News Aggregator


JavaScript Reserved Keywords Cheatsheet

Aggregated on: 2022-02-20 15:50:01

When writing code, a reserved keyword is one you can't use as the name of a variable or identifier. As of 2022, this is the full list of valid reserved keywords in JavaScript. All JavaScript Reserved Keywords The below list cannot be used as variable names, as they are reserved keywords. Most of them have current functionality in JavaScript. Some do not, but they are words that may have some sort of functionality in the future. Avoid using these words in variable names.

View more...

Using CockroachDB Workloads With Kerberos

Aggregated on: 2022-02-19 18:05:00

GSSAPI authentication is becoming increasingly popular as CockroachDB starting to make inroads in Fortune 2000 customer bases and financial services segment. That said, ecosystem coverage for GSS needs to improve for parity with other authN methods. Today, we are providing a workaround and a look at the future. By the way, do you realize this is my 15th article on Kerberos and CockroachDB? Articles Covering CockroachDB and Kerberos I find the topic of Kerberos very interesting and my colleagues commonly refer to me for help with this complex topic. I am by no means an expert at Kerberos, I am however familiar enough with it to be dangerous. That said, I've written multiple articles on the topic which you may find below:

View more...

Harmful Misconceptions in Software Testing

Aggregated on: 2022-02-19 17:35:00

In 1870, the German chemist Erich von Wolf was investigating the amount of iron in spinach. When writing down his findings in his notebook, he misplaced a decimal point, changing the iron content in spinach ten times more than in reality. While Mr. von Wolf found out that there are just 3.5 milligrams of iron in a 100g serving of spinach, the published number became 35 milligrams thanks to his mistake. This caused the well-known misconception that iron is exceptionally high in spinach, which makes the body stronger.  Though Mr. von Wolf's error was detected and fixed 67 years later when someone re-checked his results, spinach is still popularly thought to be one of the most iron-rich vegetables, probably due to the popular cartoon character Popeye.

View more...

From IBM Integration Bus to IBM App Connect Enterprise in Containers (Part 3)

Aggregated on: 2022-02-19 17:35:00

In Scenarios 2a and 2b, we showed different ways of deploying an App Connect flow onto containers on OpenShift – via the command line, and via the dashboard. We eventually saw a response from our deployed integration, but so what! We haven’t yet really seen what Kubernetes is bringing to the table. We will now explore some of the things that Kubernetes significantly simplifies and extends compared to traditional deployments. In this scenario, we’ll specifically look at load balancing and autoscaling. If you feel you already understand basic load balancing and autoscaling in Kubernetes, perhaps take a look at the Advanced Scaling Topics section at the end of this post.

View more...

Why Does My App Send Network Requests When I Open an SVG File?

Aggregated on: 2022-02-19 16:35:00

You decided to make an app that works with SVG. Encouraged by the enthusiasm, you collected libraries and successfully made the application. But suddenly you find that the app is sending strange network requests. And data is leaking from the host machine. How so? In today's world, you can have a library for every occasion. So, let's not reinvent the wheel for our application and take a ready-made solution. For example, the SVG.NET library. The source code of the project is available on GitHub. SVG.NET is distributed as a NuGet package, which comes in handy if you want to add the library to the project. By the way, according to the project's page in NuGet Gallery, the library has 2.5 million downloads — impressive!

View more...

Why Do We Encourage Poor Coding Patterns?

Aggregated on: 2022-02-19 16:35:00

For what feels like an eternity at this point, we’ve discussed “shifting left” in the SDLC, taking into account security best practices from the start of software development. DevSecOps was a great leap forward, in no small part because of the emphasis on shared responsibility for security, and the power of a security-aware developer to thwart common vulnerabilities as they write code.  We have also known — again, for eons — that the type of secure code training chosen to engage and upskill developers makes all the difference. Low-effort solutions motivated solely by regulatory compliance do not build up the bright security minds of the future, and most security awareness professionals have worked that out. Dynamic, contextually relevant learning is best, but it’s critical that the nuances within are understood. 

View more...

How To Embed Data Protection Principles in the Application Development Process

Aggregated on: 2022-02-19 15:35:00

The pace of digitization over the past two years has accelerated due to organizational needs driven by the ongoing pandemic. And that has meant that there's an ever-increasing flow of data now passing through digital channels that nobody anticipated. And for developers, it has spotlighted the importance of implementing clear data protection standards in everything they do. But for developers who've never written software that requires a careful approach to data protection, it's not always obvious how to convert best practices into development standards. To help those who lack experience with embedding data protection standards into their development process, here's a guide to what they need to do.

View more...

Data Lives Longer Than Any Environment, Data Management Needs to Extend Beyond the Environment

Aggregated on: 2022-02-18 22:05:00

Komprise enables enterprises to analyze, mobilize and monetize file and object data across clouds, data centers, and the edge. The solution constantly monitors key business services, identifies changes in usage patterns, and automatically captures new insights. Komprise also simplifies access to all enterprise data helping companies make better decisions faster while driving increased revenue from existing infrastructure The 41st IT Press Tour had the opportunity to meet with Kumar Goswami, co-founder and CEO, Darren Cunningham, VP of Marketing, Ben Conneely, VP EMEA Sales, Krishna Subramanian, Co-Founder and COO of Komprise.

View more...

The Ultimate Guide to Legal and Ethical Web Scraping in 2022

Aggregated on: 2022-02-18 22:05:00

The popularity of web scraping is growing at such an accelerated pace these days. Nowadays, not everyone has technical knowledge of web scraping and they use APIs like news API to fetch news, blog APIs to fetch blog-related data, etc. As web scraping is growing, it would be almost impossible not to get cross answers when the big question arises: is it legal?

View more...

The Intelligent Storage Revolution

Aggregated on: 2022-02-18 22:05:00

Intelligent computing and intelligent storage are the future. Intelligent computing is the ability to automatically adjust computing resources based on data and application needs, such as the acceleration of an analytics workload.  Intelligent storage ensures that applications can always access their data by transparently managing multiple disk tiers. 

View more...

How to Use Postman to Build a Mock Server That Mimics the Marqeta Core API?

Aggregated on: 2022-02-18 21:35:00

The Marqeta Core API lets you build web applications for custom payment card programs with the Marqeta platform. While SDKs for the Core API are available for Python and Ruby, you can always use the developer sandbox and the Core API Explorer to work with the API, regardless of the language you use to develop your application. For faster prototype development, however, you might find it useful to build an API mock server. In this post, we'll work through how to use Postman to build a mock server that mimics the Marqeta Core API. We'll demonstrate how to create a new collection in Postman, save responses from live requests to the sandbox, and then create a mock server and send our test requests.

View more...

Object-relational Structural Design Patterns in Java

Aggregated on: 2022-02-18 21:05:00

In the below video, we take a closer look at Object-relational structural design patterns in Java. Let's get started!

View more...

How To Ensure Data Transparency and Why It’s Important

Aggregated on: 2022-02-18 20:35:00

Data transparency is more important than ever before, with more people going online amid surging cyberthreats. Consumers are becoming more aware and critical of how software and websites use their data. More than a few companies have gotten bad publicity due to a lack of transparency about user data.  How can developers ensure they are providing good data transparency? A few key tactics will help.

View more...

The Top SIEM Challenges Modern Security Practitioners Face Today

Aggregated on: 2022-02-18 19:50:00

In many ways, the tools security professionals have at their disposal have not kept up with the seismic changes in IT infrastructure and workloads brought about by the cloud. For example, most Security Information and Event Management (SIEM) platforms are still based on decades-old technology and architectures. The deficiencies in traditional SIEM solutions are common knowledge throughout the industry, at least anecdotally, but I wanted to see actual data. To explore the firsthand experiences of security practitioners, my company, Panther Labs, commissioned an independent study to understand how well legacy SIEMs meet the needs of security teams today. 

View more...

Proxy Design Pattern in Java

Aggregated on: 2022-02-18 18:35:00

In the video below, we take a closer look at the Proxy Design Pattern in Java. This video tutorial includes an introduction, real-time examples, a class/sequence diagram, and implementation. Let's get started!

View more...

5 Best Practices for Succeeding at Developer-First Application Security

Aggregated on: 2022-02-18 18:35:00

Advances in developer tools, containers, code repositories, and more enable developer teams to deliver software at an unprecedented pace. However, application security teams are often understaffed, underfunded, and laboring to keep pace with software development. One demonstrated strategy that helps AppSec teams keep up and even provides them time for high-value security tasks is to shift security left in the development cycle.  Creating a developer-first approach to security, or in other words, shifting security left requires that developers become accountable for producing secure code. Since security is not the typical developer's area of expertise, application security engineers assume the role of providing oversight and guidance needed to enable developers to succeed. 

View more...

Basic Google BigQuery Operations With a Salesforce Sync Demo in Mule 4

Aggregated on: 2022-02-18 17:50:00

If we think about data storage, the first thing that comes to our mind is a regular database. This can be any of the most popular ones, like MySQL, SQL Server, Postgres, Vertica, etc., but I noticed not too many have interacted with one of the services Google provides with the same purpose: Google BigQuery. Maybe it is because of the pricing, but in the end, many companies are moving to cloud services and this service seems to be a great fit for them. In this post, I will demonstrate in a few steps how we can make a sync job that allows us to describe a Salesforce instance and use a few objects to create a full schema of those objects (tables) into a Google BigQuery dataset. Then with the schema created, we will be able to push some data into BigQuery from Salesforce and see it in our Google Cloud Console project.

View more...

Design Insights From Unit Testing

Aggregated on: 2022-02-18 16:05:00

Probably the biggest breakthrough while Unit Testing is to realize that writing tests offer priceless feedback about the design of your production code. This feedback goes from suggesting immediate obvious improvements, up to hints about some of the most advanced design principles in software engineering. This article briefly enumerates these hints, pointing to questions to ask about your design.  Disclaimer: Don't follow blindly these hints, but make sure you understand all of them so that you can decide in your real problem what would improve the design, and what wouldn't.

View more...

Ace Your DevOps Game With This Ultimate List of Plugins in Jenkins

Aggregated on: 2022-02-18 14:05:00

In recent years, DevOps has established itself as a formidable force in the software world. By bridging the gap between development and IT operations teams, DevOps has brought speed, efficiency, and quality to software development. It enabled IT businesses to adopt agile software delivery methodologies like Continuous Integration and Continuous Delivery (CI/CD). However, despite gaining universal popularity, the road to successful DevOps adoption remained bumpy. Many organizations struggle to implement optimal automation across the software development lifecycle (SDLC), from build, integration, and testing to delivery and deployment. Consequently, harnessing the full potential of the CI/CD pipeline remained elusive. At this juncture, Jenkins has emerged as an indispensable tool to help DevOps teams achieve automation goals.

View more...

Cloud Migration Manual: The Adjustment to SaaS Model

Aggregated on: 2022-02-18 14:05:00

The cloud-based SaaS model eliminates the need to build, set up, and manage the system, allowing users to just purchase the desired program for a certain length of time. And to migrate to the cloud you need to set up a roadmap, prepare to change app architecture, pick up a SaaS hosting provider, and lastly delineate the data migration process. Before the gaining growth of SaaS software popularity within the development, IT solutions were pretty obvious: businesses had on-premises applications, which operated on particular servers with a certain volume and other limitations. And developing ones, companies went along with the high fees on maintenance, expenses on manual labor, as well as challenges regarding updating.

View more...

Kafka vs Chronicle for Microservices

Aggregated on: 2022-02-18 13:35:00

Apache Kafka is a common choice for inter-service communication. Kafka facilitates the parallel processing of messages and is a good choice for log aggregation. Kafka also declares to be low latency, high throughput. However, is Kafka fast enough for many microservices applications?When I wrote Open Source Chronicle Queue my aim was to develop a messaging framework with microsecond latencies. In this article, I will describe why Kafka does not scale in terms of throughput as easily as Chronicle Queue for microservices applications.  Visualizing Delay as a Distance In order to illustrate the difference, let me start with an analogy. Light travels through optic fiber and copper at about two-thirds the speed of light in a vacuum, so to appreciate very short delays, they can be visualized as the distance a signal can travel in the time. This can really matter when you have machines in different data centers.

View more...

CockroachDB With GSSAPI Deployed via Systemd

Aggregated on: 2022-02-18 11:50:00

Articles Covering Topics on CockroachDB and Kerberos I find the topic of Kerberos very interesting and my colleagues commonly refer to me for help with this complex topic. I am by no means an expert at Kerberos, I am however familiar enough with it to be dangerous. That said, I've written multiple articles on the topic which you may find below: CockroachDB With MIT Kerberos CockroachDB With Active Directory CockroachDB With MIT Kerberos and Docker Compose Executing CockroachDB table import via GSSAPI CockroachDB With SQLAlchemy and MIT Kerberos CockroachDB With MIT Kerberos Cert User Authentication CockroachDB with Django and MIT Kerberos CockroachDB With Kerberos and Custom Service Principal Name (SPN) Simplifying CockroachDB Kerberos Architecture With a Load Balancer CockroachDB With MIT Kerberos Using a Native Client CockroachDB With Mixed Kerberos and Certificates Authentication Motivation Systemd has become a standard approach for deploying Linux services. We have documentation to deploy CockroachDB via systemd, however, we do not have steps documented to deploy CockroachDB with GSSAPI and systemd. This tutorial attempts to bridge that gap.

View more...

5 Best Web Development Courses for Beginners to Learn Online

Aggregated on: 2022-02-18 08:50:00

Hello Devs, if you want to learn web development and become a web developer, or looking for web development resources like books, online courses, and tutorials, but are not sure where to start then you have come to the right place. In the past, I have shared the best free web development courses and in this article, I am going to share the best web development courses for beginners to learn essential web development skills both frontend and backend, and become a professional web developer.

View more...

Resolving HTTP Headers Sent Error in Node.JS

Aggregated on: 2022-02-18 08:50:00

When using express and Node.JS, we will sometimes get this error:   Error [ERR_HTTP_HEADERS_SENT]: Cannot set headers after they are sent to the client at new NodeError (node:internal/errors:277:15) at ServerResponse.setHeader (node:_http_outgoing:563:11) at ServerResponse.header (/node_modules/express/lib/response.js:771:10) at file:///link/to/file/app.js:309:13 {     code: 'ERR_HTTP_HEADERS_SENT'

View more...

Control Your Data Structures

Aggregated on: 2022-02-18 08:50:00

Complex logic should be implemented on data structures you have full control on an internal Domain Model that you can tailor to your problem to simplify your code. Here is an (opinionated) list of term definitions used in this article:

View more...

Why and How SREs Can Benefit From Feature Flags

Aggregated on: 2022-02-18 08:50:00

When you think of who uses feature flags, your mind most likely goes to developers. In general, feature flags are closely associated with software engineering. But Site Reliability Engineers (SRE), too, can benefit from feature flags. SREs may not be the ones to create feature flags, but they should work closely with developers to ensure that the applications their teams support include feature flags.

View more...

What You See vs What's Going On Under the Hood - Setting Development Priorities

Aggregated on: 2022-02-18 07:50:00

The question of what came first, the egg or the chicken, haunts humankind for many centuries. From a software company client's standpoint, there's another essential rivalry requiring due diligence: should a software product start with front-end or back-end development? It goes without saying that both these parts of the web application are vital and require due attention during design, coding, and testing.  The thing is that deciding which of them requires number one priority may be tricky sometimes. This article will consider the main reasons determining whether developers should focus first on the front-end or the back-end part of the app development process.

View more...

5 DevOps Tools To Add to Your Stack in 2022

Aggregated on: 2022-02-18 04:49:59

DevOps has fundamentally changed the way software is developed. It has further paved the way for creating faster, flexible, and more collaborative development and delivery processes. Thus, new and exciting DevOps tools emerge each year to improve existing workflows or introduce new functionality to the DevOps process. In this article, let’s have a look at five DevOps tools you can add to your tech stack in 2022. Anthos Modern workloads are becoming more complex than ever. Therefore, these workloads need to be distributed in different environments from the cloud, on-premise, and edge, depending on the requirement. Managing multiple different environments has become commonplace, with multi-cloud being a popular option to distribute workloads while maintaining flexibility. However, it will add increased management overhead to the DevOps process. Anthos aims to solve this issue by providing a unified platform to manage applications in on-premises, edge, and multi-cloud platforms.

View more...

The X-Factor: RAML With XML Format

Aggregated on: 2022-02-18 04:04:59

In this article, we will explore how RAML specifications can be defined for the XML representation of resources. This will be explained with the help of JOB API. Consider this API for the purpose of getting a list of all jobs published by different companies. A job can also be posted using this JOB API. JOB API Resource: Jobs Resource Path: /jobs Methods: GET: To retrieve a list of all jobs POST:  To add a job JSON Representation

View more...

10 Books Every Engineering Leader Should Read

Aggregated on: 2022-02-17 23:19:59

DZone is an ever-growing community of authors from various technical fields who have a wide range of skill-sets and share their knowledge with the rest of the development community.  We asked our DZone Core community members to recommend books they swear helped them up-skill or improvise in their work. We received a list of awesome books that are not only helpful but are interesting reads. 

View more...

Using SingleStore as a Geospatial Database

Aggregated on: 2022-02-17 22:19:59

Abstract SingleStore is a multi-model database system. In addition to relational data, it supports key-value, JSON, full-text search, geospatial, and time series. A previous article showed SingleStore's ability to manage Time Series data. In this article, we'll explore geospatial data. We'll use data for the London boroughs and data for the London Underground. We'll use these datasets to perform a series of geospatial queries to test SingleStore's ability to work with geospatial data. We'll also discuss an extended example using the London Underground data for a practical use case: finding the shortest path between two points in a network. Finally, we'll create London Underground visualizations using Folium and Streamlit.

View more...

Alpha Testing - A Brief Guide

Aggregated on: 2022-02-17 21:49:59

What Is Alpha Testing? Before releasing a final product to real users, an organization conducts Alpha Testing to identify all possible flaws and defects. It is carried out by testers, who are generally internal employees of the company. It is either a spoof or a true functional test on its own site. Before alpha testing, unit and integration testing are completed. It's used once all of the tests have been completed.

View more...

Kubernetes and Apache Cassandra: What Works (and What Doesn’t)

Aggregated on: 2022-02-17 19:49:59

“I need it now and I need it reliable”– ANYONE WHO HASN’T DEPLOYED APPLICATION INFRASTRUCTURE If you’re on the receiving end of this statement, we understand you here in the K8ssandra community. Although we do have reason for hope. Recent surveys have shown that Kubernetes (K8s) is growing in popularity, not only because it’s powerful technology, but because it actually delivers on reducing the toil of deployment.

View more...

Kubernetes auditing: which IAM user deleted a namespace?

Aggregated on: 2022-02-17 19:49:59

As a cluster administrator, by following the simple steps in this blog post, you should be able to answer questions about Kubernetes audit logs, like who initiated a request to delete a Kubernetes resource? When did it happen? On what did it happen? Architecture diagram What are audit logs? Audit logs allow you to better understand the operations that are initiated by users in your cluster, which can help you troubleshoot issues or report compliance to industry and internal standards.

View more...

Decorator Design Pattern

Aggregated on: 2022-02-17 16:19:59

In the video below, we take a closer look at the Decorator Design Pattern in Java. This video tutorial includes an introduction, real-time examples, a class/sequence diagram, and implementation. Let's get started!

View more...

Parsing Binary Data Formats

Aggregated on: 2022-02-17 16:19:59

This story started with me wanting to write a steganography tool. Steganography is the process of hiding information inside a file, typically an image.

View more...

How to Use Embedded Hazelcast on Kubernetes

Aggregated on: 2022-02-17 16:19:59

Hazelcast IMDG is a perfect fit for your (micro)services running on Kubernetes since it can be used in the embedded mode and therefore scale in and out together with your service replicas. This blog post presents a step-by-step description of how to embed Hazelcast into a Spring Boot application and deploy it in the Kubernetes cluster. The source code for this example can be found here. Step 1: Configure Hazelcast to Work on Kubernetes Make sure you have the following Maven dependencies:

View more...

How to Rectify R Package Error in Android Studio

Aggregated on: 2022-02-17 15:04:59

R.java plays a vital role in Android application advancement. It is utilized to distinguish all assets' information; for example, ID, format, picture, drawable assets, and so forth. R.java is produced by the Android Studio. In any case, it is at some point mistaken for a designer to utilize it. This article will assist you in resolving these issues you may be experiencing in R.java. Where Is R.java Saved? R.java is commonly saved in a directory like:

View more...

Top 10 Ways To Secure Containers

Aggregated on: 2022-02-17 10:49:59

A cybersecurity incident can cause severe damage to the reputation of the organization and competitive disadvantage in the market, the imposition of penalties, and unwanted legal issues by end-users. On average, the cost of each data breach is USD 3.92 million as per this IBM report. The biggest challenges providing security in organizations are: Lack of skills and training in security tools and practices Lack of visibility and vulnerabilities Continuous monitoring of the current state of security In the recent survey by PaloAlto Networks, State of Cloud Security report, it was discovered that 94% of organizations use one or more cloud platforms and around 45% of their compute is on containers or CaaS. The dominance of containers is increasing and thus the security threats. 

View more...

GitOps Principles and Workflows Every Team Should Know

Aggregated on: 2022-02-17 10:49:59

An Operating Model for Dynamic, Distributed Kubernetes Environments Kubernetes clusters have a lot of moving parts—and so does each application running on a cluster.  With frequent application and environment updates, the state of every cluster can change rapidly. Operating at scale—with dozens of clusters and hundreds of application instances—it can be almost impossible to avoid configuration inconsistencies between clusters and configuration mistakes that result in prolonged troubleshooting, downtime, or worse. It’s exactly these types of challenges that have led so many organizations to adopt GitOps, bringing the familiar capabilities of Git tools to infrastructure management and continuous delivery (CD). In last year’s AWS Container Security Survey, a whopping 64.5% of the respondents indicated that they were already using GitOps. That number will undoubtedly grow when this year’s survey is released.

View more...

How Good Is Node.js for Backend Development?

Aggregated on: 2022-02-17 10:19:59

Millions of users can be accessing your web application from myriad corners of the world. As a business owner, one would always wish that their online systems work as smoothly as possible. Glitches in the online user experience can cause loss of potential customers. JavaScript backend is widely used all over the world when it comes to web programming. Earlier, it was only considered a tool for front-end development. But now the same has become a major cross-platform tool for cross-platform techs such as PhoneGap, React Native, Native Script, and more. But there were a lot of problems when it came to back-end projects. Here’s where Node.js made the news.

View more...

Everything You Need To Know About JavaScript Variables

Aggregated on: 2022-02-17 09:49:59

One of the most important concepts in JavaScript, as with most programming languages, is the ability to define variables. A variable is a container of a value or data. Some types of variables can later be changed, based on the logic we use in our code. Let's take a look at how variables work in Javascript. Defining Variables There are two main types:

View more...

Automating SQL User Generation and Password Rotation With CockroachDB

Aggregated on: 2022-02-17 09:49:59

Motivation As with most of my tutorials, topic ideas come from user inquiries. I see this question come up quite often and we don't have a documented approach to bridge the gap today. Cockroach Labs engineering is hard at work to build an API that will make this point moot but until then this can be a viable alternative.  It is primarily directed at our cloud offering where we rely on password authentication today. There are also cases where password authentication serves other purposes and we need ways to automate the provisioning of passwords other than ALTER USER username WITH PASSWORD "password"; command. You can take this approach and incorporate it into your CI/CD pipelines to onboard new users and manage their passwords in absence of certificate-based authentication and its associated revocation mechanisms or directory services and its password management capabilities.

View more...

Redshift vs. Snowflake: The Definitive Guide

Aggregated on: 2022-02-17 00:04:59

What Is Snowflake? At its core Snowflake is a data platform. It's not specifically based on any cloud service which means it can run any of the major cloud providers like Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP). As a SaaS (Software-as-a-Service) solution, it helps organizations consolidate data from different sources into a central repository for analytics purposes to help solve Business Intelligence use cases. Once data is loaded into Snowflake, data scientists, engineers, and analysts can use business logic to transform and model that data in a way that makes sense for their company. With Snowflake users can easily query data using simple SQL. This information is then used to power reports and dashboards so business stakeholders can make key decisions based on relevant insights.

View more...

You’re Doing It Wrong — Recruiting a DevRel

Aggregated on: 2022-02-16 23:34:59

The DevRel collective is a community where people in the developer relations field can chat and help each other out. But this post isn’t about that group… We’ll get to that. This is an article about you: the startup founder or manager who’s trying to hire your first developer relations person. This article is here to help you by example. I’m not the first to write about this problem. Taylor Barnett wrote a great piece on this as well. Be sure to check it out!

View more...

Spring Boot Secured By Let's Encrypt

Aggregated on: 2022-02-16 23:04:59

In this article, we will learn how we can do the following: Generate a valid certificate for free Configure a Spring Boot app with it Renew it when it expires In my previous blog post, we became familiar with the configuration of a Spring Boot Application with a self-signed certificate. Self-signed certificates are good for specific purposes such as test and development. But, if one needs to ship his application to production, certificates should be signed by known and legitimate Certificate Authorities (CA).

View more...

Using Machine Learning to Find Root Cause of App Failure Changes Everything

Aggregated on: 2022-02-16 23:04:59

It is inevitable that a website or app will fail or encounter problems from time to time, ranging from broken functionality to performance issues or even complete outages. Development cycles are too fast, conditions too dynamic, and infrastructure and code too complex to expect flawless operations all the time. When a problem does occur, it creates a high-pressure urgency that sends teams scurrying to find a solution. The root cause of most problems can usually be found somewhere among millions (or even billions) of log events from a large number of different sources. The ensuing investigation is usually slow and painful and can take away valuable hours from already busy engineering teams. It also involves handoffs between experts in different aspects or components of the app, particularly with the use of interconnected microservices and third-party services which can cause a wide range of failure permutations.  Finding the root cause and solution takes both time and experience. At the same time, development teams are usually quite short-staffed and overworked, so the urgent “fire drill” of dropping everything to find the cause of an app problem stalls other important development work. Using observability tools, such as APM, tracing, monitoring, and log management solutions, helps team productivity, but it's not enough. These tools still require knowing what to look for and significant time to interpret the results that are uncovered.

View more...

Getting Started With Apache Cassandra

Aggregated on: 2022-02-16 22:04:59

Apache Cassandra® is a distributed NoSQL database that is used by the vast majority of Fortune 100 companies. By helping companies like Apple, Facebook, and Netflix process large volumes of fast-moving data in a reliable, scalable way, Cassandra has become essential for the mission-critical features we rely on today. In this post, we will:

View more...

Polymorphism, Encapsulation, Data Abstraction and Inheritance in Object-Oriented Programming

Aggregated on: 2022-02-16 21:34:59

Object-Oriented programming refers to the concept in high-level languages, such as Java and Python that uses Objects and classes in their implementations. OOP has four major building blocks which are, Polymorphism, Encapsulation, Abstraction, and Inheritance. There are other programming paradigms, such as Procedural programming in which code is written sequentially. Python and Java are multi-paradigm high-level, programming languages. This means they support both OOP and procedural programming. A programmer decides on the paradigm to use based on their expertise and the problems they're trying to solve. However, there is no debate that OOP makes programming easier, faster, more dynamic, and secure. This is a major reason Java and Python are two fo the top most popular programming languages in the world today

View more...

Completed Staff Work: Making Recommendations vs Asking for Approval

Aggregated on: 2022-02-16 21:34:59

When I was introduced to the concept of Completed Staff Work, I felt like I had been handed a secret management technique. I had been a manager for several years and never heard of it, so it felt like a big secret when I did. And the idea simply exploded how I thought of my work as a leader. So, let me share with you one of the most powerful management concepts I’ve encountered: Completed Staff Work. A standard for determining whether or not you’ve done enough work on a problem, the concept of Completed Staff Work involves useful techniques to

View more...