News Aggregator


Environmental Impact of the Cloud: 5 Data-Based Insights and One Good Fix

Aggregated on: 2022-03-18 18:35:18

Does using the cloud make your business sustainable? Research suggests that it’s a greener choice.  By moving to the cloud, the e-commerce giant Etsy slashed its energy consumption by 13% (from 7330 MWh in 2018 to 6376 MWh in 2019), saving enough energy to power 450 households for a month.(1) However, migrating to the cloud doesn’t guarantee anything if you neglect to optimize your resource utilization over the long term. 

View more...

Apache Kafka Landscape for Automotive and Manufacturing

Aggregated on: 2022-03-18 18:35:18

Before the Covid pandemic, I had the pleasure of visiting "Motor City" Detroit in November 2019. I met with several automotive companies, suppliers, startups, and cloud providers to discuss use cases and architectures around Apache Kafka. A lot has happened. Since then, I have also met several OEMs and suppliers in Europe and Asia. As I finally go back to Detroit this January 2022 to meet customers again, I thought it would be a good time to update the status quo of event streaming and Apache Kafka in the automotive and manufacturing industry. Today, in 2022, Apache Kafka is the central nervous system of many applications in various areas related to the automotive and manufacturing industry for processing analytical and transactional data in motion across edge, hybrid, and multi-cloud deployments. This article explores the automotive event streaming landscape, including connected vehicles, smart manufacturing, supply chain optimization, aftersales, mobility services, and innovative new business models.

View more...

MQTT Messaging With Java and Raspberry Pi

Aggregated on: 2022-03-18 17:50:18

In December 2021, I had the chance to write a three-post blog series for HiveMQ. They provide an MQTT compatible message broker you can install yourself, or through a cloud service they provide. That cloud service is free to connect up to 100 devices! Even for the most enthusiastic maker, that’s a lot of microcontrollers or computers!  You can find example code for many programming languages on the HiveMQ site, but as a Java and Raspberry Pi fan, I wanted to add some extra examples. The full descriptions are available on the HiveMQ blog, so let me give you a short overview here on DZone to give you an idea of the possibilities.

View more...

Garbage Collection Tuning Success Story: Reducing Young Gen Size

Aggregated on: 2022-03-18 17:20:18

When you tune Garbage collection performance, you are not only improving Garbage collection pause time but also the overall application’s response time and reducing cloud computing cost. Recently, we helped to tune the Garbage collection behavior of a popular application. Just by making a minor change, it resulted in a dramatic improvement. Let’s discuss this garbage collection tuning success story in this post. Garbage Collection KPIs There is a famous saying that "you can’t optimize something that you can’t measure." When it comes to garbage collection tuning, there are only 3 primary Key Performance Indicators (KPIs) that you should be focusing upon:

View more...

PwnKit, or How 12-Year-Old Code Can Give Root To Unprivileged Users

Aggregated on: 2022-03-18 16:50:18

It looks like IT teams have no respite. Following all the hassles caused by Log4j (and its variants), there is a new high profile, high-risk vulnerability making the rounds. CVE-2021-4034, or PwnKit if you’re into fancy CVE nicknames, is a polkit vulnerability that lets unprivileged users gain root privileges on basically any Linux system out there that has polkit installed. NOTE: Patches are now available for Centos6, Oracle6, CL6, Ubuntu16, and Centos8.4 with more to follow. You can track actual distribution support through a CVE dashboard here.

View more...

BPMN Workflows Version Management With Milestone Camunda Cawemo

Aggregated on: 2022-03-18 15:50:18

This article contains a step-by-step guide on how to manage BPMN file versioning and avoid conflicts in Cawemo when multiple team members are working together. It will also help you to avoid overriding BPMN files while updating and tells you how to sync files between the repository and Cawemo.  What Is Milestone? This feature in the Cawemo tool is used to maintain Versioning in BPMN. We can see all of the BPMN history, the creator’s name who has done the changes, and the Last Changed date. We can upload the new version of BPMN without removing/deleting its older version. Steps to Follow: Create a new directory (e.g., Demo) in Cawemo for signed-off deployed BPMN files. Upload working/developed and integrated BPMN (e.g., Demo_BPMN) from code repository/local to the newly created directory as follows.

View more...

7 Common Kubernetes Backup and Recovery Mistakes

Aggregated on: 2022-03-18 14:50:18

As enterprises move Kubernetes into production and increase the number of Kubernetes clusters and applications in use, they need to deliver the same “enterprise-level” services as for other production applications. Implementing Kubernetes backup is critical to protect your applications in the event of an accident, system failure, or deliberate attack. You need an effective and appropriate backup strategy—in addition to whatever built-in resiliency and data protection features your applications may have.  There are several use cases that your Kubernetes backup and recovery strategy should satisfy:

View more...

Spring Boot: Cross-Origin AJAX HTTP Requests

Aggregated on: 2022-03-18 14:50:18

What is CORS (Cross-Origin Resource Sharing)?  In this Spring Boot video tutorial, we take a closer look at the Cross-Origin AJAX HTTP Requests. Let's get started!

View more...

Blink a LED on a Raspberry Pi With Vaadin

Aggregated on: 2022-03-18 00:20:17

As I'm becoming a senior developer in terms of age, I've transitioned from one language to another. One of my main interests has always been clean, easy-to-understand UIs (User Interface). That journey started for me with Director (to create multimedia CD-ROMs), Flash website animation, and Flex Rich Internet Applications (= "Flash on steroids"). When I started developing with Java over 10 years ago, we had some projects with the early versions of Vaadin and JavaFX. As I went on with serverside applications, I only continued with JavaFX for some personal and side projects and loved the way you can create a UI both with XML (FXML actually) and code, exactly the same approach I loved with Flex. Since then, my love for Java and JavaFX only grew and it's still my major programming environment. But JavaFX has one missing piece: running it in the browser... Yes, JPRO can do this, but it needs a license and a dedicated server. And yes, there are some projects ongoing to bring JavaFX fully to the browser, but they are ongoing and not mature yet... Let's look at another approach: Vaadin Flow and run it on a Raspberry Pi to control a LED and show the state of a button.

View more...

Building a Vector Database for Scalable Similarity Search

Aggregated on: 2022-03-17 23:50:17

According to statistics, about 80%-90% of the world's data is unstructured. Fueled by the rapid growth of the Internet, an explosion of unstructured data is expected in the coming years. Consequently, companies are in urgent need of a powerful database that can help them better handle and understand such kinds of data. However, developing a database is always easier said than done. This article aims to share the thinking process and design principles of building Milvus, an open-source, cloud-native vector database for scalable similarity search. This article also explains the Milvus architecture in detail. Unstructured Data Requires a Complete Basic Software Stack As the Internet grew and evolved, unstructured data became more and more common, including emails, papers, IoT sensor data, Facebook photos, protein structures, and much more. For computers to understand and process unstructured data, these are converted into vectors using embedding techniques.

View more...

Streaming Real-Time Chat Messages Into Scylla With Apache Pulsar

Aggregated on: 2022-03-17 23:50:17

At Scylla Summit 2022, I presented "FLiP Into Apache Pulsar Apps with ScyllaDB". Using the same content, in this blog, we'll demonstrate step-by-step how to build real-time messaging and streaming applications using a variety of OSS libraries, schemas, languages, frameworks, and tools utilizing ScyllaDB. We'll also introduce options from MQTT, Web Sockets, Java, Golang, Python, NodeJS, Apache NiFi, Kafka on Pulsar, Pulsar protocol, and more. You will learn how to quickly deploy an app to a production cloud cluster with StreamNative, and build your own fast applications using the Apache Pulsar and Scylla integration. Before we jump into the how, let's review why this integration can be used for a speedy application build. Scylla is an ultra-fast, low-latency, high-throughput, open-source NoSQL platform that is fully compatible with Cassandra. Populating Scylla tables utilizing the Scylla-compatible Pulsar IO sink doesn't require any complex or specialized coding, and the sink makes it easy to load data to Scylla using a simple configuration file pointing to Pulsar topics that stream all events directly to Scylla tables.

View more...

Debugging Race Conditions in Production

Aggregated on: 2022-03-17 23:50:17

Race conditions can occur when a multithreaded application accesses a shared resource using over one thread. Unless we have guards in place, the result might depend on which thread "got there first". This is especially problematic when the state is changed externally. A race can cause more than just incorrect behavior. It can enable a security vulnerability when the resource in question can be corrupted in the right way. A good example of race condition vulnerabilities is mangling memory. Let's say we have an admin user name that is restricted and privileged. You can't change your user name to admin because of validation. But you can change it to anything else...

View more...

Hooks: The Secret Feature Powering the Postgres Ecosystem

Aggregated on: 2022-03-17 23:20:17

What do developers mean when they say Postgres is "extensible"? They're referring to low-level APIs which can change the core functionality of the database. In this post, we will explore a secret - meaning undocumented - feature called hooks which allow developers to not only add features to Postgres, but modify the way that queries are executed and data is parsed. Hooks are used by some of the most popular projects in the Postgres ecosystem, including Timescale, pg_stat_statements, and Supabase. To give you ideas of what can be built, we will see how each of these projects uses specific hooks. At the end of this post, we provide a Makefile, some C code, and compilation instructions to get started customizing Postgres on your own.

View more...

Polymorphism and Dynamic Binding in Java

Aggregated on: 2022-03-17 22:50:17

Polymorphism is an Object-Oriented-Programming concept. Whether you are new to Java programming or a person who has worked with Java for years, you should know what polymorphism is in Java and how it works. Most developers claim that they know the topic well but when it comes to other complex features like static and dynamic binding, they seem underconfident. A good understanding of polymorphism allows us to build efficient object-oriented programs. What Is Polymorphism in Java? Polymorphism is composed of two words:        

View more...

DevOps Maturity Model: Trends and Best Practices in Today’s World

Aggregated on: 2022-03-17 21:50:17

Innovation is critical to driving an organization's growth. Once leaders in their industries, companies like Nokia, Kodak, and Blockbuster failed to innovate and soon lost most market share. Consumers want quicker, better, and more affordable solutions to their problems. You should have systems in place to launch your products in the market as soon as possible — without compromising the quality.

View more...

Steps to Connect to the Database, MySQL DB, or Oracle DB, and More

Aggregated on: 2022-03-17 21:50:17

In the video below, we take a closer look at the steps needed to connect to the database, the MySQL DB, or the oracle DB, and get information in JDBC. Let's get started!

View more...

5 Steps To Implement DataOps Within Your Organization

Aggregated on: 2022-03-17 21:20:17

Successful DevOps Implementation is crucial for organizations looking to scale their business. But, what after you have implemented it successfully? Should you be technologically stagnant? The answer is definitely a “NO.”  Nearly after two decades of DevOps inception, we have access to newer forms of DevOps with enhanced quality and practices. One such form is known as DataOps. According to Gartner, DataOphs is a collaborative data management practice focused on improving the communication, integration, and automation of data flows between data managers and data consumers across an organization. In this blog, we have listed 5 major steps necessary for the successful implementation of DataOps. 

View more...

Writing a Jenkins File for Multi Branch Build Pipeline

Aggregated on: 2022-03-17 21:05:17

Today's software companies maintain a lot of projects and to keep development and deployment activities keep go on for each team without any friction, CICD comes into the picture. Generally, in software development, we create two separate environments for a product: UAT and Prod. UAT is the deployment setup, which is meant for User acceptance testing and is generally used by alpha testers, developers, product managers, and internal folks of a company. On the other hand, Prod is the production environment that is used by users.

View more...

What Is End-to-End Testing?

Aggregated on: 2022-03-17 21:05:17

End-to-end testing, or E2E testing, is a type of performance test go-through during the cycle of mobile app development. All of the functionalities of the product are tested from one end to another to ensure that the entire application flow functions without setbacks. In fact, one of the primary goals of E2E testing is to provide makers with context about the user experience. The real user experience is simulated and all the integral components are validated under test. What Are the Types of End-to-End Testing Methods? Depending on the end goal of the developers, there are two kinds of testing methods: Horizontal E2E Testing This is a testing method that tests the application across various platforms and applications. This kind of testing can be easily conducted in the purview of a single Enterprise Resource Planning (ERP) system. It is the most well-known approach when it comes to E2E testing because it takes into account the perspective of the user. It checks whether the user is able to successfully navigate the app. Vertical E2E Testing E2E testing can also be carried out in sequential layers. This kind of testing is called vertical E2E testing since the system follows a strict vertical hierarchy. All of the different elements of the system are tested from one end to another, to ensure that proper quality is delivered. This kind of testing method is best applied to sophisticated applications that have a lot of moving parts. It is applicable for systems that don’t have user interfaces. Benefits of Conducting E2E Testing & Performance Test Mobile App There are various benefits you can take advantage of if you apply E2E testing. Apart from the basic benefit of providing a comprehensive, end-to-end test, here are the main benefits of conducting E2E testing. Reduces the Risk of Future Bugs: Properly conducted E2E tests also drastically reduce the risk of future bugs. The application is subjected to intensive testing after every iteration – thus ensuring that there are very less bugs in the future. Cost-Effectiveness & Time-Effectiveness: Properly conducted E2E testing can also increase the level of cost associated with the project. By reducing the amount of repetition, E2E testing can save you and your enterprise a lot of time and money. Expands the coverage of the Test: E2E testing also expands the coverage of the test by taking into consideration all of the sub-systems associated with the application. It’s a very enumerative form of testing that looks after the quality of each and every dimension of the application. Increases the Level of Efficiency: All of the professionals involved in the development process prefer E2E testing. Developers don’t have to worry too much about the testing process and the testers can conduct a thorough test of the product. Project managers benefit greatly from the valuable insight they receive. Summing Up To sum it up, E2E testing is a valuable form of testing that will allow your business to benefit from a comprehensive and highly developed app. When you conduct tests on your app, make sure to use E2E testing so that maximum coverage is ensured. It’ll also save you a lot of time and money.

View more...

Why You Need Both IT and OT Cybersecurity

Aggregated on: 2022-03-17 20:50:17

With cyberattacks becoming more prominent and severe in today’s society, it’s no longer sufficient to focus on only information technology (IT) or operational technology (OT) to keep systems safe. While IT concerns an organization’s online infrastructure, OT extends to the connected physical devices it uses, such as smart sensors on manufacturing equipment. You need cybersecurity for both to maintain resiliency across an organization. Here’s a closer look at why both are necessary today and for the foreseeable future.

View more...

How to Clear an HTML Canvas

Aggregated on: 2022-03-17 20:50:17

When we've created a canvas, sometimes we'll want to clear it completely before redrawing something else. Let's look at how to do that. How to Clear HTML Canvas for Redrawing Let's say we have a canvas, and we've already written code like this:

View more...

Unsupervised Learning in Data Mining: Apriori Algorithm

Aggregated on: 2022-03-17 20:05:17

This post will share my knowledge about unsupervised learning in data mining with the simplest algorithm, which we used to generate associated rules to determine the related grocery items customers bought from our e-commerce application/retail stores. Before jumping ahead, Let’s understand a few terms which I will be using in this article.

View more...

Java Memory Architecture and Metaspace

Aggregated on: 2022-03-17 19:35:17

Purpose This article discusses the basic concept of Java memory management and the basics of GC along with heap and stack memory. Garbage Collection The Java program compiles and changes into byte code and runs on a JVM (Java Virtual Machine). Objects of a Java program get created on the dedicated heap memory for that program. Over time, more objects get created and some of the objects (un-referenced and de-scoped) are no longer needed by the program. Garbage collection is the process of Java that performs automatic memory management and frees up memory space by removing the un-referenced objects.

View more...

Creating Your First Svelte App With SvelteKit

Aggregated on: 2022-03-17 19:35:17

Svelte is a lightweight framework for building web applications. When you use it, it looks and feels a lot like other frontend frameworks like React and Vue, but leaves the virtual DOM behind. That, along with other optimizations, means it does far less work in the browser, optimizing user experience and load time. In this guide, we'll be going over how to set up your first Svelte application using SvelteKit. Svelte has a number of different ways to make applications, and SvelteKit is one of the official packages from Svelte for doing that. If you're interested in other frameworks, you might enjoy a similar guide we have on making your first Vue application.

View more...

Modular Feature-Driven Development: The Smartphone Pattern (OS) with React and Redux

Aggregated on: 2022-03-17 19:35:17

Front-end architecture is a very important aspect I consider when developing apps. I've been developing front end since around 2007, and since then, I've been interested in software architecture concepts, design patterns, and code organization. Once, in a code review session, I was trying to explain a certain strategy I would have liked the code would be, then a colleague told me:

View more...

Cross-Validation in AI and Machine Learning for Healthcare

Aggregated on: 2022-03-17 18:35:17

Every time we create a machine learning model, we feed it with data to train it. Then we give the model some unlabeled data (test data) to check how well it performs and generalizes to new data. This model is stable if it works well on anonymous data, is consistent, and can forecast with high accuracy on a wide range of input data. But, this isn't always the case! Machine learning models are not always stable; thus, we must assess their stability. Cross-Validation enters the scene at this point.

View more...

B2B vs B2C Mobile Apps: How to Know the Differences in Development

Aggregated on: 2022-03-17 17:35:17

B2B vs B2C Mobile Apps: How to Know the Differences in Development Say you’re a software manufacturer and you decide to develop an app. The first thing you need to decide on is who you are going to make the app for. Who you make the app for will determine almost everything that will go into the app. This includes things like the UI/UX design, cloud server, the app’s features, its name, and even what terminology it uses.  Who your target audience is will determine what category your app will be classed as. The broadest classification you can make is between business-to-consumer (B2C) apps and business-to-business (B2B) apps. Which one of these categories your app is placed in will determine how you will go about developing your app.

View more...

5 Threat Intelligence Trends

Aggregated on: 2022-03-17 16:50:17

We’re living in a world where technology advances at a breathtaking pace, and cybercriminals are always looking for the latest ways to target organizations and individuals alike. In such a turbulent digital transformation, security experts need to keep up with the latest trends and address the latest potential threats in innovative ways. The world of cyber security is an incredibly fast-moving sector, with both security providers and hackers trying to constantly outsmart each other. Simply put, it’s a constant cycle of coming up with new attack strategies and threats while trying to find new and innovative ways to combat them or eradicate them before they gain more ground.

View more...

Automation Testing: The Bright Future of Software Testing

Aggregated on: 2022-03-17 16:50:17

In the past few years, there has been a “big bang” in the world of software testing, with new trends and innovations coming into IT. One of these innovations is automated testing which has challenged the manual testing approach for good reasons. The development world is now entering a new era where developers can run lots of test cases, generate detailed reports, and deliver products in a short time frame. That being said, we’re going to discuss what automated testing is, why it matters, and what the future holds for it. Let’s begin! 

View more...

Manage Your Milvus Vector Database With One-Click Simplicity

Aggregated on: 2022-03-17 16:35:17

Zilliz has been a pioneer who dedicated itself to enabling users in the face of a rapidly growing demand for unstructured data processing. Zilliz has now open-sourced a graphical user interface, Attu, specifically for Milvus 2.0, an AI-oriented vector database system designed for massive production scenarios. In this article, we would like to show you step by step how to perform a vector similarity search with Attu and Milvus 2.0. Attu (/ ˈætu /) is an island on the west edge of the Aleutian Islands. This uninhabited realm symbolizes an adventurous spirit. In comparison with Milvus CLI, which brings the uttermost simplicity of usage, Attu features more:

View more...

Delete Multiple Resources and Resource Groups in Azure With Tags

Aggregated on: 2022-03-17 01:50:17

You might have noticed that resources comprising some Azure services such as Azure Kubernetes Service (AKS) span multiple resource groups by default. In some cases, you might intentionally want to segregate resources such as disks and network interfaces from VMs by placing them in different resource groups for better management. A common problem arising from the resource spread is that you might find it challenging to delete multiple resources and resource groups to entirely remove a service from a subscription. We can solve the problem by using resource tags to associate resources and resource groups to a service. Tags are key-value pairs that can be applied to your Azure resources, resource groups, and subscriptions. Of course, you can use tags for many other purposes apart from resource management. The Azure docs website has a detailed guide on the various resource naming and tagging strategies and patterns.

View more...

Interview With Tom Granot: Developer Observability, KoolKits, and Reliability

Aggregated on: 2022-03-16 23:35:17

In preparation for the upcoming Developer Observability Masterclass we’re hosting at Lightrun with Thoughtworks, RedMonk, and JFrog, I sat down for a brief interview with Tom Granot – the Director of Developer Relations at Lightrun. Tom will MC the event as he did for the Developer Productivity Masterclass we ran back in December.

View more...

What's New With Java 17 and Containers?

Aggregated on: 2022-03-16 23:05:17

Container platforms and edge computing continue to grow, powering major networks and applications across the globe, and Java technologies have evolved new features and improved performance to match steps with modern infrastructure. Java 17 (OpenJDK 17) was released recently (September 2021) with the following major features: Restore Always-Strict Floating-Point Semantics Enhanced Pseudo-Random Number Generators Strongly Encapsulate JDK Internals Pattern Matching for switch (Preview) Foreign Function & Memory API (Incubator) Vector API (Second Incubator) Context-Specific Deserialization Filters Developers are wondering how to start implementing application logic using the new features of Java 17 and then build and run them on the same OpenJDK 17 runtime. Luckily, Quarkus enables the developers to scaffold a new application with Java 17. It also provides a live coding capability that allows developers to focus only on implementing business logic instead of compiling, building, deploying, and restarting runtimes to apply code changes.

View more...

On Git and Cognitive Load

Aggregated on: 2022-03-16 22:35:17

Any developer working in a modern engineering organization is likely working in git. Git, written by Linus Torvalds in 2005, has been since its creation, basically the ubiquitous tool for source control management. Git gained widespread adoption across engineering organizations as the successor to existing source control management such as Apache Subversion (SVN) and Concurrent Versions System (CVS), and this was mostly a byproduct of the timing. Git predates cloud and improved network connectivity, and therefore the best solution to managing source control at scale was to decentralize and leverage local dev environments to power engineering organizations. Fast forward 17 years, this is no longer the case. Cloud is de facto, networking and internet connectivity is blazing fast, and this changes everything.

View more...

How Vue Components Work

Aggregated on: 2022-03-16 21:35:17

Components let us split parts of our site into reusable pieces which we can then place in multiple places. This can be incredibly powerful - and ultimately means reduced workload, as we can reuse code extensively. You can easily imagine a Vue Component tree that looks a little like the image below. Here, we have two pages, Home, and About. Within each, we have a reusable component, MyDropdown, which we use twice.

View more...

React Apps Can Be Incredibly Fast: Here’s How to Optimize Load Time

Aggregated on: 2022-03-16 21:05:17

Without any doubt, speed is the most important factor for a positive user experience — that is, how much time your app takes to load and display content.    To give you an example, Walmart has reported a +2% conversion per one-second improvement of load time. As per Amazon, every 100ms load time results in a 1% loss in sales.   

View more...

JWT Authentication and Authorization

Aggregated on: 2022-03-16 21:05:17

JWT is one of those rare things that pop up once every now and then that solves a real problem in such a beautiful way it’s almost impossible to ignore, resulting in that it becomes a force of its own and ends up becoming the industry standard. My first reaction to the thing when I discovered it was as follows; “Golly gosh this is cool!” However, it comes with compromises, and it forces you to think differently. In this article I will first explain how it works, then I’ll explain its advantages, for then to finish up with how it changes your thinking. First of all, a JWT token is simply 3 JSON objects, each of which are base64 encoded, for then to separate each base64 encoded JSON object with a ”.”. A typical JWT token, therefore, looks like this. Plain Text   eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9. eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6I kpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ. SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c Notice the two . characters in the above example. Also, notice I have added CR/LF sequences to the above example to simplify understanding. An actual JWT token cannot have CR/LF sequences in it. If you break down the above token at for instance jwt.io you can see its 3 segments. These are as follows.

View more...

How to Get Started With Vaadin Flow

Aggregated on: 2022-03-16 20:35:17

In this blog, I will show you how I got started with Vaadin Flow. With Vaadin Flow, you can create web apps without HTML or JavaScript, but entirely with Java. Let’s get started! 1. Introduction For some time, I have been curious about Vaadin Flow. I am not very good in frontend developement but sometimes I try to get myself together and then I take a look at a frontend framework. In a previous post, I looked at React for example. Although the React introduction was a nice experience, I still did not think I could create a frontend with React before investing a serious amount of time. At Twitter, I often saw posts coming by about Vaadin and this took my interest. So, I put Vaadin on my blog todo list.

View more...

Java on Raspberry Pi

Aggregated on: 2022-03-16 19:20:17

Hello, DZone Community! This is my first post here: sorry for ignoring this community until now! :-)

View more...

Spring Boot - How To Use Native SQL Queries | Restful Web Services

Aggregated on: 2022-03-16 18:50:17

In the video below, we take a closer look at Spring boot - how to use native SQL queries? | RESTful Web Services. Let's get started!

View more...

How To Set Up a Scalable and Highly-Available GraphQL API in Minutes

Aggregated on: 2022-03-16 18:50:17

A modern GraphQL API layer for cloud-native applications needs to possess two characteristics: horizontal scalability and high availability.  Horizontal scalability adds more machines to your API infrastructure, whereas vertical scalability adds more CPUs, RAM, and other resources to an existing machine that runs the API layer. While vertical scalability works to a certain extent, the horizontally scalable API layer can scale beyond the capacity of a single machine. 

View more...

DNS Gotchas With CockroachDB and GSS-API

Aggregated on: 2022-03-16 16:20:16

We just pushed a new release of CockroachDB and Postgres also had a recent release with a vulnerability impacting GSS. I figured it was a good time as any to update my repos with the latest versions of Postgres and Cockroach, and thereby test that everything works. I discovered an issue that is easily fixed but changes the behavior of cockroach and psql clients. High-Level Steps Start a three-node CockroachDB cluster in Docker with GSSAPI. Demonstrate the problem scenario. Verify. Step by Step Instructions Start a Cluster There's nothing more special about this tutorial than what was covered in my previous tutorials. Feel free to set up a stand-alone environment to follow along or use my docker-compose environment.

View more...

Where Spring Boot Meets Machine Learning Services: A Study

Aggregated on: 2022-03-16 16:05:17

This is an article from DZone's 2022 Enterprise AI Trend Report.For more: Read the Report In 1978, Bell Labs computer scientist Brian Kernighan introduced the most commonly known programming task in history: 

View more...

A MAP for Kubernetes Supply Chain Security

Aggregated on: 2022-03-16 15:05:17

The sharp increase in software supply chain attacks has made securing the build and delivery of software a critical topic. But what does this mean for Kubernetes DevOps teams tasked with securing their continuous delivery pipelines and clusters? To get started with securing a Kubernetes supply chain there are four things you will need to consider: Artifacts, Metadata, Attestations, and Policies (A-MAP). Let’s dive in! In a prior post, Dan Lorenc (Founder/CEO at Chainguard) and I discussed container image signing and verification. 

View more...

Apache Druid vs StarRocks: A Deep Dive

Aggregated on: 2022-03-16 01:50:16

In recent years, an increasing number of enterprises began to use data to power decision-making, which yields new demands for data exploration and analytics. As database technologies evolve with each passing day, a variety of online analytical processing (OLAP) engines keep popping up. These OLAP engines have distinctive advantages and are designed to suit varied needs with different tradeoffs, such as data volume, performance, or flexibility. This article compares two popular open-source engines, Apache Druid, and StarRocks, in several aspects that may interest you the most, including data storage, pre-aggregation, computing network, ease of use, and ease of O&M. It also provides star schema benchmark (SSB) test results to help you understand which scenario favors which more.

View more...

Overcoming Web Test Automation Challenges With Ease

Aggregated on: 2022-03-15 19:20:16

Introduction Automation has become an integral part of any software development process. It has contributed to the digital transformation of many organizations worldwide. In this era where agile development is adopted widely to stay ahead in the competition, the demand for automation has become inevitable. Organizations are relying on their fast and sleek websites and mobile apps as their primary source of revenue generation, customer interaction, transaction processing, feedback, etc. Keeping the website usability and mobile apps at the focus, it becomes absolutely necessary to automate the testing process to provide a better user experience through a stable and friendly UI, and web test automation can make this possible. Web automation testing is transforming the whole software industry. It has made the testing process so easy for testers that it has enabled them to catch and resolve issues in the development process rapidly and effortlessly. Adopting Agile development is a costly affair and demands quick delivery in a limited timeframe. The responsibility to identify issues in a timely manner and ensure a quality software release at the same time demands more from the testing teams. Web test automation eases this pressure to perform by providing high test coverage, easy identification of prevailing issues, and enabling faster test execution.

View more...

Data Fabric Architecture: Modern Way of Data Management and Integration

Aggregated on: 2022-03-15 18:35:16

Data Fabric provides a single environment to access data and enable simpler and unified data management by connecting data from disparate sources. Such a data architecture helps businesses to discover unique, business-relevant relationships between the available data points. Data fabrication is an architecture that is developed to standardize data management practices across multiple environments cloud, on-premises, and edge devices. Data fabric is listed among Gartner’s top 10 Data and Analytics trends.  It also allows enterprises to cost-effectively leverage technologies such as artificial intelligence and IoT by reducing time for integration design by 30%, deployment by 30%, and maintenance by 70%. With the increasing scalability and complexity of data from disparate environments in enterprises, a data fabric architecture helps to take the data to the right place and at the right time to make business analysis easy. Thus, it helps to unleash the power of data to meet business demands. 

View more...

Best Practices to Secure Your API

Aggregated on: 2022-03-15 17:05:16

An Application Programming Interface (API) is a set of protocols that allow software components to interact. The intermediary interface is commonly used for streamlining development by enabling software teams to reuse code. APIs also abstract functionality between systems by decoupling applications from the infrastructure they run on. Though APIs’ benefits and use cases in modern business continue to rise, inherent security challenges present various security risks.  This article delves into various risks associated with API vulnerabilities while learning common API security best practices to implement robust security mechanisms.

View more...

The Rise of the Data Reliability Engineer

Aggregated on: 2022-03-15 16:05:16

With each day, enterprises increasingly rely on data to make decisions. This is true regardless of their industry: finance, media, retail, logistics, etc. Yet, the solutions that provide data to dashboards and ML models continue to grow in complexity. This is due to several reasons, including: The ability to process data from diverse sources at a low cost An explosion in the availability and variety of data tools (impacting collaboration and decision making, beyond technical work) Tight dependencies among data assets managed by different departments within companies This need to run complex data pipelines with minimum rates of error in such modern environments has led to the rise of a new role: the Data Reliability Engineer. Data Reliability Engineering (DRE) addresses data quality and availability problems. Comprising practices from data engineering to system operations, DRE is emerging as its own field within the broader data domain.

View more...

Devoxx UK 2022: Designing Your Best Architecture Diagrams

Aggregated on: 2022-03-15 16:05:16

As mentioned previously, I've pushed a few talks to the Devoxx UK 2022 conference being held May 11-13 in London. The Devoxx series is well known, and I've attended and spoken at multiple sessions for the Belgian version in the past. It's very developer-centric with a lot of good depth and knowledgeable attendees. 

View more...