of infrastructure goes beyond production environs. It spreads across the complete development process. The infrastructure includes a host of components including servers, load balancers, firewalls, and databases. They also include DevOps tools, CI/CD platforms, staging environments, and testing tools. But there’s a catch here.

View more...

Back to Basics: Accessing Kubernetes Pods

Aggregated on: 2022-08-10 19:51:46

Kubernetes is a colossal beast. You need to understand many different concepts before it starts being useful. When everything is set up, you'll probably want to expose some pods to the outside of the cluster. Kubernetes provides different ways to do it: I'll describe them in this post. Setup For the sake of the demo, I'll be using kind:

View more...

Decorator Pattern to Solve Integration Scenarios in Existing Systems

Aggregated on: 2022-08-10 19:36:46

When we are in the learning phase of some technology, we always find the cleanest scenarios and examples in books and tutorials. It is perfectly logical because then we have to grasp the very core of the concepts involved, and we don't want to be confused by the imperfections coming from the real world.  When we make the first steps in the actual implementations of such learned material we always face some discomfort. Reality is always dirtier than our imagination.

View more...

What Is the Future of Humans With Artificial Intelligence (AI)?

Aggregated on: 2022-08-10 18:36:46

Artificial intelligence is influencing the world in incredible ways. The technology has sophisticated machine learning algorithms that enable it to process vast volumes of data. AI and complex machine learning algorithms can empower humans to control climate change and increase efficiency in the workplace. Additionally, it will support finding cures for rare diseases and facilitate a sustainable future for mankind. As per Ray Kurzweil, a famous American inventor, computers will achieve human-like intelligence by the year 2029. He added that humans will reach singularity by the year 2045. According to Bloomberg research, it was found that the AI industry will reach a financial growth of above $422 billion. It forecasts a CAGR of 39% between 2022 and 2028.  How Does Artificial Intelligence  Influence the Human World? The introduction of AI-backed products has paved the way for exponential profits. It has facilitated the production of smart apps. In this light, artificial intelligence is setting new standards of accuracy, efficiency, and reliability. 

View more...

Flutter — Highly Popular Technology for App Development

Aggregated on: 2022-08-10 17:36:47

Flutter is a Software Development Kit (SDK) that develops high-quality mobile applications, and it is also known as a UI framework. Flutter is developed by Google to build apps for web, mobile, and desktop in a single codebase. Flutter is an open framework that develops interactive UI designs for both iOS and Android mobile applications. It provides fast development growth to developers as compared to other operating systems. It creates attractive and efficient designs that developers can easily customize the design as per the user requirements. Flutter framework is a cross-platform app development framework that allows developers to develop powerful and high-performance mobile applications in a short period of time. It is simply compatible with all operating systems using a single codebase and offers the best icons, typography, and scrolling. With the help of the Flutter app development framework, developers can easily create web pages for browsers and applications for macOS, Linux, and Windows using a single codebase. 

View more...

Neural Network Essentials

Aggregated on: 2022-08-10 17:36:47

Neural networks are the core of all AI algorithms, and today, deep neural networks are used in tasks ranging from image recognition and object detection to natural language processing and generation. After dissecting the basic building blocks that form a neural network and the principles of how they work, this Refcard delves into neural architecture types and their respective uses, neural network chips, and model optimization techniques at a high level.

View more...

8 Cross-Platform Tools for Mobile App Development

Aggregated on: 2022-08-10 15:36:46

Mobile app development is an industry that’s constantly changing and evolving. While some of the biggest apps may seem like they’re stuck in time, there are new technologies emerging every day, which means developers have to stay on their toes. The thing about mobile apps is that the user experience needs to be seamless across all platforms—desktop computers, laptops, tablets, and phones. With different operating systems and screen sizes to consider for each device type, it can be challenging for developers who don’t know how to code for multiple platforms at once. However, there are tools available to make cross-platform development easier than ever before!

View more...

TURN Time Into Value

Aggregated on: 2022-08-10 12:51:46

Web2 software engineers have benefitted from design standards, mature programming languages, and vulnerability tools to minimize the risks of an attack. Failure to do so can result in a situation similar to my “Equifax Attack: Only a Matter of Time” publication back in 2017. Those working in Web3 projects find themselves at an exciting stage. Initiatives like bounties and Decentralized Autonomous Organizations (DAOs) drive new opportunities for these pioneers to explore. Unfortunately, the Web3 landscape is not as mature or defined as earlier phases in the web frontier. Compounding the situation is the risk those challenges impose in a decentralized environment — where exploitation can result in losing a large volume of assets, as well as the time it takes to secure an auditing service for smart contract code and the duration of the audit itself

View more...

Don’t Shove Your API Data Into Amplitude

Aggregated on: 2022-08-09 23:06:46

It’s a prudent business practice to only focus on your core features when getting to a Minimum Viable Product (MVP). Microservices architectures allow you to outsource non-differentiated pieces of your solution to third-party providers; Use someone else for user management, billing, and account management. At first blush, it might seem attractive to develop your own API analytics solution, perhaps by building on top of a web analytics tool like Amplitude, MixPanel, or Segment. But once you peel back the onion you’ll soon realize that you’ll be unnecessarily crippling your solution through upload limits, de minimis dimensional support, and flawed visualization.

View more...

Apache Kafka in Crypto and Finserv for Cybersecurity and Fraud Detection

Aggregated on: 2022-08-09 22:21:46

The insane growth of the crypto and fintech market brings many unknown risks and successful cyberattacks to steal money and crypto coins. This post explores how data streaming with the Apache Kafka ecosystem enables real-time situational awareness and threat intelligence to detect and prevent hacks, money loss, and data breaches. Enterprises stay compliant with the law and keep customers happy in any innovative Fintech or Crypto application. The Insane Growth of Crypto and Fintech Markets The crypto and fintech markets are growing like crazy. Not every new crypto coin or blockchain is successful. Only a few fintech like Robinhood in the US or Trade Republic in Europe are successful. In the last months, the crypto market has been a bear market (writing this in April 2022).

View more...

Snake-Based REST API (Python, Mamba, and Hydra)

Aggregated on: 2022-08-09 21:21:46

Today, I would like to try something new and start exploring the world of Python. In this article, I will present a step-by-step tutorial on how to implement a simple REST API using Python, Fast API, Hydra, and Mamba. Moreover, I will provide you with a short description on how to pack all these snakes into a single Docker image and make them work together. The whole code presented below is available on my GitHub. Let’s start with a short paragraph on why I decided to choose this topic. 

View more...

Delivering the Future of Uber-Like Apps With AI and ML

Aggregated on: 2022-08-09 21:21:46

Uber is, so far, the most popular ride-sharing application, with over 93 million users globally. The application was a revolutionary solution back in 2009; for over 13 years, it has kept increasing revenue. In 2015 Uber was one of the first to adopt machine learning for processing big data. Within the next 3 years, the application reached AI at scale, becoming one of the handfuls of companies that have successfully integrated ML strategy within a short period. Let’s dig deeper to understand Uber’s value proposition and the success formula.

View more...

How to Write RFCs for Open Source Projects

Aggregated on: 2022-08-09 20:51:46

About RFCs The importance of RFCs has been emphasized by many people. As @tison said in How to Participate in the Apache project community: A description is certainly needed for any non-trivial change to explain the motivation. For major changes, design documentation becomes even more necessary since no one has a permanent memory, and people always forget why they did something in the first place. The precipitation of design documentation plays a vital role in freeing the community from the uncertain evolution of human activities.

View more...

The 2-Minute Test for Kubernetes Pod Security

Aggregated on: 2022-08-09 19:51:46

In this post, I will show you how to audit your clusters for compliance with the latest Kubernetes Pod Security Standards without installing anything in the cluster. Pods are the basic unit of execution in Kubernetes, and pod security is necessary for all clusters. Without pod security checks enabled, any user with permissions to run a pod can elevate privileges. Attackers can exploit the lack of pod security to execute a container escape. All clusters, including Dev/Test and staging clusters, which are common entry points for attackers, should implement pod security.

View more...

Sprint Goals: How to Write, Manage, and Achieve

Aggregated on: 2022-08-09 18:06:46

Sprint Goals as the Key to Efficient Decision-Making A business is made of decisions, and what drives great decision-making is indeed the gateway to a flourishing venture. Though companies have overlooked the value brought in by the sprint goals, this blog here is all about giving a brief account of Sprint Goals and how we achieve success using them. Sprint Goal holds the capacity to either sustain or hinder your Sprint. Being one of the crucial components, Sprint Goal helps organizations to more successfully pivot, prioritize, and line up their tasks. 

View more...

How To Migrate From ECS to EKS and the #1 Trick To Make EKS Easier

Aggregated on: 2022-08-09 17:06:46

Migrating from Amazon ECS to EKS is probably the last thing you want to spend your time on; yet, you’re here. It’s likely that ECS hasn’t been serving you fully, or perhaps you’re curious if you should start planning the migration and how long will it take. I’ll try to answer most of your questions, starting from whether you should look at EKS at all to some practical migration and EKS management tips for when you’ve made your decision.

View more...

Monitoring Blind Spots in the Cloud and What to Do About Them

Aggregated on: 2022-08-09 17:06:46

Cloud adoption is growing because it comes with many advantages—like easy provisioning of new resources when there’s demand for it. Plus, there are generally short-term money savings as well. The cloud is more than just SaaS; there are lots of third-party providers that use the cloud—including DNS, CDNs, and APIs.

View more...

Massively Scalable Geographic Graph Analytics: InfiniteGraph and Uber’s Hexagonal Hierarchical Spatial Index

Aggregated on: 2022-08-09 16:06:46

Many organizations are discovering the tremendous value that graph databases provide in solving complex problems on connected data. Where relational databases focus on the data in the data model, they struggle to derive value from the relationships between data items in the same data model. Graph databases are designed to derive value from both the data and the relationships in your data model. What happens when the graph data you need to capture and analyze has a geographic element? What happens when much of your analysis becomes concerned with the “where” aspect of your data model?

View more...

Building a Slack Integration for Your SaaS Notification System

Aggregated on: 2022-08-09 02:51:45

For many organizations, Slack is the software of choice for business communication. Slack’s ubiquity in modern companies makes it one of the first notification integrations a SaaS company might want to build, possibly after email and mobile push notifications. In our experience, Slack notifications are a great way to reach business users (as Slack is mostly used in a business context) with time-sensitive alerts or action items while they’re at work. Because the users are already in work mode, Slack notifications are suitable for anything from collaboration on documents and spreadsheets to workflows like approval requests or data access permissions. Slack is less suited for notifications outside of a work context or out of working hours.

View more...

Create a Millisecond-Precision Time Ticks Chart with NodeJS

Aggregated on: 2022-08-09 02:51:45

Hello! Omar from LightningChart here. As my first article for DZone, I wanted to experiment with how to create different charts available from the lcjs library.

View more...

How to Build Spark Lineage for Data Lakes

Aggregated on: 2022-08-09 02:06:45

When a data pipeline breaks, data engineers need to immediately understand where the rupture occurred and what has been impacted. Data downtime is costly. Without data lineage—a map of how assets are connected and data moves across its lifecycle—data engineers might as well conduct their incident triage and root cause analysis blindfolded.

View more...