News Aggregator


Hyperautomation: The Beacon for Your Digital Transformation Journey

Aggregated on: 2022-06-27 15:36:19

The concept of automation is constantly expanding as time passes. IT executives have already seen the potential of automation and how it makes the entire process smoother. They are now looking for new methods to use hyperautomation to fulfill digital transformation goals. As per a market study done by Global NEWSWIRE, in the next few years, the global hyperautomation market is expected to grow at a CAGR of more than 18.7 percent, attaining a value of more than US$ 32,632 million by 2030. The hyperautomation market has expanded fast across several business sectors (retail, manufacturing, BFSI, automotive, and so on), with the BFSI industry showing the most opportunity for hyperautomation application.

View more...

How to Get GDPR and Customer Communications Right

Aggregated on: 2022-06-27 04:51:19

The General Data Protection Regulation (GDPR) was big news for companies when it came into effect in 2018. It aimed to put more controls on how organizations manage the personal data of their EU-based users. Since the law’s enactment in 2018, some US states, such as California and Virginia, followed suit and passed their own data privacy laws for their respective residents. Companies that do business in those regions now have to ensure they comply with these legal requirements. This post is the third in a series about what developers need to keep in mind when sorting out security and compliance for their application. The first article in this series covered how to build security for user communications, the second was about compliance certifications and regulations for SaaS apps, and this one is all about GDPR and customer communications. GDPR and similar regulations cover all communications from a company to its customers and prospects, including marketing and transactional notifications. If you are considering sending notifications to the users of your SaaS application, whether via email, push, or a Slack bot, you need to keep GDPR in mind when building your service.

View more...

The Importance of Semantics for Data Lakehouses

Aggregated on: 2022-06-27 04:06:19

Data lakehouses would not exist — especially not at enterprise scale — without semantic consistency. The provisioning of a universal semantic layer is not only one of the key attributes of this emergent data architecture, but also one of its cardinal enablers. In fact, the critical distinction between a data lake and a data lakehouse is that the latter supplies a vital semantic understanding of data so users can view and comprehend these enterprise assets. It paves the way for data governance, metadata management, role-based access, and data quality.

View more...

The Advanced Risk of Basic Roles In GCP IAM

Aggregated on: 2022-06-26 13:06:19

Most GCP users know that granting basic roles is a really bad practice, but you may be surprised to learn that the risk is much more serious than it might seem because basic roles actually grant far more than what appears on the permissions list (which is already excessive, of course). For the owner role, we can assume that most project administrators are aware it includes the resourcemanager.projects.setIamPolicy permission which allows for straightforward privilege escalation and managing the risk accordingly. However, for Viewer or Editor, you could make the very reasonable assumption that even though the roles provide a wide set of permissions - spanning every resource type in a GCP project - at least they won’t allow anything else.

View more...

When Writing Code Isn't Enough: Citizen Development and the Developer Experience

Aggregated on: 2022-06-26 12:36:19

This is an article from DZone's 2022 Low Code and No Code Trend Report.For more: Read the Report What is citizen development? In this article, we define citizen development and dive into its impact on internal development practices and how software companies think about designing their developer experience.

View more...

Low Code and No Code: The Security Challenge

Aggregated on: 2022-06-25 20:36:18

This is an article from DZone's 2022 Low Code and No Code Trend Report.For more: Read the Report Many companies are looking to low-code and no-code platforms to build apps in the visual environment. They provide the opportunity for faster app development and reduce the dependence on highly skilled developers. Companies may hire less experienced or only minimally trained staff (I’ll call them citizen developers) to meet service gaps and to respond to skills shortages, ensuring their larger dev team can focus on more advanced projects. 

View more...

Vaadin Apps as Native Executables Using Quarkus Native

Aggregated on: 2022-06-25 17:21:18

JVM is a monster – in a good way. Its architecture and especially the super-optimized just-in-time-compiler (JIT) help Java byte-code apps to run at a performance that makes startups rewrite their entire software when they grow up. But this amazing piece of engineering doesn’t come without a price. Even small JVM applications are known to eat up a lot of memory and the start-up times of non-trivial JVM apps are – well – iconic. GraalVM is a newish JDK distribution coming from Oracle Labs. It uses partly the same codebase as the regular OpenJDK, a variant of which you most likely use on a daily basis, but focuses on performance and polyglot support. For JVM performance, GraalVM replaces the JIT compiler in the HotSpotJava Virtual Machine with a custom version that, especially in the enterprise edition, is expected to give significantly better performance (34%, according to their own benchmarks), including some memory savings. 

View more...

Securing Software Supply Chains on Kubernetes Using Nirmata and Venafi

Aggregated on: 2022-06-25 16:51:18

Securing software supply chains remains a top priority for DevOps teams. In a prior post, we discussed the A MAP framework for Kubernetes supply chain security.  In this post, we will discuss how supply chain security can be implemented using Nirmata Policy Manager and Venafi CodeSign Protect.  With supply chain attacks on the rise, securing the software supply chain has become a requirement for DevOps teams building cloud-native applications on Kubernetes. Signing the container image is typically the very first step in securing software supply chains. The modern application development and deployment process is highly automated with platforms like Kubernetes & Github at the heart of continuous integration (CI) and continuous delivery (CD) practices. Any additional steps required for signing and verifying container images need to be automated as well so that software development agility can be maintained. 

View more...

Terraform Controller: Cloud Resource Self-Service

Aggregated on: 2022-06-25 16:51:18

Kubernetes has been brilliant at delivering an ecosystem for developers, improving the velocity of shipping, bringing components under a common framework and DSL, coupled with the flexibility to expand and extend the offering. And so it beggars belief that speaking to customers, application dependencies and consumption is still a major bottleneck to progress, with teams blocked waiting on that database, queue, object store, and so forth. Thing is ...

View more...

Getting Started With RSocket Kotlin

Aggregated on: 2022-06-25 16:21:18

RSocket is a transport protocol designed for reactive applications. More information on RSocket can be found on their website, leaving me to focus on writing about how RSocket and Kotlin can be combined. RSocket has several libraries written in various languages that implement the RSocket protocol. For Kotlin, this comes as an extension for Ktor (a Kotlin client and web-server library) named rsocket-kotlin. We will look at this extension through this post.

View more...

Secure Proxy for HIPAA-Compliant API Analytics

Aggregated on: 2022-06-25 15:51:18

In HeathTech apps, it’s often the case that you’re dealing with private or health-related data. This requires compliance with regulations, such as HIPAA in the United States. These regulations force you to handle sensitive data in a well-defined manner, so only specific people can read it, and if they do, it should be logged for later auditing. To be compliant with HIPAA, technical and administrative safeguards must be implemented both within your company and in your app. The technical safeguards often lead to more complicated software architectures. So, it’s a good idea to make sure the extra engineering development work for HIPAA compliance is necessary before embarking. Alternatively, you could fall under one of the four cases where it’s safe not to comply with HIPAA.

View more...

Supabase and Ionic Vue Quickstart Guide

Aggregated on: 2022-06-25 15:51:18

This example provides the steps to build a simple user management app (from scratch!) using Supabase and Ionic Vue. It includes: Supabase Database: a Postgres database for storing your user data. Supabase Auth: users can sign in with magic links (no passwords, only email). Supabase Storage: users can upload a photo. Row Level Security: data is protected so that individuals can only access their own data. Instant APIs: APIs will be automatically generated when you create your database tables. By the end of this guide you'll have an app that allows users to log in and update some basic profile details:

View more...

Modern Application Security Requires Defense in Depth

Aggregated on: 2022-06-25 02:21:18

Perimeter security has been dying a slow death over the better part of a decade, as breaches of the corporate network have become commonplace. Most organizations now find it obvious that trusting devices and users merely for being "on the corpnet" is insufficient to maintain security in the face of evolving threats. At the same time, the re-platforming of business applications to a SaaS model, coupled with a more mobile and distributed workforce, has made the need to "VPN into a corpnet" feel archaic and cumbersome. The pandemic created the perfect storm around these two long-term trends, accelerating this slow death into a fast one. Adopting a zero-trust architecture is no longer negotiable for any organization that wants to stay alive.

View more...

Migrating Legacy Applications and Services to Low Code

Aggregated on: 2022-06-25 01:51:18

This is an article from DZone's 2022 Low Code and No Code Trend Report.For more: Read the Report Low code accelerates and optimizes software development with a visual approach. It automates the development process and makes it easier to deliver solutions by providing visual tools that simplify and democratize development. But low code isn't just for new projects. It's a good candidate for migrating legacy applications, too. When moving an existing application to low code, you shorten development time and effort, save money, and take a big step toward cloud migration. 

View more...

Demystifying Cloud-Native Data Management: Layers of Operation

Aggregated on: 2022-06-24 23:21:18

As containerized applications go through an accelerated pace of adoption, Day 2 services have become a here-and-now problem. These Day 2 services include data management functions such as backup and disaster recovery along with application mobility. In this new world of containerized cloud-native applications, microservices use multiple data services (MongoDB, Redis, Kafka, etc.) and storage technologies to store state and are typically deployed in multiple locations (regions, clouds, on-premises). In this environment, where legacy infrastructure or hypervisor-based solutions don’t work, what are the right constructs for designing and implementing these data management functions for cloud-native applications? How should you reason about the various data management options provided by storage vendors, data services vendors, and cloud vendors to decide the right approach for your environment and needs? This piece dives under the covers and addresses the pros and cons of various data management approaches across several attributes including consistency, storage requirements, and performance.

View more...

How to Build a Simple CLI With Oclif

Aggregated on: 2022-06-24 22:21:18

Salesforce developers have contributed much to the open-source community. Among their many contributions is an important, but perhaps lesser-known, project named oclif. The Open CLI Framework was announced in early 2018 and has since grown to become the foundation for the Salesforce CLI and the Heroku CLI. In this post, we will provide a brief overview of oclif, and then we’ll walk through how to build a simple CLI with oclif.

View more...

How To Use Open Source Cadence for Polling

Aggregated on: 2022-06-24 20:21:18

This guide is for developers and engineers of all levels looking to understand how polling works in Cadence, the relatively new (and fully open source) fault-tolerant stateful code platform originally developed by Uber (and now supported by others, including us at Instaclustr). This guide provides “Hello, World!” type examples based on simple scenarios and use cases.   What You Will Learn How to set up a simple Cadence polling application on Instaclustr’s Managed Service platform.  

View more...

Blind SQL Injection — Threat or Child's Play?

Aggregated on: 2022-06-24 18:51:18

One of the primary issues in the database world is SQL injection - it's prevalent to such an extent that even OWASP continuously lists it as the #1 threat targeting web applications. SQL injection can have many types, and one of these types is blind SQL injection - in this blog post, we will go through just how harmful such an attack can be. What Is SQL Injection? What Are Its Categories? SQL injection is the main attack directed at databases - an application is vulnerable to SQL injection when an input provided by a user is forwarded straight into a database without being sanitized and properly dealt with.

View more...

No-Code/Low-Code Use Cases in the Enterprise

Aggregated on: 2022-06-24 18:21:18

This is an article from DZone's 2022 Low Code and No Code Trend Report.For more: Read the Report In a world of Facebook, Twitter, YouTube, and other ubiquitous, individual-user applications, enterprise applications have taken a quiet background role in the minds of average users and even many software developers. Despite being underhyped, enterprise applications are the foundation that underpins many of the necessities and amenities that we take for granted in our lives. From hospitals to municipal governments and businesses, enterprise applications are at the heart of what drives our economies and non-profits. 

View more...

Progressive Web Apps vs Native Apps: Differences and Similarities

Aggregated on: 2022-06-24 17:21:18

It's working great! People can easily access our services from multiple devices; what more do we need?' said every person who, at one point in time, was asked if a mobile application is necessary for their existing web application. What comes next after your responsive website?  What Is a Responsive Web Application? A responsive web app is a website application whose design and development are centered on the idea that the site should adapt to the device. This means that the website should respond to the size, platform, and orientation of the users' devices.

View more...

Component Testing of Frontends: Karate Netty Project

Aggregated on: 2022-06-24 15:51:18

In my previous article, I highlighted the nature of component tests. Their scope should be a single executable where all external dependencies have been replaced by configurable test doubles. Rich front-end applications are a good candidate for such tests. The backend they interact with should return predictable and easily configurable responses to cater to relevant test scenarios. The real backend is usually not cut out for that task. In this continuation, I will therefore look in some more detail at the Karate Netty project. It must be worth the effort to set up a mock server over just using the actual backend. If it is awkward to set up and hard to learn, it may be more prudent not to use mock at all and run your tests in an end-to-end fashion. But that only works when the backend is lightweight and can run on a local machine. In the most complex microservices environments, that is hardly the case anymore.

View more...

How Low Code Demands More Creativity From Developers

Aggregated on: 2022-06-24 04:51:17

This is an article from DZone's 2022 Low Code and No Code Trend Report.For more: Read the Report Yes, engineering is a science, but it's more and more an art, too. Developers must be at least as creative as the next hacker — and they need to cultivate user empathy. That's why organizations benefit from automating the minutia, allowing devs to focus on novel problem-solving. This is where the promise of no-code and low-code development comes in — not to replace developer jobs, but to transform them into knowledge worker roles. Read on to learn about the no-code/low-code movement, how it fits into your work as a developer, and where it's heading. 

View more...

Secure Your WSO2 Micro Integrator Deployment

Aggregated on: 2022-06-23 22:21:17

WSO2 Micro Integrator (for short, let's use MI) is an integration solution that is widely used in enterprise integration. You can use MI  to implement mediation policies, message transformation, security, and more. In this article, we are going to focus on how you can securely place MI on your deployment. First Things First WSO2 MI comes with a default keystore that is used in many cryptography-related features including SSL, mutual SSL, and password encryption. Since this is a public one, you should make sure that you have generated a new keystore and truststore for the MI.

View more...

Monolith vs Microservices architecture: Split or Not to Split?

Aggregated on: 2022-06-23 21:06:17

What Is a Microservice Architecture and Why It Is Often Chosen Currently, the software paradigm is represented by two types of solutions: microservices and monolithic architecture. In general, microservices architecture represents an application as a collection of small, loosely coupled services. In this kind of solution, the complexity is moved to the level of coordination of services. Each service represents one business capability that makes it easier to locate the code. Whereas monolithic architecture assumes several discrete functions composed into a single unit that is tested, deployed, and scaled as a whole. All components are interdependent and often cannot run separately. That also means a bug in a module can slow down or break the entire application.

View more...

What Is Edge Compute? It’s Kind of Like Knitting Dog Hats

Aggregated on: 2022-06-23 21:06:17

I’ve been trying to come up with a good explanation of what exactly “edge compute” is and for reasons I don’t need to justify to you, I’ve landed on the analogy: it’s like selling knitted hats for dogs. Why knitted dog hats? Because they’re hilarious!

View more...

Testing Your Infrastructure as Code Using Terratest

Aggregated on: 2022-06-23 19:36:17

Setting Up infrastructure manually can be a time-consuming and hectic process. That is when we can make use of Infrastructure as Code (IaC) tools to automate the infrastructure. IaC automation can be done for any kind of Infrastructure i.e, virtual machine, storage, etc. As more and more infrastructure becomes code, it is essential to have unit and integration tests for your IaC. We will briefly discuss what is IaC and testing your Infrastructure code mean. Then we deep dive into how we can use Terratest for IaC testing. Let’s begin, shall we?

View more...

Getting Started With Serverless Application Architecture

Aggregated on: 2022-06-23 19:36:17

The serverless model can free technical teams from the more monotonous development work, allowing them to focus on innovation. And using a serverless database to build cloud-native apps amplifies such benefits due to its ability to scale without being hindered by fragmented data across independently deployed services.This Refcard dives straight into building a serverless Java web application. You'll find a list of tools needed to follow the tutorial as well as comprehensive step-by-step instructions, code snippets, and a companion repository for the sample serverless application.

View more...

What Emerging Technologies Make Data Centers More Energy Efficient?

Aggregated on: 2022-06-23 18:06:17

The looming energy crisis is a black spot for industries where power consumption is commonly excessive and difficult to manage, the chief example being modern data centers. These facilities consume 10 to 50 times more energy per floor space than your average office building. While achieving an energy-efficient data center is possible, even the most sophisticated energy management initiatives are not without difficulties. One of the best solutions is to adopt emerging technologies — which require using even more energy, albeit efficiently — such as the Internet of Things and connected sensors. A quick review is necessary to understand how they can help better reduce, mitigate and manage power consumption.

View more...

Experiences at KUBECon Europe and Advice for Trade Shows

Aggregated on: 2022-06-23 17:36:17

KUBECon Europe was last month and took place in Spain. That's obviously a long haul from North Carolina. We were fortunate enough to have a DZone Core member, Xavier Portilla Edo. that lived in town. He went on our behalf and helped us produce a news roundup from the KUBECon Europe show floor.   KUBECon is run by The Cloud Native Computing Foundation. The CNCF is a vendor-neutral organization working to promote cloud-native computing. They hold annual events the world over to help companies improve their applications and streamline their workflows using the latest cloud computing tech. 

View more...

Kubernetes Service Types Explained In-Detail

Aggregated on: 2022-06-23 15:21:17

Kubernetes has emerged as a powerful tool to manage and scale cloud-native applications. Organizations need to deploy their software quickly, leveraging highly scalable and always available capabilities to maintain zero downtime. As more applications are containerized and deployed, it becomes increasingly complex for any organization to manage these containers. Hence, scaling becomes an issue. This is where Kubernetes shines. With Kubernetes, you can easily automate, deploy, scale, and monitor your applications. If you’ve read any documentation about Kubernetes services and networking, you’ve probably come across the terms ClusterIP, NodePort, LoadBalancer, and Ingress. There seems to be a lot of confusion around these terms, and you must understand the difference before you start building your next Kubernetes-based application.

View more...

Understand Source Code — Deep Into the Codebase, Locally and in Production

Aggregated on: 2022-06-23 15:21:17

Say you have a new code base to study or picked up an open-source project. You might be a seasoned developer for whom this is another project in a packed resume. Alternatively, you might be a junior engineer for whom this is the first “real” project. It doesn’t matter!

View more...

Writing Beautiful, Optimized, and Better .NET Code With NDepend Static Analysis

Aggregated on: 2022-06-23 03:51:17

Over the years, I’ve been in various discussions regarding the benefits of clean architecture, best practices, techniques such as code reviews, unit tests, etc., and I think to some degree, most of us are aligned on the reasons behind it. Having a clean architecture or code-base not only makes your development team happier, but it has a far-reaching impact on the business itself. In this post, we will learn about NDepend, which is described on their website as the following:

View more...

The Developer's Guide to SaaS Compliance

Aggregated on: 2022-06-22 22:06:17

As SaaS applications usually collect and process sensitive user information, keeping this information secure is key to building user trust and ensuring long-term business success. One of the ways for SaaS providers to communicate how exactly their users’ data is kept safe is through compliance with security and privacy standards. Compliance certifications are an effective way to communicate that you’re meeting industry standards and handling user data in alignment with customer expectations, all through a standardized report that customers know how to read. This post is the second in a series about what developers need to keep in mind when sorting out security and compliance for their applications. The first article in this series covered how to build security for user communications, and in this one, we will review what kinds of compliance certifications and regulations exist for SaaS applications, what these certifications mean for developers, and how to begin the certification process for compliance standards.

View more...

Exhaustive JUNIT5 Testing with Combinations, Permutations, and Products

Aggregated on: 2022-06-22 21:36:17

Test Support Libraries There are many libraries that make testing better in different aspects. Here are some of them: Agitar One Agitator automatically creates dynamic test cases, synthesizes sets of input data, and analyzes the results.

View more...

Blocking Ads on Your Network Using Raspberry Pi 3 + Fedora + Pi-hole

Aggregated on: 2022-06-22 21:21:16

This article proposes how to build a device to block advertisements on the network using Linux and Pi-hole on Raspberry Pi 3. The equipment needed to build the device, configured software, and use will be described in the next sections. Requirements The following are hardware and software requirements to run the tutorial.

View more...

Container Orchestration Tools Comparison

Aggregated on: 2022-06-22 21:06:17

Containers have become increasingly popular as software development shifts from traditional methods to cloud-native development and DevOps. In a containerized environment, a single instance of an operating system is shared across apps. For those more familiar with virtual machines, it’s useful to remember that each VM contains its own instance of a full operating system and is intended to operate as if it were a standalone server — hence the name.

View more...

Apache Kafka Patterns and Anti-Patterns

Aggregated on: 2022-06-22 20:36:16

Apache Kafka offers the operational simplicity of data engineers' dreams. A message broker that allows clients to publish and read streams of data — Kafka has an ecosystem of open-source components that, when combined together, help store, process, and integrate data streams with other parts of your system in a secure, reliable, and scalable manner. This Refcard dives into select patterns and anti-patterns spanning across Kafka Client APIs, Kafka Connect, and Kafka Streams, covering topics such as reliable messaging, scalability, error handling, and more.

View more...

A Brief History of the DMCA

Aggregated on: 2022-06-22 20:36:16

What Is the DMCA? The DMCA is short for the Digital Millennium Copyright Act. On Oct 12, 1998, the US Congress passed the DMCA, which amended U.S. copyright law to address important issues of the relationship between copyright and the internet.

View more...

Legacy Modernization and Hybrid Cloud with Kafka in Healthcare

Aggregated on: 2022-06-22 20:06:16

IT modernization and innovative new technologies change the healthcare industry significantly. This blog series explores how data streaming with Apache Kafka enables real-time data processing and business process automation. Real-world examples show how traditional enterprises and startups increase efficiency, reduce cost, and improve the human experience across the healthcare value chain, including pharma, insurance, providers, retail, and manufacturing. This is part two: Legacy modernization and hybrid multi-cloud. Examples include Optum / UnitedHealth Group, Centene, and Bayer. Blog Series - Kafka in Healthcare Many healthcare companies leverage Kafka today. Use cases exist in every domain across the healthcare value chain. Most companies deploy data streaming in different business domains. Use cases often overlap. I tried to categorize a few real-world deployments into different technical scenarios and added a few real-world examples:

View more...

MACH Architecture Explained

Aggregated on: 2022-06-22 20:06:16

Lately, the digital ecosystem has been highly platform-centric.  For a majority of organizations, it looks something like this - A monolith application at the center serves all the different touchpoints and integrates with several back-end and third-party systems for additional functionalities.

View more...

Classification of Neural Networks in TensorFlow

Aggregated on: 2022-06-22 19:36:16

What Is TensorFlow? TensorFlow is a library resource that comes under machine learning and artificial intelligence. The Google Brain team introduced it in the year 2015. It is a framework used for machine learning and deep learning. The languages used to develop TensorFlow are Python, CUDA, and C++. It supports platforms such as Windows, Android, Linux, JavaScript, and macOS. Using TensorFlow, developers design graphs and structures that consist of nodes, performed by mathematical calculation.  According to the user's choice, developers can use TF in Python or JavaScript. 

View more...

Major PostgreSQL Features You Should Know About

Aggregated on: 2022-06-22 18:06:16

If you are already familiar with other SQL databases but new to PostgreSQL, then this article is perfect for you. It will help you understand the nuances and get started with PostgreSQL. Note: Most comparisons in this article are targeted towards MySQL since it is the closest open source database that PostgreSQL can be compared against.

View more...

Spring, IoC Containers, and Static Code - Design Principles

Aggregated on: 2022-06-22 16:36:16

In this article, I would like to discuss the inversion of control patterns, static code (can be legacy or newly created) within an IoC framework like spring, and the issue of wiring utility methods in static code inside the IoC framework. Static Methods For example, we have an HttpUtils class with inside a bunch of static methods. Should we remove the static keyword and annotate the class with a Spring stereotype, which would immediately turn it into a spring singleton?

View more...

Handling Multiple Browser Windows and Tabs in Selenium PHP

Aggregated on: 2022-06-22 15:51:16

One of the common scenarios in a web application (or a web app) is opening up a new browser window (or tab) once the user performs a specific activity. Many web developers use the HTML tag ‘__blank’ that informs the browser to open a new window (or tab, depending on the user’s set preference) when a link is clicked. Handling Windows in Selenium with PHP can be used for automating interactions with browser windows, tabs, and even pop-up windows. Pop-up windows can "sometimes" be annoying for website visitors, but sometimes, you have no other choice than to use the same. How does Selenium differentiate between different windows or tabs? How can automation be used to switch between different browser windows or tabs seamlessly? How do you manage window handling in Selenium?

View more...

Common Types Of Network Security Vulnerabilities In 2022

Aggregated on: 2022-06-22 15:21:16

Cyber attacks become more and more sophisticated every year and cause serious financial and reputational damage. The damage affects all means of communication and blocks an organization for an extended period. For example, two of the most significant encryption viruses are Petya and Wanna Cry. They caused millions of losses in different areas of business around the world and showed the vulnerability and insecurity of the network infrastructure of even large companies. The protective measures were simply not provided. In most organizations, information security was limited at best to the installation of the antivirus. At the same time, there are hundreds of types of attacks that might occur every day, and the power of the consequences is only growing. Network Security Vulnerabilities You Should Pay Attention to in 2022 There are a lot of varieties of network attacks. Here are just the most common, which can face both small businesses and large corporations in 2022:

View more...

Implementing HIPAA Technical Safeguards in Your API Platform

Aggregated on: 2022-06-22 13:21:16

The Health Insurance Portability and Accountability Act, or HIPAA for short, is a set of laws around handling health-related data in information systems. It defines safeguards, which are rules you have to follow when handling health data for your customers. There are three safeguard categories:

View more...

Top ALM Tools and Solutions Providers

Aggregated on: 2022-06-22 00:36:16

A good application lifecycle management (ALM) package has software that is able to carefully manage and monitor all aspects of software development.  ALM applications provide tools for managing and completing the phases of design, development, testing, deployment, and ongoing enhancements.   With an ALM solution in place, organizations can significantly improve the way they design, build, test, and adapt their software.  Greater customer satisfaction, speed of development, and reduction of cost is the often the result. Top ALM Tools: VersionOne

View more...

ETL/ELT on Kubernetes With Airbyte

Aggregated on: 2022-06-22 00:36:16

There are a lot of different approaches working for a spot in an attempt to solve ETL/ELT on Kubernetes. Considering that the cloud-native landscape is built for deploying Dockerized, open-source software, many of the closed-source solutions don’t align with the trajectory of the community. In this DoKC session, Airbyte's senior developer advocate, Abhi Vaidyanatha, discusses how they implemented strategies as his team launched their K8s beta from the nuances behind deploying an ETL/ELT pipeline. Abhi further solidifies their development insights in accordance with the final implementation of their architecture.

View more...

5 Ways to Optimize Your CQL Queries for Performance

Aggregated on: 2022-06-22 00:06:16

You’ve finalized the development of your twitter-killer app. You heard of NoSQL databases and decided to use ScyllaDB for its sub-millisecond writes and high availability. The app looks also great! But then, you get an email from your colleague telling you there are issues with the load tests. ScyllaDB Monitoring Dashboard: CQL

View more...

No Code Expectations vs Reality

Aggregated on: 2022-06-22 00:06:16

Since its conception, no-code has indeed changed and innovated how developers create ground-breaking and life-changing apps that change their lives along with it. One significant change no-code brought was its usability; even ordinary people with little to no knowledge about coding can now create apps of their own. These newbies are now commonly known as 'citizen developers.’ In the simplest of statements, no-code has genuinely paved the way toward innovation and success in terms of app development. Along with this trend that has spread and is continuously spreading like wildfire, many expectations that became misconceptions have sprung from this revolutionary movement. Today, we talk about some of the initial expectations about no-codes and shed light on the reality behind these misconceptions. We are not here to debunk any of these claims but rather to inform and educate on what revolves around these notions and state only the facts. Let's go.

View more...