News Aggregator


10 Best Data Analysis and Machine Learning Libraries/Tools

Aggregated on: 2022-01-23 14:34:43

Hello Devs, if you want to become a data scientist or Machine Learning (ML)engineer and looking for the best Python libraries for data science, machine learning, data analysis, and deep learning then you have come to the right place. Data Scientist needs a tool to clean and transform data as well as tools to analyze and visualized data, these 10 tools help you to become a better data scientist

View more...

6 Top Cloud Cost Optimization Issues To Avoid in 2022 and How To Deal With Them

Aggregated on: 2022-01-23 14:04:43

New Year is when people tend to make resolutions for the 365 days to come, like eating more veg, exercising more often, or cutting down on cloud costs. The latter makes the list as the top initiative for companies for the fifth year in a row. According to the 2021 State of the Cloud Report, over 60% of organizations planned to optimize their cloud costs. 

View more...

How Security, Reliability, and Design Teams Can Get Other Teams To Do Work for Them - The Objective Expert Model

Aggregated on: 2022-01-23 12:19:43

Today I’m going to share my favorite way to organize specialist teams that want other teams to do work for them. I recommend this coordination model for security, reliability, and design teams. Non-specialist teams can also use it for some projects! This approach gives your team leverage.

View more...

Getting Started With Hugging Face Transformers for NLP

Aggregated on: 2022-01-23 11:34:43

Hugging Face: The Best Natural Language Processing Ecosystem You’re Not Using? If you’ve been even vaguely aware of developments in machine learning and AI over the last few years since 2018, you definitely have heard of the massive progress being made in the world of Natural Language Processing (NLP) due in large part to the development of larger and larger transformer models. Of course, we don’t mean the extraterrestrial shape-shifting robots of the 1980s franchise of the same name, but rather attention-based language models. These models gained widespread attention in the ML community in 2017 with Vaswani et al.’s seminal paper Attention Is All You Need, and the subsequent mass adoption of the Transformer blueprint for NLP in 2018 has been likened by some as the ImageNet moment of language models.

View more...

Building Microservices Using Spring Boot, HarperDB, and AWS

Aggregated on: 2022-01-22 18:19:43

Introduction In this article, you will learn how to use Spring Boot and HarperDB to create a microservice. Later on, you will also look at how to deploy the complete application on AWS Elastic Beanstalk. You will be building an Employee Leave Management System. This application will be responsible for tracking the detailed record of employees' leaves. You will also be implementing the functionality to add, edit, and cancel leaves.

View more...

Developer Quickstart: PHP and MariaDB

Aggregated on: 2022-01-22 18:19:43

The PHP programming language has long been considered a fairly light and simple solution for developers to use to create robust and creative web applications. In fact, that’s as true now as it has ever been as past few versions of PHP have made the language more appealing than ever. Like many other languages, PHP has the ability to take advantage of the power of MariaDB, and it’s actually a pretty simple and straightforward process.

View more...

Should We Target Zero False Positives?

Aggregated on: 2022-01-22 18:19:43

In an ideal world, secret detection tools would spot all leaked secrets and never report false positives. Unfortunately -or maybe fortunately...- we do not live in an ideal world: secret detection tools are not perfect, sometimes they report false positives. But would it really be better if they did not?

View more...

How to Detect and Defeat the Log4j2 Vulnerability With Deepfence

Aggregated on: 2022-01-22 18:19:43

Introduction to log4j2 Mitigation The log4j2 vulnerability like the OpenSSL Heartbleed and Apache Struts vulnerabilities that came before it are poignant reminders to digital businesses that it’s not just enough to respond to a vulnerability by redeploying applications once a patch is available, you also have to be able to discover instances of the vulnerability being exploited in real time in your production platform and stop them. In this tutorial, we’ll show you how to use Deepfence ThreatMapper and ThreatStryker to help you do just that. Deepfence ThreatMapper is an open-source security observability platform that hunts for vulnerabilities – including log4j2 – in applications in production across containers, Kubernetes, clouds, serverless environments, VMs, and bare metal, and then ranks them based on their risk of exploit. ThreatMapper eliminates the noise and false positives generated by scanning tools by further calculating the risk of exploit for each of these vulnerabilities, so that you can target the issues that present the greatest risk to the security of your applications. 

View more...

Interpretable and Explainable NER With LIME

Aggregated on: 2022-01-22 17:49:43

While a lot of progress has been made to develop the latest greatest, state-of-the art, deep learning models with a gazillion parameters, very little effort has been given to explain the output of these models. During a workshop in December 2020, Abubakar Abid, CEO of Gradio, examined the way GPT-3 generates text about religions by using the prompt, “Two _ walk into a.” Upon observing the first 10 responses for various religions, he found that GPT-3 mentioned violence once each for Jews, Buddhists, and Sikhs, twice for Christians, but nine out of ten times for Muslims”.

View more...

Getting Started With Numpy

Aggregated on: 2022-01-22 17:49:43

NumPy is a third-party library for numerical computing, optimized for working with single- and multi-dimensional arrays. Its primary type is the array type called ndarray. This library contains many routines for statistical analysis. Creating, Getting Info, Selecting, and Util Functions The 2009 data set 'Wine Quality Dataset' elaborated by Cortez et al. available at UCI Machine Learning, is a well-known dataset that contains wine quality information. It includes data about red and white wine physicochemical properties and a quality score. 

View more...

How to Convert Audio From 2D to 3D

Aggregated on: 2022-01-22 17:49:43

Immersive audio is becoming an increasingly important factor for enhancing user experience in the music, gaming, and audio/video editing fields. The spatial audio function is ideal for meetings, sports rehabilitation, and particularly for exhibitions, as it helps deliver a more immersive experience. For users who suffer from visual impairments, the function can serve as a helpful guide. In this article, I am going to reuse the sample code on this GitHub repo. I will implement spatial audio functions in my Android app and deliver the 3D surround sound. 

View more...

Data Federation With CockroachDB and Presto

Aggregated on: 2022-01-22 17:49:43

Motivation A customer inquired whether data federation is possible natively in CockroachDB. Unfortunately, CockroachDB does not support features like foreign data wrappers and such. A quick search returned a slew of possibilities and Presto being a prominent choice, sparked my interest. High-Level Steps Install Presto Configure Postgresql catalog Configure TPCH catalog Verify Wrap up Step by Step Instructions Install Presto I'm using a Mac and luckily there's a homebrew package available.

View more...

Postgres UNNEST Cheat Sheet for Bulk Operations

Aggregated on: 2022-01-22 17:04:42

Postgres is normally very fast, but it can become slow (or even fail completely), if you have too many parameters in your queries. When it comes to operating on data in bulk, UNNEST is the only way to achieve fast, reliable queries. This post has examples for using UNNEST to do all types of bulk transactions. All the examples in this article assume a database schema that looks like:

View more...

Intrusion Detection vs. Intrusion Prevention: The Beginner’s Guide to IPS and IDS

Aggregated on: 2022-01-22 17:04:42

I think you'll agree with me when I say that the words "database" and "intrusion" are not words you want to hear in the same sentence. Databases house critical information that needs to be kept private for our businesses and our customers - we can't have criminals exploiting gaps in our security and accessing this information. Fortunately, we can take steps to stop intruders from getting in and catching them if they manage to sneak in anyway. Let's learn about these methods and how we can put them to good use to protect our valuable data. We'll explore two systems - the IPS and the IDS - and take a look at how they compare and what you should think about when implementing them.

View more...

Application Modernization and 6 R's

Aggregated on: 2022-01-22 16:34:43

Enhanced functionality, rapid innovation, increased efficiency, reduced operational and infrastructure costs, more scalability, improved overall experience, and resiliency ... It's like a door to unlimited possibilities has been unlocked with the cloud.  Shifting your business' apps to the cloud has numerous advantages, including those outlined above. The problem is that many firms don't grasp that leveraging the cloud's benefits requires a little more than just application transfer. 

View more...

Microservices Testing: Key Strategies and Tools

Aggregated on: 2022-01-22 14:49:42

Development teams are increasingly choosing a microservices architecture over monolithic structures in order to boost apps' agility, scalability, and maintainability. With this decision to switch to the modular software architecture — in which each service is a separate unit with its own logic and database that communicates with other units through APIs — comes the need for new testing strategies and new testing tools. Testing microservices is a critical part of the microservices application process: you need to ensure that your code doesn’t break within the unit, that the dependencies in the microservices continue to work (and work quickly), and that your APIs meet the defined contracts. Yet, because many microservices are built with a continuous delivery mode to build and deploy features consistently, developers and DevOps teams need accurate and reliable testing strategies to be confident in these features. So which different types of tests exist for microservices, how can they work for other areas of your software, and what are their benefits? The well-known "testing pyramid" can provide a testing framework for approaching these tests. According to Martin Fowler, a prominent author on software engineering principles, “The 'Test Pyramid’ is a metaphor to group software tests into buckets of different granularity.” The different layers of the pyramid are defined as:

View more...

Using JSON in MariaDB

Aggregated on: 2022-01-22 14:19:42

I’m willing to bet that if you’re reading this article you’ve at least heard of MariaDB. Heck, maybe you’ve even used it at some point. But, if not, I highly recommend that you give it a quick glance as, at the highest level, it’s a pretty solid, free (yea, free) open-source database solution that you can use for anything from some lightweight tinkering to supporting fully-fledged, production-grade applications. Tip: If you'd like to jump right into a MariaDB database and use the same dataset in this article be sure to check out this MariaDB JSON Quickstart Guide!

View more...

MuleSoft Email Connector - Part 1

Aggregated on: 2022-01-21 23:19:42

What Is An Email Connector? MuleSoft Connector for Email sends and retrieves email messages over standard email protocols such as SMTPS/SMTP, IMAP, and POP3. Some of the use cases for Email connectors include:

View more...

"Move Fast, With Safety:" CloudBees Connect 2022

Aggregated on: 2022-01-21 22:04:42

Where is software delivery headed in 2022 and beyond, and what role will continuous delivery play? How have organizations like yours successfully transitioned to continuous delivery-and how can you take advantage of what they've already learned? Can feature flags help pave the way, and if so, how can you avoid the most common pitfalls as you scale? Join us on Wednesday, February 9, 2022 for a half-day event to gain insight into the future of software development and delivery-broadly, as well as at your own organization. You'll have an opportunity to attend sessions and workshops to help you accelerate your DevOps maturity. You'll also be able to network with your like-minded peers-those in similar positions, and those who have walked your path already.

View more...

A Primer on the History and Evolution of Incident Management to Today

Aggregated on: 2022-01-21 22:04:42

What’s the history of incident management? If you’re an SRE, you may be so caught up in the day-to-day work of managing reliability and responding to incidents that you never take time to step back and ask that question. And that’s a shame because SREs didn’t invent incident management concepts and strategies on their own.

View more...

How Should You Approach Software Development Training?

Aggregated on: 2022-01-21 21:34:42

There’s an interesting challenge that budding programmers face when it’s time to further their software development training, or even start their training. There are hundreds, if not thousands, of different training and course options, and they vary widely in cost from free to hundreds or thousands of dollars. What’s more, some courses can be completed in weeks or months, while others require years and years of discipline. It’s even possible, and extremely easy, to invest in the wrong courses, depending on what your specialization or desired job will be. So, how should you approach software development training? What are the best practices for choosing a school, course, or program, and what will that mean for your future career?

View more...

How Does an NFT Marketplace Platform Work?

Aggregated on: 2022-01-21 21:34:42

Similar to cryptocurrency, NFT has been gaining traction since its inception in 2013. Significantly, the popularity of NFT took up a new turn in 2021 with never-seen-before sales. The volume of NFT sales jumped from $94.9 million in 2020 to $24.9 billion in 2021. This has proved the significant elevation of sales.  Consequently, the urge to develop an NFT marketplace for trading digital assets has soared to a great extent. In view of it, the technopreneurs can leverage the ongoing demands and deploy their platform on the go. If you have an aspiration to be a promising entrepreneur and are eager to deploy your platform, this blog is for you as you could have insights regarding the same. Catch a glimpse of it at this moment!

View more...

How to Animate a Picture by Leveraging the AI Algorithms

Aggregated on: 2022-01-21 21:34:42

Ever wondered how to animate a static image?  Wouldn't it be fun to make the facial expressions in the photos move? Such a function adds authentic facial expressions to an image of faces by leveraging the AI algorithms such as face detection, face key point detection, facial expression feature extraction, and facial expression animation. Impressive stuff, right? Let's move on and see how this capability can be integrated. Integration Procedure Preparations:

View more...

S3-Compatible Object Storage Powered by Blockchain/Web3

Aggregated on: 2022-01-21 21:34:42

More businesses are moving their operations online. This shift has caused an increase in demand for cloud-based storage solutions, as companies look to reduce or eliminate the need for physical infrastructure. I just met with Joshua Noble, co-founder, and CEO of Filebase to learn how the platform unifies multiple networks under a single S3-compatible API to make decentralized storage accessible and easy to use for everyone. Decentralized storage is a vital piece of the decentralized web. Filebase has plans to power decentralized exchanges, marketplaces, and social media networks with their technology.

View more...

Service Locator Design Pattern in Java: An Introduction, Class/Sequence Diagram, and Implementation

Aggregated on: 2022-01-21 21:04:42

In the video below, we take a closer look at Service Locator Design Pattern in Java including an introduction, class/sequence diagram, and implementation. Let's get started!

View more...

Pros and Cons of Hybrid Working Culture: Which Working Culture Your Team Needs?

Aggregated on: 2022-01-21 21:04:42

Employees have made it clear they want greater flexibility in how—and where—they do their jobs. The pandemic showed that it is indeed possible to work successfully from home, forcing some employers to admit the reason they were reluctant is that they don’t trust their staff. In spite of the success of remote working, many businesses are still deciding between adopting hybrid work or going back to pre-pandemic practice.

View more...

Top 3 Chatbot Security Vulnerabilities in 2022

Aggregated on: 2022-01-21 17:04:42

Chatbots Are Here To Stay Chatbots have been around for a long time and based on the global chatbot market size (and the expected growth), they will stick around for a long time and gain importance. In the past, they've rarely met customer expectations or provided much positive experience. However, over the last few years, advances in conversational AI have transformed how they can be used. Since chatbots offer a wide range of applications, in certain cases, they become responsible for collecting and protecting personal information as well.  Consequently, they are a great attraction for hackers and malicious attacks too. The responsibility of ensuring chatbot security has become more evident after the introduction of GDPR in Europe. As statistics show that this technology will be a determining factor in our lives, security testing must also become part of our daily tasks, so that these chatbots can be used with confidence. Security Risks, Threats, and Vulnerabilities                 The words risk, threat, and vulnerability are often confused or used interchangeably when reading about computer security, so let’s first clarify the terminology: Vulnerability refers to a weakness in your software (or hardware, or in your processes, or anything related). In other words, it’s a way hackers could find their way into and exploit your systems. A threat exploits a vulnerability and can cause loss, damage, or destruction of an asset - threats exploit vulnerabilities.                 Risk refers to the potential for lost, damaged, or destroyed assets - threats + vulnerability = risk!  The well-known OWASP Top 10 is a list of top security risks for a web application. Most chatbots out there are available over a public web frontend, and as such, all the OWASP security risks apply to those chatbots as well. Out of these risks, there are two especially important to defend against, as in contrast to the other risks, those two are nearly always a serious threat — XSS (Cross-Site Scripting) and SQL Injection. In addition, for artificial intelligence-enabled chatbots, there is an increased risk for Denial of Service attacks, due to the higher amount of computing resources involved. Vulnerability 1: XSS - Cross-Site ScriptingA typical implementation of a chatbot user interface:                        There is a chat window with an input box. Everything the user enters in the input box is mirrored in the chat window. Chatbot response is shown in the chat window. The XSS vulnerability is in the second step — when entering text including malicious Javascript code, the XSS attack is fulfilled when the web browser is running the injected code: <script>alert(document.cookie)</script>               Possible Attack VectorFor exploiting an XSS vulnerability the attacker has to trick the victim to send malicious input text. It can be done through one of the following ways:

View more...

Load Balancing — MQTT Broker Clustering Part 1

Aggregated on: 2022-01-21 16:34:42

This post gives a quick introduction to MQTT message broking, the challenges of clustering, and then load balancing. MQTT the Protocol Maybe you are not that familiar with MQTT protocol, you probably know HTTP protocol very well. Like HTTP, MQTT works at the same network (transport) layer TCP/TLS (well, it can actually work on top of HTTP, but that’s a topic for another day).

View more...

Security: Your Secret Weapon for UX Innovation

Aggregated on: 2022-01-21 16:04:42

The last two years have seen consumer expectations for high-performing digital experiences skyrocket. More than three-quarters (76%) of people say their expectations of digital services have increased since 2020. The necessity for brands to innovate and keep pace with their competition - when it comes to providing incredible user experiences - has never been greater. The start of a new year brings a great opportunity for brands to re-evaluate how leadership teams engage with and incorporate fresh strategies into their user experiences in order to meet these expectations.

View more...

12 Ways To Get More GitHub Stars for Your Open-Source Project

Aggregated on: 2022-01-21 16:04:42

We launched ToolJet in June 2021, since then we've got more than 4500 stars for our repository. Here is a list of things that worked for us. This is not an article about how to just get more stars for your repository. The article instead explains how to present your project well so that it is helpful for the open-source community.  Some of these points have helped us get contributions from more developers, we have contributions from more than 100 developers now.

View more...

Simplify Microservice Transactions With Oracle Database Sagas

Aggregated on: 2022-01-21 15:34:42

The Saga Pattern The saga pattern is used to provide data integrity across multiple distributed, isolated services involved in potentially long-lived activities (sometimes referred to as business activities or business transactions to disambiguate).  The classic example, and the one I use here and in the corresponding workshop, is a travel booking consisting of flight, hotel, and car reservations.  The original paper was published in 1987 and alludes to the advantages of an implementation that runs and stores data within a database and that is precisely what is being done in the Oracle database, making it a perfect fit for microservices and modern applications development for a number of reasons.  

View more...

8 Best React Native Project Ideas for Beginners

Aggregated on: 2022-01-21 14:49:42

Hello Devs, if you want to learn React Native and looking for creative project ideas and tutorials then you have come to the right place. In this article, I will share with you cool and nice projects to learn React Native for Beginners. From my own experience of learning many tech skills including React Native, I can say that building projects are really the best way to learn any new technology including React Native.

View more...

Rancher Vs. Kubernetes: It’s Not Either-Or

Aggregated on: 2022-01-21 13:49:42

Kubernetes (K8s) and Rancher are both open source projects focused on container management with enormous communities of contributors and users. Kubernetes is the leader in container orchestration. It offers teams the flexibility to efficiently run containerized workloads across multiple public cloud providers and hybrid cloud environments. Kubernetes offers advanced scheduling and scaling capabilities to ensure application performance and high availability. However, its functionality focuses on managing resources within a single cluster.

View more...

Introduction to Couchbase for Oracle Developers and Experts: Part 1- Architecture

Aggregated on: 2022-01-21 13:04:42

Introduction  You know Oracle, but need a good overview of Couchbase, a modern NoSQL database? You're in the right place. This will speed up your understanding of Couchbase.  It’s not intended to evaluate all the features or performance.  Since Oracle is a relational database with SQL as the main query language, it's normal for developers to view other databases from SQL's point of view.  In this article, we'll compare and contrast Oracle with Couchbase from a SQL point of view.  You'll get a good feel for the architecture and capabilities of Couchbase. We won't do a deep dive into high-availability, scale-out, and sizing the databases in this series.  

View more...

Dataweave Interview Question: Combine Country and Capital Name From Input

Aggregated on: 2022-01-21 12:34:42

This article will help you practice your DataWeave skills in MuleSoft. Today, we'll learn to combine the country and capital name from the input by using the map function.  Let's get started. 

View more...

Using Azure DevOps Pipeline With Gopaddle for No-Code Kubernetes Deployments

Aggregated on: 2022-01-21 12:34:42

Azure pipelines is a cloud-based continuous integration and deployment (CI/CD) platform to build, test and deploy applications to cloud environments like Azure, AWS, or GCP through Kubernetes Services, Azure Web Apps, and Azure Functions. Azure DevOps pipelines can build container images, push the images to a container registry and deploy these images to Kubernetes environments of our choice.  Setting up a pipeline that leverages a custom container registry or deploys to multi-cloud Kubernetes environments requires cloud-specific expertise and is time-consuming. For instance, building a pipeline from scratch requires:

View more...

What Is Applicative? Basic Theory for Java Developers

Aggregated on: 2022-01-20 22:19:41

Applicative is just another concept similar in meaning and history to Functors and Monads. I have covered these two in my previous articles, and I think it is finally time to start closing this little series about the most commonly known functional abstractions. Besides explaining some details and theory, I will implement a simple Applicative. I will also use Optional, hopefully one last time, to show what advantages Applicatives give us. The source code for this article is available in GitHub repository.

View more...

Software Testing Trends to Win in 2022

Aggregated on: 2022-01-20 21:49:41

Due to the pandemic, the adoption of digital technologies has been phenomenal across the verticals and horizontals. As per a survey conducted by McKinsey & Company, responses to COVID-19 have only sped up the adoption of digital technologies by several years — and many of these changes could be here for the long haul. 

View more...

6 Ways Software Engineers Can Learn at Work

Aggregated on: 2022-01-20 21:19:41

We know from multiple studies (e.g., 1, 2, 3) that learning at work improves both job satisfaction and organizational commitment. Both of these contribute to higher productivity and lower turnover. Many companies use personal learning budgets and some type of "5/10/20 percent time" policy to encourage learning. These are useful but highly dependent on personal motivation and learning habits. It’s often hard for software engineers to prioritize learning over their busy day-to-day work. For example, only around 10 percent of Googlers are using their famous "20 percent time" policy.

View more...

Exploring CockroachDB with ipython-sql and Jupyter Notebook

Aggregated on: 2022-01-20 21:19:41

Today, I will demonstrate how ipython-sql can be leveraged in querying CockroachDB.  This will require a secure instance of CockroachDB for the reasons I will explain below.  Running a secure docker-compose instance of CRDB is beyond the scope of this tutorial. Instead, I will publish everything you need to get through the tutorial in my repo, including the Jupyter Notebook. You may also use CRDB docs to stand up a secure instance and change the URL in the notebook to follow along. This post will dive deeper into the Python ecosystem and build on my previous Python post. Instead of reliance on pandas alone, we're going to use a popular SQL extension called ipython-sql, a.k.a. SQLmagic to execute SQL queries against CRDB. As stated earlier, we need to use a secure instance of CockroachDB. In fact, from this point forward, I will attempt to write posts only with secure clusters, as that's the recommended approach. Ipython-sql uses sqlalchemy underneath and it expects database URLs in the format postgresql://username:password@hostname:port/dbname. CockroachDB does not support password fields with insecure clusters, as passwords alone will not protect your data.

View more...

Exploring CockroachDB With Flyway Schema Migration Tool

Aggregated on: 2022-01-20 21:19:41

Today, I am going to quickly introduce you to Flyway and some of the new capabilities in CockroachDB leveraging schema migrations. This is by no means a deep-dive on Flyway, for that, I highly recommend you get familiar with Flyway's documentation. With that, let's dive in. I will continue to use a docker-compose environment for the following tutorial as it fits nicely with the iterative model of development and deployment with schema migration tools. We will need a recent CockroachDB image. My current folder tree looks like so:

View more...

The Power of Code Refactoring: How to Measure Refactoring Success

Aggregated on: 2022-01-20 20:49:41

Code refactoring provides a well-needed mental break for developers, and I think many devs can relate to this. Writing code all day is very demanding, especially if you create new functionality day by day. It’s a taxing exercise, and developers often need some space to think about the codebase's overall organization and look back on what can be improved. This is exactly what code refactoring does. It provides this well-needed mental break for developers, and it gives them the chance to tackle higher-level, codebase-related issues. However, it’s also a great moment to check your code against the codebase guidelines. No codebase is perfect. Small faults against the guidelines make it to the “main” branch.

View more...

Red Hat Summit 2022 - Talking Architecture Shop Series

Aggregated on: 2022-01-20 17:34:41

It's that time of year again when we get the Red Hat Summit 2022 call for papers! This year seemed to be a perfect time to go all in with sessions around our architectures based on a series of talks we've designed to showcase the various aspects we cover. Some are vertical aligned and others are just customer domains, but all of them include extensive research into how to implement successful architectures at scale.

View more...

Distributed SQL Essentials

Aggregated on: 2022-01-20 15:04:41

Distributed SQL databases combine the resilience and scalability of a NoSQL database with the full functionality of a relational database. In this Refcard, we explore the essentials to building a distributed SQL architecture, including key concepts, techniques, and operational metrics.

View more...

How I Built My Own Stock Index Tracker With Time-Series Data Using Low Code

Aggregated on: 2022-01-20 14:34:41

I recently started investing and came across a product called Smallcase. The way it works is — experts create a diversified long-term portfolio of stocks and ETFs and manage it on a timely basis for you. I really love the idea of how stocks can be added into portfolios or baskets to reduce market volatility. Unfortunately, at the moment, this product is only available for Indian investors and that led me to create an app, where I could create a portfolio, and also create a custom index on top of it, with features to compare benchmarked indices like Dow Jones / S and P. Building this kind of application from scratch would have taken me a lot of time; I would have had to choose a front-end framework, configure a database, and work on different visualizing frameworks to build time-series charts. With Appsmith, I was able to build this app in just a few hours. If you don’t already know, Appsmith is an open-source low code framework to build internal apps. In this blog, I will take you through the steps I followed to create the app.

View more...

Continuous Profiling in Kubernetes Using Pyroscope

Aggregated on: 2022-01-20 13:34:41

Developers typically need to look at performance bottlenecks in production applications to determine the cause of the problem. To do this, you usually need information that can be collected through logs and code tools. Unfortunately, this approach is usually time-consuming and does not provide enough details about the underlying problem. A modern and more advanced approach is to apply and use profiling techniques and tools that highlight the slowest application code, that is, the area consuming most of your resources.

View more...

Jakarta EE8, EE9, EE9.1, …. What???

Aggregated on: 2022-01-20 13:34:41

Jakarta EE is the new Java Enterprise platform as you’ve probably heard. There is a lot of news about this application development framework and also about the rapid development of the platform. Version 9.1 was released in May last year and version 10 is already in a review process. But what does this mean for my own Java project? Because I was also a bit confused about the different versions, hence my attempt to clarify things. First, the good news: As an application developer, you don’t have to worry. The most important thing that will change besides improved support by the community is the Java package names. The package name javax.* will be replaced by jakarta.*.

View more...

DataWeave Interview Question: Reverse an Array After Combining Its Elements

Aggregated on: 2022-01-20 12:19:41

This article will help you practice your DataWeave skills in MuleSoft. Use the article as a tutorial for learning more about DataWeave. Let's get started. 

View more...

A Guide to DevOps Security Checklist

Aggregated on: 2022-01-20 11:49:41

Organizations nowadays have started to realize the potential of DevOps. A survey conducted by Google says that 77% of organizations are currently either relying on DevOps or plan to do the same in the near future. The key factor behind their decision is the faster deployment of software. Another survey report says that 51% of DevOps users apply DevOps to new and existing applications. The wide utilization of DevOps has given rise to security concerns to protect their valuable data from phishing. To curb this menace a new branch of DevOps Security aka DevSecOps has emerged. Using DevSecOps, companies embed security through technology, policies, processes, and strategies. In this blog, we will discuss the top 6 DevOps security checklists, one must perform to ensure security compliance.

View more...

You're Running Untrusted Code!

Aggregated on: 2022-01-20 11:49:41

Last December, Log4Shell shortened the nights of many people in the JVM world. Worse, using the earthquake analogy caused many aftershocks after the initial quake. I immediately made the connection between Log4Shell and the Security Manager. At first, I didn't want to write about it, but I've received requests to do so, and I couldn't walk away. Hey @nicolas_frankel, isn't the #Log4j-Exploit the perfect argument against deprecation of the Java SecurityManager?!

View more...