News Aggregator


Create a Svelte Reusable Tab Component Without Complicated CSS

Aggregated on: 2022-03-03 19:50:07

Tabs are a key feature in any application. They are needed for effective navigation between the various parts of the application and switching between different views. We can easily create and manage tabs in Svelte. However, the question is whether we can create a Svelte Reusable Tab Component. We can definitely create a reusable tab component in Svelte very easily. All we have to use is basic Javascript logic, some rudimentary CSS, and a custom event dispatcher. We don’t need to use complicated routing solutions. By simply using these basic building blocks, we can create a working tab solution that also keeps track of the active tab. Such an approach is very suitable for small applications.

View more...

How To Use V-for in Vue

Aggregated on: 2022-03-03 19:20:07

Often times when we are creating an application, the data we use determines what we show to the user. For example, in a to-do application, we may have multiple to-do list items. In Vue, it is easy to display multiple data points through the v-for attribute in our Vue templates. How To Use V-for in Vue Let's suppose we have some data we are storing on a single page component. Our .vue document looks a bit like this:

View more...

Rest Assured: Get User Details, API Test Client, and API Automation

Aggregated on: 2022-03-03 19:05:07

In the video below, we take a closer look at Spring Boot's Get User details, API test client, and API automation using Rest Assured. Let's get started!

View more...

Method Builder With Lombok @Builder

Aggregated on: 2022-03-03 18:35:07

Overview In this tutorial, we are going to explore the possibilities of generating method builders with Lombok's @Builder annotation. The aim is to improve usability by providing a flexible way of calling a given method even if it has a lot of parameters. @Builder on Simple Methods How to provide a flexible usage for methods is a general topic that might take multiple inputs. Take a look at the following example:

View more...

Mule 4 DataWeave(1.x) Script To Resolve Wildcard Dynamically

Aggregated on: 2022-03-03 17:05:07

DataWeave is a powerful programming language designed and supported by MuleSoft in Mule applications. In Mule runtime version 4.x, DataWeave version 2.0 is supported. The internal DWL version could be different; however, in the script, %dwl 2.0 needs to be defined. It is mainly used for transforming and accessing data in the Mule flow relating to several components such as connectors and transformers. In this article, we are trying to resolve a wildcard dynamically using a user-defined DataWeave function. In DWL 2.0, I could not find any core function or operator present to support the feature; hence, I decided to write one. An article for the same use case for Mule 3 with Dataweave 1.0 is already published on DZone.

View more...

Building an Open Data Lake Analytics Stack Using Presto, Hudi, and AWS S3

Aggregated on: 2022-03-03 17:05:07

Rise of Open Data Lake Analytics Data warehouses have been considered a standard to perform analytics on structured data but cannot handle unstructured data such as text, images, audio, video, and other formats. Additionally, machine learning and AI are becoming common in every aspect of business and they need access to vast amounts of data outside of data warehouses. The cloud transformation has triggered the disaggregation of compute and storage, which leverages cost benefits and enables adaptability to store data coming from multiple dimensions. All this has led to a new data platform architecture called the Open Data Lake Analytics stack. This stack solves the challenges of the traditional cloud data warehouse through its use of open source and open format technologies such as Presto and Hudi. In this blog, you will learn more about open data lake analytics stack using Presto, Hudi, and AWS S3.

View more...

A Detailed Comparison of Data Modeling Tools

Aggregated on: 2022-03-03 16:35:07

A data modeling tool or a database modeling tool is an application that helps data modelers to create and design databases structure. Thus, data modeling tools make the Data modeling process easier and provide many features that help data modelers to understand their data.  Actually, there are many different data modeling tools available for different database platforms. This multitude of tools available makes it very difficult to choose a tool that suits the user's needs.  

View more...

Must-Know Python Libraries

Aggregated on: 2022-03-03 16:35:07

Introduction This article explains the must-know Python libraries which are useful for debugging, creating fake data, and for serialization and deserialization purposes. This is the first part of the series, and the article covers 3 utility libraries: For Debugging: PySnooper  Creating your own dataset: Faker  Serialization/Deserialization:Pickle  Let’s explore. 

View more...

6 Easy Ways to Start Coding Accessibly

Aggregated on: 2022-03-03 04:05:07

Why Does Accessible Development Feel So Intimidating? I’ve found accessible development to be one of the places where it’s easiest to fall into analysis paralysis: there’s always something that you feel like you need to double-check first, something that you heard someone else is doing, or just a vague feeling that you don’t really know enough yet to start tackling accessible coding yourself. Just one more blog, one more conference talk, one more video, and then you’ll be ready to start writing accessible code. Meanwhile, our applications – and more importantly, our users – are stuck with the same old inaccessible code that we just keep writing. The best thing we can do is to start writing accessible code to the best of our ability, with the acknowledgment that we might make a mistake! After all, isn’t that just how development works all the time? We code things using the skillset we have, adhering to the best practices that we’re aware of and the current web standards. Sometimes we make mistakes, whether those are bugs or architecture approaches we would have done differently in hindsight, but we still ship an application that’s (hopefully) mostly functional. Accessibility is the same way: it functions on a sliding scale, not an on/off switch. We code accessible features as we’re able, based on what we know right now and the current accessibility-related guidance. It might not be perfect 100% of the time, but anything is better than ignoring accessibility entirely. And hey, code isn’t carved into stone, right? You can always go back and update something once you’ve learned how to do it better.

View more...

Putting JavaScript in CSS

Aggregated on: 2022-03-03 01:35:07

Putting CSS in JavaScript is pretty much the norm these days - but what if we could do the opposite? Recently, I've been reading quite a bit about Houdini, which gives developers the ability to directly interact with the CSS Object Model. One of the coolest things about it is that it lets us put JavaScript in our CSS. In the example below, I've created a background effect where the JavaScript is inside the CSS. Every time you refresh, the background is randomized. Check the CSS tab below to see JavaScript inside the CSS.

View more...

Using SingleStoreDB as a JSON Document Database

Aggregated on: 2022-03-03 01:05:06

Abstract Continuing our series on the multi-model capabilities of SingleStoreDB, we'll discuss SingleStoreDB's support for JSON data in this article. We'll build a small inventory system to model an online store that sells various electronic equipment. This example is derived from an excellent tutorial available on DigitalOcean. We'll apply that tutorial to SingleStoreDB, and we'll see that it is effortless to store, retrieve and query JSON data using SingleStoreDB. We'll also build a quick visual front-end to our inventory system using Laravel and PHP.

View more...

Generating and Protecting Invoices With Adobe Document Generation and PDF Services

Aggregated on: 2022-03-03 00:50:06

Adobe Document Services platform continues to build and expand what’s available which in itself is a great thing. But things get even more interesting when you start looking at how our various APIs can work together to enable more powerful workflows. In this blog post, I’m going to demonstrate a simple example of that using Adobe Document Generation and PDF Services API together. Our Demo Scenario Every month, our company needs to send out invoices. Each invoice goes to a unique company and consists of a series of line items and a total. As these invoices sometimes include sensitive information, we want to protect the document with a unique password so that only the recipient can open it. Altogether this sounds like a somewhat complex process, but let's break it down step by step.

View more...

Create a Multi-Tenancy Application in Nest.js, Part 4: Authentication and Authorization Setup

Aggregated on: 2022-03-02 23:20:06

Introduction Authentication and Authorization are essential parts of most applications. There are many different approaches and strategies to handle authentication. This article presents the same production that can be adapted. We will use Nest.js to build the following:

View more...

COBOL: A 1959 Idea and 2022 Technology

Aggregated on: 2022-03-02 23:05:06

COBOL, the unassuming technology that has been around since before IT was even a term, is sometimes the subject of a heated state government debate, occasionally makes headlines at industry events, and it was even featured among the top 10 technology topics on an IEEE Twitter poll from 2020. But how did it become a part of the modern zeitgeist?  COBOL is now into its seventh decade of usage as a global programming language and continues to be hugely important as a system language for great swaths of the global economy. Age aside, COBOL’s defining characteristics include running systems of record applications in worldwide organizations; supporting all sectors vital to the global economy including banking, transportation, government, and healthcare; comprising billions of lines of application code worldwide; and remaining ubiquitous in the mainframe world.

View more...

Create User API Test Client With REST Assured [Video]

Aggregated on: 2022-03-02 22:35:06

We take a closer look at creating user API test clients using REST Assured — a Spring Boot API automation using Rest Assured. Let's get started!

View more...

Security Automation’s Next (and Best) Evolution Is No-Code and Here’s Why

Aggregated on: 2022-03-02 22:05:06

The biggest challenge I saw in my 15 years as a security practitioner and overseeing security teams was analysts' time consumed by mundane, repetitive tasks that were taking them away from doing the work their skills suited them for, leading to burnout and human error. That's why automation has the potential to help reduce the load of overworked teams by automating low-value tasks and freeing up those analysts for more high-impact work, like improving an organization's security posture. However, that potential hasn’t been realized with traditional approaches to automation — but it is with no-code automation, which brings increased value, productivity, and efficiency security managers teams are looking for.

View more...

Best Practices for a Successful DevOps Transformation

Aggregated on: 2022-03-02 21:50:06

In this competitive world, every organization is moving towards digital transformation. To stay ahead of the competition businesses are trying to improve their existing IT infrastructure, methodologies, welcoming new technology and software development approaches. To be successful in achieving all of this, organizations depend a lot on how inclined they are towards adopting best practices for a successful DevOps transformation.  This shift to DevOps implementation makes organizations capable of faster quality releases with lesser performance issues. This shift cannot be taken lightly and should be based on thorough research on the organization’s cultural foundation on which it is built because every company’s journey is different. So, to take this plunge, one must adopt the following DevOps best practices for a successful DevOps transformation.

View more...

Mobile software development; Native or Web?

Aggregated on: 2022-03-02 20:05:06

When you're faced with two options, it's common to create a list of advantages and disadvantages between both of your options, for then to weigh these up against each other. When your choice is whether or not to go for native mobile or a responsive web app, your list might resemble the following - As in, these are the advantages you'll have when creating a web app. You don't need to send Apple 25% of your earnings You won't be thrown out of the AppStore because of competing with some Apple product You don't have to create 3 versions of your app, in 3 different programming languages, being Swift, Java and PHP/Python/.Net/etc You don't need 3x as many developers to maintain your app further down the line You don't have to fight with neither Flutter nor Xamarin for "device x with resolution y" because of "missing feature z" Etc, etc, etc ... The above are some of the advantages you'll have if you create a responsive web app. We all know the arguments in favour of building native - However, the primary (only?) argument really seems to be some permutation of "you can't do that with the web". Well, we built a complete IDE, SQL Workbench, Cloud platform, etc, etc, etc, where the system produces according to neutral metrics between 50 and 80 percent of your backend code automatically for you, and to prove it, I just published a YouTube video where I in real time create 3,300 lines of backend code, from my iPhone, resulting in 100+ HTTP endpoints, securely wrapping my database. The video is 3 minutes and 53 seconds long.

View more...

The Cloud Challenge: Choice Paralysis and the Bad Strategy of “On-Premising” the Cloud

Aggregated on: 2022-03-02 19:35:06

The cloud is vast. It is natural that we look at the cloud and understand it through the narrow lens of our previous experiences. This can translate into solutions that underutilize/overutilize one area of the cloud over other areas. Innovative and robust solutions often require the use of the full spectrum. Most companies are migrating to the cloud because they want to unlock new business opportunities, but many of them stumble because they continue to build solutions that are only suitable for on-premises. Imagine your IT workloads are on servers that sit in the basement of your corporate office. Would moving these servers to the first floor of that office open any new opportunities for your business? Of course not. Lifting and shifting your servers to the cloud might save you money, but it certainly won’t take you any further. The first and most important thing to remember about the cloud is that the cloud is not a place, it is a model. Building for the cloud requires a mindset change, not a location change. 

View more...

How to Use Native Image Kit With the Quarkus Framework

Aggregated on: 2022-03-02 16:35:06

BellSoft issued a new version of Liberica Native Image Kit (NIK), 22.0.0.2, so in this short article, I will provide a tutorial on how to use it with the Quarkus framework. Liberica NIK is based on the open-source project GraalVM (Community Edition) and is compatible with many platforms, including lightweight musl-based Alpine Linux. Liberica NIK in essence is a utility that converts JVM-based applications into native executables (AOT compilation).

View more...

Add Secure HarperDB APIs Using SuperTokens in React

Aggregated on: 2022-03-02 03:50:06

Adding authorization and authentication to an app is a common task for developers. When you're launching a new product, a startup, or a side project, it can feel like a mission. This tutorial will teach us how to make a music player app that uses SuperTokens for authentication and HarperDB for the backend. Some of the App's Most Essential Features  On Backend Side:1. Secure your API with almost significantly less and zero configurations.2. Secure your third-party API on the server side using SuperTokens.3. Session management is simple.On the Front-end side:1. For login, use SuperTokens' library component, which is available as an npm package.2. There's no need to develop any extra code for authentication.3. There's no need to maintain tokens on the UI side.4. You won't have to worry about managing token refresh calls on the UI side because SuperTokens will take care of it for you.

View more...

Difference Between Cross-Browser Testing and Responsive Testing

Aggregated on: 2022-03-02 03:50:06

A website has become an information hub for users worldwide. Whether you want to buy a product or service, learn about a subject, or obtain important information about any specific thing, a website is always there for you. In order to enhance the level of a website in terms of compatibility, usability, responsiveness, robustness, scalability, performance, and functionality, the inclusion of cross-browser testing and responsive testing comes into perspective.  Cross-browser testing deals with interoperability and functionality, and when it comes to responsive testing, it deals with adaptability and aesthetics. In this article, you will get to know the differences between cross-browser testing and responsive testing.    

View more...

7 Must-Haves For Ultimate AWS Security

Aggregated on: 2022-03-02 03:50:06

AWS makes our life easier in many ways. But, as it often happens, in an attempt to address all possible needs, it ended up with just too many features to keep an eye on. Newbies or small teams that cannot have a dedicated AWS admin, may get lost or spend too much time managing and configuring it. In our new series, we want to help everyone in setting up an AWS account completely from scratch.We will be sending you to the AWS docs quite often. Our goal for writing this blog series is to have all useful links for you in one place and to point you to the facts that may have skipped your attention before.

View more...

The Most Comprehensive Guide on WebRTC

Aggregated on: 2022-03-02 03:20:06

WebRTC or Web Real-Time Communications, though a relatively new web technology, has taken web-based communication at an entirely new level with the promise of heralding into a brave new world of communication on the horizon. The free, open-source WebRTC project makes use of a set of JavaScript APIs to facilitate peer-to-peer communication between web browsers and different devices. The question remains what makes it so popular. A big draw with WebRTC is it eliminates the use of plugins or third-party software to facilitate real-time communication, helping achieve the ultimate goal of moving in a plugin-free world.

View more...

PostgreSQL Rewrite Rules

Aggregated on: 2022-03-01 23:05:06

Since version 10, PostgreSQL supports the concept of rewrite rules, which allow you to change how queries are executed.  In fact, rewrite rules are how views are implemented in PostgreSQL. When you access a view, your query is actually rewritten according to the rule that was created when you created the view. A view is basically a rewrite rule, as we're about to see.

View more...

MongoDB to Couchbase for Developers, Part 1: Architecture

Aggregated on: 2022-03-01 22:35:06

Introduction With this article on MongoDB to Couchbase comparison, I'm starting a new, detailed series for MongoDB developers to learn Couchbase by comparison. Two years ago, I wrote a single high-level comparative article on MongoDB and Couchbase.  I recommend you read that for a bird's view comparison. Both MongoDB and Couchbase have done multiple major releases since then, and developers need a deeper treatment of topics. As developers know, the devil is in the details :-)  This series will be similar to the series for Oracle developers to learn Couchbase by comparison, but for MongoDB developers.  

View more...

Calling YouTube API via Mule

Aggregated on: 2022-03-01 21:20:06

To start developing API in Mule for this use case, we need to first create a project in Google Cloud Platform. So let us first complete the setup for it. Setting Up Google Cloud Platform Log in to Google Cloud Platform using your credentials. Now we need to create a project and configure authentication to access it securely via REST API. We can use either OAuth client ID or API Key to secure our project access. For this, navigate to API and Services > Credentials > Create Credentials. To make use of the API key, you just need to select the API key and you will be getting a key that you need to use to access your project. To make use of OAuth client ID follow the below steps. Click on create OAuth Client ID. For the application type, select Web Application and also provide an APP Name. Then add the redirect URL http://localhost:8091/callback as shown below and click on save. You will receive the client ID and client secret. Keep these details handy as we will need it to configure in Mule Flow. Now navigate to API and Services > OAuth consent screen and edit the application you have created. Add the user support email and developer support email as those are mandatory fields and then click on save and continue for the rest of the steps. Once done, publish the app for testing. The last step is to Enable YouTube Data API v3 from the library section for us to access YouTube APIs. Creating Mule Application Create a Mule flow and drag and drop an HTTP Listener and an HTTP Request component. Also, add OAuth Module from the exchange because we need to configure OAuth Authentication in HTTP Request.

View more...

What D'Hack Is DPoP?

Aggregated on: 2022-03-01 20:20:06

OAuth2.0/OpenID connect is considered the fastest-growing protocol used by many application developers for access delegation and single-sign-on. This is due to its flexibility and high security compared to other protocols in the market. In contrast, the world is full of hackers who are desperately looking for flaws that you make when developing an application. Single Page applications or public clients which do not use MTLS secure transport layers are considered to be the most vulnerable source of an attack.  Standard Token Flow Despite the application type, the standard OAuth2.0/OpenID connect flow is similar to the below diagram (Figure 2). There are three actors involved: Client, Resource Server, and Authorization Server. The client will initiate the authorization request. Upon user authentication, the authorization server will issue an access token and refresh token for the user with an expiry time. Then, the client can use these tokens to access the protected resource from the resource server.

View more...

An Introduction to AWS Serverless Application Model

Aggregated on: 2022-03-01 20:20:06

In this blog, the AWS Serverless Application Model (AWS SAM) is introduced. You will learn what SAM is and where it can be used for. You will also get your hands dirty, because you will create an AWS SAM project from scratch. Enjoy! 1. Introduction AWS SAM is, according to the official documentation, a framework that you can use to build serverless applications on AWS . A serverless application consists of several lambda’s and other resources working together. In order to define all of these components, a SAM template is used. This SAM template is used to deploy the application to AWS. During deployment, the SAM template is converted to a CloudFormation template which will actually create the resources defined in the SAM template. An introduction to AWS CloudFormation is given in a previous post. SAM can be seen as a CloudFormation++ where less configuration is needed in the template itself. E.g. the Events property in a SAM template will create an API gateway for the Lambda but with less yaml than you would need in a CloudFormation template. You will see for yourself later on in this post. Another big advantage of SAM is that you can easily test it locally on your dev machine.

View more...

Spring Boot: User Login API Test Client Using Rest Assured

Aggregated on: 2022-03-01 17:50:06

In the following Spring Boot video tutorial, we take a closer look at the User Login API Test Client and API automation using Rest Assured. Let's get started!

View more...

Julia vs. Python: Key Differences To Consider

Aggregated on: 2022-03-01 17:50:06

Concurrent to the increased demand for data manipulation and scientific computing, a more efficient data processing language was required. As a result, Julia was developed in 2021 by Alan Edelman, Viral B. Shah, Jeff Bezanson, and Stefan Karpinski. It has become an essential tool in data science, visualization, machine learning, and AI. Julia is an excellent alternative to Python for arithmetic coding, whereas Python is a long-time favorite among programmers. Julia was created to help Python with data processing. Facebook, Instagram, Spotify, Netflix, ILM, Dropbox, Yahoo! and Google use Python.

View more...

Change Management Approach

Aggregated on: 2022-03-01 02:50:05

The following article contains adapted content from the author's book "WE CAN LEAD: A Guidebook of Personal Leadership and Self-Coaching." “If you are entrusted with bringing about change, you are

View more...

Evolving Your RESTful APIs: A Step-by-Step Approach

Aggregated on: 2022-03-01 00:50:05

Designing an intuitive, user-friendly RESTful API is a tough job. It might already be a massive task if it’s your first attempt. Planning for the lifecycle management of your API is likely to be an afterthought. But it’s possible anyway: In this post, I’d like to propose a no-nonsense approach to evolving your APIs, even if it was not planned. The Initial Situation Let’s consider a sample application that says "Hello" when using it.

View more...

Configure SSO for CockroachDB Dedicated With Microsoft Identity Platform and OpenID

Aggregated on: 2022-03-01 00:20:05

Motivation CockroachDB Dedicated is a fully-managed, reserved CockroachDB cluster ideal for a cloud database. We frequently get asked how to set up SSO for the individual CockroachDB Dedicated clusters and we have a detailed tutorial to walk you through that with a local, self-hosted cluster. What was unclear was that you can use the same steps to set up SSO with Dedicated. Based on this detailed document, CockroachDB Dedicated supports OIDC authentication for the DB Console today. In a future release, we are going to bring OIDC integration across the stack. Today, we're going to provide details on how to leverage OIDC specifically with the CockroachDB Dedicated DB Console and Microsoft using the OpenID Connect protocol. Previous Articles on OpenID Connect OpenID Connect and Google OAuth OpenID Connect and Okta High-Level Steps Provision a dedicated cluster Configure Microsoft identity platform integration Configure CockroachDB with the OpenID details Verify Step-by-Step Instructions Provision a Dedicated Cluster Follow this tutorial to set up a Dedicated cluster.

View more...

What If You Don't Want To Be a Developer Anymore? w/ CTO Connection's Peter Bell

Aggregated on: 2022-03-01 00:20:05

It used to be that in order to make your parents proud you had to go into management. Then along came the self-contained IC career path. Today, this dual-track career path remains the unchallenged standard of companies everywhere. Or does it?

View more...

FOSDEM 2022 Conference Report

Aggregated on: 2022-02-28 23:50:05

FOSDEM took place February 5-6. The European-based event is one of the most significant gatherings worldwide focused on all things Open Source. Named the "Friends of OpenJDK", in recent years the event has added a devroom/track dedicated to Java. The effort is led by my friend and former colleague Geertjan Wielenga. Due to the pandemic, the 2022 event was virtual once again. I delivered a couple of talks on Jakarta EE as well as Diversity & Inclusion. Fundamentals of Diversity & Inclusion for Technologists I opened the second day of the conference with my newest talk titled "Fundamentals of Diversity and Inclusion for Technologists". I believe this is an overdue and critically important subject. I am very grateful to FOSDEM for accepting the talk. The reality for our industry remains that many people either have not yet started or are at the very beginning of their Diversity & Inclusion journey. This talk aims to start the conversation in earnest by explaining the basics. Concepts covered include unconscious bias, privilege, equity, allyship, covering, and microaggressions. I punctuate the topic with experiences from my own life and examples relevant to technologists. The slides for the talk are available on SpeakerDeck. The video for the talk is now posted on YouTube.

View more...

Vue Quick Tips: Globally Registering Vue Components

Aggregated on: 2022-02-28 22:35:05

When we use vue, it's common to register a component within another component. In this tutorial, we're going to look at how you can globally register a component in Vue, so you never have to reference it in your component again - instead, you can use it straight in your <template> tag.  If you are new to Vue, check out our guide on creating your first Vue application before starting.

View more...

Migrating Spring Java Applications to Azure App Service (Part 1: DataSources and Credentials)

Aggregated on: 2022-02-28 22:35:05

Originally published July 23, 2019 Running on the cloud is not only for cool new applications following 12-factor principles and coded to be cloud-native. Many applications could be converted to be cloud-ready with minimal adjustments — just to be able to run in the cloud environment. In the following few articles we will demonstrate how to address the most common migration items in legacy Spring applications — handling JNDI, and credentials, externalizing configuration, remote debugging, logging, and monitoring.

View more...

Problems With Kafka Streams

Aggregated on: 2022-02-28 21:35:05

Originally published December 11, 2017 Before diving straight into the main topic, let me introduce you to Kafka Streams first.

View more...

Remote Debugging Cloud Foundry Apps

Aggregated on: 2022-02-28 20:05:05

Context While debugging Java applications in an IDE like IntelliJ Idea is straightforward, it involves slightly more effort to debug a remotely running app. While debugging a remotely running app in production is generally not a good idea, the ability to remote debug apps in lower environments, like integration testing, may be useful. Cloud Foundry is a platform that allows you to deploy and run your workloads easily and intuitively. IntelliJ Idea is a popular IDE, especially for Java developers.

View more...

When NOT To Use Apache Kafka

Aggregated on: 2022-02-28 17:20:05

Apache Kafka is the de facto standard for event streaming to process data in motion. With its significant adoption growth across all industries, I get a very valid question every week: When do I NOT use Apache Kafka? What limitations does the event streaming platform have? When does Kafka simply not provide the needed capabilities? How do I qualify Kafka out as not the right tool for the job?  This blog post explores the DOs and DONTs. Separate sections explain when to use Kafka, when NOT to use Kafka, and when to MAYBE use Kafka.

View more...

Comparing Ethereum Blockchain and Classical Java Enterprise Architecture

Aggregated on: 2022-02-28 16:20:05

Blockchain and Java: Are They Comparable? In simple terms, blockchain is a special distributed network and Java is a programming language. So how we can compare it? Does it seem that we can't? Wait a Minute! There Are Still Many Similarities They are different, but they have many things in common or that are similar between the two. Blockchain networks now have an embedded programming language. For example, Ethereum has Solidity. At the same time, Java has integration with a huge ecosystem and can create solutions similar to blockchain (in some way). 

View more...

Processing Files With Special Language Characters Using Mule 4

Aggregated on: 2022-02-28 03:35:05

Working with data, there are several scenarios to transform data from input files using the Mule 4 connector. There are several scenarios for files with special characters or language-based characters.

View more...

Why Classical Singleton Is an Antipattern: How To Make It Great Again Using IOC

Aggregated on: 2022-02-27 22:05:05

Classical Singleton Introduction Classical Singleton is one of the most well-known structural patterns. It is widely used in production and is responsible for creating only one single instance. This pattern was mentioned in the GOF patterns book. How is it possible that it became an antipattern? Before we start, let's remember what a classical Singleton looks like.   Classical Singleton Implementation Classical implementation of Singleton assumes that class contains two things:

View more...

Mule 3 DataWeave(1.x) Script To Resolve Wildcard Dynamically

Aggregated on: 2022-02-27 21:35:05

Mulesoft DataWeave is a simple powerful tool to transform data inside a flow. Numerous core operators and functions are already present to perform various operations such as capitalize, camelize, upper, and lower. For string operations, there are no core functions present to resolve a wildcard. I hope the DataWeave(DWL 1.0) function below helps you to perform a requirement where you want to resolve a wildcard using a set of parameters.

View more...

Double-Checked Locking Design Pattern in Java

Aggregated on: 2022-02-27 21:05:05

In the video tutorial below, we take a closer look at the double-checked locking design pattern in Java. This tutorial includes an introduction, implementation, and out-of-order writes. Let's get started!

View more...

Building a Simple Front-End for Your ArangoDB Datasource

Aggregated on: 2022-02-27 19:35:05

A major pain point around building apps is designing the UI elements. Fortunately, with Appsmith, you create a custom frontend in minutes. Connecting datasources with Appsmith takes a few minutes, and you can easily build tools on top of the database of your choice. For example, you can build admin panels to manage product catalogs, read content data from your database and use that to populate your e-commerce website, and then write more data and update your existing orders in the database. The possibilities are countless. In this blog, I will teach you how to build a frontend that can connect to ArangoDB as a datasource.

View more...

How Milvus Deletes Streaming Data in a Distributed Cluster

Aggregated on: 2022-02-27 17:50:05

Featuring unified batch-and-stream processing and cloud-native architecture, Milvus 2.0 poses a greater challenge than its predecessor did during the development of the DELETE function. Thanks to its advanced storage-computation disaggregation design and the flexible publication/subscription mechanism, we are proud to announce that we made it happen. In Milvus 2.0, you can delete an entity in a given collection with its primary key so that the deleted entity will no longer be listed in the result of a search or a query. Please note that the DELETE operation in Milvus refers to logical deletion, whereas physical data cleanup occurs during the Data Compaction. Logical deletion not only greatly boosts the search performance constrained by the I/O speed, but also facilitates data recovery. Logically deleted data can still be retrieved with the help of the Time Travel function.

View more...

IaC Hot Reload With Pulumi Watch

Aggregated on: 2022-02-27 17:50:05

Do you like using hot reload when developing applications? How about using hot reload when developing the cloud infrastructure of an application? Keep reading because that's what we are going to talk about. Developing and Deploying Cloud Infrastructure When doing Infrastructure as Code for a cloud application we usually do the following steps:

View more...

The Economics of TDD

Aggregated on: 2022-02-27 17:20:05

From a management standpoint, Test-Driven Development (TDD) can be a difficult sell. It involves a relatively large upfront investment, has no obvious business benefits, and (most important of all) the customer is paying for functionality, not tests. Tempting as it is to cut testing in order to reach the next milestone in the project, it is a mistake because, as we’ll see, TDD can help us accelerate development and reduce costs over a project’s lifecycle.

View more...