News Aggregator


Model Quantization for Edge AI

Aggregated on: 2022-06-22 00:06:16

Deep learning is witnessing a growing history of success. However, the large/heavy models that must be run on a high-performance computing system are far from optimal. Artificial intelligence is already widely used in business applications. The computational demands of AI inference and training are increasing. As a result, a relatively new class of deep learning approaches known as quantized neural network models has emerged to address this disparity. Memory has been one of the biggest challenges for deep learning architectures. It was an evolution of the gaming industry that led to the rapid development of hardware leading to GPUs, enabling 50 layer networks of today. Still, the hunger for memory by newer and powerful networks is now pushing for evolutions of Deep Learning model compression techniques to put a leash on this requirement, as AI is quickly moving towards edge devices to give near to real-time results for captured data. Model quantization is one such rapidly growing technology that has allowed deep learning models to be deployed on edge devices with less power, memory, and computational capacity than a full-fledged computer. How Did AI Migrate From Cloud to Edge? Many businesses use clouds as their primary AI engine. It can host required data via a cloud data center for performing intelligent decisions. This process of uploading data to cloud storage and interaction with data centers induces a delay in making real-time decisions. The cloud will not be a viable choice in the future as demand for IoT applications and their real-time responses grows. As a result, AI on the edge is becoming more popular.

View more...

Making Your Own Express Middleware

Aggregated on: 2022-06-21 21:21:16

Express is a common way to display static routes to a user. It is even more commonly used to create APIs for Node.JS. In Express, it's easy to define a URL and what will happen at that URL. We can also define middleware, which runs before the final request is returned. This can let us to alter the request and do it in a standard way across many routes. If you've used Express, you may have already used pre-built middleware like bodyParser or jsonParser. In this guide, let's look at how you can create your own custom middleware.

View more...

10 Programming Habits a Web Developer Should Embrace

Aggregated on: 2022-06-21 20:51:16

Technology evolves. And programmers who don’t grow professionally get left behind. Naturally, they must have the hard technical skills required of a programmer, such as the languages involved. But having a firm grasp of data structures and algorithms and web development is just the minimum.

View more...

Build a Data Pipeline on AWS With Kafka, Kafka Connect, and DynamoDB

Aggregated on: 2022-06-21 20:51:16

There are many ways to stitch data pipelines: open source components, managed services, ETL tools, etc. In the Kafka world, Kafka Connect is the tool of choice for "streaming data between Apache Kafka and other systems." It has an extensive set of pre-built source and sink connectors as well as a common framework for Kafka connectors, which standardizes integration of other data systems with Kafka and makes it simpler to develop your own connectors, should there be a need to do so. This is a two-part blog series that provides a step-by-step walkthrough of data pipelines with Kafka and Kafka Connect. I will be using AWS for demonstration purposes, but the concepts apply to any equivalent options (e.g., running these locally using Docker). Here are some of the key AWS services I will be using:

View more...

Artificial Intelligence (AI) And Its Assistance in Medical Diagnosis

Aggregated on: 2022-06-21 20:06:16

Artificial Intelligence (AI) is a phrase that can be found in practically every business, not just in manufacturing and logistics but also in education, cybersecurity, and many other areas. AI in healthcare was once misunderstood as a competitor to medical experts, but it is today recognized as a second helping hand of professionals that never rests. Artificial Intelligence (AI) in medical diagnostics and healthcare, with its aid and efficiency, gives dependable support to overworked medical practitioners and institutions, reducing workload pressure and increasing practitioner efficiency.    According to research by the Institute of Medicine of the National Academies of Science, Engineering, and Medicine (NASEM), diagnostic errors cause around 10% of patient deaths. They account for almost 17% of hospital problems. However, NASEM said that these challenges are not caused by professional ignorance but rather by a combination of variables such as ineffective communication between patients and organizations, human mistakes, and others. 

View more...

API Security Weekly: Issue 165

Aggregated on: 2022-06-21 08:21:15

This week, we have news of another high severity vulnerability in a WordPress plugin, this time the popular All in One allowing compromise via the core REST API. We also have views from @apihandyman on why to treat all APIs as public ones, a comprehensive beginner's guide to API security, and finally an optimistic view from Forbes on how enterprises can achieve speed and security by adopting Zero Trust and APIs. Vulnerability: High Severity Vulnerability in the All in One WordPress Plugin Vulnerabilities in WordPress plugins have featured frequently in this newsletter (here and here) and again this week we feature a pair of high-severity vulnerabilities in the popular All in One plugin. The first vulnerability CVE-2021-25036 allows for access to high privilege API endpoints via a privilege escalation attack, whilst the second vulnerability CVE-2021-25037 allows for SQL injection via API endpoints.

View more...

What Are Microservices?

Aggregated on: 2022-06-21 02:51:15

Beloved by tech giants like Netflix and Amazon, microservices have become the new darlings in modern software development, even though they are more than a decade old. But, despite the benefits, this paradigm is easy to get wrong. So, let's explore what microservices are and, more importantly, what they are not. What Are Microservices? The microservice architecture is a software design approach that decomposes an application into small independent services that communicate over well-defined APIs. Since each service can be developed and maintained by autonomous teams, it is the most scalable method for software development.

View more...

C++ Creator Bjarne Stroustrup Interview

Aggregated on: 2022-06-21 02:21:15

We had a great talk with Bjarne Stroustrup, the designer and original implementer of C++. He is also the author of The C++ Programming Language (Fourth Edition), A Tour of C++ (Second Edition), Programming: Principles and Practice Using C++ (Second Edition), and many popular academic publications. Enjoy the full interview below!

View more...

Troubleshooting HTTP 502 Bad Gateway in AWS EBS

Aggregated on: 2022-06-20 21:51:15

The application that we are going to discuss in this post was running on Elastic Beanstalk (EBS) service in Amazon Web Services (AWS). Intermittently this application was throwing an HTTP 502 Bad Gateway error. In this post, let’s discuss how we troubleshoot and resolve this HTTP 502 bad gateway error in the Elastic Beanstalk service. AWS Elastic Beanstalk Architecture This application was running on AWS Elastic Load Balancer, Nginx 1.18.0, Java 8, Tomcat 8, and Amazon Linux in AWS Elastic BeanStalk service (EBS). For the folks who are not that familiar with EBS, below is its high-level architecture. 

View more...

SSH Tutorial: Nice and Easy [Video]

Aggregated on: 2022-06-20 20:51:15

Ever looked for a practical crash course on SSH that is fun and entertaining at the same time? Then have a look at this brand-new episode of "Marco Codes: SSH Tutorial - Nice & Easy." In this video, you'll learn how to use: SSH on the command line, which includes creating keypairs with various algorithms SCP to copy/download files SSH-agents to improve keyfile handling SSH config files to properly manage your SSH target hosts SSH keys to checkout repositories from GitHub  You will also explore advanced topics like SSH agent forwarding, SSH tunneling, and using password managers for maximum comfort.  

View more...

How Template Literal Types Work in TypeScript

Aggregated on: 2022-06-20 20:21:15

Template Literals are common in JavaScript: they let us easily combine variables and strings in JavaScript. TypeScript also introduces the concept of Template Literal Types, where we can enforce types on the inputs for Template literals. That gives us controls to ensure that text is in a certain format. Let's look at how they work. Template Literal Types in TypeScript A perfect example of when a template literal type might be useful is for creating IDs of certain formats. For example, let's say we have an ID that starts with 'ga-' or 'ua-', followed by a string or number. We can define a new type using type literals for that like so:

View more...

Build a Business-Led API Strategy and Get the Most Out of Your APIs

Aggregated on: 2022-06-20 19:51:15

APIs are known to unlock opportunities for businesses. They can help businesses innovate at a faster pace, create new revenue opportunities, automate back-end operations, and more. According to Luis Weir, author of the book "Enterprise API Management," more companies need to realize the business value of APIs by creating their own business-led API strategy. During an interview on the Coding over Cocktails podcast, Weir said that organizations finding and realizing their API strategies should be a number one priority and that they should use these technologies to understand the business problem that they’re trying to solve.

View more...

Python vs PHP Which Technology Will Dominate in the Future

Aggregated on: 2022-06-20 16:36:15

Programming is currently one of the most in-demand skills. Since learning a programming language is difficult and hardly everyone is successful, specialists in this field earn a substantial income. There are now a vast number of programs and technologies that enable the rapid development of a variety of applications, websites, and other web-based products. In addition, you can construct several of them without any particular expertise. A user can acquire programming abilities by utilizing website constructors and other tools that facilitate the creation of their first web service.

View more...

How to Gain Competitive Advantage in Software Development With Innovative Technology?

Aggregated on: 2022-06-20 15:36:15

Continuous tech innovation is the new and persistent reality for businesses now. Companies are growing exponentially while automating their business workflows, streamlining business processes and smart marketing strategies, and delivering impeccable digital experiences to end customers. The evolving top-notch technologies, increasing business needs, and changing market trends have created a new era of digitalization.

View more...

The Power of Enum: Make Your Code More Readable and Efficient [Video]

Aggregated on: 2022-06-20 15:36:15

Like any other language, Java has the enum feature that allows us to enumerate items. It is helpful to list delimited items in your code, such as the seasons. Regarding the readability of code, it is better and cleaner than using constant codes such as int. It avoids mistakes, such as an invalid number or a value the system does not support. Once we're talking about any number type such as int, float, double, or long, enum can support any value. On the other hand, with an enum, the API only has valid values.   The question is: Can we do more with enum? Where else can we use an enum?  In this article, discover tips that are excellent and effective in Java. 

View more...

8 Must-Have Project Reports You Can Use Today

Aggregated on: 2022-06-20 03:51:15

Knowing exactly what state your project is in is important.  You'll need to report on the progress of each assignment and summarize what's been completed so far. You should start keeping track of these as soon as you begin planning any project because chances are, you'll forget something or think of something completely different by the time the task is finished.  If everything goes according to plan, then great! However, chances are good that you'll miss a deadline or a small detail will turn out to be more complicated than expected. 

View more...

How to Translate Value to Executives Using an Outcome-Driven Mindset

Aggregated on: 2022-06-19 23:06:14

An IT project is never an end in itself, but a means to attain a business objective. In this day and age, when leaders and decision-makers are exposed to buzzwords, frameworks, and tech trends constantly, it is more important than ever to take a step back and reflect on the business goal before deciding on the technological way to get there. Decades after the advent of information technology, the challenge remains the same: to successfully apply IT practices that improve revenue streams and unlock new DevOps opportunities. Organizations urgently need to establish frameworks to manage information systems and apply them to daily operations, contributing to delivering business value and improving economic performance.

View more...

Chef InSpec: Where Compliance and Security Blend

Aggregated on: 2022-06-19 18:21:14

Overview  As your applications grow and become more complex, so can your worries about the risks to your environments and ensuring they comply with your system policies and regulatory standards. While administrators deal with audits and other routine work, they also need to work on planned projects.   DevSecOps teams could manage their endpoints with existing tools for small fleets of devices, but challenges arise when you begin to scale. This is where Chef InSpec comes into the picture. 

View more...

Revoking Access to JWTs With a Blacklist/Deny List

Aggregated on: 2022-06-19 17:51:14

Depending on who you listen to, JWTs are either a panacea for all your authentication problems or should be avoided like the plague.  What Is a JWT? A JWT, or JSON Web Token, is a string/token issued by the server that asserts properties contained in its “payload”. Its most common use case is for authentication (OAuth 2.0 + Open ID Connect) and session management.

View more...

My Sentiments, Erm… Not Exactly

Aggregated on: 2022-06-19 17:51:14

This article is an excerpt from the book Transformers for Natural Language Processing, Second Edition. This edition includes working with GPT-3 engines, more use cases, such as casual language analysis and computer vision tasks, and an introduction to OpenAI's Codex. Have a look at the following sentence:

View more...

Pub/Sub Design Pattern in .NET Distributed Cache

Aggregated on: 2022-06-19 17:21:14

The publish-Subscribe pattern also known as Pub/Sub is an indispensable tool for building enterprise-grade .NET applications. Just to refresh your memory, Pub/Sub is a messaging paradigm where the senders of messages (publisher) do not have any knowledge about the intended recipients (subscribers). Moreover, the publisher and subscriber applications do not interact with each other directly but instead depend on a common medium known as a topic. Hence, it's a loosely coupled messaging model. Now, assume that you have multiple applications of different roles deployed within the same architecture and they need a mechanism to inform/notify each other about certain events. These events could either be transient (due to changes made on the run time) or database events (due to changes in the database). That's exactly where the publish-subscribe design pattern will help you to enable distributed events.

View more...

Building a QR Code Generator with Azure Functions

Aggregated on: 2022-06-19 16:51:14

Here's a fun project if you want to learn how to build Azure Functions. This project is going to be a little silly but educational. We will build a QR Code Generator that runs 100% within an Azure function. There are thousands of QR Code generators on the internet, so this is a silly exercise, but I wanted to push the limits of what an Azure Function can do, show you how cool they are, and inspire you to build cool stuff with them.

View more...

12 Modern CSS Techniques For Older CSS Problems

Aggregated on: 2022-06-19 15:51:14

Discovering modern CSS techniques is one of the best ways to spruce up the overall web design process. If you’ve been working with CSS, you might have encountered a few layouts or cross-browser compatibility issues. For example, CSS3 styles do not work with legacy versions of Internet Explorer. Still, there are many instances where we want to use a feature and discover it is not supported or behaves differently among browsers. Therefore while working on web development technologies, browser compatibility testing of websites and web apps is also important. However, as web technologies evolve, developers are striving to figure out how to cope with other issues as well. For example, leverage other libraries to optimize the loading time of a heavily loaded website or make the div tags more responsive without relying much on Bootstrap. With the evolving and increasing challenges, CSS has evolved as well.

View more...

Spelling “Equality” With IT: Addressing the Gender Gap in the Tech Industry

Aggregated on: 2022-06-19 15:51:14

Without a doubt, women are the minority in a lot of industries. From the general workforce up to the management levels, McKinsey’s “Women in the Workplace 2021” report tells us that women are still very much underrepresented in corporate America. From their findings, white women make up 30% of the entry-level workforce while white men make up 35%. In more stark comparison, white men make up 62% of the C-Suite population while white women only make up 20%. An even wider gap was seen for women of color, making up only 17% of the entry-level workforce and a measly 4% for the C-Suite levels.

View more...

Anypoint CLI Commands in MuleSoft

Aggregated on: 2022-06-19 00:06:14

Introduction Anypoint CLI is a scripting and command-line tool for both Anypoint Platform and Anypoint Platform PCE. We will be using Anypoint CLI commands for Anypoint Platform accounts, API Manager, CloudHub applications, design center projects, and exchange assets. Prerequisites NodeJS and npm Git management system Installation Verify the npm version with the command npm -version Anypoint CLI installation npm install -g anypoint-cli@latest Authentication You can configure Anypoint CLI authentication with username and password, client ID and client secret, or a bearer token. At least one method is required.

View more...

Streaming ETL with Apache Kafka in the Healthcare Industry

Aggregated on: 2022-06-18 22:36:14

IT modernization and innovative new technologies change the healthcare industry significantly. This blog series explores how data streaming with Apache Kafka enables real-time data processing and business process automation. Real-world examples show how traditional enterprises and startups increase efficiency, reduce cost, and improve the human experience across the healthcare value chain, including pharma, insurance, providers, retail, and manufacturing. This is part three: Streaming ETL. Examples include Babylon Health and Bayer. Blog Series - Kafka in Healthcare Many healthcare companies leverage Kafka today. Use cases exist in every domain across the healthcare value chain. Most companies deploy data streaming in different business domains. Use cases often overlap. I tried to categorize a few real-world deployments into different technical scenarios and added a few real-world examples:

View more...

Five Tips to Fasten Your Skewed Joins in Apache Spark

Aggregated on: 2022-06-18 20:06:14

Joins are one of the most fundamental transformations in a typical data processing routine. A Join operator makes it possible to correlate, enrich and filter across two input datasets. The two input datasets are generally classified as a left dataset and a right dataset based on their placing with respect to the Join clause/operator. Fundamentally, a Join works on a conditional statement that includes a boolean expression based on the comparison between a left key derived from a record from the left dataset and a right key derived from a record from the right dataset. The left and the right keys are generally called ‘Join Keys’. The boolean expression is evaluated against each pair of records across the two input datasets. Based on the boolean output from the evaluation of the expression, the conditional statement includes a selection clause to select either one of the records from the pair or a combined record of the records forming the pair.

View more...

Using PHP Headers When Serving JSON Data

Aggregated on: 2022-06-18 17:36:14

Web browsers and other similar applications rely on headers to understand the content being served to them by a web server. While modern browsers will try to “guess” what format content is in and intelligently format it, it’s still good practice to use headers to ensure your application’s output is handled correctly. When sending a JSON Payload, the header is set using the following PHP code:   header('Content-type: application/json');

View more...

The Definitive Guide to Developing Portable Tizen Apps

Aggregated on: 2022-06-18 16:21:14

Russian (русский) Translation available Table of Contents

View more...

What's the Difference Between Static Class vs. Singleton Patterns in C#?

Aggregated on: 2022-06-18 16:21:14

When developing apps with C# in the .NET framework, you have a choice between two single, shared class instances. Whether you decide to use a static keyword or a singleton design pattern depends on several factors, which are outlined in the article below.           Key Differences Between Static Classes and Singleton Patterns Put simply, a singleton is a pattern while a static class is a keyword. This means you can create one, persistent instance across an application’s entire lifespan with a singleton. The nifty thing about singletons is that a single instance can be used as a parameter for other methods. On the other hand, static classes only permit static methods and can’t be passed as parameters. 

View more...

JIT Compilation of SQL in NoSQL

Aggregated on: 2022-06-18 15:51:14

Hi everyone! My name is Georgy Lebedev, and I'm a part of Tarantool's kernel development team. In 2021, we participated in the Google Summer of Code (GSoC) for the first time: one of the proposed projects was migration of SQL from VDBE to a JIT platform — that's where my journey in Tarantool began. Having a year of developing various toolchain components as educational projects under my belt and armed with the support of mentors (Nikita Pettik, Timur Safin, and Igor Munkin), I took on this project. While building a platform for JIT compilation of SQL queries in Tarantool virtually from scratch during just one summer, I have encountered some pitfalls and acquired, in my opinion, interesting knowledge and experience which I would like to share. This article will be of interest first and foremost to those who are interested in further maintaining this project, as well as to those who are considering implementing JIT compilation in their own SQL.

View more...

How To REST With Rails and ActiveResource: Part Three

Aggregated on: 2022-06-18 15:51:14

It’s easy to use OpenURI and Net::HTTP. Well, "easy" is a relative term. Building a client library to access our task manager service still requires a fair amount of boilerplate code — more than we care to write, test, and maintain. We have shown you some principles and conventions for designing RESTful web services, and in this final part of our three-part series, we'll take it a step further and show you how we can use them to develop a client library for the task manager using ActiveResource. If you missed parts one and two of the series you can find them here:

View more...

How to Make Git Forget a Tracked File Now in .gitignore

Aggregated on: 2022-06-18 15:21:14

When we track a file in git, it can sometimes get cached and remain tracked, even if we add it to our .gitignore file. This is simply because .gitignore prevents files from being added to Git's tracking system, but it will not actively remove those that are already tracked. This can lead to issues when you have something you no longer want to be tracked, but can't seem to remove it from your git repository. Fortunately, there is an easy way to fix this. git has a built-in rm function which lets us remove cached or tracked changes. To run it, you can use the following command to remove a specific file, where [filename] can be removed with the file you wish to stop tracking:

View more...

What I Miss in Java, the Perspective of a Kotlin Developer

Aggregated on: 2022-06-18 14:51:14

Java has been my bread and butter for almost two decades. Several years ago, I started to learn Kotlin; I never regretted it. Though Kotlin compiles to JVM bytecode, I sometimes have to write Java again. Every time I do, I cannot stop pondering why my code doesn't look as nice as in Kotlin. I miss some features that would improve my code's readability, expressiveness, and maintainability.

View more...

How to Build Security for Your SaaS User Communications

Aggregated on: 2022-06-18 03:21:14

Modern SaaS application providers handle sensitive user information every day, from customer names and email addresses to application code and third-party API secrets. It is thus more important than ever for web applications to adhere to the highest security standards, not only to maintain their business reputation and avoid financial losses but also to protect their users. Customer communications is one of the components of SaaS security that is often overlooked. In this article, we cover why you should look closely at how secure your customer communications are and implement strict security measures for emails, push notifications, and other communications you send to your users. We also offer some recommendations to get you started on this security journey.

View more...

Automation Testing vs. Manual Testing: What's the Difference?

Aggregated on: 2022-06-18 02:51:14

Before we get into automation testing vs. manual testing, let's define testing. To begin, what exactly is testing? Testing is a method of evaluating a system to see if it meets the specified requirements.

View more...

Exploring Deferred and Promise in JQuery

Aggregated on: 2022-06-18 02:06:14

The jQuery Deferred object was introduced as a part of the 1.5 release of the framework. The Deferred object in jQuery is based upon the concept of Promises. To understand all about Deferred objects, it would be wise to try to understand what a Promise is all about. Many times in our daily lives, we cannot rely on the outcomes of certain actions. However, we may still need to make decisions about the future depending on an anticipated outcome. All we know for sure is that we are going to get an outcome. Let’s just say that we wrap the term “outcome” in a fancy-looking gift wrapper and call it a “Promise.”

View more...

4 Careers for People with Coding Backgrounds

Aggregated on: 2022-06-18 00:36:14

This article was written exclusively for Dev Interrupted by Lewis Dowling Learning to code doesn’t mean you have to become a programmer. Coding is one of those professions with a lot of transferable skills: logic, clear thinking, problem solving, and attention to detail, to name just a few. So learning a programming language can open up a whole range of opportunities, even if you decide to veer away from becoming a developer.

View more...

Getting Started Building on the NEAR Network with Infura

Aggregated on: 2022-06-17 22:21:14

Web3 and smart contracts are growing in popularity. In fact, a recent analysis of public code repositories has shown that over 18,000 developers are regularly contributing to open source crypto and Web3 projects on a monthly basis. Some of the keys to this growth are blockchains like NEAR and developer platforms like Infura. This article will look at the NEAR blockchain, its benefits, and how to build on NEAR using Infura. Then we’ll use the NEAR Rust SDK to mint in three steps and then interact using Infura. You’ll need a NEAR account, an Infura account, and some Rust skills and tools to get up and running quickly.

View more...

Biometric Authentication: Best Practices

Aggregated on: 2022-06-17 20:21:13

Today, the usage of biometric authentication in a corporate environment is discussed quite often. However, at the same time, it is still can be considered new since it is just starting to really gain momentum. As a result, those organizations that are going to explore and use such an authentication system face many incomprehensible nuances, to which various myths are added. First, let us define the terms and also discuss the advantages and disadvantages of biometric authentication in a corporate environment. 

View more...

How To Check for JSON Insecure Deserialization (JID) Attacks With Java

Aggregated on: 2022-06-17 19:06:13

A consistent inclusion in the OWASP top 10, insecure deserialization is a subtle but dangerous application security threat.  This aptly named attack exploits data serialization, the "bread and butter" data transformation process that takes place when an object is passed from one web application to another.  Under normal circumstances, when a new object is sent to an application, the object is first converted (serialized) into either a structured or binary format before passing through a network as a sequential stream of bytes.  On the application’s end, the serialized file is turned back into an object (deserialized) before being interpreted by the application. Most commonly, that data is serialized using CSV, XML, or JSON format.  No matter which format is used, properly securing this deserialization process is a critical piece of the design "puzzle" for any individual developer or business to solve.  The purpose of this article is to highlight the dangers of insecure deserialization attacks and demonstrate a cloud-based security API solution that can be deployed to help mitigate this threat specifically for JSON deserialization.  This demonstration includes step-by-step instructions to structure your API call with Java using code examples provided further down the page.

View more...

5 Steps to Create a Successful Agile Release Plan

Aggregated on: 2022-06-17 14:06:13

Agile release planning is the dynamic document that suggests the group of tasks you should accomplish before the release of your final product. As product development is tricky itself, the release planning requires a professional development team and their expertise to create a buy-in plan for the product.  However, if you are familiar with the Agile principles for your company, it is pretty easy to get started with the Agile release planning for your product. Below are the simple steps involved in creating a successful release plan:

View more...

SQL vs. NoSQL: Pros and Cons

Aggregated on: 2022-06-17 03:51:13

What’s the best way to store, protect, and access your data? This is a fundamental, yet critical decision. After all, data is the cornerstone of success for just about every modern organization. For most companies, the choice comes down to SQL and NoSQL databases. Each has unique strengths and weaknesses. SQL databases have been a proven option since the 1970s. They are made up of highly structured tables, consisting of rows and columns, related to one other through common attributes. Every column is required to have a value for its corresponding row.  NoSQL (“not only SQL” or “non-SQL”) databases came along later to break the relational table straitjacket, with the ability to store and access all data types, structured and unstructured, together.  They’re extremely flexible and easy for developers to work with and modify. Learn more about SQL and NoSQL databases and their basic differences.

View more...

Is NoOps the End of DevOps?

Aggregated on: 2022-06-17 03:36:13

Is NoOps really the end of DevOps? To answer this question, you must understand NoOps better.   Things are moving incredibly fast in the development world as automation and scaling in the cloud reach new heights every day. You can have “as a service” for almost anything — be it storage, network, in the cloud, compute, or security. Cloud providers are also increasingly investing in their automation ecosystem. This leads us to NoOps, where you wouldn’t require an operations team to oversee your lifecycle because everything would be automated.

View more...

RSA Conference Recap for Developers

Aggregated on: 2022-06-17 03:06:13

Internet security professionals flocked to the Moscone Center in San Francisco for the RSA Conference (RSAC). Previously planned to occur in February, this year’s event got moved to June 6-9 after organizers wanted to exercise an abundance of caution during the ongoing COVID-19 threat. Here’s a look at some of the themes and trends explored there this year.  DevSecOps at the Forefront DevSecOps was an ongoing theme at this year’s RSA Conference, and some people commented that the content was more focused on developers than at any other time in the past. The conference’s opening day featured an evening reception where people discussed integration and development of the software bill of materials (SBOM). 

View more...

Remote Debugging and Developer Observability

Aggregated on: 2022-06-17 02:36:13

In this post, we'll go over remote debugging — debugging production with developer observability tools and debugging asynchronous code, which presents its own unique challenges! This is actually material from four separate videos because I wanted to pool some ideas together into a single blog post, and the asynchronous stuff got pulled in. So without further ado, these are the applicable videos. Read on below for the analysis and discussion:

View more...

Getting the Respect Your Work Deserves: A Live Workshop w/ Engineering Coach Lena Reinhard

Aggregated on: 2022-06-17 00:21:13

The last thing anyone who does great work should be doing is having to take time out from doing great work to promote it to their higher-ups. Unfortunately, until the person you report to achieves omnipotence, you’re going to have to make sure their perception of your work lines up with the quality. In fact, when we asked our community what issue they would want professional coaching on, it was this: How to improve the impression of your work.

View more...

Change Data Capture to Accelerate Real-Time Analytics

Aggregated on: 2022-06-16 22:51:13

There is nothing new in saying that startups leverage Big Data and AI to develop more innovative business models. As a result, Big Data and AI matters have been ubiquitous in executive and technical forums. But they have often been discussed at such a high level that folks end up missing details on such companies' building blocks. In this blog post, I’ll cover one of the modern companies’ most valuable building blocks: the ability to process data in real-time, which enables data-driven decision-making in industries like retail, media & entertainment, and finance. For example:

View more...

What Is Data Analytics? Understanding Data Analytics Techniques

Aggregated on: 2022-06-16 21:36:13

Data is becoming increasingly crucial for success in the digital economy. You might ask, why do organizations rely so much on data? Well, a majority of organizations rely on data for multiple processes, from product management and fraud detection to HR, finance, and manufacturing. Data analytics allow users to use pre-made reports to track performance metrics on demand. Research shows that 94% of organizations believe that data and analytics solutions are critical for growth. Not a surprising statistic since it offers several benefits, including an increase in productivity and efficiency, faster and more effective decision making, and financial gains!   Before we dive into the ins and outs of data analytics, it is important to understand the two terms, namely ‘data science’ and ‘data analytics. Data science lays emphasis on finding meaningful correlations between large datasets, while data analytics is a branch of data science designed to uncover specifics of extracted insights.  

View more...

Cross-Functional Team Management

Aggregated on: 2022-06-16 21:06:13

Managing a cross-functional team is an optimal way to overcome fragmentation and organize effective teamwork for the best project results. But this is not a group of people with similar jobs, such as a marketing team, IT department, or sales department. A cross-functional team rather includes people with different expertise from different departments within one unit. What Is a Cross-Functional Team? It is a group of people with diverse backgrounds who come together to achieve one common goal. It usually includes employees from all or any levels of the organization.

View more...