News Aggregator


AI in Cybersecurity: An Overview

Aggregated on: 2022-07-08 14:51:26

What Is Cybersecurity? Network safety or Cybersecurity is the act of safeguarding basic frameworks and touchy data from advanced assaults. Otherwise called data information technology (IT) security, these measures are intended to cope with the dangers that arranged frameworks and applications might face, irrespective of whether those dangers are external or internal. Security framework intricacy, made by divergent advancements and an absence of in-house ability, can intensify these expenses. Yet, associations with a complete network protection procedure, represented by best practices and robotized utilizing progressed investigation, man-made consciousness (AI), and data and machine learning can battle cyber threats all the more successfully and diminish the lifecycle and effect of breaks when they happen. In recent times, cybersecurity and Artificial Intelligence have become the flip sides of one same coin, cybersecurity cannot be dreamt of anymore without AI.

View more...

Writing Your First Python GitHub Action

Aggregated on: 2022-07-08 04:06:26

We wanted to share our findings and experiences from creating our first GitHub Action. In this article, you’ll learn how to write a simple GitHub Action in Python. Brief Overview of GitHub Actions In 2019, GitHub released its own CI tool called GitHub Actions. According to GitHub, Actions make it easy for developers to automate tasks within the software development life cycle (SDLC). The native ecosystem integration enables projects to be automated from the moment developers commit code for deployment into production.

View more...

The Rise of RAD and Its Application in the Tech Industry

Aggregated on: 2022-07-08 03:36:26

Software development wasn’t always so fluid and efficient. The early beginnings of software development took months to prepare for and even more months in the development process, much like traditional engineering. Developers would come up with a plan that took laborious months and software architects would work directly with end users in order to come up with functional designs before defining them in spec sheets. If their clients didn’t like what the option they were presented with, it was back to the drawing board and developers would have to yet again start from scratch, taking even years to produce something that their clients first requested. Aside from opportunity cost, the expenditure to fund such undertakings were astronomical.  In a bid to make software development much more cost-effective and time-efficient, RAD, or rapid application development, was proposed in the 1980s. The idea was that software development should be treated as a malleable and intuitive process, rather than something rigid as constructing a building. Instead of focusing on costly planning, RAD emphasized rapid prototyping.

View more...

Live Loading to Deploy Kubernetes on Bare Metal

Aggregated on: 2022-07-08 03:06:26

In a previous article, I said that basically there are 2 ways to deploy servers: automatic and live download over the network. Today I want to talk about live loading over the network. This is when your nodes load some pre-prepared system images immediately into the RAM. For example, Core OS or LTSP can do this.

View more...

How to Store Text in PostgreSQL: Tips, Tricks, and Traps

Aggregated on: 2022-07-08 00:51:26

DDL generation based on JPA entities definition is a daily task for many developers. In most cases, we use tools like Hibernate's built-in generator or JPA Buddy plugin. They make the job easier, but there are exceptions. When it comes to storing big chunks of data in the database, things get a bit complicated. Use Case: Storing Documents  Let’s assume we need to store a document object with its content in the PostgreSQL database. The JPA entity code for this might look like the code below:

View more...

Learning by Auditing Kubernetes Manifests

Aggregated on: 2022-07-08 00:21:26

Last year, I spoke at the National DevOps Conference that took place at the British Museum. I had already visited the museum before, but speaking there was a fantastic experience. Besides, we had the museum all for ourselves for a couple of hours. If you've ever visited the place, you know what I mean. Anyway, I also attended a talk about Checkov:

View more...

7 Reasons to Choose Apache Pulsar over Apache Kafka

Aggregated on: 2022-07-07 21:51:26

So why did we build our messaging service using Apache Pulsar? At DataStax, our mission is to empower developers to build cloud-native distributed applications by making cloud-agnostic, high-performance messaging technology easily available to everyone. Developers want to write distributed applications or microservices but don’t want the hassle of managing complex message infrastructure or getting locked into a particular cloud vendor. They need a solution that just works. Everywhere.

View more...

Trends We Are Watching: API Democratization and API Management

Aggregated on: 2022-07-07 20:51:26

If you’re a developer of any modern application, then you’re likely more than just familiar with APIs—you’re probably a power user. Today’s applications, built for consumers and producers of endless content, are interconnected. And APIs are the glue that connects those applications, serving as the primary vehicle for communication between separate services. As the usage, development, and productization of APIs have blown up in recent years, we’re looking at a new trend that’s on the horizon: API democratization and API management. In this post, we’ll look at where APIs have been and where they’re going, specifically considering the role of API democratization and management in the future of APIs.

View more...

Scale Up to a Collaborative and Multiplayer Architecture With Edge Messaging

Aggregated on: 2022-07-07 20:21:26

There's unprecedented demand for multiplayer products. That is, products with features that support real-time, shared live and collaborative experiences between users. There's been explosive growth in the unified communications and collaboration sector through the pandemic, but collaboration isn't just about the Zooms and Slacks of the world. Remote-first and hybrid workplaces are increasingly common and have fueled growth in apps that provide a shared live experience for project collaborations where users are not physically co-located. Taking an application that's designed to be single-user and screen-sharing it with a collaborator over a conference call could at best be viewed as entry-level collaboration. The growth of collaborative experiences is highly competitive.

View more...

How to Scale Agile and DevOps for New Levels of Competitiveness

Aggregated on: 2022-07-07 18:51:26

97% of companies expect to keep some level of remote working post-pandemic. So, to stay competitive, companies must speed up application integration, development, and delivery.  To adapt to changing customer needs and market opportunities, companies need flexibility. Because of this, many companies are turning to agile and DevOps - those that master them see a 60% higher revenue and profit growth than their competitors.

View more...

Continuous Delivery Pipeline Security Essentials

Aggregated on: 2022-07-07 17:36:26

As the threat landscape continuously evolves, it is crucial for organizations to adopt a shift left for security mindset — ensuring that security is prioritized and its importance equated to that of automation and collaboration among distributed teams.In this Refcard, you’ll review the challenges associated with integrating security practices into a continuous delivery pipeline, including the blockers development teams in particular often face. Also covered are the key areas to consider when administering and maintaining security of CD pipelines.

View more...

A Complete Guide to Cloud Security Testing: What It Is, Importance, Benefits, Cloud Security Testing Methodology, and More

Aggregated on: 2022-07-07 15:51:26

Cloud security testing is an essential part of cloud computing. Cloud-based security testing can help organizations detect and prevent breaches, protect their data and improve their compliance posture. In this comprehensive guide, we will discuss what cloud security testing is, its importance, benefits, features, components, how to perform security testing in the cloud, and more! Cloud Security — What Is It? Cloud security entails taking precautions to safeguard data, applications, and infrastructure stored or accessed via the cloud. Cloud security includes both physical and logical security measures. Physical security measures protect the hardware and facilities used to store and access cloud-based data. Logical security measures protect the data itself from unauthorized access, use, or modification.

View more...

Two Principles of Geometric Deep Learning

Aggregated on: 2022-07-07 15:21:26

After CNNs exploded in 2012, showing unprecedented levels of prediction accuracy on image classification tasks, a group of researchers from Yann LeCun's team decided to extend their success to other, more exotic domains. Specifically, they started working on generalizing convnets to graphs. Their efforts were described in this influential paper.  Since then, Graph Neural Networks have become a hot area of research within the ML community and beyond. Numerous papers have been published explaining how different kinds and flavors of GNNs can be applied to complicated, irregular, high-dimensional, non-grid-like structures (graphs, manifolds, meshes, etc.).

View more...

Data Quality Metrics to Know and Measure

Aggregated on: 2022-07-07 14:51:26

The most important characteristic for any organization is not data; it is quality data. In a study, IBM estimated that bad data costs the U.S. economy $3.1 trillion per year. Such costs are incurred when your employees spend time cleaning data or rectifying the errors caused by bad data. Apart from financial costs, bad data becomes a source of dissatisfaction and discontent between you and your customers, partners, and other business relationships.  This clearly explains the importance of housing quality data in your organization. But what exactly is it, and how can you measure data quality? Let’s take a look. 

View more...

App Developers Are the First Line of Defense Against Cyberattacks

Aggregated on: 2022-07-07 14:21:26

A growing number of developers are creating new apps dedicated to improving cybersecurity. Their work is going to be even more important than ever as cyberattacks become a greater threat. In order to thwart would-be cybercriminals, app developers need to understand how these crimes are conducted. You can find more information about this below.

View more...

Kafka vs. JMS: Which One Should You Be Using?

Aggregated on: 2022-07-06 22:06:25

Two of the most popular message brokers used today are Kafka and those based around JMS. JMS is a long-standing Java API used generally for developing messaging applications, with its primary function of being able to send messages between two or more clients. Kafka, on the other hand, is a distributed streaming platform that provides a lot of scalabilities and is useful for real-time data processing.  While both offer their own advantages and are highly useful in their own right, which of the two should you be actually using?

View more...

Now It's Time to Uncomplicate With the Not-So-New API in Java

Aggregated on: 2022-07-06 21:36:25

Dealing with dates or any operations that deal with time as a unit of measurement is always a big challenge. It is no different within the Java world; however, since Java 8, the new date API brings several improvements. This article will understand more about the complexity of working with dates and how useful Java's date API is.

View more...

Is Sustainability the New Security and Compliance?

Aggregated on: 2022-07-06 21:36:25

Digital transformation is making every business faster, smarter, and more connected. At the same time, it’s also putting pressure on businesses to reduce their environmental footprint and make sure that their IT operations are socially responsible. Are we at a point where we were with security five years ago, where you can no longer ignore the importance of social governance in your IT environment? Data Security & Compliance When I began conducting interviews with IT executives for DZone in 2015, GDPR and data security were only the concern of CIOs and CTOs -- there weren't many CISOs then. Data security was a nuisance to CEOs, CSOs, and COOs. IT just needed to "handle it."

View more...

Lessons Learned in Cloud Security From Lapsus$ Surfacing

Aggregated on: 2022-07-06 21:36:25

Over the past few days, new information about the Lapsus$ cybercrime group has surfaced and provided fresh insights into the actual practices of cyber security adversaries. While it’s not clear exactly who they are (it’s been reported that the mastermind behind this group could be a teenager!) or the extent of their accomplishments - cloud security practitioners, can already learn a lot about the best practices that reduce the threat from groups like Lapsus$. You can read a lot about the activity of Lapsus$ elsewhere (most notably, we recommend the post on the Microsoft Security Blog and the post by KerbsOnSecurity) and the detailed response by Okta’s CSO about their incident, so what we’ll try to do here is outline a few quick effective action items/lessons you can take away from this incident to improve the security posture of your cloud environment.

View more...

Using Insomnia to Upgrade Dependencies — With Confidence

Aggregated on: 2022-07-06 21:36:25

Demo app: “Is Today My Birthday” Always keep your dependencies up to date. When you don’t upgrade, you miss out on bug fixes, security patches, and new features. You may even be up against an “end of life” deadline if the version of a package you use will soon no longer be supported. If upgrading dependencies is so important, why don’t many developers do it? They may not know-how, or they may not understand the benefits of upgrading, or they may not feel like they have the time. Or, they may be afraid.

View more...

Web Application Testing Guide for Beginners

Aggregated on: 2022-07-06 20:21:25

The internet, World Wide Web (WWW) or simply the web, is the most revolutionary information technology and application development platform in the world. The present world economy majorly depends on the web.  The simplest way to conceptualize it is that it is a network of interconnected nodes called servers and clients, exchanging data over well-defined protocols like TCP/IP, HTTP, FTP, etc. Read more about its inception and specifications.

View more...

What Developers Need to Know About Table Partition Maintenance

Aggregated on: 2022-07-06 20:21:25

Table partitioning is a very convenient technique supported by several databases including MySQL, Oracle, PostgreSQL, and YugabyteDB. In the first article of this series, we discussed an application that automates the operations of a large pizza chain. We reviewed how PostgreSQL improves the application’s performance with the partition pruning feature by eliminating unnecessary partitions from the query execution plan.  In this article, we’ll examine how PostgreSQL’s partition maintenance capabilities can further influence and simplify the architecture of your apps. We’ll again take the pizza chain app as an example, whose database schema comes with the PizzaOrders table. To remind you, the table tracks the order’s progress (table data is explained in the first article):

View more...

The Top Secrets to Become a Successful Remote Software Developer

Aggregated on: 2022-07-06 19:51:25

“To improve is to change; to be perfect is to change often.” -Winston Churchill. The remote working model has seen a significant rise during the pandemic years and is still being continued worldwide. A recent survey states that 77% of developers find themselves more productive while working remotely. This hype has brought tremendous opportunities for remote developers in the global market. 

View more...

10 Computer Vision Applications for Today's World

Aggregated on: 2022-07-06 19:21:25

Computer vision applications enable machine learning models to recognize, analyze, and comprehend data from digital photos and videos. It allows artificial intelligence (AI) models to “see” the world around them. Machine and deep learning advances have been crucial to the success of computer vision programs. From object identification to picture production, to style transfer, to image captioning–computer vision and the applications of computer vision have created a new world of opportunities for those building AI models for practical applications.

View more...

Fine-Grained Access Control — What's All the Buzz About?

Aggregated on: 2022-07-06 18:06:25

Authorization has become quite a hot topic: Intuit, Airbnb, Google, and others have recently described the architectural challenges surrounding authorization at scale and the solutions that they’ve built internally to address them. As a developer of a B2B SaaS application, you may be scratching your head about how this is relevant to you. Early on in your application’s lifecycle, these challenges may not be obvious: your application typically starts with “regular users” and “admins”; for admin-level operations, you write some code to check whether the logged-in user has admin rights. Life is simple.

View more...

How to Handle JavaScript Alert in Selenium WebDriver Using Python?

Aggregated on: 2022-07-05 21:06:25

Alert windows are widely used across websites where an alert message acts as a mode to ‘interrupt’ the current flow of the user journey. A simple example of a JavaScript alert would be someone filling in details on the sign-up page and submitting the details without entering some mandatory information. This user flow also needs to be verified when Selenium automation testing is performed on the web product.  Handling pop-ups and alerts are one of the common test scenarios that should be tested using Selenium WebDriver. In this post of the Selenium Python tutorial series, we look at how to handle JavaScript alerts in Python. It is worth mentioning that the core fundamentals of JavaScript alerts and popups remain unchanged irrespective of the programming language used for Selenium.

View more...

CIO Guide for Operational and Business Benefits of DevOps

Aggregated on: 2022-07-05 20:06:24

The rising demands of end-users have forced businesses to face many challenges to increase their operational efficiency and productivity. Also, the continuous evolution in the market plays a handy part in pressuring businesses to achieve optimal results. To overcome and eliminate all those hassles, businesses can prefer a DevOps culture that brings collaborative work nature to their team. This blog is about briefing DevOps and its benefits (Operational & Business) for an organization.

View more...

Building Reactive Java Applications with Spring Framework

Aggregated on: 2022-07-05 19:36:25

If you’re a Java developer who uses the Spring ecosystem, you’ve probably seen the Spring Pet Clinic. In this workshop, we will walk you through a new reactive implementation of the Pet Clinic backend that uses Spring WebFlux and Apache Cassandra® (via DataStax Astra DB). The cloud-native database-as-a-service built on Cassandra fits the highly concurrent, non-blocking nature of our reactive application. We’ll do all of our work in the cloud with Gitpod’s open-source, zero-install and collaborative development environment.

View more...

How Intrinsic Type Manipulations Work in TypeScript

Aggregated on: 2022-07-05 19:36:25

Did you know that TypeScript comes with a bunch of built-in string manipulator types? That means we can easily transform a string type into uppercase, lowercase, or capitalized versions of itself. When might this be useful? In lots of situations where you have a fixed set of string values, for example, whenever you have a set of strings from an object using something like keyof. To transform a string into a different version by defining a new type along with one of the type manipulators. For example, below, we transform myType into the capitalized version:

View more...

Why More Incidents Are Better

Aggregated on: 2022-07-05 19:36:25

As most SREs how many incidents they’d have to respond to in a perfect world, and their answer would probably be “zero.” After all, making software and infrastructure so reliable that incidents never occur is the dream that SREs are theoretically chasing. Reducing actual incidents as much as possible is a noble goal. However, it’s important to recognize that incidents aren’t an SRE’s number one enemy. What matters more than the number of incidents you experience is how effectively you respond to each one.

View more...

Document Annotation, Its Industry Significance, and Best Practices

Aggregated on: 2022-07-05 19:06:25

By images and document annotation, we mean the process of identifying fields and values within a document in order to extract useful information. By using AI and machine learning algorithms, data sets in files can be categorized and extracted automatically without the need for manual intervention. When you mark up documents, you can easily find the information you are searching for without having to comb through the entire document.  Data can be structured and shown in a clear and comprehensible format that other users can understand and appreciate as well. Image annotation traditionally is handled by specialized staff, with innovations in technology, OCR, and RPA eliminating the need for employees to look up information in documents manually and freeing up workers for more productive tasks. 

View more...

Benchmarking PostgreSQL Workloads on Kubernetes

Aggregated on: 2022-07-05 17:36:24

Kubernetes used to be a platform that could only host stateless workloads, and while this has mostly changed with up to 90% believing Kubernetes is ready for stateful workloads, "databases like PostgreSQL cannot run on Kubernetes" is something that you can still hear. However, Gabriele Bartolini,  Vice President of Cloud Native for EDB, and Francesco Canovai, System Engineer for 2ndQuadrant, think otherwise.  But they don’t want us to take their words for granted. If a company is considering running Postgres on Kubernetes, the first question they should ask is “why”. Once the goal is figured out, benchmarking the setup is a great way to ensure that it will be performed as needed. 

View more...

How to Use Automatic Mixed Precision Training in Deep Learning

Aggregated on: 2022-07-05 16:51:24

Why Use Mixed Precision Deep Learning? As advancements have been made in the field of deep learning, the discussion about mixed-precision training of deep learning models has seen a similar increase. These improvements and natural evolution of the scope, sequence, and raw power of neural networks mean that the size of these models has had to increase to compensate accordingly. Larger and more complicated deep learning models require advancements in technology and approach. This has led to multi-GPU setups with distributed training which can get out of hand quickly as more GPUs are integrated into training. Getting back to the basic training principles of deep learning and brushing up on fundamental techniques can ease the stress of the training phase of neural networks and optimize GPU usage. Mixed precision training or automatic mixed precision training can be a simple way to do exactly this.

View more...

Getting Your Developers to See Value With a Great Developer Experience

Aggregated on: 2022-07-05 16:21:24

One of the beauties of working with APIs is their convenient and practical ways to share data and applications. APIs have enabled a transformational shift from an interface that relied on custom integrations to now a relatively streamlined process. That said, because of their agile framework, some companies have overlooked the importance of providing a great developer integration experience and are not taking the necessary steps to help drive the Time To First Hello World. Unfortunately, it’s an all too common sentiment surrounding API management that the integration should be left to a hyper-intelligent developer to figure out and that standard onboarding workflows are unnecessary luxuries. However, this is a misguided notion; developers don’t want to be treated as second-class citizens; they want to be shown how to integrate and would appreciate the convenience of streamlined workflows.

View more...

Event-Driven Order Processing Program

Aggregated on: 2022-07-05 15:51:24

Following the Hello World example of a simple, independently deployable real-time Event-Driven microservice, this article looks at a more realistic example of an Order Processor with a New Order Single in and an Execution Report out.  A New Order Single is a standard message type for the order of one asset in the FIX protocol used widely by financial institutions such as banks. The reply is typically one or more Execution Reports updating the status of that order.

View more...

DevOps for Enterprise — Are You Doing It Right?

Aggregated on: 2022-07-05 15:51:24

The development of a product or application is a lengthy process and involves various steps that need thorough checking at several stages. An enterprise needs a system that can help them manage this development process and make it faster and more efficient. DevOps is the process implemented in large-scale organizations that help them in achieving higher productivity, operational efficiency, optimized results, etc. It is a set of tools, approaches, and practices that allows the combination of the developmental and operational capabilities for rapid product development. 

View more...

A Simple Guide to Rust Data Types

Aggregated on: 2022-07-05 15:51:24

Every programming language depends on data types. The same goes for the Rust programming language. Rust data types cover the various needs of storing data. Since Rust is a statically typed language, data types become even more important. The Rust compiler uses the data types at the compilation time to make sure that the program is correct. Rust data types are divided into two major types: scalar and compound. We will look at both types in detail.

View more...

Saving Memory In Java: Making The Smallest Memory Footprint

Aggregated on: 2022-07-05 15:51:24

Articles To Read Before We Start I've already written articles about memory estimation. The first one explains how to calculate memory for objects, arrays, etc. The second one shows tools for how to estimate recursively any object size. Before you begin this article, I strongly recommend you read the first ones. Otherwise, it would be a bit difficult to understand how I calculate the size of objects. This article will cover the next tricks and topics:

View more...

Understanding OAuth 2.0

Aggregated on: 2022-07-04 17:06:24

In a traditional client-server authentication model, a resource owner shares their credentials with the client so that the client can access its resources when necessary. The client does that by passing the resource owner's credentials to the resource server, and the resource server validates the same before providing access to the protected resource(s). Simple, right?  Well, there are a bunch of problems associated with this model, a few of which are listed below:

View more...

NativeScript vs. Flutter: A Comparison for Tech Businesses and Entrepreneurs

Aggregated on: 2022-07-04 16:36:24

With the growing demand for lifestyle and communication apps, mobile app development has become a booming industry. Building apps for both iOS and Android requires having two different teams with different skill sets. This can be a challenge for companies that might not have the resources to invest in two other teams. This process can be pretty time-consuming and expensive, but there is a solution. Cross-platform app development with technology like Flutter and NativeScript can be a more cost-effective solution.

View more...

Everything You Need to Know About Building MVP With React and Firebase

Aggregated on: 2022-07-04 16:06:24

While a concept is in the ideation phase, it is wise to simplify and build a minimal core to see if it works per your needs. Moreover, a prototype will assist in knowing if there is any market for your product before you lose your resources. The creation of this minimal core is known as ‘Minimal Viable Product’ or MVP. Let us learn how to create an MVP using React and Firebase. Why Should You Use Firebase? Firebase is a well-equipped platform that serves as backend development software. Firebase provides various important options all under one software and helps to embrace

View more...

Building an E-Commerce API Using Nestjs, SQLite, and TypeORM

Aggregated on: 2022-07-03 17:36:23

Introduction Nestjs is a cutting-edge Node.js framework for developing server-side applications that are efficient, dependable, and scalable. It is simple to integrate with NoSQL and SQL databases such as MongoDB, Yugabyte, SQLite, Postgres, MySQL, and others. It supports popular object-relational mappers such as TypeORM Sequelize and Mongoose. In this tutorial, we'll create an e-commerce application with SQLite and TypeORM. We'll also look at Arctype, a powerful SQL client and database management tool.

View more...

Architecture as Code With C4 and Plantuml

Aggregated on: 2022-07-03 17:06:23

Introduction I'm lucky enough to currently work on a large microservices-based project as a solution architect. I'm responsible for designing different architecture views, each targeting very different audiences, hence different preoccupations: The application view dealing with modules and data streams between them (targeting product stakeholders and developers) The software view (design patterns, database design rules, choice of programming languages, libraries...) that developers should rely upon; The infrastructure view (middleware, databases, network connections, storage, operations...) providing useful information for integrators and DevOps engineers; The sizing view dealing with performance; The security view, which is mainly transversal. NOTE

View more...

Are Foreign Keys Unscalable?

Aggregated on: 2022-07-03 16:36:23

If you find yourself reading this post, there are very good chances that you find yourself in the shoes of a MySQL database administrator, a database-savvy developer, or even a sysadmin. If you're reading this post, also chances are that you know a couple of things about storage engines, indexes, partitioning, normalization, search engines helping you secure your data, and whatnot. In this blog, we will dive deeper into the correlation between big data and foreign keys on MySQL.

View more...

Screen Sharing in Java

Aggregated on: 2022-07-03 15:36:23

Remote screen sharing is used in various applications and services, from web conferencing to remote access applications. A back-office employee can use it to consult a colleague on the frontline or a technical support specialist can use it to see exactly what their client sees. You may go with a third-party application like a TeamViewer. But what if you need to have the remote access capabilities right in your Java application? In this case, you may want to go the other direction.

View more...

Unified Observability Exporters: Metrics, Logs, and Tracing

Aggregated on: 2022-07-03 15:36:23

This is the second in a series of blogs discussing unified observability with microservices and the Oracle database. The first piece went into the fundamentals and basic use cases. This second blog will take a deeper dive into the Metrics, Logs, and Tracing exporters (which can be found at https://github.com/oracle/oracle-db-appdev-monitoring), describing them and showing how to configure them, Grafana, alerts, etc.  I will also refer the reader to the latest version of the Unified Observability in Grafana Workshop that has just been published which demonstrates the principles, provides code and configuration examples, etc.  All of the code for the workshop can also be found at the https://github.com/oracle/microservices-datadriven repos (specifically in the observability directory).  Particularly with the dawn of microservices, robust observability is an absolute requirement, and the better the tools and techniques used in the space, the more effective and enjoyable observability is for the (DevOps) user and thus the focus on this key area.

View more...

3 Approaches To Connecting With Snowflake Using MuleSoft Connectors

Aggregated on: 2022-07-02 21:36:22

Using available MuleSoft connectors, there are three approaches that we can use to operate on the Snowflake platform: Using MuleSoft Snowflake Connector Using DataSource with MuleSoft Database connector With MuleSoft connector with database generic connection All the above have their benefits in preparing a connection with Snowflake as a source system, which we will discuss in the sections below.

View more...

How to Manage a Red Hat MicroShift Cluster with Shipa

Aggregated on: 2022-07-02 17:51:22

For developers working with low-resource environments that nevertheless wish to harness the full advantages of Kubernetes, the open-source Red Hat MicroShift project and Shipa (an application-as-code platform you can spin up for free) offer a rather compelling pairing. In this article, I’ll take you through the steps of using MicroShift to set up a lightweight Kubernetes distribution, and then manage the same cluster using the “free forever” version of Shipa Cloud.  But first, why MicroShift? A research project started by Red Hat, MicroShift is built for running Kubernetes clusters in environments with tight resource constraints, such as edge and IoT devices. It’s a memory-optimized lightweight flavor of OpenShift/Kubernetes, and currently supports Fedora, RHEL, and CentOS Linux distributions. Shipa fits in here by helping solve some of the usual problems faced by developers and platform operators. It lets developers focus on what they’re good at and want to do (building applications) and reduces the time platform operators spend on deployments and governance. Onboarding MicroShift to Shipa offers some nice benefits by making it possible to manage multiple clusters from an administration and operations perspective. 

View more...

How to Use MQTT in PHP

Aggregated on: 2022-07-02 17:21:22

PHP is a widely-used open source multi-purpose scripting language that can be embedded in HTML and is especially suitable for web development. This article mainly introduces how to use the php-mqtt/client client library in PHP projects to implement the functions of connection, subscription, unsubscribing, message receiving, and sending between the MQTT client and MQTT server.

View more...

Refactor Switch to a One-Liner

Aggregated on: 2022-07-02 16:51:22

Intro In this article, we’ll take a look at why switch is almost never a good idea in OOP. We are going to look from different perspectives at how it affects the code, tests, and maintainability. Afterwards, we’ll do some refactoring on our existing code and analyse the benefits of the newly refactored code. We’ll see how almost any (no matter how long) switch can and should be converted to an elegant one-liner. All the source code used in this article can be found here, which has two branches — the un-refactored code (main) and the result after refactoring (feature/refactor-switch). switch Is Almost Never a Good Idea How many times have you come across some code that you need to add some changes to or modify something, and you do this?

View more...