News AggregatorTarantool: Speeding Up Development With RustAggregated on: 2022-04-16 16:05:35 As you may know, Tarantool supports any programming language that is compatible with C and can be compiled to machine code. Among other things, it is possible to implement stored procedures and modules in Lua and C. Nevertheless, we have already used Rust in two of our projects, and in one of them, we converted the Lua code to Rust entirely, thus achieving a 5x performance improvement in comparison with the Lua version and about the same output as the C version. I am Oleg Utkin from Tarantool, and my main expertise is in data-intensive storage systems. I will cover the two projects mentioned above and the reason why we find Rust so good — it has long had various bindings for the Tarantool API and for Lua modules writing. For example, you can write Rust code for Tarantool right away, along with stored procedures and third-party modules that can be used without Lua. Are you interested? Then let's roll! View more...Exploring Multi-Region Database Deployment Options With a Slack-Like MessengerAggregated on: 2022-04-16 15:05:35 Distributed database deployments across multiple regions are becoming commonplace. And there are several reasons for that. More and more applications have to comply with data residency requirements such as GDPR, serve user requests as fast as possible from the data centers closest to the user, and withstand cloud region-level outages. This article reviews the most widespread multi-region deployment options for distributed transactional databases by designing a data layer for a Slack-like corporate messenger. View more...Understanding the Database Connection Pool (DBCP) PropertiesAggregated on: 2022-04-16 02:35:35 Recently, I faced an issue related to a very high load on the database layer. The database was having too many connections in parallel. I had to review my application’s database connection pool (DBCP) properties very closely. Since I was dealing with legacy code, I needed to understand the value assigned to each property and also analyze whether it is relevant for the present-day load or not. As I started looking at the properties, their values, and the consequent implications, I was able to find a decent explanation in the tomcat documentation. However, I wasn’t able to immediately map each property to the scenario where it will be used. Since we were using Apache tomcat’s JDBC connection pool, I started reading the source code to get a better understanding. I was able to get a lot of clarity by going through the ConnectionPool class. As I didn’t find any easy resource to understand the same, I am summarizing my understanding in the form of simple flowcharts. I hope this will help others in a similar situation. View more...Extend Kubernetes Service Discovery With Stork and QuarkusAggregated on: 2022-04-16 00:05:35 In traditional monolithic architecture, applications already knew where the backend services existed through static hostnames, IP addresses, and ports. The IT operation team maintained the static configurations for service reliability and system stability. This Day 2 operation has significantly changed since microservices began running in distributed networking systems. The change happened because microservices need to communicate with multiple backend services to improve load balancing and service resiliency. The microservices topology became much more complex as the service applications were containerized and placed on Kubernetes. Because the application containers can be terminated and recreated anytime by Kubernetes, the applications can't know the static information in advance. The microservices don't need to be configured with the static information of the backend applications because Kubernetes handles service discovery, load balancing, and self-healing dynamically and automatically. View more...API Security Weekly: Issue 162Aggregated on: 2022-04-16 00:05:35 This week, we have details of compromised Google Cloud accounts being used to mine cryptocurrency (mainly with weak or no passwords on API connections), there’s an article on how GraphQL can be used as an API gateway (including security controls), a very comprehensive guide to all things relating to API security, and a new API security training course from AppSecEngineer. Vulnerability: Compromised Google Cloud Accounts Used to Mine Cryptocurrency The main story this week comes from HackerNews and describes how attackers are able to exploit improperly secured Google Cloud Platform (GCP) tenants. The impact on affected users included compromising their cloud resources, like uploading cryptocurrency mining software, and ransomware and phishing attacks. View more...How the TypeScript Exclude Type WorksAggregated on: 2022-04-15 23:35:35 In TypeScript, the Exclude utility type lets us exclude certain members from an already defined union type. That means we can take an existing type, and remove items from it for specific situations. Let's look at how the exclude utility type works in TypeScript. View more...Specialists Are Not Cogs in the MachineAggregated on: 2022-04-15 16:50:35 In a recent article, I argued that it is becoming even harder to be a credible full stack developer, one who is sufficiently up to date to contribute to every stage of developing a modern web- and/or mobile-based application. You’re not expected to build it all by yourself, obviously, but given enough time and with a little help from Stack Overflow, you could. Such requirements were not unrealistic in the year 2000. In a typical LAMP-stack app (Linux, Apache, MySQL, Perl) you hand-coded most of your HTML and CSS. JavaScript was still optional and frameworks that kept all presentation concerns on the browser had yet to arrive. The backend created the views and besides a few indispensable modules (CGI, DB), standard Perl did the trick. View more...GCP DevOps: Top 7 Implementation ServicesAggregated on: 2022-04-15 16:35:35 As more companies are turning to the Cloud for their application development needs, a new challenge emerged. The physical dedicated servers were proving to be slow, expensive, and required a lot of maintenance to keep up with the growing speed of the market as a whole. The emergence of Agile methodologies was a step in the right direction. However, even these Agile methodologies fell short in keeping up with the increased demand. This is where DevOps came into the picture to change the culture to a more efficient, reliable, and secure way to develop, manage, and monitor applications. With that said, Google Cloud Platform (GCP) is a collection of cloud computing services from Google. It runs on the same infrastructure that Google uses internally for its end-user products, such as: View more...Successful AI Requires Data GovernanceAggregated on: 2022-04-15 04:35:34 As tech applications increasingly include artificial intelligence (AI) aspects, people involved in building or using them cannot overlook the need for data governance. It should address details such as: Where does an AI product's data exist? View more...5 Steps to Strengthen API SecurityAggregated on: 2022-04-15 03:50:34 APIs are the connective tissue of scalable websites — fundamental to functioning in today’s digital world. But much like the physical world, weaknesses in connections and associated protocols can result in significant, sometimes existential, trouble. A recent instance includes data leaks that stemmed from the misconfiguration of Microsoft Power Apps portals to enable public access. When examining this case, UpGuard found that the type of data varied between portals, and even included personal information that was used for COVID-19 contact tracing and COVID-19 vaccination appointments — as well as Social Security numbers, employee IDs, and millions of email addresses and names. View more...The True State of SAP S/4HANA in 2022Aggregated on: 2022-04-15 03:50:34 "By my estimate, more than 89% of the S/4 transformation is still to be done." As I was preparing for a recent webinar, I was looking for data on the current state of S/4HANA adoption from ECC customers, and what I found was quite interesting. View more...Taking Your Database Beyond a Single Kubernetes ClusterAggregated on: 2022-04-15 03:20:34 Global applications need a data layer that is as distributed as the users they serve. Apache Cassandra has risen to this challenge, handling data needs for the likes of Apple, Netflix, and Sony. Traditionally, managing data layers for a distributed application was handled with dedicated teams to manage the deployment and operations of thousands of nodes — both on-premises and in the cloud. To alleviate much of the load felt by DevOps teams, we evolved a number of these practices and patterns in K8ssandra, leveraging the common control plane afforded by Kubernetes (K8s) There has been a catch though — running a database (or indeed any application) across multiple regions or K8s clusters is tricky without proper care and planning up front. View more...The Testing Pyramid: How to Structure Your Test SuiteAggregated on: 2022-04-15 03:20:34 For over a decade, the testing pyramid has been helping developers plan automated software tests. In this article, we’ll explore what makes up the pyramid, how it is helpful, and what alternative “shapes” there are. What Is the Testing Pyramid? Introduced by Mike Cohn in his book Succeeding with Agile (2009), the pyramid is a metaphor for thinking about testing in software. It’s an idea that has caught on so strongly that, to this day, it’s still the industry standard in engineering circles. The pyramid attempts to visually represent a logical organization of testing standards. It consists of three distinct layers: View more...Roman Pichler: The Product Owner [Video]Aggregated on: 2022-04-14 22:50:34 HoA #38: An Introduction In this energizing 38th hands-on Agile session, Roman Pichler delves into your questions on the role of the product owner. The topics range from product manager vs. product owner vs. business analyst to the right size of a product backlog to linking product vision to product goal and sprint goal. The Ask-Me-Anything With Roman Pichler on the Product Owner During the session, Roman addresses the following questions: View more...Demystifying How 'this' Works in JavaScriptAggregated on: 2022-04-14 21:50:34 It's something used in JavaScript, but it is often a mystery. In JavaScript, this works quite differently from other programming languages - and it works differently depending on if you are using strict mode or not. If you find it hard, you aren't alone. Let's look at exactly how this works and remove any confusion about its meaning in various contexts. View more...NoSQL Migration EssentialsAggregated on: 2022-04-14 21:05:34 Need help with your NoSQL migration? Look no further than our "NoSQL Migration Essentials" Refcard. We walk through the primary steps for moving out of a relational database, plus important design principles to understand and consider in your migration process. Readers will review key concepts that range from denormalizing and modeling data to defining access patterns, designing primary keys and indexes, and creating an entity relationship diagram — all demonstrated with a simple site application example. As a bonus, readers can use the included JSON structure at the end to interact with a NoSQL playground. View more...Top Automation Practices to Avoid During TestingAggregated on: 2022-04-14 20:35:34 Introduction The quality of software solutions delivered to consumers determines the success of every software development company. The hard work of the QA team, which frequently tests and updates the software product to keep it up to date, is one of the most significant factors in ensuring the product’s quality. Automation testing best practices and appropriate test automation technologies can help a company achieve this, but what if your tests fail despite your best efforts? Automation testers make mistakes in their eagerness to do their best, which costs them time and money. It also raises questions about their competency and trustworthiness. It may sound like a nightmare for the company but breathe a relief because you can prevent these blunders. Automation Testing Practices That Testers Need to Take a Break From When executing various types of automation testing in the automation testing life cycle. Many novice testers and developers make automation testing blunders. It’s more vital to avoid some of the automation testing practices than it is to get the testing right. Many automation testing tools, automation frameworks, and some AI-based automation tools in the market claim to be a one-stop-shop for all automation testing issues. You can resolve the problem to some extent, but half of it remains, leaving behind the costly impact of the consequences. View more...How the TypeScript Extract Type WorksAggregated on: 2022-04-14 20:05:34 The Extract utility type lets us check a union type for specific members, and returns a new type based on what is leftover. It's quite similar in format to the Exclude type. Let's find out how it works. View more...Message Queuing and the Database: Solving the Dual Write ProblemAggregated on: 2022-04-14 19:35:34 Developing a modern application means developing for the cloud, with uptime, scalability, geographic distribution, and low latency at the forefront of concerns. This has led to the widespread adoption of application architectures based on event-driven microservices. Breaking the elements of an application down into microservices allows us to (for example) scale different services independently. It is simply the most efficient way to architect applications for the cloud. However, embracing event-driven microservices also presents some challenges. With so many different services in motion at the same time, communication between them can become a challenge. View more...What Can Go Wrong While Following Agile MethodologyAggregated on: 2022-04-14 19:35:34 Introduction Most of the Job Postings you will see will have the term Agile Process mentioned somewhere in their Job Description. If you talk to Developers or Managers in your network, most of them will tell you that their teams are using Agile Methodology. So I believe it is fair to say that the term Agile Process is trending nowadays in Software Industry, and using Agile Process in your team is as cool as using AI/ML in your code. Agree? View more...Using the PDF Embed API With Vue.jsAggregated on: 2022-04-14 15:20:34 I've recently become acquainted with Adobe's PDF Embed API. As you can probably guess by the name, it's a library for embedded PDFs on a web page. It is not just a simple viewer; it has APIs for interacting with the PDF and excellent mobile support. This is a part of the Document Cloud service that provides other PDF tools (extraction, conversion, and so forth). I've been playing with the viewer a bit and wanted to see what Vue.js integration would look like. Here's my solution, but note that I'm still learning about the product, so it could probably be done better. First off, to use the API, you need a key. Clicking the link from the webpage will walk you through generating a key. One important note on this, though. You have to lock down your key to a domain, and that domain cannot be changed either. Also, you can only specify one domain. So, if you want your domain and localhost, create two projects, generate two keys, and set them as environment variables for your development and production environment. I did my testing on CodePen and had to use this domain: cdpn.io View more...From Zookeeper to Raft: HA and Fault-ToleranceAggregated on: 2022-04-14 01:20:34 Introduction Alluxio implements a virtual distributed file system that allows accessing independent large data stores with compute engines like Hadoop or Spark through a single interface. Within an Alluxio cluster, the Alluxio master is responsible for coordinating and keeping access to the underlying data stores or filesystems (UFS for short) consistent. The master contains a global snapshot of filesystem metadata, and when a client wants to read or modify a file, it first contacts the master. Given its central role in the system, the master must be fault-tolerant, highly available, strongly consistent, and fast. This blog will discuss the evolution of the Alluxio master from a complex multi-component system using Zookeeper to a simpler and more efficient one using Raft. The operation of a file system can be thought of as a sequence of commands performed on the system (e.g., create/delete/read/write). Executing these commands one at a time in a single thread gives us a sequential specification for our file system that is easy to reason about and to implement applications on top of. While this sequential specification is simple, the actual implementation of Alluxio’s virtual distributed file system consists of many moving parts all executing concurrently: the master who coordinates the system, the workers who store the file data and act as a cache between the client and the UFS, the UFSs themselves, and the clients who, at the direction of the master, access all other parts of the system. Again here, we may want to reason about each of these individual components as a sequential thread executing one operation at a time, but in reality, they are running complex systems themselves. View more...Go Application Vulnerability CheatsheetAggregated on: 2022-04-14 01:20:34 Securing applications is not the easiest thing to do. An application has many components: server-side logic, client-side logic, data storage, data transportation, API, and more. With all these components to secure, building a secure application can seem really daunting. Thankfully, most real-life vulnerabilities share the same root causes. And by studying these common vulnerability types, why they happen, and how to spot them, you can learn to prevent them and secure your application. View more...SingleStore DB Loves RAggregated on: 2022-04-14 00:50:34 Abstract The R programming language is very popular with many Data Scientists. At the time of writing this article, R ranks as the 11th most popular programming language according to TIOBE. R provides many compelling data manipulation capabilities enabling the slicing and dicing of data with ease. Often data are read into and written out of R programs using files. However, R can also work with database systems. In this article, we'll see two quick examples of how Data Scientists can use R from Spark with SingleStore DB. View more...Making Your Own Email Subscription Service with Node.JSAggregated on: 2022-04-13 21:20:33 It's common for websites to have a subscription button, where you can pass along your email address, and you'll receive emails every week, month, or day. Sometimes, these are automated emails, and sometimes they are custom posts written by an editor. It's also common to pay for this service, sometimes extortionately. In this article, I'll show you it's pretty easy to create your own, although you will obviously still have to pay for hosting. Let's look at how to create an email subscription service with MongoDB and Node.JS. View more...How to Build an Image Carousel Using SvelteTransitionsAggregated on: 2022-04-13 21:20:33 Svelte contains some inbuilt transitions that are useful to create an easy animation. Let’s learn about transitions in Svelte by creating an image carousel component. Image Carousel is a series of images that are moved one after another either automatically with a timer or manually using some buttons. View more...How to Manage Your JDKs With SDKMANAggregated on: 2022-04-13 20:50:33 In this blog, you will learn how to manage several Java Development Kits (JDKs) on your Linux system using SDKMAN. Besides JDKs, several other SDKs can be managed by means of SDKMAN. Enjoy! 1. Introduction Some time ago, a colleague of mine showed me how he used SDKMAN and how easy he could maintain different versions of JDKs, Maven, etc. on his Linux system. I had heard of SDKMAN before but did not yet take the time to take a closer look at it. But now I did :-). View more...Beta Testing — A Brief GuideAggregated on: 2022-04-13 20:50:33 What Is Beta Testing? User Acceptance Testing is another name for beta testing. Beta testing is the type of testing we did before the software was released. It is also a type of silent testing that does end-to-end software testing. Real people usually carry it out. After the alpha testing, this testing was carried out. A limited number of users are given access to beta testing to verify functionality, usability, and accessibility, among other things. Alpha Vs Beta Testing View more...A Quickstart Guide to Apache KafkaAggregated on: 2022-04-13 20:50:33 Want to install Apache Kafka on your machine as well as send and receive messages? Here is a quick walkthrough of how to do it. 1. Download Apache Kafka Go to https://kafka.apache.org/downloads and download the latest release of Apache Kafka. View more...Best Practices for Apache Ranger-Based Authorization for Your Data PlatformAggregated on: 2022-04-13 20:20:33 Introduction Alluxio enables data orchestration for compute in any cloud. It unifies data silos on-premise and across cloud environments to provide the data locality, accessibility, and elasticity needed to reduce the complexities associated with orchestrating data for today’s big data and AI/ML workloads. Alluxio is designed to help any framework access any data, from any storage at high performance regardless of the environment, which enables an organization to remain agile and competitive in adopting and experimenting with new and existing technologies. View more...Verification and Validation in TestingAggregated on: 2022-04-13 20:20:33 Introduction You are at the right place! This is not a free vocabulary-building class but a critical evaluation of a much sought-after debate around verification and validation in the software testing world. Why do we need to know the difference between Verification and Validation? Even though they sound just about the same, they carry different meanings depending on what you intend to do as a tester/developer in the software development and testing process. They both go hand in hand while solving a problem. However, there is a lot of confusion around the meaning of these two words concerning software testing. While there may be many definitions of these terms in various fields on the internet, here we will look at these terms in the testing space and analyze both of these terms in detail. Verification vs Validation Software testing is a vast field. It involves various methods and processes proposed to solve different software testing issues. Verification and Validation are also a part of the same group in software testing. It is also known as a V-Model (Verification and Validation model) in the context of software development and testing. View more...Saving Form Data in Client-side StorageAggregated on: 2022-04-13 19:50:33 Today's post is one of those that started off with me worrying that it was going to be too simple and quickly turned into a bit of a complex little beast. I love that as it usually means my expectations were wrong and I've got a chance to expand my knowledge a bit. This post came from a simple idea: While working on a form, can we save your form data for restoring later in case you navigate away, close the tab by accident, or perhaps get "surprised" by an operating system update. While this is not something you would want to use in every situation (for example, storing a new password field), there are plenty of examples where this could be helpful, especially in a larger form. For our demo, I will only cover client-side storage, which means the data will be unique to one browser on the device. Although what I described here could be tied to a back-end service for storing temporary form data as well. View more...How the TypeScript Record Type WorksAggregated on: 2022-04-13 19:20:33 TypeScript Records are a great way to ensure consistency when trying to implement more complex types of data. They enforce key values and allow you to create custom interfaces for the values. That sounds confusing, but let's see how it works in practice. View more...Don’t Have a DevOps Team? This Is Why You’re WrongAggregated on: 2022-04-13 19:20:33 If you’re not sure what “DevOps” means and whether or not you need a DevOps team in your organization, this article is for you. Here, I provide an overview of DevOps and its various facets, discuss why you most probably want a dedicated DevOps team in your company, and cover those edge cases where you might not need one. What Is “DevOps”? “DevOps” is a workplace culture that merges “development” and “operations.” Before the DevOps methodology was established, engineers worked in silos, focusing solely on their particular area of expertise and usually unwilling to learn about other fields. DevOps eliminates silos by ensuring collaboration between developers and operations engineers throughout the software development lifecycle (SDLC). Teams can thus deliver optimized products much faster. View more...Building a Slack App with Native SFDC Integration: Part 3Aggregated on: 2022-04-13 17:50:33 Synchronizing Data At last, we’ve arrived at the final part of our series on using Salesforce’s Slack Starter Kit to quickly scaffold a deployable Slack App that interacts with Salesforce data. The Slack Starter Kit makes it tremendously easy to authenticate with Salesforce, organize your code into reusable chunks, and deploy the project to Heroku for live access. We’ve largely based this series on these video tutorials showcasing how to build Slack Apps. In our first post, we got acquainted with the Slack Starter Kit and set up our development environment. In our second post, our Slack app issued a query to fetch data from a Salesforce org and then presented the result with UI components from Block Kit. Now, we’re going to extend that pattern to showcase how you can edit Salesforce data entirely within Slack. Let’s get started! View more...5 Steps to Implementing File Upload in Node.jsAggregated on: 2022-04-13 17:50:33 Image Source What Is Node.js? Node.js, also known as Node, is an open-source development platform for running JavaScript code on the server-side. Node is useful for developing applications that require a persistent connection from the browser to the server. View more...Benefits of Setting Initial and Maximum Memory Size to the Same ValueAggregated on: 2022-04-13 17:05:33 When we launch applications, we specify the initial memory size and maximum memory size. For the applications that run on JVM (Java Virtual Machine), initial and maximum memory size is specified through "-Xms" and "-Xmx" arguments. If Java applications are running on containers, it’s specified through "-XX: InitialRAMPercentage" and "-XX: MaxRAMPercentage" arguments. Most enterprises set the initial memory size to a lower value than the maximum memory size. As opposed to this commonly accepted practice, setting the initial memory size the same as the maximum memory size has certain "cool" advantages. Let’s discuss them in this post. 1. Availability Suppose you are launching your application with the initial heap size to be 2GB and the maximum heap size to be 24GB. This means when the application starts, the operating system will allocate 2GB of memory to your application. From that point, as the application starts to process new requests, additional memory will be allocated until a maximum of 24GB is reached. View more...Formatting Tips and Tricks for Adobe Document Generation APIAggregated on: 2022-04-13 16:20:33 I’ve been having a fun time playing around with our Adobe Document Generation API service. It provides an easy-to-use API for generating PDFs and Microsoft Word docs based on a template and your data. Today, I will give you a deep dive into another topic — formatting. When I talk about formatting, I’m talking about ways to display excellent information in your documents. Imagine for a moment the following text in your Microsoft Word document: View more...Kubernetes Performance Tuning: Make the Most of Your ClustersAggregated on: 2022-04-13 15:50:33 Image Source Why Is Kubernetes Performance Tuning Needed? As Kubernetes becomes a basic infrastructure for many organizations, performance tuning for Kubernetes clusters is becoming more important. Kubernetes is a highly scalable open-source platform for orchestrating containerized workloads in server environments. It enables declarative configuration and automation of computing resources. View more...Your Daughter's Favorite Dev Fixed Tech's Mentorship Problem w/ AMEX VP Sarvenaz MyslickiAggregated on: 2022-04-13 00:35:33 If you looked up the term “firing on all cylinders” in the dictionary, I’m fairly confident there would be a picture of Sarvenaz Myslicki next to it. A next-gen leader who earned the role of VP of Technology at American Express by the age of 30, Savernaz is a published author, an in-demand thought-leader on mentorship and has one of the largest followings on programmer TikTok. View more...Imposter Syndrome: The Silent Dream KillerAggregated on: 2022-04-13 00:35:33 A lot of you are brilliant, and you don’t know it. It saddens me to see such wasted potential in those that think they are not good enough but in fact are amazing and often 10 times better than those that think highly of themselves. These people, not all of them, but some, I feel suffer from imposter syndrome. I will do my best to explain my experiences with this mental state of mind and how I’m currently battling with it. Once you understand what imposter syndrome means, and read a real-life example, I hope you get some mental clarity. View more...Top Python Coding Best Practices for BeginnersAggregated on: 2022-04-12 22:50:33 In March 2022, Python made headlines in the programming world by becoming the most popular programming language. After years of hovering in the top ranks, it finally surpassed Java and C to reach the number one spot on the TIOBE index. And why not? After all, it is such a fun and powerful language to work with. It is fast, user-friendly, open-source, and has a community comprising millions of programmers across the globe. View more...Understanding Cross Browser Testing and Responsive TestingAggregated on: 2022-04-12 20:50:33 Introduction The Internet is inevitable in the current time. It is everywhere, and the entire world depends on it to function, perform day-to-day activities and stay connected with people from different corners. Gone are the days when testers only chose to create websites for selected browsers and hardly faced issues maintaining a website on a few browsers. As the technology matured, many significant players entered the browser market. Even the users evolved, became tech-savvy, and improved their browsing habits. Now was a time when businesses were in critical need of cross-browser testing and responsive testing to stay ahead of the competition. Cross-browser testing focuses on the website's overall functionality; responsive web testing verifies the look and feel of the web application. Cross-browser testing deals with the analysis of the web browsers that their users use, and responsive testing deals with the devices where the company's user base visits the websites. Let us shed some light and understand cross-browser and responsive testing in detail. What Is Cross Browser Testing? We all know that testing cross-browser compatibility of websites "is of utmost importance. It helps understand how stable your web application is across various technologies, browsers, operating systems, and devices. The adoption of cross-browser testing is to provide a better user experience irrespective of which browser-OS-device combination your users use to access your website. In cross-browser testing, the testers generally validate the web application's functionality and ensure its user-friendliness and performance are up to the mark across the web browsers. Businesses can also take the help of cloud-based automated cross-browser testing tools to have access to a wide range of real devices to test their web and mobile applications. Different browser engines render websites differently; even the version of each browser causes the code uniquely. It means the code behind the websites is read differently by every browser. So, various cross-browser testing strategies are critical for website accessibility. It is how different browsers render a web page: View more...JDBC: Clauses, Sorting Data, Create and Drop Database, and Table ExamplesAggregated on: 2022-04-12 20:05:33 In this video tutorial, we take a closer look at JDBC Insert, Update, Read, Delete, Where, and Like clauses, as well as sorting data, create and drop database, and table examples. Let's get started! View more...Kafka for Real-Time Replication Between Edge and Hybrid CloudAggregated on: 2022-04-12 20:05:33 Not all workloads should go to the cloud! Low latency, cybersecurity, and cost-efficiency require a suitable combination of edge computing and cloud integration. This blog post explores architectures and design patterns for software and hardware considerations to deploy hybrid data streaming with Apache Kafka anywhere. A live demo shows data synchronization from the edge to the public cloud across continents with Kafka on Hivecell edge hardware and serverless Confluent Cloud. Not Every Workload Should Go Into the Cloud Almost every company has a cloud-first strategy in the meantime. Nevertheless, not all workloads should be deployed in the public cloud. A few reasons why IT applications still run at the edge or in a local data center: View more...How Fetch Works in JavaScriptAggregated on: 2022-04-12 19:50:33 We must use the fetch API; if we want to get data from an API or post data to a server, I. As is implied by the name, fetch() gives us a way to send and receive HTTP requests through requests and responses. The fetch() function is a global function, and it is most frequently used to interact with APIs. If you're new to it, you're not alone - so let's look at how fetch() works. View more...What Are Java Servlets and Servlets Basics? | Servlets Life Cycle | How Servlets WorksAggregated on: 2022-04-12 19:05:33 In the video below, we take a closer look at Java servlets and servlets basics along with Servlets Life Cycle. Learn how Servlets work etc. Let's get started! View more...What Are the Differences Between Big Data and Data Analytics?Aggregated on: 2022-04-12 19:05:33 Table of Content Introduction Understanding big data and data Analytics What a data analyst does What a data scientist does. Congruences between data analytics and data science A balance between technology and consulting Conclusion Introduction Especially in a business context, the metaprocess of digitization has established numerous terms relating to data analysis. However, on closer inspection, it is not always as easy to name their specific meaning and delimitation as one might think at first glance. Data engineering, big data, data science, or data analytics? Lots of new terms and some need explanation. We would like to shed some light on the darkness and explain the differences and similarities of a common pair of terms: big data and data analytics. With the emergence of new branches and branches of industry, the need to make processes, occupational fields, and technologies communicable with new terms grow. View more...Not Just Buckets: Are You Aware of ALL Your Public Resources?Aggregated on: 2022-04-12 19:05:33 Public exposure to resources is a point of dread for many security practitioners. Public resources are low-hanging fruit for attackers seeking to access sensitive information or manipulate an activity -- or even deny the availability of mission-critical resources. One well-known culprit for exposing resources is AWS built-in mechanisms. While misconfiguring them is a common and legitimate concern for security practitioners charged with protecting AWS environments, we often see another mechanism that may be even more misconfiguration-prone: resource-based policies. View more...The Pros and Cons of Embedded SREsAggregated on: 2022-04-12 18:35:33 To embed or not to embed: That is the question. At least, that’s one of the questions that companies have to answer as they decide how to implement Site Reliability Engineering. They can either embed SREs into existing teams, or they can build a new, separate SRE team. View more... |
|
|