News Aggregator


Proof of Stake Alternatives Every Developer Should Know Of

Aggregated on: 2022-07-28 17:06:38

According to Statista, global spending on blockchain solutions is projected to grow to $19 billion by 2024. However, despite its numerous applications across a multitude of industries, there is still a large debate over what type of blockchain protocol is most effective. At its core, blockchain technology is designed to act as a public ledger where information can be recorded and distributed without being manipulated or edited. Every blockchain must strive toward three main features: security, decentralization, and scalability. Yet, not all blockchain protocols achieve this task to the same degree.

View more...

API Security Weekly: Issue 172

Aggregated on: 2022-07-28 16:36:38

This week, we have news of a vulnerability in Argo CD that allowed leaking application secrets, a survey of the state of API security across three regions, a quick read on how to use Postman and OWASP Zap for API security testing, and finally, views on how to distribute authorization services in a microservice architecture. Vulnerability: Argo CD Path-Traversal Vulnerability Enables Leaking Data This week’s major news has been the vulnerability discovered in Argo CD, a popular continuous delivery platform.

View more...

Combining gRPC With Guice

Aggregated on: 2022-07-28 16:06:38

gRPC gRPC is a high-performance protocol for Remote Procedure Calls over HTTP/2. It is mainly used for communication between micro-services, but it can also be used for requests from end-users using browsers or mobile devices just like REST or GraphQL. gRPC was designed by Google, and open-source implementation libraries are available for several platforms and programming languages, including Java. Quite a unique feature of gRPC is streaming requests and responses: when defining a gRPC procedure, we can indicate that instead of just 1 request message, the client will send a stream of request messages. Similarly, we can indicate that the server will respond with a stream of response messages:

View more...

What Are Protocol Buffers?

Aggregated on: 2022-07-28 15:51:38

On a daily basis, I deal with custom software development and take part in projects for various industries. I specialize in the use of Modern C++ in embedded systems and building applications using Qt. Here, I will share with you my experience in a project that required Protocol Buffers on a memory-constrained embedded system. Let's take a look! Imagine a situation where several people meet and each of them speaks a different language. To understand each other, they start to use a language that everyone in the group understands. Then, each of them wanting to say something has to translate their thoughts, which are usually in their mother tongue, into the language of the group. 

View more...

Launch Your Startup Idea in a Day

Aggregated on: 2022-07-28 14:36:38

Recently, I was thinking about the 1987 movie “Wall Street” and more specifically Michael Douglas’ character, Gordon Gekko. At the time, the 20-year-old version of me who saw the film the night it was released was focused on his college education. I was trying to absorb as much as possible in hopes to extract some educational advantage that could be applied to my Bachelor's degree. I will always remember Gordon Gekko’s quote: “The most valuable commodity I know of is information.”

View more...

Roles in Data Science Teams

Aggregated on: 2022-07-28 14:06:38

In 2017, Netflix changed its five-star rating system to a simple thumbs-up, thumbs-down. Now the service was recommending movies based on the match percentage, and people hated it.  How can we reduce all the nuance that lives in cinematic art to a primitive binary reaction?  In reality, what Netflix found was that people were giving high rates to those movies that they believed were good, not necessarily those they’ve really enjoyed watching. At least that’s what the data said. So how does data analysis work in organizations like Netflix, and what are the roles of data science teams?  

View more...

Getting Started With Apache Iceberg

Aggregated on: 2022-07-27 23:36:38

With the amount of data produced on a daily basis continuing to rise, so too do the number of data points that companies collect. Apache Iceberg was developed as an open table format to help sift through large analytical datasets. This Refcard introduces you to Apache Iceberg by taking you through the history of its inception, dives into key methods and techniques, and provides hands-on examples to help you get introduced to the Iceberg community.

View more...

Install Anypoint Flex Gateway on the Kubernetes as a Ingress Controller in Connected Mode - Part 2

Aggregated on: 2022-07-27 20:51:38

In my last blog, we saw how to set up Flex Gateway on Minikube as an Ingress controller in the Connected Mode and here we will see how to publish the APIs to Flex Gateway. As we have seen for installing the Flex Gateway, we have used the Runtime Manager and for publishing the APIs, we will be using the API Manager. To achieve this, we have to make sure that Flex Gateway is connected. With Flex Gateway, Anypoint API Manager capabilities can be extended to the MuleSoft APIs as well as to Non-MuleSoft APIs.

View more...

Developer Experience vs. User Experience

Aggregated on: 2022-07-27 20:06:38

While they may seem similar at first glance, Developer Experience (DX) is not just “User Experience (UX) for developers”. Rather, DX is an extension of UX focused on users who build with technical languages and tooling. DX follows the same core principles of UX but extends it by recognizing that technical details and mechanical processes can be understood and utilized efficiently by a developer. Great DX happens when developers feel they are being spoken to and having their needs met directly. This means showing code, providing lots of detail, and giving clear instructions for multiple use cases.

View more...

Migrating From Sakila-MySQL to Couchbase, Part 5: JavaScript User-Defined Functions

Aggregated on: 2022-07-27 20:06:38

With the release of 7.1, Couchbase N1QL adds support for JavaScript user-defined functions. Originally as seen in Part2: Views and UDFs and Part3: Stored Procedures, we used N1QL UDFs to map the MySQL UDFs and stored procedures. With N1QL UDFs, we can do only a single query or operation per function. This meant our translation to UDFs in Couchbase was a bit cumbersome. However, with the addition of the JS UDFs,  mapping an SQL function as is becomes much simpler.  Now let's look at the individual functions and stored procedures and their direct mappings.

View more...

Multi-Cloud Identity Orchestration — What Does the Future Look Like?

Aggregated on: 2022-07-27 20:06:38

Cloud computing has offered endless business opportunities to enterprises embarking on a digital transformation journey.  Whether we talk about SMEs or renowned brands, everyone is on the verge of adopting the latest cloud computing technologies to stay ahead of the curve. 

View more...

Querydsl vs. JPA Criteria - Introduction

Aggregated on: 2022-07-27 19:36:38

I've used JPA Criteria for many years. The main advantage is its type-safe approach (compared to JPQL), but the code is quite complicated and not always straightforward. Recently, I came across a Querydsl framework and I saw its benefits immediately. The main benefits for me are: Type-safe approach. Fluent API with SQL style - the code looks pretty much like SQL queries. No limitation to JPA technology - there are modules for other technologies. The idea of this series is to shed light on the Querydsl framework and compare it with the JPA Criteria. The main goal is to demonstrate the differences in some standard cases. This series is planned to have these parts:

View more...

5 Best Practices for Building Cloud-Native Permissions

Aggregated on: 2022-07-27 17:21:38

Most developers end up building authorization or access-control for their products multiple times - forced to refactor with new customer, product, or security demands coming in. To make our lives a little easier, let's go over the unique challenges that building cloud-native permissions poses before us and cover the five best practices for building them that can save you a lot of hassle. Things Have Changed We used to build authorization by using monolithic frameworks like Django or Spring that came with authorization or access-control baked-in, but these are no longer applicable when we create applications in the cloud-native space. There are a few reasons for that - Firstly, applications themselves are no longer monoliths - they're based on microservices and are becoming highly distributed. This becomes even more critical when you need to incorporate devices or instances that are deployed at the edge, which often need access control too. Second, cloud-native applications tend to require the integration of third-party services (Such as billing, authentication, databases, analytics, etc.) and the ability to control access to them in addition to your own application's microservices. Third, more dynamic and distributed applications require us to use a bunch of different authorization models (e.g., RBAC, ReBAC, ABAC) that are based on multiple data sources and increasingly complex rules. Lastly, security, privacy, and compliance demands are also rising (in the face of increasingly complex cyber threats) and becoming really complex. We find ourselves not only managing who should access the data but also how it is propagated between different services.

View more...

Rails Asynchronous Processing

Aggregated on: 2022-07-27 17:21:38

When I log into my bank account and want a report of all my account transactions for say, six months or a year, the web application says it received my request and asks me to check later to get the PDF report. After some time, I would be able to download the report. This is an example of asynchronous processing. In this article, I describe the implementation of a simple asynchronous processing use case in Rails. I have a sample application called "mahrasa," short for Mahboob Rails sample application, into which I have integrated the code.

View more...

Distributed Training on Multiple GPUs

Aggregated on: 2022-07-27 14:51:38

Why and How to Use Multiple GPUs for Distributed Training Data Scientists or Machine Learning enthusiasts training AI models at scale will inevitably reach a cap. When the datasets size increases, the processing time can increase from minutes to hours to days to weeks! Data scientists turn to the inclusion of multiple GPUs along with distributed training for machine learning models to accelerate and develop complete AI models in a fraction of the time.We will discuss the usefulness of GPUs versus CPUs for machine learning, why distributed training with multiple GPUs is optimal for larger datasets, and how to get started training machine learning models using the best practices. Why Are GPUs Good for Training Neural Networks? The training phase is the most resource-intensive part of building a neural network or machine learning model. A neural network requires data inputs during the training phase. The model outputs a relevant prediction based on processed data in layers based on changes made between datasets. The first round of input data essentially forms a baseline for the machine learning model to understand; subsequent datasets calculate weights and parameters to train machine prediction accuracy.

View more...

JSP vs Servlet: Difference and Comparison

Aggregated on: 2022-07-27 14:21:38

In the world today, a large percentage of the internet's structure consists of web applications of different types. As a developer, you can design and develop web applications by using web components, such as Servlet, JSP, and so on. In general, web components such as JSP and Servlet execute on the server and respond to client requests. Servlets run in web containers, while JSPs are text documents that contain both static and dynamic data. Servlets and JSPs both have their own specific uses. In this article, we will discuss the main differences between JSP and servlet, as well as describe the definitions of servlet and JSP, along with their advantages. Understanding the differences between JavaServer Pages (JSPs) and Java Servlets (Servlets) will help you better understand their workings.

View more...

The Ultimate Software Engineering Job Search Guide

Aggregated on: 2022-07-27 05:06:37

I am a software engineer who has worked at Microsoft and Google. A while back, I went on a 120 - day long job search journey, aced more than 30 interviews, and landed multiple offers. During my preparation and discussions with other candidates, I discovered that though there’s a lot of information about interviewing, some of the critical details are missing or hidden deep inside experience posts. This includes details like communicating your story, communicating your level through system design, or negotiating the offer when the time comes. I have kept a record of all the resources and steps that helped me receive offers from tech companies. This article will be a sum total of all the resources I used and the experiences I gained. My goal is to create a blueprint and a roadmap that can be used by any candidate in their next job search.

View more...

Data Science: Scenario-based Interview Questions

Aggregated on: 2022-07-27 04:06:37

As we step into the new era of technology-driven data, we find ourselves facing an abundance of possibilities on the data horizon. Data science is a very competitive job market, so it can be very difficult to find a good job. Only the best inline personnel have a chance to be interviewed for a position and hired. It is important to prepare well for such a scenario.  The formats used for data science interviews vary from company to company. Interviews most often involve questions related to SQL, machine learning, and Python, but there are certainly scenario-based questions, programming knowledge tests, and soft skills tests, as well.

View more...

Why Pulsar Beats Kafka for a Scalable, Distributed Data Architecture

Aggregated on: 2022-07-27 03:06:37

The leading open-source event streaming platforms are Apache Kafka and Apache Pulsar. For enterprise architects and application developers, choosing the right event streaming approach is critical, as these technologies will help their apps scale up around data to support operations in production. Everyone wants results faster. We want applications that know what we want, even before we know ourselves. We want systems that constantly check for fraud or security issues to protect our data. We want applications that are smart enough to react and change plans when faced with the unexpected. And we want those services to be continuously available.

View more...

AI Philosophy and Its Part in Digital Design

Aggregated on: 2022-07-26 21:36:37

The evolution of new technology significantly impacts today's society and various other industries. While a few developments more or less affect the entire work industry, artificial intelligence (AI) is a relatively new and controversial technology.  This technology has been advancing steadily in recent years and is now being used in numerous industries. From a business standpoint, it has improved workflow efficiency and manufacturing processes and generated new work opportunities.

View more...

Install Anypoint Flex Gateway on the Kubernetes as an Ingress Controller in Connected Mode - Part I

Aggregated on: 2022-07-26 21:06:37

MuleSoft launched Universal API Management in 2022 and released or improved various components. Flex Gateway API Governance API Community Manager API Experience Hub (coming soon) Anypoint DataGraph API Designer API cataloging with the updated Anypoint Platform CLI (coming soon) API Manager In this particular tutorial, we will be focusing on setting up Flex Gateway on Minikube as an Ingress controller and how to publish APIs to Flex Gateway. Before we start with the tutorial, let's understand what Flex Gateway is and what are the benefits that can be extracted out of Flex gateway?

View more...

Gitab vs Jenkins 2022: Ultimate Comparison

Aggregated on: 2022-07-26 20:36:37

Gitlab vs Jenkins has been a popular debate among developers for a long time. While most of the coders like Jenkins, developers cast their votes for Gitlab. Both tools come with certain strengths and weaknesses. Without further ado, let’s dive into the ultimate comparison of Gitlab and Jenkins.  Intro to Jenkins Jenkins is a popular open-source automation tool that enables businesses of all sizes to seamlessly build and manage Continuous Integration and Continuous Delivery (CI/CD) pipelines by allowing you to add multiple programming languages, repositories, and pipelines, Jenkins makes it possible to integrate every type of automation solution. 

View more...

API Security Weekly: Issue 171

Aggregated on: 2022-07-26 20:06:37

This week, we have news of multiple API flaws and vulnerabilities: the parcel tracking portal at DPD that may have exposed customer data, an API vulnerability in the Apache Pulsar that allowed access data in different tenants, and an SQL injection vulnerability in Casdoor API. On the more positive side, we take a look at the emerging trends in the API industry. Vulnerability: DPD Parcel Tracking Flaw May Have Exposed Customer Data The big news this week was the disclosure of a vulnerability in the parcel tracking portal of DPG Group, which may have exposed customer data.

View more...

The Differences You Should Know About Java and Python

Aggregated on: 2022-07-26 19:21:37

Java and Python may be a smart starting line to assess how to complete your forthcoming project. Selecting the correct language depends on your business because of the product(s) you plan to create. It’s arduous to make up your mind that programming language can best suit your business objectives as you don’t understand the technologies' strengths and weaknesses. The two languages compete with one another as each provides excellent opportunities for developers.

View more...

Happens-Before In Java Or How To Write a Thread-Safe Application

Aggregated on: 2022-07-26 18:51:37

Multithreading is the most complex part of Java. Happens-before is a relation that gives a guarantee of allowing the writing of predictable code in multithreading a reality. Such code is also known as thread-safe code. Unfortunately, Oracle Java documentation about this notion is hard to read. So in this article, I'll mainly explain what happens-before is in human language and provide detailed examples. Happens-Before Solves the Main Multithreading Problem Before we start learning the happens-before notion, we have to understand the reason for creating it. Once multithreading comes to the scene, your code might become inconsistent because shared objects between threads might have different and unpredictable values. Let's review a simple example. In that example, we will update values in one thread and read and print them in another.

View more...

Building an IoT Application Using an HTTP API

Aggregated on: 2022-07-26 18:51:37

For years the world has been abuzz with IoT devices. These devices range from alarm clocks that show the current weather to refrigerators that list the prices of nearby groceries. Whatever the specifics, these devices rely on APIs to communicate with data sources. But how, exactly, do we connect the messages, data, and devices?In this post, we’ll show you an example of how to design and model data for an IoT device. We’ll use the M5Stack—a small, modular IoT device with a display screen—and connect to the API for the New York City Metropolitan Transportation Authority (NYC MTA) to render the latest subway times for various stations. While we’ll focus on the M5Stack, the concepts we’ll discuss will apply to designing an IoT application across a wide variety of devices. 

View more...

How to Bring Shadow Kubernetes IT Into the Light

Aggregated on: 2022-07-26 18:51:37

Shadow IT continues to be a challenge for IT leaders, but perhaps not in the sense that companies have seen in the past. Traditionally, shadow IT occurs within the application stack, which creates problems because the use of IT systems occurs without the approval, or even knowledge, of the corporate IT department. DevOps practices have emerged to help address these challenges and to unleash creativity and opportunity for modern software delivery teams. However, access to the cloud has made it easier for autonomous teams to set up their own toolsets. As a result, the shadow IT problem now manifests itself in a new way: in the tooling architecture.

View more...

Get Started With Kafka and Docker in 20 Minutes

Aggregated on: 2022-07-26 17:51:37

Apache Kafka is a high-throughput, high-availability, and scalable solution chosen by the world’s top companies for uses such as event streaming, stream processing, log aggregation, and more. Kafka runs on the platform of your choice, such as Kubernetes or ECS, as a cluster of one or more Kafka nodes. A Kafka cluster will be initialized with zero or more topics, which you can think of as message channels or queues. Clients can connect to Kafka to publish messages to topics or to consume messages from topics to the client is subscribed. Docker is an application that uses virtualization to run containerized applications on a host machine. Containerization enables users to build, run, and test applications completely separately while still allowing them to communicate across a network. Importantly, containerization enables application portability so that the same application can be run on your local machine, a Kubernetes cluster, AWS, and more.

View more...

A Breakdown of Continuous Testing

Aggregated on: 2022-07-26 16:21:37

In the present world that we live in, software is a vital component. As users, we interact with an ever-increasing amount of software every day. The wheels of innovation are constantly churning out new digital experiences. The old way of testing was based on the waterfall model. The product was passed on from one team to another. A product would have separate development and QA phases. QA teams usually needed more time to ensure quality. If businesses want to keep up with the ever-increasing customer expectations, they’ll have to deliver their software faster without hindering its quality. Continuous Delivery (CD), a practice that ensures that the software can be released into production at any time, can help businesses with that. Businesses use a build pipeline to automatically test the software and deploy it to their testing and production environments with continuous delivery.

View more...

DevOps Security Checklist for Kubernetes

Aggregated on: 2022-07-26 16:21:37

Kubernetes is a container orchestration platform today adopted by many companies. Its implementation requires a certain understanding of its ecosystem in order to deploy a cluster ready for production. Implementing working principles or tools is therefore essential and requires the work of all teams (operations, development, security, etc.) to promote the detection of anomalies as soon as possible and thus raise the level of security of the orchestrator and its resources. Pre-commit Hooks The primary objective being to minimize the impacts in production by adding automated processes as early as possible in a continuous integration pipeline is today a recognized principle of the DevSecOps world.

View more...

Compatibility Testing: Checklists and Crucial Things You Need to Know About It

Aggregated on: 2022-07-26 15:21:37

Development and designing are crucial, yet equally significant is making sure that you have developed the software product as per the necessities. In QA and software testing world, a compatibility test is a kind of test performed to scrutinize whether the software or app is competent of running on multiple OSs, mobile devices, browsers, applications, network environments, and more. Put simply, the compatibility of the software is checked for distinct environments and platforms. This non-functional testing can be conducted either through automation tools or can be performed manually.  What Is the Compatibility Test? A Compatibility test deals with delivering software so that it functions perfectly across distinct configurations, platforms, as well as versions based on user requirements. Compatibility is the Non-Functional Requirement (NFR) and hence concentrates on delivering superior-quality and consistent performance. In nutshell, Compatibility Test is a kind of Software test to confirm whether your software is competent enough of running on various Mobile devices, operating systems, hardware, applications, or network environments  

View more...

Top 10 Benefits of ReactJS for Your Application Development

Aggregated on: 2022-07-26 14:21:37

For business owners who are willing to plunge into the online business, choosing suitable and right tools might be a tough call.  There are many web and mobile app development frameworks that give you tough competition when choosing it and React Native is one of those. Yes, it is one of the leading and preferred enterprise development frameworks used by Facebook, Skype, Instagram, Airbnb, and many more. ReactJS is an efficient, declarative, and flexible open-source JavaScript library that is used to build simple, fast, and scalable front-end development and single-page applications.

View more...

AWS, Azure, and GCP: Find the Right Platform

Aggregated on: 2022-07-26 14:06:37

The cloud computing market is one of the most dynamic and attractive industries in the world. It's also incredibly complex, and it can be hard to know where to start if you're looking for a cloud platform to support your business. The cloud is growing at a rapid pace, and it's helping to democratize technology.  Businesses with nascent cloud infrastructure are struggling to ensure business stability and continuity. Start-ups and enterprises that adopted cloud technology prior to the COVID-19 pandemic, on the other hand, benefit from the current situation. But we can't forget that not every company needs the same level of flexibility or scalability as others. So how do you choose the best platform for your business? Know here: 

View more...

Using Multiple Azure Storage Accounts From a Single Spring Boot App

Aggregated on: 2022-07-26 01:21:37

Spring projects in general are opinionated: 80-90% of use cases are handled "by default", and code is often much more concise than would be required otherwise due to Spring's preference of convention over configuration. These and other "opinions" can result in dramatically less code to write and maintain and as a result, more focused impact. In the vast majority of cases where Azure Storage is used from an application, there is no compelling advantage to using more than a single Azure storage account. But there are edge cases, and having the ability to use multiple Azure Storage accounts from a single app - even if we might only need that capability around 10% of the time - could provide an incredibly useful extension of our storage superpowers.

View more...

Securing Access to Kubernetes Environments With Zero Trust

Aggregated on: 2022-07-26 00:36:37

Modern IT environments are becoming more dynamic by the day. Kubernetes, for example, is pushing the boundaries of what’s possible for many IT organizations. The benefits of the open source technology to automate deployment, scalability and management of containerized applications are numerous. In particular, IT teams are taking advantage of its power, efficiency and flexibility to develop modern applications quickly and deliver them at scale.

View more...

Unengaged Stakeholders at the Sprint Review

Aggregated on: 2022-07-26 00:36:37

There are plenty of failure possibilities with Scrum. Given that Scrum is a framework with a reasonable yet short “manual,” this effect should not surprise anyone. For example, what if your Scrum team repeatedly faces unengaged stakeholders at the Sprint Review? How can the Scrum team stay on track in accomplishing the Product Goal when a vital feedback loop is missing? Join me and delve into how to support your stakeholders in living up to their part of the collaboration with the Scrum team in less than two minutes.

View more...

Introduction to AWS Config: Simplified Cloud Auditing

Aggregated on: 2022-07-25 21:51:37

Modern cloud environments are ever-changing, and so is the nature of cloud computing. The growing cloud assets accompany the attack surface expansion problem for organizations, which unveils the need for visibility of cloud resources. AWS Config addresses that exact demand. It can be challenging to understand resources within your infrastructure like: Seeing what resources you have Understanding your current configurations Knowledge of configuration changes and change histories Assessing if your resources are compliant with specific governances controls  Having accurate and up-to-date audit information Depending on the size of your AWS resources or deployment, overcoming these challenges and obtaining this information can become time-consuming and budget-intensive unless you use resource visibility and auditing tool like AWS Config. 

View more...

The Difference Between Artificial Intelligence, Machine Learning, and Deep Learning

Aggregated on: 2022-07-25 20:51:37

Technology continues to evolve. Who would have dreamt of smartphones, Alexa, electric cars, and all the modern technology we see today back in the 90s. It’s incredible to see devices around us with intelligence sometimes surpassing the human minds. You may ask, what made this possible? The answer is Artificial Intelligence. You must have heard about Machine Learning, Deep Learning, and Artificial Intelligence before, probably thousands of times.

View more...

Write Your Kubernetes Infrastructure as Go Code — Using Custom Resource Definitions With Cdk8s

Aggregated on: 2022-07-25 20:51:37

cdk8s (Cloud Development Kit for Kubernetes) is an open-source framework (part of CNCF) using which you can define your Kubernetes applications with regular programming languages (instead of yaml). Some of the previous blogs on this topic covered the getting started experience and using cdk8s-plus library to further improve upon the core cdk8s library features. We are going to continue and push cdk8s even further.This blog post will demonstrate how you can use Kubernetes Custom Resource Definitions with cdk8s. We will start off with a simple Nginx example and then you will use the combination of Strimzi project CRDs along with Go  cdk8s to define and deploy a Kafka cluster on Kubernetes! I am assuming that you've have some knowledge of Kubernetes Custom Resource Definitions and have probably even used a few in the form of Operators. If not, that's ok! The Kubernetes documentation covers it quite well. You can always refer to it, come back here and follow along!

View more...

Testing Strategies for Microservices

Aggregated on: 2022-07-25 19:51:37

A microservice application is a group of distributed programs that communicate over networks, occasionally interfacing with third-party services and databases. Microservices, by their networked nature, provide more points of failure than a traditional monolith. As a result of this, we need a different, broader approach to testing. So, how do we test a microservice application? Does the testing pyramid still work? How do we test when third-party services are involved, and network disruptions are a possibility? We’ll attempt to answer all these questions in this post.

View more...

AWS, Azure, and GCP: The Ultimate IAM Comparison

Aggregated on: 2022-07-25 18:51:37

IAM (Identity and Access Management) is one of the most important yet complicated layers of cloud security. To add insult to injury, each major cloud provider (AWS, Azure, GCP) handles IAM differently, requiring cloud security professionals to learn different capabilities, restrictions, and terminology when managing IAM in a given environment. With infrastructure cloudification growing in depth and breadth, cloud security professionals – even if they’re not currently working in a multi-cloud environment – will want to, and should, gain proficiency in the IAM of different CSPs. Where to begin? In this post, we provide the ultimate cloud IAM overview, comparing AWS, Azure, and GCP. After reading the blog post, you will have a foundational understanding of the IAM cloud security of the major providers. 

View more...

Create a Minimal Web API With ASP.NET Core and Publish To Azure API Management With Visual Studio

Aggregated on: 2022-07-25 18:06:37

Minimal Web API is a new approach for building APIs without all the complex structures of MVC, so, in accordance with the name "minimal," it includes the essential components needed to build HTTP APIs. All that you need is only a CSPROJ and a Program.cs. Benefits of Using Minimal Web API Less complex than before Easy to learn and use Don’t need an MVC structure: no controllers! Minimal code to build and compile the application, which means the application runs much faster (better performance) Latest improvements and functionalities of .NET 6 and C#10 Prerequisites .NET 6 SDK Visual Studio 2022 or Visual Studio Code (we will use both of them) We will use two methods to create our Minimal Web API.

View more...

Introduction to Building Desktop Applications With Electron

Aggregated on: 2022-07-25 17:36:37

If you're anything like me, you're a big fan of JavaScript and its ecosystem, and you've been utilizing it to create excellent online apps using frameworks like React or fast web servers with NodeJS. You now want to create a desktop application but don't want to learn a new programming language, or you want to reuse as much as possible from your previous web projects. It is when Electron comes into play to save the day. You can use HTML, CSS, and JavaScript to create desktop applications using Electron. There are numerous complaints against Electron on the internet: poor performance and frequent low-quality apps; however, don't blame the framework; Electron is robust and may be performant. Many popular applications today are built on top of it.

View more...

How to Enable Big Data Best Practices

Aggregated on: 2022-07-25 16:36:37

Why do you need Big Data best practices? Whether it’s government, private organizations, military, healthcare, or agencies such as NASA, there is no better option to meet analytics needs, increase productivity, and become more efficient.  Big Data has become the fulcrum on which organizations of all sizes and shapes revolve for quite some time now. The integration of analytics tools and Big Data management has been the hallmark of transformational technologies organizations are adopting. 

View more...

Software Methodologies — Waterfall vs Agile vs DevOps

Aggregated on: 2022-07-25 16:36:37

The IT industry is ever-changing. In the past decade, it went through continuous evolution of technologies and methodologies. There is a  constant need to upgrade to integrate different solutions and meet the needs of market demands.  Starting from the waterfall approach, the industry has shifted towards agile methodology and now focuses massively on DevOps principles and best practices. Have you ever wondered why billion-dollar companies like Amazon, Netflix, Etsy, NASA, Walmart, Nordstrom, etc., have adopted DevOps? Where did it all start from? What caused DevOps to be developed? Let’s try to answer all these questions in this brief comparison of methodologies. 

View more...

Disciplined Agile Delivery Framework: A Beginner's Guide

Aggregated on: 2022-07-25 16:06:37

Think of Disciplined Agile Delivery as a software delivery framework because that is exactly what it is. By employing principles of disciplined agile in your team's process, you can ensure its success. This article hopefully gives you ample working knowledge on the concept of the DaD framework before you get to the tail end. Want to delve right in?

View more...

3D Tetris With Three.js Tutorial

Aggregated on: 2022-07-25 06:06:36

Think about the way we play Tetris. When the block is moving, we transform and rotate it freely. Cubes that make blocks are clearly connected and it's intuitive that their representation in code should be as well. On the other hand, when we try to complete a slice (in 2D, a row) and we succeed, the cubes are removed and the block that was their origin doesn't matter at this point. In fact, it shouldn't matter — some boxes from a block may be removed and others not.  Tracing an origin of a box would require constant splitting and merging geometries and trust me, that would be a crazy mess. In original 2D Tetris, sometimes the color of a square was the indicator of the origin block. In 3D, however, we need a quick way to show the z-axis and color is perfect for this.

View more...

Deploy ECR-Based AWS Lambda

Aggregated on: 2022-07-25 02:51:36

AWS Lambda is one of the most popular FaaS (function as a service) platforms out there. Its serverless capabilities and low cost per execution make it a go-to service for developers globally. Lambda supports multiple framework applications and multiple deployment models, and it helps developers customize their networking, permissions, and concurrency configurations. When we talk about multiple deployment models in Lambda, container image-based deployments are one of the most popular ways to deploy their application on Lambda packaged into an image. With the benefits of containerization, developers can easily deploy applications by providing application dependencies in their application's Docker image instead of mentioning their dependencies and configuration separately in their Lambda. 

View more...

Comparison: JMS Message Queue vs. Apache Kafka

Aggregated on: 2022-07-25 01:51:36

Comparing JMS-based message queue (MQ) infrastructures and Apache Kafka-based data streaming is a widespread topic. Unfortunately, the battle is an apple-to-orange comparison that often includes misinformation and FUD from vendors. This article explores the differences, trade-offs, and architectures of JMS message brokers and Kafka deployments. Learn how to choose between JMS brokers like IBM MQ or RabbitMQ and open-source Kafka or serverless cloud services like Confluent Cloud. Motivation: The Battle of Apples vs. Oranges I have to discuss the differences and trade-offs between JMS message brokers and Apache Kafka every week in customer meetings. What annoys me most is the common misunderstandings and (sometimes) intentional FUD in various blogs, articles, and presentations about this discussion.

View more...

Deploying MWAA Using AWS CDK

Aggregated on: 2022-07-24 17:51:36

Introduction In this quick how-to guide, I will show you how you can use a Python AWS CDK application to automate the deployment and configuration of your Apache Airflow environments using Managed Workflows for Apache Airflow (MWAA) on AWS. What will you need:

View more...