News Aggregator


Developing a Cloud Adoption Strategy

Aggregated on: 2022-08-02 20:21:41

The value of technology in businesses and organisations cannot be underestimated, and there was nothing like the COVID-19 pandemic for us to see its value first-hand.  Overnight, the way we interact with and operate businesses was forcefully changed forever, effectively accelerating our journey towards digitally transforming our organisations. According to a 2020 McKinsey report, companies were able to adopt digital changes 20-25 times faster than they would have anticipated.

View more...

Trending Programming Language to Learn

Aggregated on: 2022-08-02 19:51:41

It wasn't that long ago when computer programming was an almost unknown and secluded field. Back then, there used to be only a few people who had the advanced coding skill set to be considered computer programmers.  But today, information technology is evolving at a faster pace than ever before. In parallel with the rapid development of the IT sector, there is a rapid growth in the market demand for specialists.

View more...

Comparing Approaches to Durability in Low Latency Messaging Queues

Aggregated on: 2022-08-02 18:51:41

A significant feature of Chronicle Queue Enterprise is support for TCP replication across multiple servers to ensure the high availability of application infrastructure. I have generally held the view that replicating data to a secondary system is faster than sync-ing to disk, assuming the round trip network delay wasn’t high due to quality networks and co-located redundant servers. This is the first time I have benchmarked it with a realistic example. Little’s Law and Why Latency Matters In many cases, the assumption is that as long as throughput is high enough, the latency won’t be a problem. However, latency is often a key factor in why the throughput isn’t high enough.

View more...

The Essential Web3 Tools and Technologies Developers Must Know

Aggregated on: 2022-08-02 18:51:41

Web3 is the next iteration of the web. As opposed to Web1, which consisted of static web pages, and Web2, which brought us web apps and the web as a platform, Web3 consists of decentralized networks built on blockchains. There is a high demand for Web3 developers, as relatively few current developers are experts in this field. So if you’re an established Web2 engineer wanting to break into Web3, where would you start? What are the fundamental concepts to know, and what tools and technologies would you need to learn?

View more...

What You Need to Know to Debug a Preempted Pod on Kubernetes

Aggregated on: 2022-08-02 17:21:42

The purpose of this post is to share some thoughts on the management of a Kubernetes platform in production. The idea is to focus on a major problem that many beginners encounter with this platform, namely: the management of preempted pods. What Is a Preempted Pod? Preemption is a famous nightmare on every orchestration platform, this is not something dedicated to Kubernetes, but several aspects of this platform can be the root cause of an unexpected preemption. 

View more...

CockroachDB and Deno: Combining Two “Quick to Start” Technologies

Aggregated on: 2022-08-02 16:51:41

This tutorial will walk through building a simple application using Deno, backed by CockroachDB (CRDB) Serverless. Deno (pronounced dee-no) is a “modern runtime environment for JavaScript and TypeScript”, while CockroachDB Serverless offers a free startup that scales with your app. Both technologies claim quick startup times for developers, so I’d like to test them out together and see how quickly we can get a full end-to-end application running. Difficulty: Beginner (assumes no prior experience with CockroachDB or Deno)

View more...

Build a Serverless URL Shortener With Go

Aggregated on: 2022-08-02 15:51:41

This blog post covers how to build a Serverless URL shortener application using Go. It leverages AWS Lambda for business logic, DynamoDB for persistence, and API Gateway to provide the HTTP endpoints to access and use the application. The sample application presented in this blog is a trimmed-down version of bit.ly or other solutions you may have used or encountered. It's structured as follows:

View more...

What Is Cloud Storage: Definition, Types, Pros, and Cons

Aggregated on: 2022-08-02 15:21:41

What exactly do tech-savvy individuals and internet users mean when they say files have been moved to the cloud? Do all files go to private cloud storage? Is there an invisible storage device that only developers and data scientists can access? Where is the cloud? This article on cloud storage is typical to a beginner's compass and will serve as a reference resource for anyone seeking sufficient knowledge about the cloud. 

View more...

Externalize Microservice Configuration With Spring Cloud Config

Aggregated on: 2022-08-02 14:21:41

In a microservices system, we might need or want to externalize configuration so that we can abstract sensitive data or credentials outside the applications. We can do something like this with Docker Compose, but the compose file often contains values for multiple services together. We probably want further separation and limited access. This is where solutions such as Spring Cloud Config come into play. We have a free Neo4j graph database instance on a public cloud, so we can set the credentials in an external location (such as a local file or other systems) and use Spring Cloud Config to access those keys and pass them to the approved application.

View more...

Top 5 Datadog Integrations To Improve the Efficiency of Tech Teams

Aggregated on: 2022-08-01 23:06:41

Datadog is an exceptional tool for DevOps teams, developers, and SREs. It's suitable for a broad range of cloud applications of every size. However, despite its powerful capabilities, most businesses aren't making the most of Datadog. Are you? Can you see how newly launched features are affecting user experience? Can you immediately see the root cause of an issue on your dashboard – without digging around?  Are you managing Jira tickets directly in Datadog? Datadog’s integrations help make the platform stand out, but using them to make Datadog more powerful can be confusing, as there are over 500 interesting tools to consider.

View more...

API Security Weekly: Issue 173

Aggregated on: 2022-08-01 22:36:41

This week, we have news of the eye-opening vulnerability on the Coinbase platform which netted $250,000 in bug bounty. There’s also an excellent guide on best practices for authentication and authorization for REST APIs, an article on the growth of bad bots and how to mitigate against them, and a fun read from APIHandyman on how to hack the Elgato Key light API. Vulnerability: Coinbase API Bug Allowed Unlimited Cryptocurrency Trading This week’s major news story has been the disclosure of a major vulnerability in an API on Coinbase, a cryptocurrency trading platform. This vulnerability potentially allowed an attacker to make unlimited cryptocurrency trades between different currency accounts.

View more...

MuleSoft Logs Integration With Datadog

Aggregated on: 2022-08-01 20:36:41

In this article, we will see how we can integrate MuleSoft application logs with the external data system using the Log4j2 file. Some organizations want to persist logs for more than 30 days or want to build custom dashboards based on the logs; hence, there is a need to store these logs in an external data system. The easiest and most recommended way to integrate the logs with external systems is through the Log4j2 file. 

View more...

Java Class Loading: Performance Impact

Aggregated on: 2022-08-01 19:36:41

java.lang.ClassLoader#loadClass() API is used by 3rd party libraries, JDBC Drivers, frameworks, and application servers to load a java class into the memory. Application developers don’t use this API frequently. However when they use the APIs such as ‘java.lang.Class.forName()’ or ‘org.springframework.util.ClassUtils.forName()’, they internally call this ‘java.lang.ClassLoader#loadClass()’ API. Frequent usage of this API amongst different threads at runtime can slow down your application performance. Sometimes it can even make the entire application unresponsive. In this post let’s understand this API a little bit more and its performance impact.

View more...

You Are Blind to the Risks in Your Cloud — Why Companies Need Cloud Security Monitoring

Aggregated on: 2022-08-01 18:51:41

Migrating to the public cloud can be a risky endeavor because it decentralizes or expands a business’s attack surface. In other words, the move can expose businesses to a variety of new ways bad actors can exploit vulnerabilities or poorly configured cloud settings. With that in mind, an effective cloud security monitoring strategy is critical to business success. To put it simply, cloud security monitoring is critical to protect your data in the public cloud.

View more...

Are Prometheus Recording Rules the Right Tool for the Job?

Aggregated on: 2022-08-01 18:06:41

If you’ve used Prometheus in the past for metrics collection/monitoring, then you’re probably familiar with Prometheus recording rules. As the Prometheus documentation says, recording rules allow you to precompute frequently needed or computationally expensive expressions and save their result as a new set of time series. Recording rules are the go-to approach for speeding up the performance of queries that take too long to return, and they are also commonly used to alias complex or repetitive PromQL subexpressions. While recording rules can be quite useful and are almost certainly in use in any production environment, they do have some downsides as well. In this post, we’ll take a look at how recording rules work, and discuss some of the pain points that you are likely to encounter when your workload scales up. How Recording Rules Work So, how do recording rules work? Recording rules are defined in YAML files that are referenced by the rule_files option in the Prometheus configuration file. Rules are structured into named groups, with each group having the ability to set the evaluation interval (default is 60s, as specified by the evaluation_interval option in the Prometheus configuration file), and an optional limit on the number of series that can be generated by the rules in the group. As part of the Prometheus server’s regular operation, it evaluates the provided rules on a schedule according to the configured evaluation interval for each group.

View more...

The Need for a Kubernetes Alternative

Aggregated on: 2022-08-01 17:06:41

Kubernetes has become a household name for container orchestration. There is no denying that it has risen to become an ideal solution for many developers. But is Kubernetes truly flawless? On the contrary, you can go from being enthusiastic about the possibilities Kubernetes offers to being frustrated trying to resolve the many issues that come up along the way. This is why an increasing number of organizations have begun to look for more easy-to-use Kubernetes alternatives. This article highlights the need for these alternatives and puts forward a strong contender to replace Kubernetes. Source: Pixabay

View more...

What to Know About Python and Why Its the Most Popular Today

Aggregated on: 2022-08-01 16:06:41

What Is Python? Python is said to be a high-level and general-purpose programming language. It supports several programming paradigms, as well as structured, object-oriented, and functional programming. It is used for Data Science, Data Analysis, Machine Learning, Software Development, etc. Guido van Rossum created Python in 1991 as Python 0.9.0 which was the first released. Python 2 is a very popular version and its latest version is Python 3.

View more...

Observability Tools Help Catch Application Failures — But Automating the Observer Is Becoming Crucial

Aggregated on: 2022-08-01 14:36:41

A modern-day blessing for Site Reliability Engineers (SREs) entreats, “May the queries flow, and the pager stay silent.” This is because SREs, DevOps engineers, or support staff are constantly stressed about responding to their alert channels while keeping an eye on operational and performance dashboards to ensure their users have a good experience. Many frontline engineers are glued to dashboard monitor screens laid out in front of them. Assessing and responding to alerts is a top priority. This approach involves both the observability tool and the observer, and they both have crucial roles. While various golden signals are continually monitored on the observability dashboards, it is up to the observer to provide the evaluation and intelligence to piece together details and know when and how to respond. This is especially apparent when there is some kind of problem. The observer has to determine what to drill down on and then where to go next in order to find the root cause. The observer is decidedly not automated, and there are finite limits to what they can take in and consider in their observations to develop proper context, validation, and, ultimately, to understand the root cause of a problem.

View more...

Everything You Need to Know About Cloud Automation

Aggregated on: 2022-08-01 13:51:41

The cloud has changed the way we work. But it hasn't changed everything: certain industries still require onsite IT support. Businesses that depend on legacy systems, like manufacturing or banking, are often left scrambling for solutions. As technology evolves and progresses, the need to have a plan in place will become more crucial.  To make your life easier when it comes to running a business, you can use a service known as cloud automation. It is a service where you can use applications from the cloud to automate various things. Let's check out what cloud automation is.

View more...

Time-series Forecasting With TensorFlow and QuestDB

Aggregated on: 2022-08-01 04:06:41

Machine Learning For Time-series Forecasting Machine learning is taking the world by storm, performing many tasks with human-like accuracy. In the medical field, there are now smart assistants that can check your health over time. In finance, there are tools that can predict the return on your investment with a reasonable degree of accuracy. In online marketing, there are product recommenders that suggest specific products and brands based on your purchase history. In each of these fields, a different type of data can be used to train machine learning models. Among them, time-series data is used for training machine learning algorithms where time is the crucial component.

View more...

SRE: From Theory to Practice: What's Difficult About On-call?

Aggregated on: 2022-08-01 03:36:41

We wanted to tackle one of the major challenges facing organizations: on-call. "SRE: From Theory to Practice - What’s Difficult About On-call" sees Blameless engineers Kurt Andersen and Matt Davis joined by Yvonne Lam, staff software engineer at Kong, and Charles Cary, CEO of Shoreline, for a fireside chat about everything on-call.  As software becomes more ubiquitous and necessary in our lives, our standards for reliability grow alongside it. It’s no longer acceptable for an app to go down for days, or even hours. But incidents are inevitable in such complex systems, and automated incident response can’t handle every problem.

View more...

GraphQL in Enterprise: What It Takes to Build, Deploy, and Monitor a New Enterprise GraphQL Service

Aggregated on: 2022-08-01 03:36:41

New technologies always require some planning, changes, and experimentation before they merge into an enterprise stack. GraphQL adoption has been no exception to this. Companies like Airbnb, Netflix, Shopify, and other industry giants have all taken the leap to use this promising technology. In this article, I will outline a few key considerations for creating your new service, deploying it, and monitoring the service. This assumes that you have a basic understanding of what GraphQL is, some of the key use cases, and awareness of some of the concerns in regards to adoption. With that in mind, let’s jump in. GraphQL vs. REST Before you begin to build your GraphQL service, it’s important to consider the reigning approach for building Web APIs: REST. A common misconception about GraphQL is that it is a replacement for REST. Thinking of the technology in this light would be very wrong. Both GraphQL and REST can be very complimentary and most enterprises will use a mixture of both approaches.

View more...

Data Software Design Pitfalls on Java: Should We Have a Constructor on JPA?

Aggregated on: 2022-07-31 23:06:40

The data in any modern and distributed architecture, such as microservices, work as a vein in a system. It fits like a state in a stateless application. On the other hand, we have the most popular paradigms in the code, especially when we talk about enterprise OOP. How do you combine both archive and software design, primarily on Java?  This article will explore more details on code, especially inside the Jakarta EE world, mainly to answer the questions in a previous Jakarta JPA discussion: should we have a constructor on JPA, and why?

View more...

Debugging a Wordle Bug

Aggregated on: 2022-07-31 21:06:41

I have a confession: I'm addicted to Wordle. Especially now that it's out of style and people don't post about it. I love that it's short, I can solve one word, and then it's gone. I don't feel bad about the addiction and wasting my time with any game. This cloud debugger tutorial is an enormous challenge for me since the target is a Wordle game. But I'm getting ahead of myself. As part of the Lightrun Playground, we recently released we needed a demo application that will let developers who are new to Lightrun, practice in a "safe environment".We decided to pick Wordle as our demo application because it's instantly familiar, visual, and not too interactive. A Flappy Bird demo might have been painful to debug. At this point, our key challenge was in creating a bug where the debugging process would be interesting enough and yet subtle enough so it won't be instantly obvious.

View more...

Optional in Java - When Better Code Is Not an Alternative

Aggregated on: 2022-07-31 20:06:40

If you are a Java developer, you have handled issues with Java for a long time. The most often problem in the Java world is the NullPointerException. Nullity is a natural consequence of reference types. If there is a reference, it has to refer to some object - or be null. If there is no this option, all the variable was initialized with some non-null expression - and even then, you'd have issues if variables were read during the initialization phase.

View more...

Open API and Omnichannel with Apache Kafka in Healthcare

Aggregated on: 2022-07-30 20:51:40

IT modernization and innovative new technologies change the healthcare industry significantly. This blog series explores how data streaming with Apache Kafka enables real-time data processing and business process automation. Real-world examples show how traditional enterprises and startups increase efficiency, reduce cost, and improve the human experience across the healthcare value chain, including pharma, insurance, providers, retail, and manufacturing. This is part five: Open API and Omnichannel. Examples include Care.com and Invitae. Blog Series - Kafka in Healthcare Many healthcare companies leverage Kafka today. Use cases exist in every domain across the healthcare value chain. Most companies deploy data streaming in different business domains. Use cases often overlap. I tried to categorize a few real-world deployments into different technical scenarios and added a few real-world examples:

View more...

Deriving Ideal Indexes: A Guide

Aggregated on: 2022-07-30 17:21:40

Indexes are there to simplify our work when searching for data: they speed up SELECT queries at the expense of slowing down other kinds of queries like DELETEs, UPDATEs, and INSERT s instead. However, as awesome as indexes might be, they also need a lot of work to get right — in this blog, we will tell you how you should go about deriving ideal indexes for your database. The majority of the examples in this article will focus on MySQL: however, the concept is the same for all major database management systems available on the market today. What Are Indexes? If you are familiar with database structures, great — because that's essentially what indexes are! Indexes are database structures that can be used to quickly find rows having specific column values. At the expense of taking up disk space and time if your tables are big and you find yourself adding indexes on top of them, indexes allow databases to skip reading through entire tables and instead, only scan relevant rows which means that databases have less data to scan through.

View more...

Securing Container Base Images Using Kyverno Policies

Aggregated on: 2022-07-30 17:21:40

Before jumping into the details, it’s worth explaining what the “Base Image” term refers to. Words matter, there is some misunderstanding between the terms “Parent” and “Base” image. As defined by the Docker documentation, a parent of an image is the image used to start the build of the current image, typically the image identified in the FROM directive in the Dockerfile. If the parent image is SCRATCH, then the image is considered a base image. However, the terms “base image” and “parent image” are often used interchangeably in the container community.

View more...

Upgrading Kubernetes Clusters With Cluster API on Oracle Cloud

Aggregated on: 2022-07-30 16:21:40

In this post, I’ll cover an awesome feature of Cluster API: the ability to do a rolling upgrade of your Kubernetes cluster. Cluster API makes it simple, and repeatable. I’ll be totally honest, I’ve manually upgraded a Kubernetes cluster, it wasn’t the end of the world, but I’m a lazy hacker so why do it manually when I can automate it and have the safety of repeatability?

View more...

Differences Between Windows and SQL Server Authentication

Aggregated on: 2022-07-30 15:51:40

Authentication is a crucial aspect of any security strategy. It is a process or act of proving that a specific person’s identity is true, valid, or genuine. To put it simply, it is an act of determining whether someone or something is what it actually claims to be. When it comes to Microsoft SQL Server, there are two different modes of authentication, namely Windows mode and mixed mode. These two modes determine how the system authenticates or identifies a particular user. 

View more...

Common Mistakes to Avoid When Migrating

Aggregated on: 2022-07-30 15:51:40

For enterprises, being able to migrate thousands of applications is an inevitable part of staying competitive. Figuring out how to achieve a successful migration is scary so let’s dive into the pitfalls to avoid. COVID-19 has created both a technical talent shortage combined with an increase in demand for accelerated technical timelines. Many companies are starting to face a “Red Queen” effect, where companies are having to re-define how and where they are competing in the market to ensure they remain relevant. Today businesses that remain complacent are rewarded with a biting disadvantage and a perpetual catchup cycle. Migrations from incumbent technologies to more responsive and cost-effective solutions are a significant part of any enterprise’s metamorphosis; however, it can be fraught with pitfalls for the unprepared.

View more...

How Do You Know If a Graph Database Solves the Problem?

Aggregated on: 2022-07-30 15:21:40

One of the greatest questions to consistently badger a developer is "what technology should I use?". Days of thought and analysis determines which option(s) (from an increasingly growing number) best suits the need, manages volume and demand, plans for long-term strategy, simplifies/reduces support, and gets approved by colleagues and management. Those steps may even seem easy compared to real life. The decision's complexity can get compounded by how much buy-in is needed, and the current constraints of existing technology plus developer knowledge. For instance, investing in an unknown or newer solution means allocation for learning costs.

View more...

Supabase and Nuxt 3 Quickstart Guide

Aggregated on: 2022-07-30 14:51:40

This example provides the steps to build a simple user management app (from scratch!) using Supabase and Svelte. It includes: Supabase Database: a Postgres database for storing your user data. Supabase Auth: users can sign in with magic links (no passwords, only email). Supabase Storage: users can upload a photo. Row Level Security: data is protected so that individuals can only access their own data. Instant APIs: APIs will be automatically generated when you create your database tables. By the end of this guide you'll have an app that allows users to log in and update some basic profile details:

View more...

External Debugging Tools 3: JMXTerm

Aggregated on: 2022-07-30 14:21:40

When tracking a bug we need to take a two-pronged approach. Similar to tongs that wrap the buggy module from both sides and squeezes to find the problematic part. Up until now, we discussed tools that are very low level. Some can be used to debug system-level services. Today we’ll discuss the other side of the stack but still a very advanced management tool. To understand this you need to understand the field we’re in. As developers, we deal with code and applications. Deployment is for OPS/DevOps and the tooling they use is often alien to us. It’s not that they have bad tools. On the contrary, they have amazing tools. But they’re usually designed for massive scale. When you need to manage thousands of servers you need a way to control things in all of them. For that, we need a different set of tools.

View more...

Cloud Tagging Strategic Practices

Aggregated on: 2022-07-30 10:21:40

The hype around cloud cost optimization is soaring high along with cloud adoption. According to NASSCOM, enterprises are expected to increase their cloud budget by nearly 5-15% CAGR till FY 2025.  “The wider the cloud adoption, the more complex is the cloud cost management”

View more...

Best Jira Add-ons for the Cloud

Aggregated on: 2022-07-30 09:21:39

Do you know how they say there’s an app for everything nowadays?  Well, I just went through the catalog on the Atlassian Marketplace. While not completely sold on the previous statement, I do find myself believing that there’s definitely an add-on for anything you’d want Jira to do. And for the things you never knew you wanted. 

View more...

Ktor - A Kotlin Web Framework

Aggregated on: 2022-07-29 21:06:39

Ktor is an asynchronous web framework written in and designed for Kotlin, leveraging coroutines and allowing you to write asynchronous code without having to manage any threads yourself. Here is a bit more background information on Ktor. It is backed by Jetbrains, who are also the creators of Kotlin itself. Who better to make a Kotlin web framework than the people that work on the language?

View more...

Install Anypoint Flex Gateway on the Kubernetes as an Ingress Controller in Connected Mode - Part 3

Aggregated on: 2022-07-29 19:06:39

In my last blog, we have a walkthrough on how to set up Flex Gateway on Minikube as an Ingress controller in the Connected Mode and how to publish the APIs to the Flex Gateway and access those APIs via Ingress on HTTP. In this blog, we will walk through how to implement TLS on the ingress and enable ingress to receive only HTTPS traffic. Before we start implementing the TLS on the ingress, we will be requiring the private key and public key in base64 format. Either we can use a Self Signed certificate or a CA-signed certificate. 

View more...

Data Model Tracing and Reporting on a Relational Database

Aggregated on: 2022-07-29 17:51:39

In relational databases, data is stored on tables created with a certain model and relationship network. Especially in systems that are not fully mature yet, changes in data models occur frequently and they make it difficult to control data and data models in terms of integrity, consistency, and granularity. This necessitates control mechanisms that will work on the basis of changes made to the data model and a catalog mechanism. The control mechanisms mentioned above should not block the development processes, but should also prevent the data model from turning into "garbage." In this respect, the data model (table names, existence of related tables and their compatibility with each other, consistency of related tables in terms of columns, etc.) should be considered in the planning to be made. 

View more...

IaC Security

Aggregated on: 2022-07-29 17:06:39

The responsibility and accountability for security is rapidly shifting toward DevOps engineers, as they have greater visibility into the broader architecture of processes and systems used to deploy applications. Effective DevSecOps makes application deployments, operations, and service monitoring easier and more secure. In particular, DevOps engineers will be responsible for securing the Infrastructure as Code in which they build. In this Refcard, we explore IaC security, how it works, why it's important, and core practices for success.

View more...

Cloud Security Audit Tools: A Glance, Why It's Important, Top Tools and Techniques

Aggregated on: 2022-07-29 16:06:39

Cloud security audit tools are important for assessing and managing the security of your cloud infrastructure. In this article, we will take a look at what cloud security audit is, why it is important, and some of the top tools and techniques used in the industry. We will also discuss the benefits of using cloud security audit tools and how they can help you protect your data.  Cloud Security Audit Tools at a glance Cloud security audit tools are used to assess the security posture of an organization's cloud infrastructure. These tools can be used to identify and remediate vulnerabilities, monitor for compliance with security policies, and track changes to the cloud environment. Here are the top five examples of cloud security tools that are taking the industry by a storm: Astra's Pentest, Prowler, Dow Jone's Hammer, ScoutSuite, and CloudSploit Scans.

View more...

Build a Java Microservice With AuraDB Free

Aggregated on: 2022-07-29 14:21:39

For today’s adventure, we want to build a Java microservice that connects to and interacts with graph data in a Neo4j AuraDB Free database. Our data is a trimmed-down version of the Goodreads data set, which includes the book, author, and review information. While books and authors are well-suited for a document database such as MongoDB, once you add reviews to the mix, the nuance of the relationships makes this project better suited for AuraDB. This way, we can utilize relationships between the different entities to improve analysis based on the structure of the connections. While everything we will do here is feasible with other data stores, a graph database dramatically simplifies queries into how entities are connected. If you are new to graphs, here are some resources:

View more...

Key Metrics and Measurements to Track Project and Product Performance

Aggregated on: 2022-07-29 13:51:39

In this article, we will define the “bare minimum” set of metrics, talk about product success metrics and discuss what can be considered a true agile measure of success. Have you ever thought, worried, or maybe, laughed at such statements,such as “You can only manage what you measure”?

View more...

Using Ingest Pipelines to Enhance Elastic Observability Data

Aggregated on: 2022-07-29 05:36:39

In a previous article, I had written about distributed tracing and how it can be implemented easily on the Elastic stack. I have used many observability platforms, including NewRelic, Splunk, and DataDog. All of them are very powerful platforms and have everything you would need for implementing full-stack observability for your applications.  Elastic is generally used for fast and powerful content search and log aggregation and analysis, but it has gained popularity recently for full-stack observability as well. It has pretty much every feature you would want in an observability platform, including support for applications written on a modern tech stack, support for tracing/logging/metrics, powerful out-of-the-box agents, visualizations and dashboards, alerting, AI-based anomaly detection, and so on. 

View more...

How to Leverage Speech-to-Text With Node.js

Aggregated on: 2022-07-29 04:06:39

The purpose of this article is to provide a brief overview of speech recognition technology and its common applications, and to demonstrate a free speech-to-text API which can be used to transcribe audio in MP3 and WAV file formats. This demonstration will include step-by-step instructions to call this API using ready-to-run Node.js code examples. Overview of Speech Recognition It’s easy to think of speech recognition as a relatively new addition to the contemporary technology landscape. That’s only a partial truth; speech recognition mechanics have been around for more than half a century, beginning with basic, limited numerical/word recognition systems developed by a few pioneering technology companies during the early 1950s. Despite its long history and proliferation in the world of smart consumer devices over the last decade or so, however, speech recognition still registers as one of the more abstract technologies on the market today.  That’s because all speech recognition services straddle the fields of computer science, computational linguistics, and mathematics/statistics, requiring sizable input from each field to achieve accurate speech-to-text results.  

View more...

Selenium vs Cypress: Does Cypress Replace Selenium?

Aggregated on: 2022-07-28 21:06:38

By automating the entire test procedure, your company will not only save money and time but also deliver superior quality products. Selenium has reined top as the go-to tests framework for almost any sort of test requirement that includes a browser-based application. However, as the world of automation testing continues to step forward, the newest tools have emerged. Chief amongst them is Cypress.io, an automated test framework that is becoming a more and more popular alternative to Selenium. Is Cypress or Selenium a perfect choice for your automation test requirements? Keep reading this blog and understand some tips on why you might willing to choose one or the other – or even use both at a similar time. Here are a few commonly asked queries that might come up when doing a Selenium vs Cypress comparison:

View more...

The Best Infrastructure as Code Tools for 2022

Aggregated on: 2022-07-28 19:51:38

Customer: Can we exchange our systems? System Admin: Why do you want to exchange your system?

View more...

Getting Started With Prometheus

Aggregated on: 2022-07-28 18:51:38

Prometheus has become the de facto standard for the monitoring and alerting of distributed systems and architecture. Designed to overcome shortcomings in existing monitoring solutions, including a lack of scalability and deployment challenges, its core architecture, data collection and discovery services, and third-party integrations help to derive greater value.In this Refcard, we explore the core components of the Prometheus architecture and key concepts — then focus on getting up and running with Prometheus, including configuration and both collecting and working with data.

View more...

Proof of Stake Alternatives Every Developer Should Know Of

Aggregated on: 2022-07-28 17:06:38

According to Statista, global spending on blockchain solutions is projected to grow to $19 billion by 2024. However, despite its numerous applications across a multitude of industries, there is still a large debate over what type of blockchain protocol is most effective. At its core, blockchain technology is designed to act as a public ledger where information can be recorded and distributed without being manipulated or edited. Every blockchain must strive toward three main features: security, decentralization, and scalability. Yet, not all blockchain protocols achieve this task to the same degree.

View more...

API Security Weekly: Issue 172

Aggregated on: 2022-07-28 16:36:38

This week, we have news of a vulnerability in Argo CD that allowed leaking application secrets, a survey of the state of API security across three regions, a quick read on how to use Postman and OWASP Zap for API security testing, and finally, views on how to distribute authorization services in a microservice architecture. Vulnerability: Argo CD Path-Traversal Vulnerability Enables Leaking Data This week’s major news has been the vulnerability discovered in Argo CD, a popular continuous delivery platform.

View more...