News AggregatorHow to Build Spark Lineage for Data LakesAggregated on: 2022-08-09 02:06:45 When a data pipeline breaks, data engineers need to immediately understand where the rupture occurred and what has been impacted. Data downtime is costly. Without data lineage—a map of how assets are connected and data moves across its lifecycle—data engineers might as well conduct their incident triage and root cause analysis blindfolded. View more...Auth0 (Okta) vs. CognitoAggregated on: 2022-08-09 01:51:45 Nowadays, many Software-as-a-Service (SaaS) companies often outsource their identity and access management needs to third parties. The question is how to figure out which works best for your specific business needs. This is especially true for start-ups with limited resources and companies that are going to deliver software over the Internet. They must provide easy and secure access to their applications without being distracted from their core business. View more...Inverse Distance Weighting Interpolation in PythonAggregated on: 2022-08-09 01:21:45 Geospatial interpolation is a process used to estimate values for unknown points in a geographical area using known values. Inverse Distance Weighting, or IDW for short, is one of the most popular methods used for geospatial data interpolation. This article will teach us how to do IDW interpolation in Python. View more...Agile Micromanagement — Seriously?Aggregated on: 2022-08-09 00:06:45 There are plenty of failure possibilities with Scrum. Indeed, given that Scrum is a framework with a reasonable yet short “manual,” this effect should not surprise anyone. For example, the Scrum Guide clearly states the importance of self-management at the Scrum team level. Nevertheless, the prevailing cause of many messed-up attempts to use Scrum result from what I call agile micromanagement, a pseudo-commitment to agile principles only to be overridden whenever it seems beneficial from a stakeholder’s or manager’s perspective. Join me and delve into the importance of self-managing Scrum teams in less than two minutes. View more...Exploring a Paradigm Shift for Relational Database Schema ChangesAggregated on: 2022-08-08 21:06:45 The relational database model was first proposed by English computer scientist Edgar Frank Codd in 1070 while working at IBM and has been commercially deployed for over forty years. It’s a rare accomplishment in software development that continues to evolve today. Relational databases generally serve as backends for the smallest to the largest apps and products in the world today. While relational databases have optimized for speed, concurrency, latency, and overall performance, they have not adapted to manage metadata changes at scale. Specifically, many organizations struggle to keep development velocity, agility, and confidence when deploying schema changes. History In the past, developers would plan a schema change months in advance and collaborate with database administrators to approve and coordinate the transition to the new model. To apply the changes, systems would be taken down for maintenance for hours or days. Given the complexity and time it took, teams would only deliver a handful of changes per year. View more...Shared Kubernetes Clusters for Hybrid and Multi-CloudAggregated on: 2022-08-08 20:06:45 Now more than ever, hybrid and multi-cloud deployments are quickly becoming key enterprise requirements. As Kubernetes adoption in an enterprise grows, effectively managing multicluster deployments becomes increasingly critical to application delivery. To bring Kubernetes usage and hybrid/multi-cloud infrastructure together, IT organizations need a modern operating model for shared K8s clusters in hybrid and multi-cloud architectures. The impetus for choosing enterprise hybrid and multi-cloud deployment varies, but the challenges and opportunities remain regardless of an organization’s infrastructure journey. Whether purposefully undertaken as an IT strategy or as the result of prior infrastructure investment, many IT leaders are discovering the benefits of using more than one infrastructure approach simultaneously. Container orchestration, in many respects, is the next logical step. Managing Kubernetes in a hybrid and multi-cloud context, however, comes with unique challenges. View more...Event Loop in JavaScriptAggregated on: 2022-08-08 20:06:45 JavaScript is an integral part of any website. It is responsible for all its logic and data manipulation. It is the most popular language used to build websites. This extremely versatile language can be used for virtually anything. This does not necessarily mean that it will best suit all applications, but it will be able to compete with the leading languages in many respects. It is this versatility that makes it worth finding out about its underlying mechanisms and thus its strengths and drawbacks. JavaScript is single-threaded, which means that only one action can be performed at a time. JavaScript uses a single thread to handle all requests, but when creating contexts, it uses other threads to handle input/output, so it does not get stuck. JavaScript can communicate between threads, using external interfaces that are able to create such other threads, it can communicate. For example, if you create a web page, it runs on a single thread but is able to communicate with other threads that work for some specific purpose. This is the case when using a camera. The camera is such a separate service for the browser and is a separate thread. And this is not happening on our thread but on an external one. View more...Tools and Integrations to Significantly Improve Code Review in GitHubAggregated on: 2022-08-08 20:06:45 As software engineers, we love to automate. Yet code review is often a fairly manual process that takes up a large percentage of our time. How do we improve this? There are plenty of tips and tricks for doing code reviews effectively, so we won’t go into those here. Instead, let’s focus on the parts of code review that we can automate. In this article, we’ll consider five tools and integrations that can significantly improve your code review experience in GitHub. View more...Difference Between Data Mining and Data WarehousingAggregated on: 2022-08-08 19:06:45 Data mining and warehousing are two processes essential for any organization that wants to be recognized on a global or national level. Both techniques help prevent data fraud and improve managerial statistics and rankings. Data mining is used to detect significant patterns by relying on the data gathered during the data warehousing phase. Data mining and data warehousing are both considered as part of data analysis. But they work in different ways. This blog will look at the differences between the two and whether or not one can exist without the other. View more...What Makes the Architecture of Geo-Distributed Apps Different?Aggregated on: 2022-08-08 17:36:45 Ahoy, matey! Welcome back to my journal, where I’ve been documenting my experience of building a geo-distributed app in Java from scratch. In the previous article, I broke down the definition of geo-distributed apps. If you missed that part of the journey, turn the “page” back to catch up. View more...Advancing Cybersecurity Using Machine LearningAggregated on: 2022-08-08 14:21:45 While businesses and services are expanding into cyberspace with minimum improvement in the traditional cybersecurity techniques, cybercriminals are revolutionizing cyber-attacks with artificial intelligence. Cyber threats are getting novel by the day and leaving under-resourced security operations analysts only to catch up. According to Sridhar Muppidi, Technology Security Chief at IBM, he alluded that security professionals are inundated with too many things to do, too much data, very little time, and too few skills. It is as though cybersecurity professionals are left to tackle ever-growing cyber-threats with their hands tied behind their backs while the threats continuously outsmart the traditional security techniques. However, machine learning can curate threat intelligence from millions of data emanating from research papers and new stories. This can help provide rapid insights that will reduce response time. After being trained with the right data—tested for bias and robust in taking on novel cyber-threats—artificial intelligence through machine learning can provide accuracy in threat detection, accelerate cyber-attack investigation and automate mitigation response. Machine learning based on behavioral biometrics will help evaluate the risk of a specific user for a specific session. View more...How to Measure Product SuccessAggregated on: 2022-08-08 02:51:45 What is success for you? When do you feel that you succeeded in your job? Is it when you are promoted? Maybe when you are tasked with more important assignments and greater responsibilities? Or does success mean increased creativity and freedom to work on the job you enjoy? We all envision success differently, and we need some sort of North Star to gauge if what we're doing is getting us closer or further from it. Business success is usually measured in monetary value. But, revenue alone is a third-rate guide to building a sustainable product that brings value to both your company and customers. How can a business find its North Star? What might it be? View more...How Can an App Show More POI Details to Users?Aggregated on: 2022-08-08 02:06:45 With the increasing popularity of the mobile Internet, mobile apps are now becoming an integral part of our daily lives and provide increasingly more diverse functions that bring many benefits to users. One such function is searching for Point of Interests (POIs) or places, such as banks and restaurants, in an app. When a user searches for a POI in an app, besides general information about the POI, such as the name and location, they also expect to be shown other relevant details. For example, when searching for a POI in a taxi-hailing app, a user usually expects the app to display both the searched POI and other nearby POIs, so that the user can select the most convenient pick-up and drop-off point. When searching for a bank branch in a mobile banking app, a user usually wants the app to show both the searched bank branch and nearby POIs of a similar type and their details such as business hours, telephone numbers, and nearby roads. View more...Monitoring at the Edge of the Third Act of the InternetAggregated on: 2022-08-08 01:51:45 Whether you’re in tech, media, retail, or any other business with or without a digital presence, the biggest challenge you are facing is how to deliver something to the last mile. If I own a grocery store, while it’s easy for me to have a big warehouse where I store and sell goods, no one will drive there if it’s not convenient. This is the reason why stores are located close to their customers — so anyone can stop on their way home and pick up their weekly groceries. The biggest challenge for everyone has been how to deliver any product or service as conveniently and as fast as possible to the end user. Amazon has disrupted the retail industry with its "same day" delivery, setting a very high bar for "last mile" delivery. Along the same lines, their acquisition of Whole Foods Market shows that they see a big opportunity in disrupting the perishable goods industry by streamlining its delivery chain and offering a more convenient experience for getting weekly groceries. Given the above examples, it is apparent that "edge" is not just a term for the computing industry — the concept is applicable to all customer facing industries. View more...Verizon’s Data Breach Report: Cloud Security InsightsAggregated on: 2022-08-07 12:51:45 * All quotations and images are sourced from Verizon 2021 Data Breach Investigations Report. For the past 14 years, telecommunications services provider Verizon has published an annual report that analyzes the security incidents and data breaches of the previous year. The Verizon Data Breach Investigations Report (DBIR) presents findings by attack type, industry, vulnerability, and more, and provides insights into global changes taking place in the cybersecurity sphere. View more...ExpectedConditions in SeleniumAggregated on: 2022-08-06 19:21:44 The majority of web products use AJAX (Asynchronous JavaScript and XML), where elements on the page are loaded at varying time intervals. This can lead to timing issues when automation testing is performed using the Selenium framework. What if a test is run on a WebElement that is not present in the DOM? The findElement function will raise ElementNotVisibleException. Here are other scenarios that can cause issues in Selenium due to the dynamic loading of elements: View more...Handling File Uploads With NestJS and MySQLAggregated on: 2022-08-06 17:21:44 Many developers despise dealing with file uploads. This can be attributed to a lack of knowledge about the best approach to take or difficulties determining how to configure their NestJS application to handle file uploads. Many people may want to save their files directly to a MySQL database, or save image names and have the image saved on disk storage: it all depends on their preferences and the goals they want to achieve. This tutorial will teach you how to build a file uploading functionality using NestJS and MySQL. Prerequisites Before you begin following this tutorial, ensure your system meets the following requirements: View more...Send Push Notifications to Users of Another AppAggregated on: 2022-08-06 17:06:44 As online shopping for products and services becomes more and more popular, new business opportunities have also arisen. To seize such opportunities, I recently developed an online shopping app, which I shall refer to in this article as "app B". Once you have developed an app, the next thing that you need to do is to promote the app and attract more users to use it. Since sending push messages to users is a widely used method for promoting apps and improving user engagement, I decided to do the same for my new app in order to deliver promotional information and various coupons to users, which hopefully should increase their engagement and interest. However, I discovered a glaring problem straightaway. Since the app has just been released, it has few registered users, making it hard to achieve the desired promotional effect by just sending push messages to these users. What I needed to do was to send push messages to a large pool of existing users in order to get them to try out my new app. It suddenly occurred to me that I once developed a very popular short video app (which I shall refer to as "app A"), which has now accumulated thousands of registered users. Wouldn't it be great if there was a one-stop service that I can use to get app B to send push messages to the wide user base of app A, thus attracting users of app A to use app B? View more...An Overview of DTrace and straceAggregated on: 2022-08-06 17:06:44 Often,ee when debugging, we need to step outside of the comforting embrace of the IDE to reproduce or track an issue. In this series, I’d like to go over some tools you might find useful for these cases. I’ll try to limit myself to tools that are 100% debugging tools and not those that are useful for development testing. For example, tools like curl or jq are remarkably useful. You can/should use them while debugging. But you probably used them while building and testing the feature. So you would already be familiar with them and should have some sense of what they do. I want to focus on tools that you would mostly reach for when debugging. In that sense, tools like SDKMan, etc. also make no sense here. View more...When Microservices Are a Bad IdeaAggregated on: 2022-08-05 21:21:43 On paper, microservices sound wonderful. They are modular, scalable, and fault tolerant. A lot of companies have had great success using this model, so microservices might naturally seem to be the superior architecture and the best way to start new applications. However, most firms that have succeeded with microservices did not begin with them. Consider the examples of Airbnb and Twitter, which went the microservice route after outgrowing their monoliths and are now battling its complexities. Even successful companies that use microservices appear to still be figuring out the best way to make them work. It is evident that microservices come with their share of tradeoffs. View more...Amazon Lightsail: Virtual Cloud ServerAggregated on: 2022-08-05 16:51:43 Amazon Lightsail, launched in 2016, is essentially a virtual private server (VPS) that offers you everything needed to deploy an application or website in a cost-effective and easy-to-understand manner. It is a basic service, but extremely convenient. It is designed for customers, developers, small businesses, or startups to get quickly started in AWS. It reduces the learning curve in the beginning, and users can later adopt the broad AWS Services as they get more familiar with the AWS cloud and/or solution workload increases. View more...Diving Deep into Smart ContractsAggregated on: 2022-08-05 12:21:43 The “Moving From Full-Stack Developer To Web3 Pioneer” publication provided a high-level overview to give full-stack developers a glimpse into the world of Web3 development. If you haven’t had a chance to review that article, consider taking a look, since it provides a good introduction into Web3 there as well. The end result of my original article demonstrated how a homeowners association (HOA) could use Web3 technology to host their election ballot. The problem with the original design is that the underlying smart contract only allowed for a single yes or no answer. This was by design to keep the smart contract simple, while introducing other concepts required to create an HOA ballot using Web3 technologies. View more...What Is the Difference Between SAST, DAST, and IAST?Aggregated on: 2022-08-05 04:36:43 What benefits does SAST have? What's the difference between SAST and DAST? What's IAST? What do all these words mean?! Let's talk about this and more in the overview of the main types of Application Security Testing (AST). Informational Security Before we start deciphering these terms, let's figure out why we need security testing at all. In modern world, software integrates into automation processes almost everywhere, the number of code lines in applications is increasing. As a result, the number of possible vulnerabilities and errors is increasing as well. This creates the need for effective checking and testing of the source code. View more...The Challenges of Ajax CDNAggregated on: 2022-08-05 03:36:43 For the longest time, hosting static files on CDNs was the de facto standard for performance tuning website pages. The host offered browser caching advantages, better stability, and storage on fast edge servers across strategic geolocations. Not only did it have performance benefits, but it was also convenient for developers. Recent developments, however, show that self-hosting static files such as Ajax (Asynchronous JavaScript and XML) and jQuery libraries, CSS styles, and other include directives are faster, more reliable, and add better security to the system. Possible Performance Degradation from CDN Usage Most developers and administrators think that adding a CDN-hosted static file improves performance. The idea has been that a CDN has fast edge servers that cache content and deliver it based on the user’s geolocation. These cached servers are faster than a traditional single hosting server, and the developers got the benefit of convenience. View more...SRE: From Theory to Practice: What's Difficult About Incident Command?Aggregated on: 2022-08-05 03:36:43 A few weeks ago, we released episode two of our ongoing webinar series, "SRE: From Theory to Practice." In this series, we break down a challenge facing SREs through an open and honest discussion. Our topic this episode was “What’s difficult about incident command?” When things go wrong, who is in charge? And what does it feel like to do that role? To discuss, Jake Englund and Matt Davis from Blameless were joined by Varun Pal, Staff SRE at Procore, and Alyson Van Hardenburg, Engineering Manager at Honeycomb. To explore how organizations felt about incident command, we asked about the role on our community Slack channel, an open space for SRE discussion. We found that most organizations don’t have dedicated incident commander roles. Instead, on-call engineers are trained to take on the command role when appropriate. Because of this wide range of people who could end up wearing the incident commander hat, it’s important to have an empathetic understanding of exactly what the role entails. View more...Spark-Radiant: Apache Spark Performance and Cost OptimizerAggregated on: 2022-08-04 23:21:43 Spark-Radiant is Apache Spark Performance and Cost Optimizer. Spark-Radiant will help optimize performance and cost considering catalyst optimizer rules, enhance auto-scaling in Spark, collect important metrics related to a Spark job, Bloom filter index in Spark, etc. Spark-Radiant is now available and ready to use. The dependency for Spark-Radiant 1.0.4 is available in Maven central. In this blog, I will discuss the availability of Spark-Radiant 1.0.4, features to boost the performance, reduce the cost, and the increased observability for Spark Application. View more...Make Your Integration Seamless By Using Ballerina Client ConnectorsAggregated on: 2022-08-04 21:06:43 Connectors and SDKs This is the era where we can see the face of the rapid growth in the integration space. There several dynamic entities have been added to the space, such as cloud networking, mobile network, IoT, system API, and so on. To use those dynamics, there should be any medium to communicate with each other. Connectors and SDKs are the medium for connecting integration entities to each other. View more...Onboarding New Users With Coinbase WalletAggregated on: 2022-08-04 20:36:43 Web3 represents an exciting chapter in the development of the internet. The primitives that the blockchain provides will lead to an infinite number of applications and use cases. We’ve seen the explosion of ICOs, DeFi, NFTs, and peer-to-peer payment systems. However, we still have a long way to go before reaching the mass adoption of this new technology. User experience is one area where things still lack. As Web3 developers, how are we supposed to onboard the next wave of users when the average person doesn’t understand concepts such as non-custodial crypto wallets or signed transactions? This article will explore the issue, and offer a solution to help create a better user experience. We’ll look at a real-world example of how we can use the Coinbase Wallet SDK to create a seamless onboarding experience for new users. View more...Geo What? A Quick Introduction to Geo-Distributed AppsAggregated on: 2022-08-04 20:06:43 Have you heard of geo-distributed apps? According to my statistics around 50% of us haven’t! Microsoft defines a geo-distributed app as an app that spans multiple geographic locations for high availability and resiliency. "Geo-distributed" is a relatively new term, coined around the time when many of us jumped on the cloud bandwagon and started building cloud-native apps like crazy. View more...Everything You Need to Know About Web Pentesting: A Complete GuideAggregated on: 2022-08-04 19:06:43 It's critical to ensure that your website is secure if you're running one. Hackers are always looking for vulnerabilities to exploit, and if they can find one on your site, they could do serious damage. That's where web penetration testing comes into the scene. Web penetration testing is the act of detecting and exploiting security flaws on a website. In this post, we'll go through what web pentesting is, why you need it, and how to use it to safeguard your site. We'll also look at some of the top web pentesting tools available, both open source and commercial. What Is Web Pentesting? Web application penetration testing, often known as web application security testing, is the activity of detecting and exploiting vulnerabilities in web applications. Pentesting can be used to find both known and unknown vulnerabilities. Once a vulnerability has been discovered, the tester may try to exploit it in order to steal confidential information or gain control of the system. View more...XAMPP vs WAMP: Which Local Server Is Best?Aggregated on: 2022-08-04 17:36:43 XAMPP and WAMP are different types of local development servers which are crucial web development technology. They reproduce the environment of a genuine web server so that you can run your website code, test it extensively, and then go onto the deployment step. A server hosted locally on your laptop or computer is referred to as a local server. Before a website goes online, they aid developers with testing it for faults and flaws. View more...Vanity Metrics for APIs vs Tracking Business Value From API TransactionsAggregated on: 2022-08-04 17:06:43 As an API product manager, you want your API to have a great developer experience. This means that developers can get up and running quickly, they get consistent behavior from your API, it’s easy for them to troubleshoot any errors they encounter, and your API makes it easy for them to address their business needs. Tracking your APIs is an important part of understanding how well they perform, which leads most organizations to build out their own internal API tracking systems. While this approach can work out for some organizations, it is much more common for organizations to track metrics incorrectly. Tracking the wrong metrics leads to an incorrect understanding of your API. View more...A Concise Guide to DevSecOps and Their Importance in CI/CD PipelineAggregated on: 2022-08-04 16:36:43 Leveraging continuous integration and delivery (CI/CD), many businesses today automate the software development life cycle. CI/CD is a part of the DevOps process, which aims to accelerate software development while minimizing errors. Continuous delivery automates the entire software release process up to production, whereas continuous integration produces and tests code automatically. However, security still possesses a significant concern. That brings us to the critical question, why is security a primary concern? CI/CD pipeline enhances your software development capabilities by providing several benefits. These include fewer code modifications, a shorter mean time to fix issues, more reliable tests, quicker release cycles, a lower backlog of products, and more customer satisfaction. View more...Testing Even Before a Line of Code Is Written: Is It Possible?Aggregated on: 2022-08-04 16:36:43 Testing is often viewed as a necessary evil in software development, in order to ensure the quality of applications. Most commonly, however, testing occurs after the coding process has been completed. However, according to the Ministry of Testing’s OpsBoss and author of Testing of Web APIs Mark Winteringham, testing should apply across the entire software development lifecycle. In his book, he even wrote that testing should be done “even before a line of code is written.” View more...Difference Between Data Mining and Data WarehousingAggregated on: 2022-08-04 15:21:43 Data mining and warehousing are two processes essential for any organization that wants to be recognized on a global or national level. Both techniques help prevent data fraud and improve managerial statistics and rankings. Data mining is used to detect significant patterns by relying on the data gathered during the data warehousing phase. Data mining and data warehousing are both considered as part of data analysis. But they work in different ways. This blog will look at the differences between the two and whether or not one can exist without the other. View more...Automatically Creating Microservices Architecture DiagramsAggregated on: 2022-08-04 04:36:42 In application development, microservices is an architectural style where larger applications are structured as a collection of smaller, independent, yet interconnected services. While this allows for highly maintainable and testable applications (as each service can be maintained independent of the larger application), the problem with this method is the inherent complexity of interactions between microservices. It can be difficult for developers and team members to visualize how these microservices are connected to each other. We have been looking for ways to produce architectural diagrams that illustrate these interactions. We found that GraphViz helped us to solve part of this problem, as it can take the microservices structure of an application in the DOT language and convert it into a PNG format. However, we wanted this process to be even more user-friendly and more automatic, so that the user would not have to manually generate a DOT file of their microservices architecture. In-Browser Tool As we could not find such a tool, we decided to create one ourselves. We decided that the most user-friendly interface would be to create an in-browser tool that allows the user to upload a jar file containing a packaged service, and to have an image automatically rendered. This article discusses how we went about creating this tool and includes an example of what happens "behind the scenes" of this interface. View more...Why Blockchain Technology Is the Future of Data StorageAggregated on: 2022-08-04 03:51:42 Data is the lifeblood of businesses, and its storage is crucially important. According to a recent study, the world will generate over 180 zettabytes of data by 2025. That is a large amount of data; it will grow even more. The question now is, how do we store all of this data? The answer is with blockchain. But: View more...How to Migrate to the Open-Source Cadence WorkflowAggregated on: 2022-08-04 02:06:42 Cadence is an open-source workflow orchestration service. It is a scalable, fault-tolerant, and developer-focused platform that centralizes business logic and allows you to build complex workflows that integrate with your distributed service architecture. Developers face steep difficulty in building modern high-scale distributed applications, which require them to wrangle long-running business processes, internal services, and third-party APIs to make them play well together. Designing those convoluted interactions forces developers to solve puzzles and carefully build numerous connections, with complex states to track, responses to asynchronous events to prepare, and communications to establish with external dependencies that often aren’t as reliable as hoped. View more...Understanding Cursors in Apache PulsarAggregated on: 2022-08-04 01:36:42 In my previous blog that introduces Apache BookKeeper, it mentions that Apache Pulsar maintains a cursor ledger for each subscription in Apache BookKeeper. After a consumer has processed a message with an acknowledgment sent to the broker and the broker has received it, the broker updates the cursor ledger accordingly. In this blog, let’s take a closer look at the cursor, how it works, and some concepts related to it. What Are Cursors Ensuring messages can be consumed successfully represents a key part of any distributed message system. In exceptions, such as machine failures on either the client side or server side, a message system featuring strong fault tolerance makes sure that no messages are lost or reconsumed. To provide such capability, message systems need a precise tracking mechanism for message consumption and acknowledgment. Apache Pulsar uses cursors for that purpose. View more...How to Integrate a Distributed Database With Event StreamingAggregated on: 2022-08-04 00:51:42 This article is derived from the Distributed Data Systems Masterclass event that I had fun doing with Maheedhar Gunturu from AWS and Tim Spann from StreamNative. What’s Event Streaming? Events are facts or things that happen. In microservices architectures, we can imagine an event affecting a number of services and generating a series of interactions. The continuous flow of events and data is called a stream. View more...Getting Started With Nose in PythonAggregated on: 2022-08-03 21:21:42 A challenge that many developers face in Selenium test automation is choosing the right test framework that can help them come up with automated tests with minimal (or no) requirement of boilerplate code. Like me, most of you would have come across test code where a huge chunk of code is written to perform a simple test. The selection of the right test automation framework can greatly simplify the job of the developer working on the test code. The framework features can be exploited to write tests that perform the job with minimal implementation. As far as Selenium Python testing is concerned, there are several test automation frameworks such as PyUnit, Pytest, Robot, Cucumber, etc. to choose from. View more...No Sprint Goal, No Cohesion, No CollaborationAggregated on: 2022-08-03 20:36:42 There are plenty of failure possibilities with Scrum. Given that Scrum is a framework with a reasonable yet short “manual,” this effect should not surprise anyone. For example, what if there is no Sprint Goal — Sprint after Sprint? What if the Scrum team is always only working on a random assortment of work items that seem to be the most pressing at the moment of the Sprint Planning? Join me and delve into the importance of the Sprint Goal for meaningful work as a Scrum team in less than two minutes. View more...IntelliJ Integration for MockitoAggregated on: 2022-08-03 20:21:42 Mockitools is an IntelliJ plugin that provides integration for Mockito. In this article, I’d like to show you the major features of the plugin (and some of the minor ones, too) and how they can be useful when working with Mockito test code. View more...The Impacts of Blockchain on the Software Development IndustryAggregated on: 2022-08-03 16:51:42 Blockchain is the most reliable technology in recent times that caters to our responsibility of complying with the IT compliance obligations. Blockchain technology not only secures the data and transactions but also simplifies the processes involved in developing software products. This possibility of any intricate system becoming a part of a larger, more trustworthy network of transactions makes it a promising technology for companies to adopt. View more...7 Great Terminal/CLI Tools Not Everyone KnowsAggregated on: 2022-08-03 16:51:42 Do you work frequently work with the CLI? Whether you use Windows, macOS, or Linux, in the video below, you'll learn 7 tools that I frequently use: exa, Clink, rg and rga, plocate, bat, jq, and f**k. What’s in the Video? The video gives a short overview of how to use the tools mentioned above work. In order of appearance: View more...Resilient Kafka Consumers With Reactor KafkaAggregated on: 2022-08-03 15:21:42 We introduce a recipe for creating resilient Kafka consumers using Reactor Kafka. This approach is one that we've developed over time and incorporates the learnings from our experience with running Reactor Kafka - and all the challenges that come with that. The consumer described in this article provides at-least-once delivery semantics using manual acknowledgments, which is mostly suited for applications where data loss is not acceptable. However, most of the concepts described here still apply to other types of delivery semantics supported by the framework. Kafka Configuration The configuration class defines the properties to be used by the Kafka consumer, after which it uses them to instantiate a KafkaReceiver that will be made available as a bean in the application context. View more...How API Management Can Ease Your Enterprise Cloud MigrationAggregated on: 2022-08-03 14:21:42 There’s no doubt the last two years have seen an accelerated push to move the majority of workloads to the cloud. You can’t talk about cloud migration without talking about how you manage your application programming interfaces (APIs.) Because APIs are how you build and connect your cloud-native applications. Instead of properly breaking up and preparing workloads, many of these digital transformations have just been of the 'lift and shift' variety — which only offers a fractional advantage. That’s because, whether self-dubbed cloud-native or truly legacy, many organizations have failed to initiate the organization-wide API management strategy necessary to break away from the monolith and unlock business agility. View more...Kubernetes Data Simplicity: Getting Started With K8ssandraAggregated on: 2022-08-02 21:21:41 You might have heard about the K8ssandra project and want to start contributing, or maybe you want to start using all of its features. If you aren’t familiar with K8ssandra (pronounced like “Kate Sandra”), you can read this overview before digging into the developer activities in this post. In a nutshell, K8ssandra is an open-source distribution of Apache Cassandra™ for Kubernetes, which includes a rich set of trusted open-source services and tooling. K8ssandra comes with handy features that are baked-in and pluggable, which allows for flexible deployment and configuration. View more...Developing a Cloud Adoption StrategyAggregated on: 2022-08-02 20:21:41 The value of technology in businesses and organisations cannot be underestimated, and there was nothing like the COVID-19 pandemic for us to see its value first-hand. Overnight, the way we interact with and operate businesses was forcefully changed forever, effectively accelerating our journey towards digitally transforming our organisations. According to a 2020 McKinsey report, companies were able to adopt digital changes 20-25 times faster than they would have anticipated. View more...Trending Programming Language to LearnAggregated on: 2022-08-02 19:51:41 It wasn't that long ago when computer programming was an almost unknown and secluded field. Back then, there used to be only a few people who had the advanced coding skill set to be considered computer programmers. But today, information technology is evolving at a faster pace than ever before. In parallel with the rapid development of the IT sector, there is a rapid growth in the market demand for specialists. View more... |
|
|