News Aggregator7 Tips for Using Instrumentation and Metrics To Align Site Reliability With Business GoalsAggregated on: 2022-07-01 21:36:22 Before the acceleration of modern DevOps practices, software engineers primarily wrote code. Now the job is so much more — from getting apps production-ready and iterating quickly to scale new services to architecting system compatibility and ensuring compliance and reliability — which has elevated the need for exceptional instrumentation. But what does great instrumentation involve and where should you begin? I tackle the answer to this question in a new book on observability I co-authored along with Chronosphere’s co-founder and CEO, Martin Mao, and cloud-native expert, Kenichi Shibata — O’Reilly’s Cloud Native Monitoring: Practical Challenges and Solutions for Modern Architecture. View more...Learn the Weekly Rituals You Should Master as a Software Project ManagerAggregated on: 2022-07-01 19:21:22 Today, I'd like to cover the weekly life of a project manager. When I'm managing a project, these are the things I do every week: Identify the next milestone. Do you have a goal that is less than a month away? If not, make one up as soon as you can. Talk about the next milestone in every meeting with the team. Update your project plan. Schedule an hour or two every Friday to review and update your project plan. Update your risk registry. During your project planning time, update your risk registry. Send a weekly project update. After updating the project plan and risk registry, I send out an update that summarizes where things are with all the projects for which I'm responsible. Putting these things together will often require meetings or conversations, but having a concrete idea of what you're delivering each week can make it more clear what to focus on. View more...How to Classify NSFW (Not Safe for Work) Imagery with AI Content Moderation using JavaAggregated on: 2022-07-01 18:51:22 The purpose of this article is to highlight some of the contemporary challenges in moderating degrees of explicit NSFW (Not Safe for Work) image content on websites and to demonstrate a cloud-based Artificial Intelligence Content Moderation API which can be deployed to increase the efficacy of the content moderation process. Pornographic images are typically banned on mainstream websites and professional networks. That’s because failing to ban such content means exposing website patrons and employees alike to unsolicited, sexually explicit imagery, which can amount to charges of sexual harassment, depending on how litigious your region of the world is. Enforcing a ban on such content is no small task, however, due to the large volume of image files that are uploaded to content-curating networks each day, and in part due to the difficulty of clearly defining policies against imagery which is some degree of sexually suggestive (i.e., content that is racy) rather than fully pornographic. View more...NextJS Vs React: Key Differences, Advantages and LimitationsAggregated on: 2022-07-01 15:51:22 Choosing the right programming language for a website or an application development has always been a hassle. When it comes to selecting between two awesome programming languages such as NextJS and React, it’s debatable. Both tools are best suited for creating web applications. View more...5 Best JavaScript Web Development FrameworksAggregated on: 2022-07-01 14:51:22 JavaScript is a very popular and powerful programming language that’s used with HTML and CSS to create the front end of a website. There are many frameworks of JavaScript, which are frontend and backend. In this article, we’ll discuss the 5 best JavaScript web development frameworks. View more...Understanding Kubernetes Resource TypesAggregated on: 2022-07-01 00:36:25 Note: This is the first of a five-part series covering Kubernetes resource management and optimization. We start by describing Kubernetes resource types. Before we dive into Kubernetes resources, let’s clarify what the term “resource” refers to here. Anything we create in a Kubernetes cluster is considered a resource: deployments, pods, services, and more. For this tutorial, we’ll focus on primary resources like CPU and memory, along with other resource types like ephemeral storage and extended resources. View more...MongoDB vs. DynamoDB Head-to-Head: Which Should You Choose?Aggregated on: 2022-07-01 00:36:25 Databases are a key architectural component of many applications and services. Traditionally, organizations have chosen relational databases like SQL Server, Oracle, MySQL, and Postgres. Relational databases use tables and structured languages to store data. They usually have a fixed schema, strict data types, and formally-defined relationships between tables using foreign keys. They’re reliable, fast, and support checks and constraints that help enforce data integrity. View more...Using an Array as Function Parameter in JavaScriptAggregated on: 2022-06-30 23:06:22 In Javascript, we often have data stored as arrays, and functions we want to call. Sometimes, the data in our arrays is exactly the data we want to pass to a function. Fortunately, there are ways in Javascript to use arrays as the input values for functions. Let's look at how to use arrays as function parameters. How to Use Arrays as Function Parameters When we have a function we want to pass an array to, the most basic way to do it would be like this: View more...Monitoring Spring Boot Application With Prometheus and GrafanaAggregated on: 2022-06-30 21:36:22 In this article, we will be looking into how we can monitor our Spring Boot application using Grafana. We would be looking into the whole setup and creating a simple dashboard to view some metrics. Every application that is deployed on production needs some kind of monitoring to see how the application is performing. This will give you some insights on whether the application is performing as aspected or if you would need to take some action in order to obtain the desired level of performance. In the modern world, this data is called Application Performance Metrics (APM). Now there are quite many commercial tools like Newrelic, Datadog APM, etc. which are SAAS services providing such capabilities. View more...6 Reasons Cybersecurity Awareness Training is ImportantAggregated on: 2022-06-30 21:36:22 We live in a world where all our day-to-day lives have gone digital. There might not be any single piece of our information that is not present on the internet today. With hackers attacking every 39 seconds, cybersecurity has become a major challenge for many organizations. Cybersecurity plays an important role in securing data from data breaches. While practicing cybersecurity is essential, cybersecurity awareness training is equally important. View more...How to Solve Context Propagation Challenges in Distributed TracingAggregated on: 2022-06-30 20:51:21 Distributed tracing allows tracking of a specific flow as it progresses throughout microservices systems. With distributed tracing, developers can connect the dots and gain visibility and understanding of a certain flow. This saves time when building and operating modern applications. However, not all workflows and architectures support distributed tracing mechanisms. This is the case especially when these mechanisms were built as creative and customized solutions to unique situations. In such cases, it can be challenging to implement the context propagation mechanism, which is responsible for gathering the metadata that enables building the distributed tracing flow. View more...3 Reasons Why You Should Centralize Developer Tools, Processes, and PeopleAggregated on: 2022-06-30 20:36:21 Have you ever worked for an organization that uses 15 overlapping tools, all with different requirements, inputs, and administrators? Pretty hectic, right? Every development team has its unique blend of tools that help it ship code, but it’s hard to keep all those tools seamlessly working together. We recently surveyed developer teams, and they cited fragmented tools as the most common challenge, with 39% of respondents calling it a significant challenge. The decentralization of developer tools, processes, and people creates friction in software development workflows and frustration across teams. If you feel like you’re constantly shifting between tools or searching for information and wasting time to ineffective tools, you’re not alone — but you also don’t have to suffer any longer. Here’s a closer look at some common issues and potential solutions: View more...5 Benefits of Electronic Data InterchangeAggregated on: 2022-06-30 20:36:21 The world of corporations can be difficult if you are not moving with the pace of the industry. Having a solid communication channel while aligning with other organizations is one of the crucial aspects of the business today. While there was a time when maintaining accurate records and keeping the communication fast was a challenge for many organizations, today, EDI solutions have made it super easy for them. Electronic data interchange has been one of the most required technologies that have simplified the basic data transfer and communication among two partnered organizations. You see, companies can't handle everything on their own. There are operations that companies prefer to keep in-house, while there are tasks that need to be outsourced. Partnering with other niche organizations is a great way to maintain quality in the operations. However, the basics of such collaborations depend majorly on the quality of communication that these two have. View more...Quantum Computers ExplainedAggregated on: 2022-06-30 19:51:21 Human technology, for the majority of our history, was limited to our brains, fire, and sharp objects. The biggest advancement has been made to human brains, while fire and sharp objects evolved into power plants and nuclear weapons. Since the 1960s, the power of our brain machines has continued to increase dramatically, enabling computers to become smaller while also becoming more potent. But the physical boundaries of this process are about to be reached. Computer components are getting closer to atom size. We must establish certain fundamentals in order to comprehend why this is an issue. View more...DevOps Compliance EssentialsAggregated on: 2022-06-30 19:51:21 From new and changing data protection laws to the widespread occurrence of data breaches, consumers are more aware than ever of how their data is being used and when their privacy is compromised. Companies must commit to an intentional, strategic approach for ensuring compliance across their infrastructure, throughout the software development and delivery lifecycles, and within the very fabric of their DevOps culture.This Refcard covers the fundamental components of DevOps compliance as well as key steps for organizations to take in order to meet regulatory and security requirements, improve operational efficiency, and adapt as policies inevitably change. View more...Why You Should Be Obsessed With DogfoodingAggregated on: 2022-06-30 19:51:21 What Exactly Is Dogfooding? If you’ve worked in a tech company, you’ve probably eaten some dog food. Or to be more precice — you’ve probably eaten your own dog food. Because the phenomenon known as “dogfooding” (or “eating your own dog food”) has become an accepted part of the product development process. So what is dogfooding exactly? It’s the practice of using your own product or service. View more...3 Best Tools to Implement Kubernetes ObservabilityAggregated on: 2022-06-30 18:51:21 A properly managed and implemented observability system provides DevOps with granular insights that can be used to debug and heal complex systems. Observability combines monitoring, alerting, and logging with metrics visualization and its analysis.It allows development teams to get detailed insights into the real-time performance of Kubernetes clusters and applications so that they can make timely and informed actions. Here, in this blog, we’ve discussed three important tools to implement Kubernetes Observability. Let’s take a look! Kubernetes at Its Boom Today, containers and microservices are emerging as the cornerstone of a flexible hybrid cloud strategy. Kubernetes have completely revolutionized the deployment and lifecycle management of containers across public clouds and private data centers. So profound was its effect that initially, Kubernetes was considered a “be-all and end-all” for software lifecycle management. View more...A Complete Guide to Generated Columns in MySQLAggregated on: 2022-06-30 17:51:21 MySQL generated columns pose as a powerful, easy-to-use, and advanced tool for anyone who wants to add automatically generated data to their tables - in this blog, we will learn everything you need to know to master them. Generated columns allow you to store automatically generated data in a table without using the INSERT and UPDATE clauses. This useful feature has been part of MySQL since version 5.7, and it represents an alternative approach to triggers when it comes to generating data. Also, generated columns can help you make your query easier and more efficient. View more...Regression Testing: Significance, Challenges, Best Practices and ToolsAggregated on: 2022-06-30 17:21:21 Minor changes can have huge consequences. As the wants and choices of customers and markets are dynamic, so is expected the software to progress in parallel with the varying trends. In a few cases, the changes or even slight modifications in the back-end can often cause a diversion from intended use and functionality. To evade such anomalies in software, the QA specialist team performs regression tests (with the assistance of regression test tools). Tester teams should make certain that fresh code doesn’t conflict with older code and that unchanged code continues to function as expected. Software products, once designed, are frequently changed to ensure the right incorporation of sophisticated and unique features. This form of testing makes certain that the app’s earlier functionality is still functional and that the latest alterations haven’t introduced new bugs. View more...Purpose-Driven Microservice DesignAggregated on: 2022-06-30 13:06:21 Buzzwords aren’t something I expected when I started my career. In those days, most of the technology news arrived in paper-based weekly publications like InformationWeek and Network World. I remember thinking to myself, “Man, they are using these same words over and over again each week.” That translated to people using buzzwords … all the time. Back then, my two favorite buzzwords were references to the internet as the “world wide web” and the “information superhighway.” I always wondered if there would be a super-duper-highway at some point. View more...Are All Kubernetes Ingresses the Same?Aggregated on: 2022-06-30 00:06:21 The simple answer is yes and no, but the real answer is more complicated. There has been a lot written on this topic, and I am taking a shot at making this area more understandable. Before getting started, it's important that I point out a key fact. k8s Upstream does not provide an Ingress. Like components such as service load balancers and storage, it simply provides the API that the controller should consume to create the functionality described in the k8s resource. An Ingress consists of the controller watching k8s APIs and the proxy engine that is programmed by that controller to affect forwarding. View more...Plan Routes to Nearby Places in an AppAggregated on: 2022-06-29 23:36:21 Route planning is a very common thing that all of us do in our daily lives. Route planning in apps allows users to enter a location that they want to go to and then select an appropriate route based on various factors such as the estimated time of arrival (ETA), and is applicable to a wide range of scenarios. In a travel app, for example, travelers can select a starting point and destination and then select an appropriate route. In a lifestyle app, users can search for nearby services within the specified scope and then view routes to these service locations. In a delivery app, delivery riders can plan optimal routes to facilitate order pickup and delivery. So, how do we go about implementing such a useful function in an app? That's exactly what I'm going to introduce to you today. View more...Complete Guide to TestOpsAggregated on: 2022-06-29 23:06:21 As we all know, DevOps is not a person — it’s a complex set of processes, skills, communication, and tools between developers, ops, testing, and business units. DevOps entered the tech big scene several years ago with The Phoenix Project (2013) and The DevOps Handbook (2016) to address scalability issues and provide an opportunity for tech companies to ship software faster. It focuses on closing the loop between development and operations and drives production through continuous development, integration, testing, monitoring and feedback, delivery, and deployment. The technology leaders have now switched to it, breaking communication barriers between dev and ops silos and reducing new features’ time-to-market. DevOps is responsible for the fact that we all use CI/CD systems, virtualization tools, and various automation to ship updates twice a day. View more...Top 7 Features in Jakarta EE 10 ReleaseAggregated on: 2022-06-29 22:36:21 Java EE was the dominant force behind all the enterprise development in Java. Lately, it was renamed Jakarta EE, transitioning from JCP to Eclipse Foundation. This transition opened the door to open governess, open compatibly testing (earlier Technology Compatibility Kit -TCK was closed source), and of course, open-source. That means no specific vendor has more influence than others; it's more distributed now. View more...Caching Across Layers in Software ArchitectureAggregated on: 2022-06-29 22:06:21 The purpose of this article is to help readers understand what is caching, the problems it addresses, and how caching can be applied across layers of system architecture to solve some of the challenges faced by modern software systems. This article is aimed at software developers, technical managers, software architects, test engineers, or anyone else interested in understanding how the cache can be used in software systems. View more...Data Mesh — Graduating Your Data to Next LevelAggregated on: 2022-06-29 20:51:21 Data Mesh is fast emerging as a serious architecture pattern to look for in the field of data. I will stop after saying 'field of data' rather than extending the 'data' to data science, data engineering, data warehouse, and all such kinds of buzz words. We in IT have the habit of creating buzzwords and then following them. I just want to focus on something other than just the buzzword. The reason for this is Data Mesh has the potential to completely change the way we handle and look at our data. This will have an impact on all areas where data is the critical element. Report Card For Current Level of Data Before we graduate our data to the next level, here is a quick summary of progress or a report card of the current level of data. The diagram below shows how data is normally handled in today's IT systems. View more...Java’s Encapsulation - When the Getter and Setter Became Your EnemyAggregated on: 2022-06-29 20:51:21 Encapsulation is the key to a good code design, but how to archive it? Java developers automatically think about putting getter and setter in a private attribute. The encapsulation is a wrapping up of data under a single unit. It is the way to protect the data with OOP and avoid any security issues. The main idea around encapsulation is the data's guardian or a shield from being accessed by the code outside this shield when it makes sense. View more...Tutorial: Build a Simple Rust App and Connect It to ScyllaDB NoSQLAggregated on: 2022-06-29 20:51:21 ScyllaDB, an open-source database for data-intensive applications that require high performance and low latency, is an excellent match for Rust. Similar to the Rust programming language and the Tokio framework, ScyllaDB is built on an asynchronous, non-blocking runtime that works well for building highly-reliable low-latency distributed applications. The ScyllaDB team has developed the scylla-rust-driver, an open-source ScyllaDB (and Apache Cassandra) driver for Rust. It’s written in pure Rust with a fully async API using Tokio. You can read more regarding its benchmark results, plus how our developers solved a performance regression. View more...MySQL to DynamoDB: Build a Streaming Data Pipeline on AWS Using KafkaAggregated on: 2022-06-29 19:51:21 This is the second part of the blog series which provides a step-by-step walkthrough of data pipelines with Kafka and Kafka Connect. I will be using AWS for demonstration purposes, but the concepts apply to any equivalent options (e.g. running these locally in Docker). This part will show Change Data Capture in action that lets you track row-level changes in database tables in response to create, update and delete operations. For example, in MySQL, these change data events are exposed via the MySQL binary log (binlog). View more...MEAN vs MERN Stack: Which One Is Better?Aggregated on: 2022-06-29 19:21:21 While talking about the word “Stack” can be described as an amalgamation of the tools and technologies used to build a particular software. The technology stack, also known as the Solution Stack, comprises the programming languages, frameworks, databases, and front and back-end technologies that collectively help in running a project/application successfully. All these tools, when used together, make up a full stack. View more...Introduction to JWT (Also JWS, JWE, JWA, JWK)Aggregated on: 2022-06-29 16:06:21 The security and privacy of users' data have been a growing concern for the past few years. At the same time, JWT, as one technology to combat it, has been used more and more. Understanding JWT will give you an edge over the other software engineers. JWT might seem simple at first, but it is pretty hard to understand. In this article, we will explore mainly JWT and JWS. In addition, we'll also go through JWE, JWA, and JWK quickly. This article aims to make the reader understand the concept of JWT without diving too deep into the topic. View more...What Are the Best Performance Tuning Strategies for Your SQL Server Indexes?Aggregated on: 2022-06-29 14:21:21 An optimized approach to indexing is important if you are keen to keep the performance of an SQL Server instance at its best and, in turn ,deliver a consistent experience for end users of any software solution that relies on it. This is an easy thing to say but harder to achieve in practice unless you have the right strategies and solutions at your disposal as an administrator. View more...Reactive Kafka With Streaming in Spring BootAggregated on: 2022-06-29 01:51:20 The AngularAndSpring project uses Kafka for the distributed sign-in of new users and the distributed token revocation for logged-out users. System Architecture The AngularAndSpring project needs to be able to be horizontally scaled each with its own database. To enable that, a sign-in needs to be propagated to all instances. Kafka serves as a central event streaming platform to send the sign-in events. Kafka is horizontally scalable to high event loads and can be set up to be highly available. View more...What Developers Need to Know About Table Partition PruningAggregated on: 2022-06-29 00:06:20 Table partitioning is a very handy feature supported by several databases, including PostgreSQL, MySQL, Oracle, and YugabyteDB. This feature is useful when you need to split a large table into smaller independent pieces called partitioned tables or partitions. If you’re not familiar with this feature yet, consider the following simple example. Let’s pretend you develop an application that automates operations for a large pizza chain. Your database schema has a PizzaOrders table that tracks the order’s progress. View more...Supabase and Angular Quickstart GuideAggregated on: 2022-06-28 22:36:20 This example provides the steps to build a simple user management app (from scratch!) using Supabase and Angular. It includes: Supabase Database: a Postgres database for storing your user data. Supabase Auth: users can sign in with magic links (no passwords, only email). Supabase Storage: users can upload a photo. Row Level Security: data is protected so that individuals can only access their own data. Instant APIs: APIs will be automatically generated when you create your database tables. By the end of this guide you'll have an app that allows users to log in and update some basic profile details: View more...To Shift Right, You Need ObservabilityAggregated on: 2022-06-28 20:51:20 In a world of shifting left, there is a growing movement: to shift right. I recently attended a panel discussion where the panelists (from tech companies in this space) debated and even insisted – that shifting right will actually allow you to deliver more value to your customers. Then, as they laid out their arguments, one thing became clear: In order to shift right without significant risk, you need extensive observability of your entire application stack. Shifting Left vs. Shifting Right First, what does it mean to shift left or right? Well, the shift-left movement came out of something we've known for many years: if you find a problem earlier, it costs less to fix it. The idea is to encourage your developers to do extensive testing, verify functionality in multiple levels of pre-production environments, and catch every issue you possibly can before it goes out to production. View more...Develop With Oracle Transactional Event QueuesAggregated on: 2022-06-28 18:36:20 This article provides a quick tour of Oracle's Transactional Event Queues (TEQ) and so attempts to cover as much as possible at a high-level while giving quick, low-level, and code examples at the same time. There is quite a bit of material, and there are multiple workshops related to TEQ and its use in modern application development and microservices that can be found at the end of this piece.This article corresponds to a 12-minute video that can be found here... Oracle Transactional Event Queues (previously known as Advanced Queueing) has been around and widely used for decades (long before Kafka) and is well-harden technology. Here is a timeline to give an idea. View more...How to Operationalize a Cloud Security SolutionAggregated on: 2022-06-28 18:06:20 Smooth and incremental operationalization of your cloud security platform ensures that your implemented solution will be fast to provide measurable value. But when it comes to operationalization, not all cloud security solutions are created equal. In this blog post, we discuss the obstacles and provide four actionable steps for successful operationalization. What Is Operationalization in Cloud Security? Cloud security operationalization is the process of turning the abstract concept of “cloud security” into an implemented solution that drives measurable value. When operationalizing a solution, Security teams seek to ensure it is tightly integrated into organizational processes and actively contributes to the organization’s security posture. A successfully operationalized cloud security solution helps reduce risk, save time, cover its own expense (and more), and be fast to value – all in a measurable way. View more...Machine Learning in CybersecurityAggregated on: 2022-06-28 16:36:20 What Is Machine Learning? Machine learning (ML) is a domain of computer science that allows computers to learn without having to be programmed directly. Machine learning is one of the most intriguing technologies ever discovered. Machine Learning in Security Thanks to machine learning (ML), computers may learn without being explicitly programmed. Machine learning works with computers to learn as humans do: by trial and error. The topic of artificial intelligence encompasses machine learning as a subset. View more...Top Salesforce Deployment Challenges and TipsAggregated on: 2022-06-28 14:36:20 As Salesforce organizations strive to improve IT delivery, making it faster, more quality-focused, and secure, they continue to face deployment challenges. Increased customer demands and high velocity releases every now and then are creating bottlenecks for Salesforce enterprises. This is where you need to recognize the Salesforce deployment challenges your team is facing and find ways to address them. In this article, we will dive into Salesforce deployment challenges, how to orchestrate Salesforce DevOps tools, and techniques to enhance efficiency and speed while maintaining the quality and security of your applications. View more...Is DataOps the Future of the Modern Data Stack?Aggregated on: 2022-06-27 23:21:20 Before DevOps took the software engineering world by storm, developers were left in the dark once their applications were up and running. Instead of being the first to know when outages occurred, engineers would only find out when customers or stakeholders complained of “laggy websites” or one too many 503 pages. View more...Internal Developer Platform in Plain EnglishAggregated on: 2022-06-27 21:51:19 Pros and Cons of Using Internal Development Platforms in the Cloud Computing World Internal Development Platform (IDP) is a brand new word in DevOps and product development. In this article, I’m explaining: What exactly IDP is How to involve it in your organization An overview of the existing IDP platforms on the market, their pros, and cons An example of IDP Architecture based on the Azure Cloud What Is an Internal Developer Platform? As a software architect, I design the DevOps processes and spend much time selecting the DevOps toolset, building pipelines, and communicating with the DevOps team to implement some procedures for the development team. We can solve this with the internal development platform (IDP). View more...Applying Domain-Driven Design Principles to Microservice ArchitecturesAggregated on: 2022-06-27 21:21:19 Microservices are the most scalable way of developing software. But you need a good design that lets developer teams work autonomously and deploy without stepping on each other's toes; otherwise, you lose most of the scalability benefits. Domain-Driven Development allows us to plan a microservice architecture by decomposing the larger system into self-contained units, understanding the responsibilities of each, and identifying their relationships. In this article, we'll learn the basics of Domain-Driven Design and how to apply it to microservices. View more...Which Backend Frameworks Are Impacting Web App Development Immensely?Aggregated on: 2022-06-27 19:36:20 Developing a successful web application is more like a group task. Deciding on the web development framework, programming languages, and efforts of the whole software development team bring to life an amazing project. To keep up with the ever-rising standards of businesses, the web and app development frameworks are becoming more complex and advanced. As you may already know, frameworks are of two types- front-end and backend. Front-end development is about developing the user interface of a website using HTML, CSS, and JavaScript. Front-end development enables the users to view and interact with the website. View more...Hard Things in Computer ScienceAggregated on: 2022-06-27 19:06:19 If you've more than a couple of years of experience in IT, you probably have stumbled upon the following quote: There are only two hard things in computer science: cache invalidation and naming things. View more...Progressive Delivery With Argo Rollouts: Blue-Green DeploymentAggregated on: 2022-06-27 18:06:19 Continuous integration (CI) and continuous delivery (CD) have been widely adopted in modern software development enabling organizations to quickly deploy these software to customers. But doing it in the right way is equally important, as in some cases, unfinished code can lead to failures and customers have to face downtime. To solve this, progressive delivery was introduced, which enables the delivery of software with the right changes to the right amount of customers at the right time. More precisely, it controls the speed at which changes are deployed for a software. Traditional CI/CD and Progressive Delivery Continuous integration (CI) is an automation process that helps in continuously integrating software development changes. It automates the building, testing, and validation of the source code. Its goal is to ultimately produce a packaged artifact that is ready to deploy. View more...Open Source Monitoring and Metrics LandscapeAggregated on: 2022-06-27 17:36:19 Metrics and managing and understanding them is an essential part of any modern complex application. As with any active and busy technical ecosystem, there is a proliferation of competing open source monitoring standards. A handful emerges as the most popular solutions. Slowly, the community creates a standard that most projects follow in some way. This article aims to help you navigate what’s available, what piece of the ecosystem puzzle an option fills, and crucially, how interoperable they are with each other. View more...SQL Database Schema: Beginner’s Guide (With Examples)Aggregated on: 2022-06-27 17:36:19 What Is a Database Schema? That’s actually a bit of a difficult question to answer! Like many database terms, database schema gets used in a variety of contexts. Depending on the context, it can mean different things. In the context of generally discussing a database and how it’s organized, the term database schema describes the structure of the data and how the elements within the database relate to each other. This information is often presented visually with diagrams that illustrate how different tables and elements connect to give you a logical view of the entire database. However, the schema itself exists in the database as the coded rules that define the data’s structure and relationships. View more...Practice on Pushing Messages to Devices of Different ManufacturersAggregated on: 2022-06-27 17:06:19 Push messaging, with the proliferation of mobile Internet, has become a very effective way for mobile apps to achieve business success. It improves user engagement and stickiness by allowing developers to send messages to a wide range of users in a wide range of scenarios: taking the subway or bus, having a meal in a restaurant, having a chat... you name it. No matter what the scenario is, a push message is always a great helper for you to directly "talk" to your users, and for your users to know something informative. Such great benefits brought by push messages, however, can be dampened by a challenge: the variety of mobile phone manufacturers. This is because usually each manufacturer has their own push messaging channels, which increases the difficulty for uniformly sending your app's push messages to mobile phones of different manufacturers. Of course there is an easy solution for this — sending your push messages to mobile phones of only one manufacturer — but this can limit your user base and prevent you from obtaining your desired messaging effects. View more...Correlation Between Fast TTM and ContainersAggregated on: 2022-06-27 16:36:19 TTM and Software Architecture One of the critical factors for business success is Time to Market (TTM). TTM is the length of time from the moment of idea creation, which could be a new product or business, to launching the final product or service to customers. Markets move fast and delayed TTM may ruin the whole business idea. Therefore it is no surprise that TTM is a metric all product owners and businesses are concerned with. The delayed-release can seriously impact the potential to benefit from business opportunities. TTM directly affects revenues, and the faster a product is launched, the bigger advantage a company has over its competitors. TTM varies by sector, with the technology industry experiencing some of the fastest TTMs. There are many ways in which an organization can shorten TTM. View more... |
|
|