News AggregatorUsing XML Policies to Log and Analyze API Calls from Azure API ManagementAggregated on: 2022-03-25 04:20:22 Azure API Management (APIM) is a powerful platform that enables you to publish and scale APIs while ensuring they are secured. One of the great features of Azure APIM is that you can add plugins and transforms to your APIs without any code change or restarts. These capabilities are deployed using XML Policies which are a collection of statements. Moesif API Observability can be added in just a few minutes using an XML policy for APIM which makes it easy get visibility into API calls, even ones that are rejected and never reach your underlying service. View more...Cognitive AI Meets IoT: A Match Made in HeavenAggregated on: 2022-03-25 03:50:22 Over the last decade, the Internet of Things (IoT) has caused widespread disruption in every sphere of our life. The evolution of IoT is not influenced by advancement in the unique technology segment; instead, a series of emerging technologies and innovation trends have converged together to create a unified experience of the ubiquitous world. The emergence of Edge computing, the 5G/ 6G revolution, and cloud computing have introduced a set of architectural patterns to minimize latency, network bandwidth requirements and allowed systems to scale beyond the limit. In the world of ‘new normal, the endless opportunities with both business and social transformations will weave IoT applications into our everyday life with billions of sensors seamlessly interacting with each other. Big Data and advanced analytics have transformed the massive volume of sensory signals and multimedia feeds into actionable insights and new revenue streams across the digital value chains. A rapid expansion in exposing pervasive channels and deploying intelligent automation have brought critical challenges towards the future of digital transformation in the 21st century. The promising applications of AI and ML are mostly executed within the centralized cloud ecosystem, far from the point of action. Such intelligence is not designed to gain situational awareness from within the operating landscape. Harnessing the benefit of capturing and analyzing temporal data and timely interpretation of sensory events within the active window of the operational cycles are emerging as the key imperatives to gain strategic advantage and address cybersecurity concerns. As the diversity of sensors and applications grow exponentially, structured intelligence or prebuilt rule-based automation deployed in the edge runtime will not be efficient and extensible to elevate process automation and autonomic functions. View more...Low Code Platforms Require Software Development SkillsAggregated on: 2022-03-25 03:20:22 Why it matters: IT leaders seeking to democratize technology with low code citizen developer projects may not realize low code platforms still require application development skills. The big picture: Regardless of required development effort, building more apps for workers to contend with increases complexity and builds technical debt. View more...API Monetization Models for Usage-based BillingAggregated on: 2022-03-25 03:20:22 Why monetize APIs? API monetization is a great way to recoup your investment into your API programs. Without direct monetization, you’re dependent on other sources of capital to grow the program, such as other profit centers or venture capital. If you’re not directly monetizing your APIs, you could be leaving money on the table. This can be especially true if you don’t have any limits in place and lean on the honor system. View more...10 JetBrains Extensions to Fight Technical DebtAggregated on: 2022-03-25 02:50:22 My last article on 10 VS Code Extensions to Fight Technical Debt got over 50.000 views and 500 reactions. It doesn't surprise me as today I see many Engineering teams under huge pressure to build fast and often lacking time to fix and clean up their codebase. View more...5 Tips for a Successful Threat HuntAggregated on: 2022-03-25 02:20:23 Survey data suggests that around 40% of SOCs (security operations centers) have started implementing specific threat hunting protocols. These protocols are created for cyber threat hunting or catching advanced threats that traditional tools and software missed. Most tools and protocols are sophisticated enough to detect most threats. However, hackers are constantly striving to create new techniques and approaches that evade detection. Unfortunately, even newer tools that are AI-powered can miss detecting advanced threats. View more...Who Needs GameDays? Resilience Testing Using TestcontainersAggregated on: 2022-03-25 01:50:22 As you may agree, it is important to test your code. The resilience patterns implemented in your application are code (even if they're just a bunch of annotations). Often I saw that this is not tested thoroughly or not at all. With Testcontainers, writing integration tests has become a commodity. We envision the same for resilience tests, so Steadybit open-sourced a small library built with the knowledge from our Chaos Engineering platform to help you write resilience tests with minimal effort and without installing extra software on your servers. The library is available on Maven Central and Github for everyone. In this post, we will add some resilience tests to a sample application using it. View more...The Best Developer Conferences of 2022Aggregated on: 2022-03-25 00:05:22 Unlike a lot of industries, conferences for developers are actually worth it. They aren’t just an excuse to spend your T&E budget, stay in a new hotel and see some bands that are over the hill. Why? Between learning the actual skills of programming and the actual work of building, leading and creating teams of developers, there is a massive skills gap. Unless you’re lucky enough to have a mentor with all the answers you need to grow your career, the best way to learn what you don’t know is by tapping into the developer community. View more...5 Reasons Why Technologists are Optimistic About Full-Stack ObservabilityAggregated on: 2022-03-24 23:35:22 The world has become more app-centric, increasing the demand for always-on, seamless, and secure digital experiences. As a result, organizations in all sectors ramped up their efforts to achieve full-stack observability to bring together disconnected tools and generate unified visibility across their IT environment. A recent report from Cisco AppDynamics, "The Journey to Observability," reveals the transition to full-stack observability is now a priority for 90% of organizations around the world. View more...JDBC DriverManager and 4 Types of JDBC DriversAggregated on: 2022-03-24 23:05:22 In the video below, we take a closer look at JDBC DriverManager and 4 types of JDBC drivers. Let's get started! View more...3 Best Tactics To Prevent Technical Debt as an EngineerAggregated on: 2022-03-24 22:35:22 The expression technical debt gets thrown around a lot and every Engineer knows that it slows down the development process. In this article, I want to give practical advice that your engineering team can manage and solve technical debt without spending a lifetime on it. Let’s Define Technical Debt... Often technical debt refers to a rushed development process or a lack of shared knowledge among team members. However, don't forget that in many cases technical debt is inevitable and is part of a normal software development process. View more...How To Boost Your In-house Enterprise DevOps Talent?Aggregated on: 2022-03-24 22:35:22 In 2010, Amazon moved from physical serves to Amazon web services. This initiative was a part of their enterprise DevOps transformation. Needless to say, it worked in their favor. Like this, there are numerous organizations that are leveraging enterprise DevOps for greater scalability, efficient collaboration, and communication, faster release cycles, better code quality, etc. But, adopting enterprise DevOps is not a piece of cake. To successfully implement enterprise DevOps, you need to hire reliable people who live and breathe DevOps. Or, you may follow key practices to boost your in-house DevOps talent. In this article, let’s discuss a few of such key practices! View more...How to Provision an Azure SQL Database With Active Directory AuthenticationAggregated on: 2022-03-24 22:05:22 In this article, we will talk about how to provision an Azure SQL Database with authentication restricted to Active Directory users/groups/applications. We will use Pulumi to do that. Why This Article? In a previous article, I already talked about connecting to an Azure SQL Database using Azure Active Directory authentication. However, my focus was on querying an Azure SQL Database from C# code (from an ASP.NET 6 Minimal API that was using Microsoft.Data.SqlClient "Active Directory Default" authentication mode, to be more precise), and not on the configuration of the Azure AD authentication itself. View more...Dynamic Signaling for Managing Communication Between Two Separate BPMN FlowsAggregated on: 2022-03-24 21:05:21 This document explains how to implement Dynamic Signaling in BPMN processes or event sub-processes to execute particular process instances or threads. Problem Statement: A signal event is generally used to communicate between two separate BPMN flows. However, the signal event has a global scope. It will broadcast the event to all related sub-flows and handlers. Whenever BPMN interacts with multiple requests, it is difficult for the process engine to identify the exact instance to process. There is also the possibility of the thrown signal getting caught by all active handlers and multiple requests at a time, which may lead to wrong execution. View more...How to Mkdir Command Works in LinuxAggregated on: 2022-03-24 20:35:21 On Linux and UNIX-like systems, like Mac, we use mkdir to make a new directory from the terminal. To do this, open up a new terminal, and make sure you're in the right directory using the cd command. The syntax for mkdir looks like this, where dir_name is the name of your new directory, and [OPTIONS] are optional settings. View more...GitOps: What Is It and How Does It Work?Aggregated on: 2022-03-24 20:05:21 Over the years, software development methodologies have changed from the waterfall model, to agile, to what we call DevOps today. Even though these methodologies focus mostly on cultural aspects, they are all backed by powerful tools and technologies that make the work more straightforward than before. Just as Docker and Kubernetes boosted DevOps adoption by making containerization easier for organizations, we are now witnessing GitOps gain traction but with Git at the center of the approach. This article will explore GitOps: Why is it used? How does it work? View more...Multi-Cloud Data Layer EssentialsAggregated on: 2022-03-24 20:05:21 By implementing more applications in the cloud as microservices, the data services needed to support these applications will be delivered by different technologies and databases — each optimized by the needs of the microservices it is supporting. The optimal result is a multi-cloud data layer with the capability to deliver the appropriate data services for any use case. A multi-cloud data layer delivers core capabilities for both existing applications to help bridge digital transformation initiatives as well as new cloud-native applications and microservices. This Refcard further explores multi-cloud data layer core capabilities, considerations, and essential workloads. View more...Using SingleStore DB, Spark and Alternating Least Squares (ALS) To Build a Movie Recommender SystemAggregated on: 2022-03-24 19:05:21 Abstract Recommender Systems are widely used today for many different applications. Examples include making product recommendations in e-commerce, restaurants, movies, music playlists, and more. This article will show how to build a recommender system for movies using Alternating Least Squares (ALS). We'll perform some initial data analysis using Spark and then use its built-in support for ALS to generate vectors. We'll then store these vectors in SingleStore DB. Using SingleStore DB's built-in DOT_PRODUCT and UNHEX functions, we'll make movie recommendations by directly executing code in the database system. View more...JDBC Introduction and ArchitectureAggregated on: 2022-03-24 16:50:21 How does the JDBC Application work? What is JDBC Connection URL? Find out in this introductory video tutorial about JDBC and its architecture. Let's get started! View more...Portfolio Architecture Examples: Healthcare CollectionAggregated on: 2022-03-24 16:05:21 For a few years now we've been working on a project we have named Portfolio Architectures. These are based on selecting a specific use case we are seeing used in the real world by customers and then finding implementations of that case using three or more products from the Red Hat portfolio. This basic premise is used as the foundation, but many aspects of open source are included in both the process and the final product we have defined. There is a community, where we share the initial project kickoff with a group of architects and use their initial feedback from the start. We also present the architecture product we've created right at the end before we publish to ensure usability by architects in the field. The final published product includes some internal-only content around the customer projects researched, but most of the content is open and freely available through various open-source channels. View more...Get Started With Reactive Programming With Kotlin on QuarkusAggregated on: 2022-03-24 16:05:21 Moving to the cloud with event-driven architecture raises big concerns for enterprises using multiple programming languages such as Java, C#, JavaScript, Scala, and Groovy to implement business requirements. Because enterprises need to redesign multiple architectures for container deployment separately and put more effort into optimizing production on the cloud, developers often must learn a new programming language in line with the production environment. For example, Java developers have to switch their skill sets to Node.Js to develop lightweight event-front applications. Kotlin addresses these issues and targets various developers who deploy business applications with multiple programming languages on top of Java Virtual Machine (JVM). Kotlin handles these issues with both imperative and reactive approaches. However, there's still a hustle to catch up on Kotlin's new syntax and APIs, especially for Java developers. Luckily, the Quarkus Kotlin extension makes it easier for developers to implement Kotlin applications. View more...Java Auto-SynthesisAggregated on: 2022-03-24 14:50:21 Java { T obj; Base(T obj) { this.obj = obj; } T getob() { return obj; } } class Sub extends Base { Sub(String str) { super(str); } String getob() { return obj; } }" data-lang="text/x-java"> class Base<T> { T obj; Base(T obj) { this.obj = obj; } T getob() { return obj; } } class Sub extends Base<String> { Sub(String str) { super(str); } String getob() { return obj; } } How many methods of the sub-class in the above code snippet will we have after compilation, and why? Let’s make it a little bit simpler: How many methods will the sub-class will have, excluding the methods inherited from java.lang.Object? View more...PyTorch Geometric vs. Deep Graph LibraryAggregated on: 2022-03-24 02:35:21 A Comparison Between Graph Neural Networks: DGL vs. PyTorch Geometric What is deep learning on graphs? In general, a graph is a system of nodes connected by edges. The nodes typically have some sort of internal state that can be modified by the relationships to other nodes defined by the edges connecting them to other nodes, and these connections and node states can be defined in a wide variety of ways. View more...4 Challenges of Using Anonymous User Data for UEBAAggregated on: 2022-03-24 02:05:21 User and entity behavior analytics (UEBA) tools support a cybersecurity strategy by looking for anomalies. These tools establish a baseline usage for users, devices, and networks, then flag cybersecurity teams about significant deviations from those norms. People are highly interested in how user behavior analytics could cut cyberattack risks. One market analysis showed that the UEBA sector was worth $1.2 billion in 2022. However, researchers believe it will get to $4.2 billion by 2026. However, the push towards anonymizing user data for the sake of privacy could hinder that growth. User and entity behavior analytics work best when decision-makers at the companies using the technology can narrow down potential problems. Anonymous UEBA data would limit the trends it's possible to pinpoint. Here's a closer look at why anonymized information is not a good fit for UEBA platforms. View more...Java Development in 2022: Predictions and Selected TrendsAggregated on: 2022-03-24 01:35:21 Last year was interesting — a new LTS release, some amazing successes, but also a global vulnerability was discovered. In this article, we will try to guess and predict how the industry will face the new challenges, and what innovations and developments will affect it the most. General Trends 1. Migration From Java 8 A lot of apps still work on Java 8 — and it is easy to see why. It is still supported by many vendors, and there are many steps you need to take to migrate from 8 to 9 and higher because of radical changes introduced in Java 9. But we think that 2022 could be the year many people will finally decide to move to the latest LTS version for several reasons. View more...How to Put a Database in KubernetesAggregated on: 2022-03-24 01:35:21 The idea of running a stateful workload in Kubernetes (K8s) can be intimidating, especially if you haven’t done it before. How do you deploy a database? Where is the actual storage? How is the storage mapped to the database or the application using it? At KubeCon North America 2021, I gave a talk on “How to put a database in Kubernetes” where I demystified the deployment of databases and stateful workloads in K8s. Basically, it boils down to a few key steps: View more...Clean Cases and the Curse of the MinoansAggregated on: 2022-03-24 00:05:21 Introduction We are what we write. From writing requirements and use-cases, user stories, test-cases, and code. We could be digging for known problems or for exploring and learning. At the end of the day, case writing is a special form of storytelling. View more...Java UUID Generation: Performance ImpactAggregated on: 2022-03-24 00:05:21 Java developers tend to use the ‘java.util.UUID#randomUUID()’ API to generate a UUID (Universally Unique Identifier) number (i.e., ‘b8bbcbed-ca07-490c-8711-5118ee0af2f9’). Under certain circumstances, using this API can affect your application’s availability. Let’s discuss this API in this post with a real-world example. How Does the ‘java.util.UUID#randomUUID()’ API Work? java.util.UUID#randomUUID() API internally uses ‘entropy‘ in the operating system to generate a unique number. What does ‘entropy’ mean? The Linux kernel uses certain techniques like a user’s mouse movements, variance in the hardware fan noise, variance in the noise of the device drivers, etc. to generate random numbers. When there is a lack of ‘entropy’ in the operating system, then random number generation will slow down. When there is a slowdown, application threads that are calling this ‘java.util.UUID#randomUUID()’ API call will be put in a BLOCKED state, and they wouldn’t be able to progress further. View more...Data Breach: A 5-Step Response PlanAggregated on: 2022-03-24 00:05:21 Introduction A data breach is one of the worst scenarios in today’s enterprise security, and for good reason. It entails reputational problems, disruption of business processes, and penalties for noncompliance with increasingly rigid data protection laws. Unfortunately, these incidents are steadily gearing up for a rise. Even ransomware attacks can now be considered data breaches, as most extortionist gangs extract confidential information out of corporate networks as part of their raids. There are different catalysts for this security nightmare. In most cases, cybercriminals retrieve proprietary data from a remotely compromised corporate server. The threat may also stem from an insider who abuses their access privileges and gets hold of valuable files behind your back. Sometimes sensitive data is unintentionally leaked via a company’s misconfigured application or component. Scenarios vary, but they all have one thing in common – the upshot can be devastating. View more...Fill Out the 2022 Jakarta EE Developer Survey!Aggregated on: 2022-03-24 00:05:21 The 2022 Jakarta EE Developer Survey, sponsored by the Jakarta EE Working Group, is now open. The survey will be open until May 6th. If you use or depend on Java/Jakarta EE (and that's most of us), it is very important that you fill out the survey before it closes. This is the fifth year of this survey. The purpose of the survey is to understand what real-world Java developers need and how Jakarta EE should evolve to meet those needs. The survey is one of the Java industry’s most significant. You can take a look at last year's results here. View more...How to Wrap Text in HTML CanvasAggregated on: 2022-03-23 23:20:21 Although adding text to HTML canvas is very common, there is no built in line break functionality. That means if our text is too long, the text will run off the end. Take the example below, where the text is supposed to be "Hello, this text line is very long. It will overflow". Since it's too long to fit in the canvas, it just overflows with no line breaks: Code for this example: View more...A Complete and Comprehensive Guide to ISO 27001 ComplianceAggregated on: 2022-03-23 22:05:21 Image Source It’s not unfair to say that our online data is caught in a tug-of-war between continually updated security controls and hackers that relentlessly find new, inventive ways of breaching those controls. View more...MongoDB to Couchbase, Part 4: Data ModelingAggregated on: 2022-03-23 21:35:21 To Embed or Not to Embed. That is the Question. - Hamlet Data modeling is a well-defined and mature field in relational database systems. The model provides a consistent framework for application developers to add and manipulate the data. Everything is great until you need to change. This lack of schema flexibility was a key trigger for NoSQL database systems. As we've learned before, both MongoDB and Couchbase are JSON-based document databases. JSON gives the developers schema flexibility: the indexes, collections, query engine provide access paths to this data. The developer uses MQL in MongoDB and N1QL in Couchbase to query this data. Let's compare the modeling methods in Couchbase. Note: This article is short because the modeling options are similar. That's a good thing. Some differences in modeling options, access methods, and optimizations are highlighted below. View more...Truth and Proof: Building Trust in Machines Through AIOpsAggregated on: 2022-03-23 21:35:21 IT systems are only getting more complex, with greater pressures to solve issues faster and demonstrate value consistently. Issues within systems, which dev teams could once handle all on their own, sprout up too fast and too often for direct human intervention. Artificial intelligence for IT Operations (AIOps) tools exist today to deliver automated monitoring and solution development, “no humans required” — significantly easing dev teams’ many burdens. Adopting AIOps should be simple enough, then. But one of the tougher sticking points has been trust. Can humans trust a machine to identify root causes of issues and create accurate and effective solutions? The stakes are high — if a machine gets it wrong, the burden on human teams compounds quickly. View more...How Does TCP Work?Aggregated on: 2022-03-23 21:05:21 What Is TCP? TCP (Transmission Control Protocol) is a protocol for machines to communicate over a network, and is the foundation on which the internet is built. One of the most useful characteristics of TCP is that it is 'resilient', which means it can cope with an unreliable network without losing any data. View more...Exception Breakpoint that Doesn't Suck and a Real Use Case for Method BreakpointsAggregated on: 2022-03-23 21:05:21 Two weeks ago, I left this series in a “cliffhanger” of sorts. Well, as much as a programming blog can leave things in the air… The big one amongst them is the premise that exception breakpoints don’t have to suck. If you used them in the past, you would know that grabbing all exceptions is ridiculous. You end up at a breakpoint every second and it doesn’t help. There’s a solution, and it’s discussed in duckling 6 number 7 also covers a lot of interesting ground for us and another cliffhanger on method breakpoints: View more...Building a Slack App With Native SFDC IntegrationAggregated on: 2022-03-23 20:35:21 Part 1: Getting Going With the Starter Kit Businesses depend on Slack for communication and Salesforce for data management. As one might expect, conversations in Slack don’t always correlate to changes in Salesforce records. Being able to share data between these two services can increase team productivity by eliminating the need to switch between them. In December of 2021, Salesforce produced a video series explaining how to build Slack Apps using their APIs. Building on top of any platform can be intimidating: You have to learn about how authentication works, the methods you can call, the events you can listen for, and so on. Slack has excellent documentation and an SDK, Bolt, which reduces a lot of boilerplate logic, getting you more quickly from an idea to an actual app. View more...MySQL DB Installation: Using MySQL Workbench to connect to MySQL DB and how to Install the Mysql 8 ServerAggregated on: 2022-03-23 18:35:21 In the video below, we take a closer look at MySQL DB Installation: Using MySQL Workbench to connect to MySQL DB and how to install the Mysql 8 Server. Let's get started! View more...Reshaping PyTorch TensorsAggregated on: 2022-03-23 18:35:21 It is a reasonable thing to expect n-dimensional tensor to have a possibility to be reshaped. Reshape means to change the spatial size of a container that holds underlying data. One can create any n-dimensional tensor that wraps a numerical array as long as the product of dimensions stays equal to the number of the array’s elements. Python import torch # underlying data data = [1,2,3,4,5,6,7,8] # has 8 elements # two ways to store identical data tens_A = torch.tensor(data).reshape(shape=(2,4)) # 2-dimensional tensor of shape (2,4) tens_B = torch.tensor(data).reshape(shape=(2,2,2)) # 3-dimensional tensor of shape (2,2,2) View more...Python, NoSQL and FastAPI Tutorial: Web Scraping on a ScheduleAggregated on: 2022-03-23 16:05:21 Can there be other use cases for Cassandra beyond messaging and chat? In this tutorial, we show you how to web scrape on a schedule by integrating the Python framework called FastAPI with Astra DB, a serverless, managed Database-as-a-Service built on Cassandra. Recently, I caught up with the Pythonic YouTuber Justin Mitchell from CodingEntrepreneurs and we discussed how today’s apps are tackling global markets and issues. He pointed out that Discord stores 120 million messages with only four backend engineers—and that was back in 2017. View more...The Battle Of New Industry Standards: Is WebRTC Making Zoom Redundant?Aggregated on: 2022-03-23 15:35:21 In the last couple of years, the way people and businesses communicate and collaborate has changed significantly. At the beginning of the Covid-19 pandemic, video conference calls evolved as the go-to way for business communication. A Gartner report confirms, by 2024, only 25% of meetings will take place in person, down from 60% today (source). Marketsandmarkets, a leading tech consulting firm, also confirms this trend, it says that the global video conferencing market size will grow to the tune of US$ 22.5 billion by 2026 with a 19.7% CAGR growth rate (source). However, this also intensified the clash for dominance between different between Zoom and WebRTC based tech players. To cater to the growing needs for new-age video conferencing solutions, there is an increased focus on new industry standards. As a result, WebRTC (Web Real-Time Communication) has become the latest web standard. Integrating real-time communication capabilities through the web browser, WebRTC makes click-to-start meetings possible without downloading any dedicated app or plug-in. Moreover, it has taken over the conventional approach of using proprietary signaling and infrastructure as deployed by platforms like Zoom to battle over standards and codecs in the early phase. Let us examine how WebRTC does this. View more...7 Tips To Get Productive Again After LanguishingAggregated on: 2022-03-23 15:35:21 Do you sometimes feel as though you have hit a wall with your work? It is easy to go from being productive to feeling stagnant, especially when projects are not moving towards their end goal fast enough. Also, it’s difficult in uncertain times to stay focused, motivated and productive. If this sounds familiar, don't worry: it happens to everyone! A quick word on how we’re using "languishing." This is defined as the state of being stagnant, inactive, or dull. It's easy for this to happen if you're not careful! It can especially be hard to get back into your work routine after experiencing a spell of languishing. If you have been languishing for a long period of time, it can seem daunting to think about getting back into your normal groove again. We are here to help you get back into the swing of things. View more...Test Case vs. Test Scenario: Key Differences to Note for Software DevelopersAggregated on: 2022-03-23 01:50:20 Test cases and test scenarios are two of the most common test artifacts: both are documentation produced by the software development team in order to track progress on a project. With the current shift away from the Waterfall method of software development and towards Agile testing, it is important to understand the differences between test cases and test scenarios. But it is also important to note that the methods are most valuable when used together appropriately. View more...The Five Skills You Must Master To Be Outstanding as a Software EngineerAggregated on: 2022-03-22 23:50:20 Areas of technology have been growing exponentially and bringing with them several opportunities and specializations. Among these thousands of options, we have software engineering and architecture. However, with so much content and easy access to happiness, what would be the best way to reach the goal that will achieve the desired satisfaction? In this debate, we will significantly address the area of expertise in software engineering or, in other words, career approaches such as "techniques." Let's share five engineering skills for you, the professional software technician. View more...How the LS Command Works on LinuxAggregated on: 2022-03-22 23:35:20 On a Linux or UNIX-based system, ls is one of the most useful commands you can know. Fundamentally, it tells you information of files and folders on your system - and is extremely useful when you only have access to a server or computer via a terminal window. Let's look at how it works, and discuss some of the features of ls that you may not know. The syntax for ls looks like this, where [OPTIONS] are optional settings, and [FILE|FOLDER] is an optional link to the file or folder we want to check. If we only type ls, it will check the current folder. View more...JDBC Create Table and Drop Table ExamplesAggregated on: 2022-03-22 22:50:20 In the video below, we take a closer look at JDBC, create table, and drop table with examples. Let's get started! View more...Kubernetes Multi-Cluster Management and GovernanceAggregated on: 2022-03-22 20:50:20 Due to the performance nature of modern cloud-native applications, Kubernetes environments need to be highly distributed. Proper multi-cluster management and governance ensure consistent, secure operations across all environments. In this Refcard, we further explore Kubernetes multi-cluster management and governance, why it's important, and core practices for success. View more...12 Useful JavaScript NewslettersAggregated on: 2022-03-22 19:20:20 As any software developer knows, it's vital that you keep learning to improve your game and stay on top of things. This is especially important in the JavaScript ecosystem, where things keep evolving quickly, especially with all the awesome frameworks we have today. One of the simplest ways to do this is by subscribing to useful JavaScript newsletters and getting updates and tutorials straight into your inbox. In this post, let's look at 12 of the best ones. View more...Chaos Mesh + SkyWalking: Better Observability for Chaos EngineeringAggregated on: 2022-03-22 18:20:20 Chaos Mesh is an open-source cloud-native chaos engineering platform. You can use Chaos Mesh to conveniently inject failures and simulate abnormalities that might occur in reality, so you can identify potential problems in your system. Chaos Mesh also offers a Chaos Dashboard which allows you to monitor the status of a chaos experiment. However, this dashboard cannot let you observe how the failures in the experiment impact the service performance of applications. This hinders us from further testing our systems and finding potential problems. Apache SkyWalking is an open-source application performance monitor (APM), specially designed to monitor, track, and diagnose cloud-native, container-based distributed systems. It collects events that occur and then displays them on its dashboard, allowing you to observe directly the type and number of events that have occurred in your system and how different events impact the service performance. View more...3 Steps To Streamline Kubernetes Multi-Cluster ManagementAggregated on: 2022-03-22 16:05:20 The footprint of Kubernetes is expanding rapidly in all industries. Many enterprises already operate multiple Kubernetes clusters in multiple regions to address the needs of global operations and reduce application latency for customers worldwide. You may already have a large number of Kubernetes clusters in on-premises data centers and a number of public cloud locations, possibly using several cloud providers to avoid lock-in. Unfortunately, operating a distributed, multi-cluster, multi-cloud environment is not a simple task. Kubernetes is a relatively new technology. It’s hard to find staff with Kubernetes skills or to identify the best tools for multi-cloud Kubernetes management. View more... |
|
|