News Aggregator6 Things Startups Can Do to Avoid Tech DebtAggregated on: 2022-05-05 01:35:46 Imagine walking into this: "About 4 million lines of PHP code, written by underpaid, sometimes not well-meaning, freelancers and students over the span of 8 years. The CEO wrote a large part, but stopped learning new techniques around 2004." That's how bad tech debt can get when a startup is run without considering that all of those messy shortcuts will eventually have to get cleaned up. View more...Refactoring Java Application: Object-Oriented And Functional ApproachesAggregated on: 2022-05-04 22:35:46 Java Refactoring Approaches Refactoring in Java has many aspects, but among all of them, there are two fundamentals: object-oriented and functional. Object-oriented existed almost from the first Java version, whereas functional appeared only with Java 1.8 (March 2014). Object-Oriented (OO) and Functional Approaches Java is a classical object-oriented language and allows the creation of flexible object structures. After Java 1.8 received functional features, it became capable to operate not only with objects or methods but with lambdas (which is executable code itself). In the functional world, you can operate with functions as with objects in the OO world. View more...Request Routing Through Service Mesh for WebSphere Liberty Profile Container on KubernetesAggregated on: 2022-05-04 21:50:46 Introduction I will demonstrate how to request routing from service mesh to WebSphere Liberty Profile (WLP) application server Docker container image on Kubernetes. Further providing details about Istio Ingress gateway, Gateway, and Virtual service created on istio that routing traffic to Docker image with WLP installed. In the end, we will be seeing from Istio kiali dashboard request routing through Istio ingress gateway and another way directly hitting to service on Kubernetes. Environment Requirements 1. Refer to the following Kubernetes official website to install and configure the cluster with kubeadm, View more...What Are the Best Ways to Protect Your CAD/CAM Data?Aggregated on: 2022-05-04 20:35:46 Computer-aided design (CAD) and computer-aided manufacturing (CAM) files are increasingly instrumental in planning and producing various products. However, you may initially overlook the possibility of cybercriminals targeting CAD and CAM files when orchestrating their attacks. A solid data security management plan can prevent data loss and unwanted outcomes. Here are some actionable suggestions. Ensure Everyone Only Uses Authorized Software Versions When people with limited budgets need expensive CAD/CAM software, some might turn to the internet to find “cracked” versions of the desired products. Creating a cracked version involves modifying the genuine title to remove a specific characteristic. For example, cracked software may no longer include the screen requiring a person to enter a software key to keep using the program after a free trial. View more...Removing JavaScript: How To Use HTML With Htmx and Reduce the Amount of CodeAggregated on: 2022-05-04 20:05:46 HTML as the Center of the Universe The internet as we know it today is largely due to HTML and CSS. Javascript (JS) could act as a glue between them and make pages more dynamic and interactive, but the history of web programming developed differently. After the emergence of client-side rendering and other similar technologies, it became much more difficult to use JS to create web applications. What Is Htmx? Htmx is a library that allows you to create modern and powerful user interfaces with simple markup. Thanks to it, AJAX requests, triggering CSS transitions, calling WebSocket and server-sent events can be performed directly from HTML elements. View more...Test Plan and Test Strategy: Best Practices That Will Make Your Product Development a SuccessAggregated on: 2022-05-04 19:35:46 Without a crystal clear understanding of the processes when a team works on a software product, it can be tempting to think that all the problems stem from under-qualified QA engineers who click around randomly and ruin the hard work of the whole team. However, the value and purpose of the quality assurance process are not transparent without documentation. That's where a test plan and test strategy can help. Even for those who are well aware of the processes, there's still the problem of measuring the quality QAs provide. If you don't measure quality, you don't have any control over the testing process or any ability to anticipate the results. So how should you know what exactly you paid for? View more...Migrating Secrets Using HashiCorp Vault and Safe CLIAggregated on: 2022-05-04 19:35:46 Vault and Safe Vault is a secret management service by HashiCorp. It is a tool that will help you in storing secrets (API keys, passwords, etc.) and accessing them securely. You can use Vault with a user interface as well as through CLI. In this post, we will not be going deep into what Vault is, but instead, will look at how we can migrate secrets from one Vault to another. We can migrate secrets from Vault using Vault CLI, but it can get a little complicated to do so. Therefore, to make things easy, we will use Safe CLI, which is a wrapper around Vault. It will help us in managing and migrating our secrets by using simple commands. It also helps us connect to different vault instances very quickly for migration purposes. View more...Best Practices in Data Discovery: Building Search for a Data Discovery PlatformAggregated on: 2022-05-04 19:05:46 Image by flashmovie from freepik The efficiency of data discovery depends on the user-friendliness of the UI and the features integrated into it to make it easier for users to look up the data they need. This article explores significant components of a user-friendly UI. In addition, it looks into specific measures that can be employed to increase the quality of search in the Open Data Discovery (ODD) Platform. View more...Proven Tips to Optimize the Performance of React Native AppAggregated on: 2022-05-04 17:50:46 For modern mobile app developers, React Native is the most promising and viable framework took for developing cross-platform applications. Ever since the framework launched it never faded from the limelight and surpasses all other frameworks of mobile app development. However since React Native is a new app development framework, developers facing difficulties in improving its performance under certain scenarios. When an application requires more tabs, parallel processing, more controls, animations, navigations, and the inclusion of 3rd party libraries the framework becomes slow. However, the framework is on the verge of evolving according to the rising demands of developers, thanks to the continuous efforts of the React Native community people. View more...PostgreSQL EXPLAIN – What Are the Query Costs?Aggregated on: 2022-05-04 17:50:46 Understanding the Postgres EXPLAIN Cost EXPLAIN is very useful for understanding the performance of a Postgres query. It returns the execution plan generated by the PostgreSQL query planner for a given statement. The EXPLAIN command specifies whether the tables referenced in a statement will be searched using an index scan or a sequential scan. When reviewing the output of EXPLAIN the command, you'll notice the cost statistics, so it’s natural to wonder what they mean, how they’re calculated, and how they’re used. In short, the PostgreSQL query planner estimates how much time the query will take (in an arbitrary unit), with both a startup cost and a total cost for each operation. More on that later. When it has multiple options for executing a query, it uses these costs to choose the cheapest, and therefore hopefully fastest, option. What Unit Are the Costs In? The costs are in an arbitrary unit. A common misunderstanding is that they are in milliseconds or some other unit of time, but that’s not the case. The cost units are anchored (by default) to a single sequential page read costing 1.0 units (seq_page_cost). Each row processed adds 0.01 (cpu_tuple_cost), and each non-sequential page read adds 4.0 (random_page_cost). There are many more constants like this, all of which are configurable. That last one is a particularly common candidate, at least on modern hardware. We’ll look into that more in a bit. View more...Usage of Java Streams and Lambdas in Selenium WebDriverAggregated on: 2022-05-04 17:20:46 Overview: Java Streams and Lambdas Lambdas A lambda expression is a microcode that takes in parameter(s) and returns a value. Lambda expressions are similar to methods, but they are anonymous and they can be implemented right in the body of a method. Lambdas Syntax Java expression //to use single parameter & expression (parameter1, parameter2) -> expression //to use multiple parameters & expression (parameter1, parameter2) -> {code block} //to use multiple parameters & conditions, loops and more complex logic " data-lang="text/x-java"> parameter -> expression //to use single parameter & expression (parameter1, parameter2) -> expression //to use multiple parameters & expression (parameter1, parameter2) -> {code block} //to use multiple parameters & conditions, loops and more complex logic View more...Data Observability Doesn't Just Create Savings — It Drives Revenue, TooAggregated on: 2022-05-04 16:50:46 When I talk to data teams about the benefits of data observability and data quality, it’s often framed to prevent the negative impacts of insufficient data: poor decision-making, lost revenue, and even the erosion of customer trust. With Gartner predicting that poor data quality costs organizations $12.9M per year, data observability becomes a no-brainer. View more...Data Insertion and Data Persistence in a Vector DatabaseAggregated on: 2022-05-04 16:20:46 Data Insertion and Data Persistence in a Vector Database. In the previous post in the Deep Dive series, we have introduced how data is processed in Milvus, the world’s most advanced vector database. This article will examine the components of data insertion, illustrate the data model in detail, and explain how data persistence is achieved in Milvus. View more...Portfolio Architecture Examples: Retail CollectionAggregated on: 2022-05-04 15:50:46 This article is a continuation of a series of posts about our project named Portfolio Architectures. The previous post, Portfolio Architecture Examples: Healthcare Collection, begins with a project overview, introduction, and examples of tooling and workshops available for the project. You may want to refer back to that post to gain insight into the background of Portfolio Architectures before reading further. Retail Collection The collection featured today is centered around architectures in the retail industry. There are currently seven architectures in this collection. We'll provide a short overview of each, leaving the in-depth exploration as an exercise for the reader. View more...Fintech and AI: Ways Artificial Intelligence Is Used in FinanceAggregated on: 2022-05-04 15:20:46 The impact and the innovation of AI can be seen everywhere, and fintech is no exception. The disruptive power of financial industries to shape the traditional financial institution is growing because of the advances in artificial intelligence. AI-powered and machine learning technologies in fintech will help analyze large data sets in real-time and have the ability to make improvements. As the demand for such services increases, AI and ML become the key to sustainability and growth in the industry. View more...Testing Schema Registry: Spring Boot and Apache Kafka With JSON SchemaAggregated on: 2022-05-04 14:50:46 Introduction Apache Kafka is the most widely used reliable and scalable eventing platform. It helps in providing the base for a fast, scalable, fault-tolerant, event-driven microservice architecture. Any type of data can be published into a Kafka topic and can be read from. Kafka does not provide an out-of-the-box schema validation system and hence is prone to junk data being fed into a topic. Confluent has devised a concept of a schema registry that can be used to implement type checking of messages in any Kafka installation. The Schema Registry needs the message schema to be registered against a topic and it enforces that only messages conforming to the schema are sent to the topic. View more...Why 1 Good UX Is Worth 5 Engineers w/ Toast's Brad PielechAggregated on: 2022-05-04 00:05:46 Few companies have mastered making products consumers actually want to use like Toast. A $30 billion giant in the tech-food business, Toast faced their worst case scenario during the pandemic when the restaurants at the heart of their business were all forced to shut down. View more...What Does Digital Transformation Mean for the Software Industry?Aggregated on: 2022-05-03 21:50:46 New trends and technologies are rapidly emerging in the IT world. Clients today prefer innovative solutions that can be made available to them as soon as possible. Whether adding new features for existing products or launching completely new software, deploying new functionality continuously becomes the need of the hour. According to Hinge Business Study, changing buyer's requirements and unpredictability in the marketplace were the main challenges businesses face. View more...Quality Engineering Design for AI Platform AdoptionAggregated on: 2022-05-03 21:50:46 Introduction We are in the golden age of AI (1). AI adoption makes businesses more creative, competitive, and responsive. The software-as-a-service (SaaS) model, coupled with the advancements of the cloud, has matured the software production and consumption process. Most organizations prefer to “buy” AI capabilities than “build” their own. Hence SaaS providers, such as Salesforce, SAP, Oracle, etc., have introduced AI platform capabilities, creating AI-as-a-Service (AIaaS) model. This evolution has made AI adoption easier for enterprises (2). For quality assurance (QA) in general, testing in particular plays a vital role in the AI platform adoption. Testing is complex in the adoption of an AI platform and the reasons are: View more...DevOps Operational Benefits — How Does DevOps Sync Your Operations With Your Business Goals?Aggregated on: 2022-05-03 21:20:46 Every year DevOps market is growing at an exponential rate. Considering the current trend of DevOps adoption, the CAGR is at 24.7%, with an expected market capitalization of $10.3 billion by 2023. In laymen's terms, DevOps's goal is to make it feasible for the development and operations teams to collaborate to optimize performance, reduce errors, improve delivery speed, etc. However, harnessing DevOps has tons of operational benefits apart from technical benefits. This blog is dedicated to explaining some of the functional benefits of DevOps and how your operations can sync with your business goals. View more...How to Move IBM App Connect Enterprise to ContainersAggregated on: 2022-05-03 20:20:46 This article is part of a series and follows the previous article, Deploying a Queue Manager from the OpenShift Web Console. IBM App Connect Enterprise was initially created at a time when much integration was performed using messaging, and specifically IBM MQ. Indeed, despite the popularity of more recent protocols such as RESTful APIs, there are still many integration challenges that are better suited to messaging. Today, IBM App Connect Enterprise is used to mediate various protocols, but nearly all existing customers will have some MQ-based integration in their landscape. View more...How to Integrate Zoom in React Application?Aggregated on: 2022-05-03 17:35:46 Zoom is a video conferencing system that gives us the feature to host a meeting with each other. Zoom's advantage is that it allows up to 1,000 participants in each session and offers a 40 minutes meeting limit. That exceeds the number of participants in most other free services. Angular and React JS services address the issue of integrating Zoom in React Application. View more...The Rise of Cybercrime – An OverviewAggregated on: 2022-05-03 17:05:46 Cybercrimes are more rampant in the year 2022. The rate of cybercrimes is increasing every year, and it is expected to reach its highest next year. It is said that cybercrime affects the security of more than 80% of businesses throughout the world today. It is mainly due to the limited capabilities of authorities in monitoring cyberattacks because this type of crime is performed using the virtual world. According to the cybersecurity stats, more than half of cyberattacks are done through ransomware attacks. The statistics further stated that healthcare databases are the most targeted because of their importance to businesses. In addition, social media websites are also abused to spread malware and viruses or compromise sensitive information. View more...How to Deploy a Simple Redis Caching App Built With Next.js and TailwindCSS to Netlify in 5 MinutesAggregated on: 2022-05-03 15:35:46 Netlify is a popular static site hosting serverless platform. It is a popular way to build, deploy, and scale modern web applications to be more scalable and secure. Netlify helps developers to launch websites and campaigns in minutes with no fuss. Netlify is built primarily for JAMstack sites, which unify JavaScript and APIs to allow applications that are well suited for both developers and content editors. View more...Top 10 Criteria to Select the Best Angular Development CompanyAggregated on: 2022-05-03 14:50:46 Started initially as a project in Google and now available as an open-source framework, AngularJS is becoming popular among Angular development companies. Angular JS can be the best option if you want to create a dynamic web application. However, if you wish to turn your app idea into reality, you need high-quality angular development services. Here are the top 10 criteria for selecting the best Angular development Company: View more...Build a Query in MuleSoft With Optional ParametersAggregated on: 2022-05-03 12:05:45 In this tutorial we will see how to: Define a RAML API specification to search products in a catalog database Establish and configure a database connection to query a MySQL database Build a query to support multiple optional filters Add optional sorting capabilities to our query at DB level 1. Define the RAML of a Search API Imagine that you want to create a MuleSoft API to search products inside a catalog. This API will need to accept multiple filter parameters and an optional sorting parameter. All these parameters can be optional and will be used to generate a dynamic query to search products in your catalog database. View more...Leveraging Change Data Capture for Fraud Detection using Arcion CloudAggregated on: 2022-05-03 12:05:45 During the height of the business intelligence (BI) craze earlier in my career, I worked with an internal reporting team to expose data for extract, transform, and load (ETL) processes that leveraged data structures inspired by Ralph Kimball. It was a new and exciting time in my life to understand how to optimize data for reporting and analysis. Honestly, the schema looked upside down to me, based on my experience with transaction-driven designs. In the end, there were many moving parts and even some dependencies for the existence of a flat file to make sure everything worked properly. The reports ran quickly, but one key factor always bothered me: I was always looking at yesterday’s data. View more...Making Machine Learning More Accessible for Application DevelopersAggregated on: 2022-05-03 00:50:45 Introduction Attempts at hand-crafting algorithms for understanding human-generated content have generally been unsuccessful. For example, it is difficult for a computer to “grasp” the semantic content of an image - e.g., a car, cat, coat, etc....… - purely by analyzing its low-level pixels. Color histograms and feature detectors worked to a certain extent, but they were rarely accurate for most applications. In the past decade, the combination of big data and deep learning has fundamentally changed the way we approach computer vision, natural language processing, and other machine learning (ML) applications; tasks ranging from spam email detection to realistic text-to-video synthesis have seen incredible strides, with accuracy metrics on specific tasks reaching superhuman levels. A significant positive side effect of these improvements is an increase in the use of embedding vectors, i.e., model artifacts generated by taking an intermediate result within a deep neural network. OpenAI’s docs page gives an excellent overview: View more...The 5 Healthcare AI Trends Technologists Need to KnowAggregated on: 2022-05-02 23:35:45 Healthcare has been at the epicenter of everything we do for two years. While the pandemic has been a significant driver of the conversation, healthcare technology—artificial intelligence (AI) specifically—has been experiencing explosive growth. One only needs to look at the funding landscape: more than 40 startups have raised at least $20 million in funding specifically to build AI solutions for healthcare applications. But what’s driving this growth? The venture capital trail alone won’t help us understand the trends contributing to AI adoption in healthcare. But the “2022 AI in Healthcare Survey” will. For the second year, Gradient Flow and John Snow Labs asked 300 global respondents what they’re experiencing in their AI programs—from the individuals using them to the challenges and the criteria used to build solutions and validate models. These are the top five trends that emerged from the research. View more...Mule Application Deployment to Cloudhub Using Connected AppAggregated on: 2022-05-02 23:05:45 In this article, we will create a Mule application and deploy the same to the cloud hub using Connected App. Connected APP The Connected Apps feature provides a framework that enables an external application to integrate with the Anypoint Platform using APIs through OAuth 2.0 and OpenID Connect. Connected apps help users delegate their access without sharing sensitive credentials or giving complete control of their accounts to third parties. Actions taken by connected apps are audited, and users can also revoke access. Note that some products do not currently include client IDs of the Connected Apps features. The Connected Apps feature enables you to use secure authentication protocols and control an app’s access to user data. Additionally, end-users can authorize the app to access their Anypoint Platform data. View more...How to Start Using Natural Language Processing With PyTorchAggregated on: 2022-05-02 21:50:45 Natural language processing (NLP) is continuing to grow in popularity, and necessity, as artificial intelligence and deep learning programs grow and thrive in the coming years. Natural language processing with PyTorch is the best bet to implement these programs. In this guide, we will address some of the obvious questions that may arise when starting to dive into natural language processing, but we will also engage with deeper questions and give you the right steps to get started working on your own NLP programs. View more...How to Set Up and Run PostgreSQL Change Data CaptureAggregated on: 2022-05-02 21:35:45 The architecture of modern web applications consists of several software components such as dashboards, analytics, databases, data lakes, caches, search, etc. The database is usually the core part of any application. Real-time data updates keep disparate data systems in continuous sync and respond quickly to new information. So how to keep your application ecosystem in sync? How do these other components get information about changes in the database? Change Data Capture or CDC refers to any solution that identifies new or changed data. View more...Using Unsupervised Learning to Combat Cyber ThreatsAggregated on: 2022-05-02 21:35:45 As the world enters a digital age, cyber threats are rising with massive data breaches, hacks into personal and financial data, and any other digital source that people can exploit. To combat these attacks, security experts are increasingly tapping into AI to stay a step ahead, using every tool in their toolbox, including unsupervised learning methods. Machine learning in the cybersecurity space is still in its infancy stage, but there has been a lot of traction since 2020 to have more AI involved in combating cyber threats. View more...Develop XR With Oracle, Ep 3: Computer Vision AI, ML, and MetaverseAggregated on: 2022-05-02 19:20:45 This is the third piece in a series on developing XR applications and experiences using Oracle and focuses on XR applications of computer vision AI and ML and its related use in the metaverse. Find the links to the first two articles below: Develop XR With Oracle Cloud, Database on HoloLens, Ep 1: Spatial, AI/ML, Kubernetes, and OpenTelemetry Develop XR With Oracle Cloud, Database on HoloLens, Ep 2: Property Graphs, Data Visualization, and Metaverse As with the previous posts, here I will again specifically show applications developed with Oracle database and cloud technologies HoloLens 2, Mixed Reality Toolkit, and Unity platform. View more...JDBCRowSet and JDBCRowSet Event Handling [video]Aggregated on: 2022-05-02 15:35:45 In the video below, we take a closer look at what JDBCRowSet and JDBCRowSet event handling are. This tutorial includes examples. Let's get started! View more...An Introduction to Graph DataAggregated on: 2022-05-01 05:35:44 This article is an excerpt from the book Machine Learning with PyTorch and Scikit-Learn from the best-selling Python Machine Learning series, updated and expanded to cover PyTorch, transformers, and graph neural networks. Broadly speaking, graphs represent a certain way we describe and capture relationships in data. Graphs are a particular kind of data structure that is nonlinear and abstract. And since graphs are abstract objects, a concrete representation needs to be defined so the graphs can be operated on. Furthermore, graphs can be defined to have certain properties that may require different representations. Figure 1 summarizes the common types of graphs, which we will discuss in more detail in the following subsections: View more...OLAs vs. SLAs vs. UCs: What They Mean and How They're DifferentAggregated on: 2022-05-01 05:05:44 Software development is a complex process, and the language that comes with it can be equally complicated. Service level agreements (SLAs), operational level agreements (OLAs), and underpinning contracts (UCs) are just some of the terms you may come across. SLAs, OLAs, and UCs are all parts of the same process, so confusion among the three terms is understandable. As similar as they may be, it’s important to understand their differences. With that in mind, here’s a closer look at what OLAs, SLAs, and UCs are and how they’re different. View more...Agile Coaches Without Technical Knowledge: How To Overcome the ParadoxAggregated on: 2022-05-01 05:05:44 Agile coaches play a vital role in helping companies implement Agile into their ways of working. Coaches may be internal employees of a company, or contractors providing these services on an on-demand basis. In both cases, their goal is to help clients diagnose organizational and interpersonal challenges, and make suggestions on how to use Agile to overcome them. The day-to-day of an Agile coach depends largely from coach to coach and organization to organization. Sometimes, their tasks involve teaching new techniques to large teams; other times, they might help set objectives for an organization, or mentor managers. View more...SOAP APIs Aren't Scary: What You Should Know Before You Build a SOAP IntegrationAggregated on: 2022-05-01 04:35:44 Building your first integration with a SOAP-based API can be daunting. Recently, I’ve helped several companies integrate their apps with third-party apps and services that use SOAP-based APIs. For developers with SOAP experience, the integrations were a breeze. But for the uninitiated, SOAP has a pretty steep learning curve and throws a lot of new terms and acronyms your way: XML, WSDL, envelope, procedure... and a few dozen others. View more...Laravel Cron Scheduling and Its SecretsAggregated on: 2022-05-01 04:05:44 Hi, I’m Valerio Barbera, software engineer, founder, and CTO at Inspector. One of the most useful features of Laravel is the tasks scheduling system. The official documentation clearly explains what it is for: View more...API Security Weekly: Issue 163Aggregated on: 2022-05-01 02:05:44 This week, we have an article on 7 reasons why API security strategies are failing, details on the recent keynote by Werner Vogels at AWS re:Invent on 6 rules for good API design, an article by Cisco on API discovery, and a review of some of the biggest API security attacks in 2021. Article: 7 Reasons Your API Security Strategy Is Failing This week, AmazicWorld featured a review of why API security strategies are failing to have the desired effect. The author’s view is that whilst developers are well-versed in how to create APIs, the security risks that APIs pose are an increasing threat to organizations. These risks are in large part a consequence of rapid API adoption: the sprawl of APIs is widening the threat landscape, and the fact that APIs are well-documented and can be easily reverse-engineered enables attackers to take advantage of them. View more...AWS Serverless Lambda Resiliency: Part 2Aggregated on: 2022-05-01 01:35:44 In this series of articles, we are addressing the patterns for the resilience of cloud-native serverless systems. Please refer to article one for the introduction of this series. Pattern 3: Lambda Synchronous Invocation and Circuit State Validated by API Gateway and Leveraging Fallback Switchover In this option, let's consider Lambdas serving synchronous requests through the API gateway. In this option, the API Gateway starts sending traffic to the fallback service when there are issues with the external service. View more...Using AWS Lambda Function URL To Build a Serverless Backend for SlackAggregated on: 2022-04-30 20:05:44 A combination of AWS Lambda and Amazon API Gateway is a widely-used architecture for serverless microservices and API-based solutions. They enable developers to focus on their applications, instead of spending time provisioning and managing servers. API Gateway is a feature-rich offering that includes support for different API types (HTTP, REST, WebSocket), multiple authentication schemes, API versioning, canary deployments, and much more! However, if your requirements are simpler and all you need is an HTTP(S) endpoint for your Lambda function (for example, to serve as a webhook), you can use Lambda Function URLs! When you create a function URL, Lambda automatically generates a unique HTTP(S) endpoint that is dedicated to your Lambda function. View more...Building a REST API With Feathers.js and SQLiteAggregated on: 2022-04-30 00:05:43 Looking for a way to build a web application with features like authentication, database setup, and authorization without writing a ton of code and configurations? Ever wanted to create a production-ready app in a matter of days? Believe it or not, it's possible! This tutorial will show you how to use Feathers.js to create a REST API in minutes. We'll learn about Feathers.js, implement an example API, and share some thoughts and considerations. Let's begin. View more...How to Handle Early Startup Technical Debt (Or Just Avoid it Entirely)Aggregated on: 2022-04-29 23:35:43 All early startups share the same first goal. No matter which sector you're aiming to disrupt, and no matter what groundbreaking new product or service you plan to disrupt it with, your prime directive is Get to MVP. Fast. After all, until you have something that people are willing to buy, your startup is really only an idea, not a company. The pressure is on to launch your product or service as fast as possible and so embracing easy, "right enough for now" technical solutions makes sense in the early chaos of startup life. But as you start to find success — once you've built and launched that first crucial offering and customers start calling, once you begin hiring more teams to grow both your product and the organization that supports it — the limitations of your initial technical decisions are going to make themselves known. View more...How the TypeScript Pick Type worksAggregated on: 2022-04-29 22:35:43 The TypeScript Pick type is a utility type that is used to create a new custom Type, based on an already existing one. It is the opposite of the Omit Type. Let's look at how it works. Custom Types We are using custom types in this guide. If you're new to custom types, check out my guide on custom types here. View more...What Is HttpSession in Servlets?Aggregated on: 2022-04-29 22:05:43 In the video below, we take a closer look at HttpSession in Servlets and HttpSession Attribute example. Let's get started! View more...SAST in Secure SDLC: 3 Reasons to Integrate It in a DevSecOps PipelineAggregated on: 2022-04-29 16:20:43 Vulnerabilities produce enormous reputational and financial risks. As a result, many companies are fascinated by security and desire to build a secure development life cycle (SSDLC). So, today we're going to discuss SAST — one of the SSDLC components. SAST (static application security testing) searches for security defects in application source code. SAST examines the code for potential vulnerabilities — possible SQL injections, XSS, SSRF, data encryption issues, etc. These vulnerabilities are included in OWASP Top 10, CWE Top 25, and other lists. View more...Portfolio Architecture Examples: Automation CollectionAggregated on: 2022-04-29 11:35:43 This article is a continuation of a series of posts about our project named Portfolio Architectures. The previous post, Portfolio Architecture Examples: Healthcare Collection, begins with a project overview, introduction, and examples of tooling and workshops available for the project. You may want to refer back to that post to gain insight into the background of Portfolio Architectures before reading further. Automation Collection The collection featured today is centered around automation architectures. There are currently six architectures in this collection and we'll provide a short overview of each, leaving the in-depth exploration as an exercise for the reader. View more...Handling Sensitive Data: A PrimerAggregated on: 2022-04-29 03:35:43 Properly securing sensitive customer data is more important than ever. Consumers are increasingly insisting that their data be secured and managed properly. The regulatory environment is also becoming tougher, and business requirements are becoming increasingly complex. The burden is placed on the company and its development teams to meet these requirements while still delighting users. If that leaves you in a bind, we’re here to help with a quick data privacy primer! First, we’ll help you to understand the various kinds of sensitive customer data and the regulations that apply to it. Next, we’ll guide you in assessing your current handling of that data. Finally, we’ll provide direction on how to properly govern that data. View more... |
|
|