News Aggregator


Cybersecurity Threats of EV Charging Stations

Aggregated on: 2022-05-18 18:20:55

According to Statista, In January 2022, there were almost 113,600 charging stations for electric vehicles in the United States. California has a large number of these charging stations, with nearly 41,300 public and private power outlets. As the number of electric vehicles (EVs) on the road continues to grow, so does the need for public and private EV charging stations. While most EV owners charge their cars at home or work, there are still many times when they need to rely on public charging stations.

View more...

Develop a Sense of Code

Aggregated on: 2022-05-18 18:20:55

The more the counter next to my years-in-tech metric increments upward, the more I find myself in situations where I talk about career paths, skill decisions, and choices about specializations. It might be talking to a publication, on a panel, or one-on-one with someone who wants to get into or ahead in IT. One of the questions that come up a lot is something like, "Are we at the point where everyone in IT needs to learn to code?"

View more...

Stop Treating Your Data Engineer Like a Data Catalog

Aggregated on: 2022-05-18 17:50:55

Data trust starts and ends with communication. Here’s how best-in-class data teams proactively certify tables as approved for use across their organizations. Say it with me: data engineers are not data catalogs. 

View more...

Debugging the Java Message Service (JMS) API Using Lightrun

Aggregated on: 2022-05-18 17:50:55

The Java Message Service API (JMS) was developed by Sun Microsystems in the days of Java EE. The JMS API provides us with simple messaging abstractions, including message producer, message consumer, and so on. Messaging APIs let us place a message on a “queue” and consume messages placed into said queue. This is immensely useful for high-throughput systems — instead of wasting user time by performing a slow operation in real time, an enterprise application can send a message. This non-blocking approach enables extremely high throughput while maintaining reliability at scale. The message carries a transactional context which provides some guarantees on deliverability and reliability. As a result, we can post a message in a method and then just return, which provides similar guarantees to the ones we have when writing to an ACID database.

View more...

Why to Implement GitOps into Your Kubernetes CI/CD Pipelines

Aggregated on: 2022-05-18 17:50:55

Continuous integration and continuous delivery have become essential to meet the demands of the modern software development process. CI/CD pipelines are popular within software delivery pipelines for facilitating software development and deployment tasks. However, infrastructure management is often tracked outside of CI/CD.  Most of the time, infrastructure and configurations are managed outside the CI/CD pipeline, even for applications requiring rapid infrastructure modifications or configuration changes like in a containerized environment with Kubernetes. In this post, we will explore the need to implement GitOps within your Kubernetes CI/CD pipelines.

View more...

Data Collection: Methods, Definition, Types, and Tools

Aggregated on: 2022-05-18 17:20:55

Access to information gives a unique opportunity to understand the interests and demands of the customers much better and even exceed their expectations. So naturally, this makes data collection urgent, the first and most crucial step of any decision-making process. But before diving deeper into the topic, let’s get started with some essential definitions. What Is Data Collection? Data collection is gathering data; it's further measuring, processing, assessing, and analyzing for research purposes. It’s conducted with the help of established, validated techniques, which make it possible to answer research questions, test hypotheses, and evaluate final results. The main goal of data collection is to get access to reliable sources of information that will provide data for further analysis and make data-driven decisions possible.

View more...

Improving Presto Architectural Decisions With Shadow Cache at Meta (Facebook)

Aggregated on: 2022-05-18 16:50:55

Motivation and Background At Meta (Facebook), Presto is a distributed real-time query engine using SQL language as an interface to perform fast, interactive queries on petabytes of data. It supports standard ANSI SQL, including queries, aggregations, JOINs, and window functions. Alluxio is the data orchestration platform as a critical technology supporting Presto and various other data analytics applications and use cases. Alluxio creates a virtual data layer that federates data from any file system or object store, provides a unified namespace across storage systems, and serves the data to the applications using industry-standard interfaces with fast data access.

View more...

Demystifying Cloud-Native Commerce

Aggregated on: 2022-05-18 16:20:55

In today's world, both eCommerce and cloud-native are the two most important areas where technology and business innovations are fused together to build scalable and experience-driven platforms. The surge in the eCommerce space after the COVID-19 pandemic has triggered many queries in the business and technology worlds. Whether it is a small company, mid-size or large corporation, everyone has been impacted by the pandemic to a certain extent.  Stores are closing. Contactless shopping and payments are becoming the norm. Supply-chain is becoming a critical issue due to transportation restrictions. Travel is getting into habitual restrictions. Cross-country shipment and local delivery are experiencing challenging times. All businesses are looking for an alternative way of doing business. In this space, direct-to-consumer is becoming the standard and online digital presence is the need of the hour.

View more...

Data Privacy Jobs Reportedly Growing While National Employment Slows

Aggregated on: 2022-05-18 16:20:55

Companies in virtually all industries use the information to some extent. Often, most of an organization’s operations revolve around collecting and analyzing it. Of course, most people in modern society know and accept that, but they assert that businesses must do whatever’s necessary to keep data safe.  Recent data privacy report statistics show a high demand for people who have the training to keep information secure. As a result, they often have multiple offers to the field, even though statistics about the U.S. job market indicate the per-month growth may be becoming less robust.

View more...

Applying Design Thinking to Artificial Intelligence. Why Should You Use It in Your AI-Based Projects?

Aggregated on: 2022-05-18 15:50:55

Choosing the right project management methodology can be crucial for your project development. It will help you avoid mistakes, speed up the whole process, and support in discovering the problems of your target groups. The last issue is fundamental. Only after a deep understanding of the needs of your target group will you be able to develop a solution that will solve their problems. There are many approaches to project management focusing on discovering problems, and design thinking is one of them. AI is becoming a more significant and critical part of our lives. AI-based products and services are everywhere, from self-driving cars to voice assistants like Siri or Alexa. AI Design Thinking is the process of designing AI systems that can operate in an unpredictable environment with limited resources in a lean, iterative way. Designing for AI requires different skills than designing for other types of technology because AI doesn’t follow predictable rules and behaviors. Today, we would like to tell you more about how it can influence your process and how you can implement it into your artificial intelligence project.

View more...

Toying With Kotlin’s Context Receivers

Aggregated on: 2022-05-18 15:50:55

Kotlin added the idea of Context Receivers in version 1.6.20. In this post, I'd like to toy with them to understand how useful they can be. Note that if you want to play along, you'll need to compile with the -Xcontext-receivers flag.

View more...

What Is a Bug in Software Testing?

Aggregated on: 2022-05-18 15:20:55

Introduction When innovation is advancing at a breakneck pace in today's environment, programming development must be precise, quick, and of the highest quality. Therefore, a "bug" in the product being supplied is a significant issue in the product industry. The word "bug" is the most despised in the product improvement measure. Yet, a bug should be identified and rectified to ensure optimal quality in the product/framework being built.

View more...

How the Alias Command Works on Linux

Aggregated on: 2022-05-18 14:05:55

We've covered a lot of Linux commands, and it's sometimes necessary to write the same command repeatedly. We can use the alias command on Linux and other Unix-like systems to avoid the drudgery of typing the same thing often. It lets us make custom commands that will run a specific command of our choosing. The alias command has no options, so it can be written as shown:

View more...

Why Engineers Make the Best Entrepreneurs w/ Drata's Co-founder & CTO Daniel Marashlian

Aggregated on: 2022-05-18 00:20:55

We want to make the Dev Interrupted podcast a vital, enjoyable part of your week. Please take 2 minutes and answer our new Listener Survey. It lets us know a bit about you, what you want from Dev Interrupted and what you want from podcasts in general!  There are so many books, videos and workshops on starting your own company. The problem for anyone listening to this podcast is that none of them come from the perspective of a developer.

View more...

Performing ETL with AWS Glue Interactive Sessions

Aggregated on: 2022-05-17 21:50:55

If you have been using AWS Glue lately, you might have witnessed the complexity of setting up the infrastructure for building, testing and running a Glue job using Glue Dev endpoint. Setting up a Dev endpoint is no easy task as it takes a lot of effort to be done on your local machine. By using interactive sessions, you can not only author a job faster than ever but also make the whole process easier for you. Drawbacks of Using Glue Dev Endpoint Cost: When you want to author a lot of jobs, the dev endpoint can be of great help but if you want to build and run only a few jobs it will turn out to be a costly investment. Since a dev endpoint is an EC2 machine backed with the Glue libraries, cost turns out to be a major factor in using the dev endpoint for just a handful of jobs. Moreover, the minimum billing duration for each provisioned dev endpoint is 10 minutes, which does not make it a great choice for running a single job that takes about 2-3 minutes to complete. Complexity: Setting up a dev endpoint is a complex task. It requires the stuff to be downloaded on your local machine which makes it difficult for the systems protected with a firewall or the systems without admin rights. Time: Timing is another drawback of using the Dev endpoint for a less number of jobs. Suppose you want to author 2 PySpark ETL jobs that take a minute each to run. Now, provisioning and establishing a dev endpoint and transferring files to the dev endpoint will take a lot more time to complete than completing the jobs themselves. Flexibility: Once a dev endpoint has been provisioned the billing continues until you manually delete the dev endpoint. Also note, that AWS continues to charge you till the dev endpoint is in a READY state. Solution - Interactive Session An interactive session allows you to leverage the simplicity of Jupyter notebooks while authoring the complex glue jobs interactively. So, let us deep dive into setting up our own interactive session.

View more...

Everything You Need to Know About Nebula Graph Index

Aggregated on: 2022-05-17 21:50:55

The term Index in Nebula Graph is quite similar to the same term in relational databases, but they are not exactly the same. I noticed that some Nebula Graph users are often confused when getting started with Nebula Graph. Typically, people want to know what exactly Nebula Graph Index is, when should they use it, and how it impacts the performance of Nebula Graph. Today I’m going to walk you through the Index concept in Nebula Graph and hopefully, this article will answer these questions.

View more...

What Are Cookies in Servlets?

Aggregated on: 2022-05-17 21:20:55

In the video below, we take a closer look at Cookies in Servlets with examples. Let's get started!

View more...

Build a Twitter Leaderboard App with Redis and AWS Lambda (Part 1)

Aggregated on: 2022-05-17 20:50:55

Hello and welcome to this two-part blog series that uses a practical application to demonstrate how to integrate Redis with AWS Lambda. The first part (this one) covers the application - by the end of this blog, you should have the solution deployed, played around with it, and in the process, have a good overview of the solution. The second part is about the Infrastructure (IaaC to be specific) aspects - it's mostly centered around AWS CDK along with some code walkthrough.

View more...

Why Is SQL Knowledge Vital for Data Scientists? A Sneak Peek

Aggregated on: 2022-05-17 20:20:54

Businesses succeed when making informed judgments based on current technology and market trends, rivals, and partners. Extracting data from databases using the Structured Query Language (SQL, pronounced "sequel") is one of the most common methods firms get business intelligence to assist them in making those decisions.  According to Oracle Patches, SQL dates back to the early relational databases built in the 1970s by Dr. Edgar Codd, Donald Chamberlin, Raymond Boyce, and other IBM researchers. Data in one table in a relational database can be linked to data in any of the tables in the database's thousands or even millions of entries. As a result, SQL makes searching for and retrieving data on business-related issues and presenting the findings in a report easier and quicker than ever.

View more...

Initial Few Days as a Product Owner in AI-Analytics Product Development

Aggregated on: 2022-05-17 19:50:54

We have received a fresh product owner for our AI-Analytics Product team.  We build analytics software for the insurance market.

View more...

SDLC Vs STLC: What's the Difference?

Aggregated on: 2022-05-17 18:50:54

What Is STLC? STLC stands for software testing life cycle, and it consists of several phases that must be completed in order to test software applications. STLC consists of several phases that are used to test software programs and guarantee that they meet user requirements. STLC Phases Are as Below: Requirement Analysis Test Planning Test Case Development Test Case Execution Test Closure 1) Requirement Analysis: One of the most significant phases of the STLC is requirement analysis, in which the task owner will connect with multiple stakeholders (clients, business analysts, technical leads, and system architects, among others) to determine the requirements. The testing team analyses the requirements from a testing standpoint to find the testable requirements during the Requirement analysis phase.

View more...

Unit Vs Integration Testing: What's the Difference?

Aggregated on: 2022-05-17 18:20:54

What Is Unit Testing? Unit testing entails testing each unit or an individual component of the product application. The goal of unit testing is to approve unit parts as they are executed. A unit is a single testable component of a product framework tested during the application programming development process. The goal of unit testing is to ensure the accuracy of segregated code. A unit segment is an application's individual capability or code.

View more...

What Powers Similarity Search in Milvus Vector Database

Aggregated on: 2022-05-17 17:50:54

As the core vector execution engine, Knowhere to Milvus is what an engine is to a sports car. This post introduces what Knowhere is, how it is different from Faiss, and how the code of Knowhere is structured. The Concept of Knowhere Narrowly speaking, Knowhere is an operation interface for accessing services in the upper layers of the system and vector similarity search libraries like Faiss, Hnswlib and Annoy in the lower layers of the system. In addition, Knowhere is also in charge of heterogeneous computing. More specifically, Knowhere controls which hardware (eg. CPU or GPU) to execute index building and search requests. This is how Knowhere gets its name — knowing where to execute the operations. More types of hardware including DPU and TPU will be supported in future releases.

View more...

How to Use Java Constructor and Collection in Mule 4

Aggregated on: 2022-05-17 17:50:54

How to Use Java Constructor in Mule 4 Java constructors of any Java class can be called from the mule configuration XML file using the “New” operation of the Java module. For this tutorial, let’s consider the below Java class which has two constructors, i.e., one default and one constructor that takes input parameters to initiate the class.

View more...

StackPod Episode: Best Practices for AWS Observability With Russell Foster of StackState

Aggregated on: 2022-05-17 17:20:54

The following is a transcript of Episode 10 of the StackPod by StackState podcast. We’re excited to share that we are celebrating our tenth podcast episode! For this episode, we invited Russell Foster. As a DevOps engineer at StackState, Russell is responsible for making sure our SaaS product runs smoothly on AWS. 

View more...

The Three Must-Haves for Machine Learning Monitoring

Aggregated on: 2022-05-17 16:50:54

Machine learning models are not static pieces of code but, instead, dynamic predictors that depend on data, hyperparameters, evaluation metrics, and many other variables; it is vital to have insight into the training and deployment process to prevent model drift predictive stasis. That said, not all monitoring solutions are created equal. These are the three must-haves for a machine learning monitoring tool, whether you decide to build or buy a solution. Complete Process Visibility Many applications involve multiple models working in tandem, and these models serve a higher business purpose which may be two or three steps downstream. Furthermore, the model's behavior will likely be dependent on data transformations that are multiple steps upstream. Thus, a simple monitoring system that focuses on single model behavior will not capture the holistic picture of model performance related to the global business context. More profound knowledge of model viability only comes from complete process visibility – having insight into the entire data flow, metadata, context, and overarching business processes on which the modeling is predicated. For example, as part of a credit approval application, a bank may deploy a suite of models that assess creditworthiness, screen for potential fraud, and dynamically allocate trending offers and promos. A simple monitoring system might be able to evaluate any one of these models individually, but solving the overall business problem demands an understanding of the interlocution between them. While they may have divergent modeling goals, each model rests upon a shared foundation of training data, context, and business metadata. Thus, an effective monitoring solution will take these disparate pieces into account and generate unified insights that harness this shared information. These might include identifying a niche and underutilized customer segments in the training data distribution, flagging potential instances of concept and data drift, understanding the aggregate model impact on business KPIs, and more. The best monitoring solutions can also work not only on ML models but also on generic, tabularized data, allowing the monitoring solution to be extended to all business use-cases, not just those involving an ML component.

View more...

Java: Why Core-to-Core Latency Matters

Aggregated on: 2022-05-17 16:50:54

Last year we had a global shortage of microchips; today, I feel there is a worldwide shortage of software developers. Like many other software companies, Chronicle Software is rapidly expanding and interviewing candidates. We usually ask candidates to demonstrate a good knowledge of core Java, and then we cover slightly more advanced concepts, such as the use of volatile memory, memory barriers, and fences. While it is important to have a high-level understanding of these concepts when writing concurrent code, it's surprising how few Java developers with 10+ years of experience have a deep knowledge of the underlying hardware. An initial goal of Java was to “write once, run anywhere,” but does that mean we should not be sympathetic to the hardware?  Java has done an excellent job at shielding developers from their platform; it is not unreasonable that most developers would rather solve their business problems than become overly burdened with the internal workings of their silicon. However, some sectors, such as fintech, benefit from fast software with predictable latencies, where every last microsecond can make a massive difference to their bottom line. For these sectors, it can be beneficial to have a reasonable grasp of the underlying hardware and basic knowledge of the areas described in the following sections.

View more...

A First Look at CSS When and Else Statements

Aggregated on: 2022-05-17 16:20:54

In CSS, we make selections of different devices by using media queries. Media queries give us an easy way to select devices based on numerous conditions, such as screen size, pixel density, or even format: i.e., print or screen. This has progressively gotten more complicated over time, and now we are often balancing many conditions that sometimes conflict with each other.

View more...

How To Use Cluster Mesh for Multi-Region Kubernetes Pod Communication

Aggregated on: 2022-05-16 23:50:54

Thanks to services provided by AWS, GCP, and Azure it's become relatively easy to develop applications that span multiple regions. This is great because slow apps kill businesses. There is one common problem with these applications: they are not supported by multi-region database architecture. In this blog, I will provide a solution for the problem of getting Kubernetes pods to talk to each other in multi-region deployments.

View more...

Why Is Software Integration Important for Business?

Aggregated on: 2022-05-16 22:05:54

Software integration is an essential part of any modern business that uses machines or projects across different modules, programs, or software to get the job done. It enables seamless interaction with all products in a modular and integrated approach. Still, it also helps companies find software solutions for their needs and stay up-to-date with the latest advances and trends in the marketplace. The business owner needs to hire a custom software development company from an outside enterprise that can do the required integration because software integrations provide scalability in areas where other entrepreneurs have failed. This blog will talk about 10 business benefits of software integration and how it can grow your business.

View more...

How the TypeScript ReturnType Works

Aggregated on: 2022-05-16 21:35:54

The ReturnType in TypeScript is a utility type that is quite similar to the Parameters Type. It lets you take the return output of a function, and construct a type based on it. The ReturnType Utility Type The ReturnType utility type is very useful in situations where the output of a specific function needs to be taken in by another function. In that scenario, you might create a new, custom type, that the output of a function constrains itself to.

View more...

Password Authentication. How to Correctly Do It.

Aggregated on: 2022-05-16 21:35:54

The problem of cybersecurity is quite severe nowadays. Even large and well-known companies face the problem of sensitive user data leakage. It can be unauthorized access to databases, leaked logs, etc. Quite often, we encounter day 0 vulnerabilities that attackers can exploit. All this negatively affects the security of users themselves and the business's reputation. In this article, I would like to explain how to implement storing user authentication data with password authentication. Authentication Authentication is the process of confirming by the user that he is the owner of the presented identifier. The most apparent and most familiar authentication process is password authentication. The user goes to the login page, enters his username/password, and logs on. In this article, I will show how you can implement authentication on the server.

View more...

How To Create PR Review Apps With Render

Aggregated on: 2022-05-16 21:05:54

Dungeon crawler demo app Code reviews are essential before merging a pull request. It’s a common practice to have another engineer look through the code changes, and it’s even better if you have a continuous integration (CI) pipeline configured that runs linters and unit tests to catch issues automatically. For UI changes, it’s also a great idea to visually inspect the changes in the app. Doing so may require the reviewer to check out the branch and run the app on their machine. Depending on the complexity of your app’s architecture, running the app locally may be trivial to do with a single command, or it may require several steps and a fair amount of time. Pull request review apps help facilitate this process by deploying a version of the app with the pull request’s changes applied in a preview environment. Now the reviewer doesn’t need to pull down the code themselves!

View more...

Why Performance Projects Fail?

Aggregated on: 2022-05-16 20:35:54

Projects involving performance testing and engineering fail for a variety of reasons. The majority of performance project failures occur for various highly complex reasons from every phase of the development life cycle and performance testing life cycle. Sometimes, performance problems are uncontrollable, and it’s out of the control of a project manager, technical architects, or performance engineers. In my experience, from both business and personal levels, most the performance projects fail due to simply a lack of communication between performance engineers, developers, DBA's, business teams, and stakeholders from the beginning, and this ends up causing many other problems which will directly impact application performance and ROI. The only objective of strategic, effective performance testing for any application/product is to achieve a satisfactory return on investment. Performance testing and engineering the applications are risky and always require a lot of trial and error with rigorous testing from the early stages of development. Failures in performance testing projects must be treated similarly to other business problems. It is essential to understand what went wrong, why it went wrong, and what can be done to prevent it. In most scenarios, the performance engineers have to run the one-man show role to make everyone educate/understand the performance challenges in the end-to-end full life cycle implementations. Working with Practice and COE teams, we continued seeing the same mistakes repeatedly from multiple teams and projects, so, based on my personal experience, I have compiled a  list of reasons Why Performance Projects Fail.

View more...

Testing Under the Hood Or Behind the Wheel

Aggregated on: 2022-05-16 20:05:54

In a room full of architects, no two will agree about their exact job description, as the joke goes. In a similar vein, someone in our team had a refreshing solution to another persistent bone of contention: how do you define an integration test? Don’t try to reconcile differing opinions and just stop using the term altogether. I liked it very much. Rather than think of unit and integration tests, it’s more helpful to distinguish between tests that validate code versus ones that validate public interfaces and recognize that within each category the scope varies for each individual test. Here's the first confusion that the word ‘integration’ throws up. Is it the integrated parts we target, or their points of integration? The first approach checks that parts cooperate and fulfill (part of) the implementation of some business functionality, for example submitting a new order and making sure that it is validated and saved. The latter category is only about checking contracts. What exact messages do we expect component A to receive and how should it react? Older readers may be reminded of WSDL and XML Schema. Not popular anymore, but still around in many enterprises.

View more...

What Is URL Rewriting? | Java Servlets

Aggregated on: 2022-05-16 20:05:54

In the video below, we take a closer look at URL rewriting with demo and Java servlets. Let's get started!

View more...

Ultra-Fast Microservices: When Microstream Meets Payara

Aggregated on: 2022-05-16 20:05:54

Microservices have become a buzzword when we talk about creating a scalable application but is that enough? The simple answer is: no. As with any software architecture decision, it has a trade-off and several challenges. Lucky for us Java developers, there is a combination of two tools to make our life easier: Microstream and MicroProfile. This article will cover combining Microstream and Payara to create a microservice application that is easily stable and ultra-fast.  Feel free to check out Part 1 and Part 2 as well. Microservices With Payara Microservices provide several challenges to software engineers, especially as a first step to facing distributed systems; but it does not mean that we're alone. Indeed there are several tools to make our life easier in the Java world, especially, MicroProfile. 

View more...

Secure Software Supply Chain: Why Every Link Matters

Aggregated on: 2022-05-16 18:35:54

The new threats in software development are not only related to the specific company itself. The whole software supply chain is a target for attackers, and it is essential to make sure that we put all our effort into securing each link because if one fails, everything will be affected. Supply chain activities include each step of the transformation of raw materials, components, and resources into a completed product and its delivery to the end customer.

View more...

Augmented Analytics: The Future of Business Intelligence

Aggregated on: 2022-05-16 17:20:54

It is more important than ever to access accurate and timely data in a rapidly changing business landscape. Unfortunately, the traditional business intelligence methods are no longer adequate to meet the needs of modern businesses. Augmented analytics is a new approach that combines the best of human expertise with the power of artificial intelligence to provide previously unattainable insights.  This technology is already being used by quite a few of the world’s leading companies to gain a competitive edge.

View more...

What Does Mean Stack Development Mean?

Aggregated on: 2022-05-16 16:50:54

What Is the MEAN Stack? Source: Dribbble In the web development process, various technologies are used. It depends on the project's complexity, budget, and other criteria.  Web servers, libraries, front-end environments, and database systems are among them. Developers these days are using the strategy of using a combination of such tools and technologies to speed up and improve the web development process. MEAN stack is one of them.

View more...

Building a Login Screen With React and Bootstrap

Aggregated on: 2022-05-16 16:50:54

Most web applications today require users to register to use certain features or visit specific pages, but building a login form is one of the most tedious things. In this article, we will build a simple and elegant sign-in screen using React and Bootstrap 5. Prerequisites A basic understanding of HTML, CSS, and Javascript A basic understanding of React Setup NodeJS on your machine Setup the React App Run the following command to create a fresh react project:

View more...

What SREs Can Learn From the Atlassian Nightmare Outage of 2022

Aggregated on: 2022-05-16 16:20:54

What happens when the tools and services you depend on to drive Site Reliability Engineering turn out to be susceptible to reliability failures of their own? That’s the question that teams at about 400 businesses have presumably had to ask themselves this month in the wake of a major outage in Atlassian Cloud. The incident offers a number of insights for SREs about reliability risks within reliability management software itself, as well as how to work through complex outages efficiently and transparently, as Atlassian has done following the incident.

View more...

Each Logic in Svelte

Aggregated on: 2022-05-16 15:50:54

Previously, I covered how if-else logic works in Svelte. Today, I'll be going over how to use each logic in Svelte, letting us iterate over objects to display their contents. If you're new to Svelte, read my guide on how to create your first Svelte project here.

View more...

Memory Debugging and Watch Annotations

Aggregated on: 2022-05-15 19:50:53

Before diving into debugging memory issues and the other amazing running process, memory debugging capabilities (which are amazing)... I want to discuss a point I left open in the last duckling post. Back there we discussed customizing the watch renderer. This is super cool! But it's also tedious. Before we continue, if you prefer, I cover most of these subjects in these videos:

View more...

Why I'm Choosing Pulumi Over Terraform

Aggregated on: 2022-05-15 17:50:53

In today's world of cloud-first applications, multi-cloud/hybrid cloud companies, and complex infrastructures, using infrastructure as code is essential. In recent years, Terraform has become one of the most popular IaC solutions, but its challenger Pulumi is quickly gaining traction. In this article, I will tell you why I think Pulumi is better and why I will choose it over Terraform for my next project. But first, let's talk about what makes a good Infrastructure as Code solution.

View more...

Java Hashtable, HashMap, ConcurrentHashMap: Performance Impact

Aggregated on: 2022-05-14 03:35:52

There are a good number of articles that articulate functional differences between HashMap, Hashtable, and ConcurrentHashMap. This post compares the performance behavior of these data structures through practical examples. If you don’t have the patience to read the entire post, here is the bottom line: when you are confronted with the decision of whether to use HashMap, Hashtable, or ConcurrentHashMap, consider using ConcurrentHashMap since it’s thread-safe implementation without compromise in performance. Performance Study  To study the performance characteristics, I have put together this sample program:

View more...

Suspicious Sortings in Unity, ASP.NET Core, and More

Aggregated on: 2022-05-14 00:50:52

Some believe that experienced developers do not make silly errors. Comparison errors? Dereferencing null references? Bet you think: "No, it's definitely not about me..." ;) By the way, what about errors with sorting? As the title suggests, there are some nuances. OrderBy(...).OrderBy(...) Let me give you an example to describe the problem. Let's say we have some type (Wrapper) with two integer properties (Primary and Secondary). There's an array of instances of this type. We need to sort it in ascending order. First — by the primary key, then — by the secondary key.

View more...

3 Predictions About How Technology Businesses Will Change In 10 Years

Aggregated on: 2022-05-14 00:05:52

We want to make the Dev Interrupted podcast a vital, enjoyable part of your week. Please take 2 minutes and answer our new Listener Survey. It lets us know a bit about you, what you want from Dev Interrupted and what you want from podcasts in general! This article was written exclusively for Dev Interrupted by Lewis Dowling

View more...

Migrating From Heroku To Render

Aggregated on: 2022-05-13 22:50:52

From time to time, there are words or phrases that I hear repeated enough to the point where I eventually think, “Hmm, I should check this out.” Render was one of those words.  On Twitter, I have seen various conversations where people want to migrate from Heroku to another service. Some of the issues people have raised include:

View more...

Building a Kotlin Mobile App with the Salesforce SDK, Part 3: Synchronizing Data

Aggregated on: 2022-05-13 22:05:52

This is our final post in our three-part series demonstrating how to use the Salesforce Mobile SDK to build an Android app that works with the Salesforce platform. In our first post, we showed you how to connect to your org. Our second post showed you how to edit and add data to your org from your app. This post will show you how to synchronize data from your Salesforce org to your mobile device and handle scenarios such as network loss. Let’s get right into it! Working With Mobile Sync One of the hardest aspects of mobile development is dealing with data synchronization. How do you handle the situation when you need to add a new broker, but you’re offline? Or what if two agents are updating the same broker: how can you handle the merging of those two changes?

View more...