News Aggregator


3 Types of User Communication APIs and When to Use Them

Aggregated on: 2022-01-07 15:04:33

If you’re an engineer who’s been tasked with planning out your application’s communication strategy, this post will help you map out the landscape. You’ll come away understanding the three core types of user communication APIs and in which circumstances you should use them to create the best possible end-user experience. As modern applications have become increasingly feature-rich and performant, user expectations are at an all-time high. Failure to communicate key information or displaying out-of-date information frustrates users and causes a loss of trust. Think about the last time you ordered something online: if you didn’t receive your order confirmation within seconds, you probably began to worry that something went wrong. Users require product transparency for consistent use.

View more...

Import Data From Hadoop Into CockroachDB

Aggregated on: 2022-01-07 14:34:33

CockroachDB can natively import data from HTTP endpoints, object storage with respective APIs, and local/NFS mounts. The full list of supported schemes can be found here. It does not support the HDFS file scheme and we're left to our wild imagination to find alternatives. As previously discussed, the Hadoop community is working on Hadoop Ozone, a native scalable object store with S3 API compatibility. For reference, here's my article demonstrating CockroachDB and Ozone integration. The limitation here is that you need to run Hadoop 3 to get access to it.  What if you're on Hadoop 2? There are several choices I can think of off the top of my head. One approach is to expose webhdfs and IMPORT using an http endpoint. The second option is to leverage previously discussed Minio to expose HDFS via HTTP or S3. Today, we're going to look at both approaches. My setup consists of a single-node pseudo-distributed Hadoop cluster with Apache Hadoop 2.10.0 running inside a VM provisioned by Vagrant. Minio runs as a service inside the VM and CockroachDB is running inside a docker container on my host machine. Information on CockroachDB can be found here. Information on Hadoop Ozone can be found here. Information on Minio can be found here. Upload a file to HDFS. I have a CSV file I created with my favorite data generator tool, Mockaroo. curl "https://api.mockaroo.com/api/38ef0ea0?count=1000&key=a2efab40" > "part5.csv" hdfs dfs -mkdir /data hdfs dfs -chmod -R 777 /data hdfs dfs -put part5.csv /data

View more...

Databricks vs Snowflake: The Definitive Guide

Aggregated on: 2022-01-07 14:34:33

There is a lot of discussion surrounding Snowflake and Databricks in determining which modern cloud solution is better for analytics. However, both solutions were purpose-built to handle different tasks, so neither should be compared from an “apples to apples” perspective. With that in mind, I’ll do my best to break down some of the core differences between the two and share the pros/cons of each as unbiasedly as possible. Before diving into the weeds of Snowflake and Databricks though, it is important to understand the overall ecosystem.

View more...

What Is Zero Trust Security and Why Is It Necessary?

Aggregated on: 2022-01-07 14:04:33

What is Zero Trust? Zero Trust is a security model that enables the DevSecOps team to deal with vulnerabilities that have arisen with massive digital transformations like cloud adoption, decentralized infrastructure, and container technologies. Though these have enabled teams to deliver products and services efficiently, the traditional security models pose a massive threat. The idea of trusting anyone inside the organization’s network is a massive flaw that needed rethinking. The core of the Zero Trust security model is to trust no one and always verify. This approach establishes a hard rule to always validate every digital interaction. Zero Trust framework assumes an organization’s network security is always at risk to external and internal threats. It helps organize and strategize a thorough approach to counter those threats.

View more...

Signs and Portents for 2022

Aggregated on: 2022-01-07 10:34:33

In this post, Head of Learning at Instil Software, Garth Gilmour, will make predictions for the tech industry in 2022. Introduction Back in ye olden days (circa 2015), I first wrote a December article that made unreliable and vainglorious predictions about the future. What started as a yearly custom soon became an annual tradition. You might like to review my 2020 effort to see how reliable my crystal ball is.

View more...

Inspecting Joins in PostgreSQL

Aggregated on: 2022-01-07 02:49:33

Introduction Relational databases distribute their data across many tables by normalization or according to business entities. This makes maintaining a growing database schema easier. Real-world queries often span across multiple tables, and hence joining these tables is inevitable. PostgreSQL uses many algorithms to join tables. In this article, we will see how joins work behind the scenes from a planner perspective and understand how to optimize them.

View more...

Protect Your Invariants!

Aggregated on: 2022-01-07 02:49:33

How do you handle constraints and validation inside your application? Most developers put this logic somewhere close to their application's boundary. Actually, this prevents them from having a rich domain model that could ensure consistency. Developers tend to get confused when they need to find a good place for their business logic. I suspect that most probably the reasons are related to all those bad examples circulating in the documentations of popular frameworks and bad habits from coding in old-fashioned enterprise platforms like J2EE. Most of the time, they're afraid to keep these vital pieces of information in the language elements most relevant to the target domain: I'm talking about the simple classes reflecting the "nouns" of the business logic. Often, you see something like the example below:

View more...

Community AMA: Bryan Finster and Continuous Delivery

Aggregated on: 2022-01-07 00:34:33

Continuous Delivery isn’t about how fast you can deliver, it’s about the outcome your delivery achieves. Bryan Finster, author of the 5-minute DevOps series and founder of the DevOps Dojo, joined our Dev Interrupted Discord community to answer your questions about outcome-based development, continuous delivery, and why failing small is better than failing fast.  Bryan is currently a Distinguished Engineer at Defense Unicorns but has also worked for Walmart as a systems analyst and eventually became a staff software engineer for Walmart Labs. He had previously appeared on the Dev Interrupted Podcast to further talk about these subjects as well as the most common pitfalls dev teams find when trying to optimize their delivery process. Listen to the episode here:

View more...

How To Use SingleStore Pipelines With Kafka, Part 1 of 3

Aggregated on: 2022-01-06 23:34:33

Abstract In this article series, we'll look at a compelling feature of SingleStore called Pipelines. This enables vast quantities of data to be ingested, in parallel, into a SingleStore database. We'll also see an example of how we can use this feature in conjunction with Apache Kafka™. This first article will focus on uploading some data into SingleStore using Spark. In a previous article, we noted that Spark was great for ETL with SingleStore. We'll also perform some analysis of the data. In the example application, we will simulate some sensors distributed globally that generate temperature readings, and these readings will be ingested into SingleStore through the Confluent Cloud. We'll implement a Producer-Consumer model using Java and JDBC, and then simplify this using SingleStore Pipelines. The SQL scripts, Java code, and notebook files used in this article series are available on GitHub. The notebook files are available in DBC, HTML, and iPython formats.

View more...

How A.I. Can Transform Academics Into Immersive Learning Experiences

Aggregated on: 2022-01-06 23:34:33

One of the biggest challenges facing today’s educational infrastructure is the inability of current technology to deliver quality courses to students. With the growing power of cloud computing and video conferencing, educational institutions have been keeping themselves in a “dark age” that only serves to inhibit student education and learning habits.  If academia would turn its attention to cloud computing, artificial intelligence, and immersive learning beyond Blackboard and video conferencing solutions, it will enhance student learning in ways that speak to numerous learning patterns. 

View more...

How Does Machine Learning Work in Finance Automation?

Aggregated on: 2022-01-06 22:49:33

Automation in finance, or any other sector for that matter, is inevitable. However, automating financial services is quite different and challenging from other business domains due to a high level of caution, concerns, and risks.  According to the survey used for the above infographic, 73% of finance experts believe that automation boosts their function efficiency, and hence, the finance team can focus on other value-added activities. At the same time, 87% of CFOs believe that they need to be more agile to analyze their financial services and meet their targets. 

View more...

Getting Started With AWS Amplify

Aggregated on: 2022-01-06 19:34:33

Serverless cloud infrastructure is the next step in building apps. But if you’ve tried to navigate the vast number of services in the AWS console, you know that using the cloud is easier said than done. Today’s developers are overwhelmed with the amount of services AWS offers. The solution? AWS Amplify, which helps developers to easily build and deploy complete mobile and web apps by providing a collection of CLI tools, libraries, frameworks, and cloud services.

View more...

DevOps on AWS: Everything You Need to Know

Aggregated on: 2022-01-06 19:04:33

DevOps is renowned for fast methodologies, increased security (in the form of DevSecOps), as well as the quick and easy scalability of software development projects. These advantages make it essential for companies to embrace the DevOps culture as a guarantee of future success and growth.  At the heart of this change, we have Amazon and its pioneering cloud offering, Amazon Web Services. Being the most popular in the market means Amazon has some of the best services, infrastructure, locations, and support in the market. The amount of trained professionals in AWS DevOps is also the highest among the big three; Google Cloud Platform, Microsoft Azure, and AWS.

View more...

CockroachDB With Kerberos and Docker Compose

Aggregated on: 2022-01-06 19:04:33

Articles covering CockroachDB and Kerberos I find the topic of Kerberos very interesting and my colleagues commonly refer to me for help with this complex topic. I am by no means an expert at Kerberos, I am however familiar enough with it to be dangerous. That said, I've written multiple articles on the topic which you may find below: Part 1: CockroachDB with MIT Kerberos Part 2: CockroachDB with Active Directory Part 3: CockroachDB with MIT Kerberos and Docker Compose Part 4: CockroachDB with MIT Kerberos and custom SPN Part 5: Executing CockroachDB table import via GSSAPI Part 6: CockroachDB, MIT Kerberos, HAProxy, and Docker Compose Part 7: CockroachDB with Django and MIT Kerberos Part 8: CockroachDB with SQLAlchemy and MIT Kerberos Part 9: CockroachDB with MIT Kerberos using a native client Part 10: CockroachDB with MIT Kerberos along with cert user authentication Part 11: CockroachDB with GSSAPI deployed via systemd Part 12: Selecting proper cipher for CockroachDB with GSSAPI Part 13: Overriding KRB5CCNAME for CockroachDB with GSSAPI As our customers are increasing their footprint and considering production use cases, I'm being asked to walk through the typical steps of enabling Kerberos auth for Cockroach. As this process is pretty heavy-handed, a few of us at Cockroach had sought out a repeatable process in getting an on-demand environment quickly and efficiently. CockroachDB source code is a good starting point for learning the inner workings of CRDB. I knew there were compose recipes available with Kerberos to test through the integration but typically they are written for Go language tests. We decided to introduce our own docker compose with nothing but a Kerberos realm, an instance of CockroachDB, and a Postgres client to connect with. The last part is only necessary for a bit longer as we're actively working on building GSSAPI support into the cockroach CLI.

View more...

Demystifying Grids For Developers and Designers

Aggregated on: 2022-01-06 18:34:33

Designers and developers each have their own individual definition and use of grids, making the concept a relatively nebulous and unclear concept to all. To some, grids could mean layout and structure, while to others grids refer to interactive tables that manage data. Understanding the target audience is key here because there might not be a universally understandable direction which can lead designers to be misguided during the cross-collaboration process. When given the time, developers and designers can fully evaluate the user story and create a thoughtful user experience together through the use of grids. But first, we need to find common ground to work from. Identifying a Grid As we mentioned, it is important to know your audience when talking about Grids. If you come from a typical design background, the word “Grid” instantly brings you to think about layout (either print or online). The term has even penetrated CSS with the Grid Layout. As you can see in this article, that demonstrates the use of the term “Grid” generically for design layout purposes.

View more...

How Disaster Ready Are Your Backup Systems, Really?

Aggregated on: 2022-01-06 18:34:33

In SRE, we believe that some failure is inevitable. Complex systems receiving updates will eventually experience incidents that you can’t anticipate. What you can do is be ready to mitigate the damage of these incidents as much as possible. One facet of disaster readiness is an incident response - setting up procedures to solve the incident and restore service as quickly as possible. Another strategy involves reducing the chances for failure with tactics like reducing single points of failure. Today, we’ll talk about the third type of readiness: having backup systems and redundancies to quickly restore function when things go very wrong.

View more...

Kubernetes Hardening Tutorial Part 1: Pods

Aggregated on: 2022-01-06 18:04:33

In my previous two articles, we discussed Kubernetes security and created a guideline for enhancing K8s. If you haven't read them yet, here are the links: Hardening Your Kubernetes Cluster - Threat Model (Pt. 1)

View more...

Kubernetes Salary Guide: A Detailed Comparison

Aggregated on: 2022-01-06 18:04:33

As the use of Kubernetes keeps growing in tandem with containers, cloud-native development, alongside other related IT trends, the hiring demand for technology professionals who have the relevant skills to help companies achieve their goals is also growing. However, relevant information about Kubernetes salaries is hard to find because this niche is relatively new to the market.   If you are looking for a Kubernetes engineer or administrator position, being armed with information about your salary prospects is vital to negotiating fair compensation with your prospective employer. Furthermore, this position has several variations, making it even more essential to do your research beforehand because some options may not fit your skillset. 

View more...

10 Must-Have React Developer Tools To Write Clean Code

Aggregated on: 2022-01-06 18:04:33

Introduction React is a component-based open-source JavaScript library for building user interfaces. It is used for handling the view layer in web and mobile applications, and it is great for building single-page web applications. Some of the features of React are:

View more...

Introduction to System Design Interviews

Aggregated on: 2022-01-06 17:04:33

This article provides an overview of practices and areas of focus when navigating a high-level systems design interview. I expect this information will be most helpful to engineers with 1-3 years of experience or those who have never done a systems design interview. Additionally, this article is expected to be used as a jumping-off point, and readers will likely need to leverage other resources to dig deeper into the referenced concepts and terms.

View more...

2 Approaches to Microservices Monitoring and Logging

Aggregated on: 2022-01-06 16:34:33

We’re seeing a massive shift in how companies build their software. More and more, companies are building—or are rapidly transitioning—their applications to a microservice architecture. The monolithic application is giving way to the rise of microservices. With an application segmented into dozens (or hundreds!) of microservices, monitoring and consolidated logging become imperative. At any given moment, one of your microservices could fail or throw an error or begin hogging resources. You need to monitor for this so that you can respond quickly and appropriately. In addition, your ability to troubleshoot errors and understand system behavior depends heavily on the existence and effectiveness of your logging tool.

View more...

Azure Synapse vs Snowflake: The Definitive Guide

Aggregated on: 2022-01-06 16:34:33

With the world on pace to reach 175 Zettabytes of data by 2025, it’s no wonder why organizations are placing such a high emphasis on building out their technology stacks. Now more than ever, companies need a way to collect and consolidate data into a single platform to derive insights quickly. This is one of the core reasons that Snowflake and Azure Synapse Analytics have risen to such popularity. However, Synapse and Snowflake are different solutions and both should be analyzed from an unbiased lens. With that in mind, here are some of the core differences and pros/cons to Snowflake and Synapse.

View more...

Securing Web Applications and APIs With Confidence [Webinar Sign-up]

Aggregated on: 2022-01-06 15:49:33

The number of web applications and APIs exposed to the internet are growing exponentially. Unsecure web applications and APIs are low-hanging fruit that attackers are targeting to steal sensitive data. In a recent report “State of the Web Security for H1 2020,” CDNetworks highlighted that, in particular, web application attacks rose by 800%. Legacy WAFs can no longer provide comprehensive coverage for cloud native architectures since attackers are looking to exploit unsecured APIs, Bad Bots, and more. Security, operations, and infrastructure teams require a holistic solution with comprehensive protection across the full application lifecycle.

View more...

Composite Design Pattern in Java

Aggregated on: 2022-01-06 15:49:33

In the video below, we take a closer look at the Composite Design Pattern in Java. This tutorial includes an introduction, class diagram, example, and key points. Let's get started!

View more...

JDBC Tutorial Part 2: Running SQL Queries

Aggregated on: 2022-01-06 15:19:33

In Part 2 of this tutorial series, you’ll learn how to execute SELECT, INSERT, UPDATE, and DELETE statements against an SQL database using JDBC. These actions are known as CRUD operations (Create, Read, Update, Delete) which form most of the functionality in an application. Note: We’ll continue where the previous step of the tutorial left off, which means this article assumes you have a Connection object ready. Refer to part 1 of this tutorial for more details. The source code is available on GitHub.

View more...

Improving Performance With SQL Aggregate Functions

Aggregated on: 2022-01-05 20:04:32

In this article, you will learn how SQL aggregate functions can represent an easy way to significantly improve your application's performance. Mainly, you will see how they were a game-changer in a real-world scenario based on a data-driven application developed for a startup operating in the sports industry. Let's now delve deeper into this scenario and learn why you can't ignore SQL aggregate functions in data science.

View more...

Web Application Security Driven by WAF is Favoring Organizations

Aggregated on: 2022-01-05 16:49:32

Web application security through WAF is a great way to protect a company's web applications from hacking attempts. It provides comprehensive security for the server's web applications, allowing the company to protect the data stored in back-end databases. While a WAF cannot provide the same level of protection as a dedicated firewall, it can prevent data leakage in a secure manner. First-Generation WAF Although first-generation WAFs scanned web traffic without detecting malicious content, these models did not offer the highest level of security. They weren't flexible enough to handle constant software updates, and a stateless WAF could not prevent attackers from devising new attack behaviors. Additionally, they were too expensive, offered false positives, and required dedicated IT expertise to maintain.

View more...

Batch Processing in Go

Aggregated on: 2022-01-05 15:49:32

Batching is a common scenario developers come across to basically split a large amount of work into smaller chunks for optimal processing. Seems pretty simple, and it really is. Say we have a long list of items we want to process in some way. A pre-defined number of them can be processed concurrently. I can see two different ways to do it in Go. The first way is by using plain old slices. This is something most developers have probably done at some point in their careers. Let's take this simple example:

View more...

Is Spring Boot Still State of the Art?

Aggregated on: 2022-01-05 15:49:32

In the following blog post, I want to take a closer look at the question of whether the application framework Spring Boot is still relevant in modern Java-based application development. I will take a critical look at its architectural concept and compare it against the Jakarta EE framework. I am aware of how provocative the question is and that it also attracts incomprehension. Comparing both frameworks I am less concerned about the development concept but more with the question about runtime environments.  Both – Spring Boot and Jakarta EE – are strong and well-designed concepts for developing modern Microservices. When I am talking about Jakarta EE and Microservices I always talk also about Eclipse Microprofile which is today the de-facto standard extension for Jakarta EE. Developing a Microservice the concepts of Spring Boot and Jakarta EE are both very similar. The reason is, that a lot of technology of today’s Jakarta EE was inspired by Spring and Spring Boot. The concepts of “Convention over Configuration“, CDI, or the intensive usage of annotations were first invited by Spring. And this is proof of the innovative power of Spring and Spring Boot. But I believe that Jakarta EE is today the better choice when looking for a Microservice framework. Why do I come to this conclusion?

View more...

What Does 2022 Have in Store for Cybersecurity and Cloud Security Specialists?

Aggregated on: 2022-01-05 13:34:32

Cloud adoption and industry transformation are accelerating as the world looks for efficiency. Let’s face it, 2022 promises to be another busy year for cybersecurity and cloud security specialists.  According to the 2021 ISC Cybersecurity Workforce Study, we are still short 2.7 million cybersecurity professionals globally. There aren’t enough people to keep up with the rising threat, so we need to deploy automation heavily to tackle it. 

View more...

2022 New Year’s Resolution: Dev and SEC Cross-Team Learning

Aggregated on: 2022-01-05 13:04:32

A good DevSecOps strategy goes beyond having the right tools and processes in place: it requires consistent and crucially, bi-directional feedback and learning. Both security and engineering teams have such different priorities and strengths, but that doesn’t mean they don’t have anything to learn from each other. This year, make it a resolution to create a culture of bi-directional learning between these two teams and reap the benefit of improved collaboration. Here are the top things one can learn from the other to break down silos in the name of DevSecOps. What Security Teams Can Learn From Developers Part of embracing DevSecOps requires relinquishing some amount of control. Security isn’t going anywhere anytime soon, but to fully embrace DevSecOps, they have to relinquish some amount of control. They have to rely on training and automation and trust that developers are capable of securing their own code.

View more...

Having (More) Fun Creating Components with the Lightning Design System for React

Aggregated on: 2022-01-05 12:34:32

In “Having Fun with the Lightning Design System for React”, I created a React application using the Lightning Design Framework for React, quickly adding several components in order to provide an impressive user experience.  The image below demonstrates what I was able to create in less than an hour on a rainy Sunday afternoon:

View more...

How To Avoid 8 Common Agile Anti-Patterns Hurting Your Team

Aggregated on: 2022-01-05 12:34:32

Agile is one of the trendiest concepts in the tech world. First theorized in 2001, Agile encompasses several frameworks such as eXtreme Programming, Crystal, or Lean Software Development (LSD), with the most widespread being Scrum.

View more...

Debugging RAM - Part 1: Java Garbage Collection - Java Heap Deep Dive

Aggregated on: 2022-01-05 12:34:32

There are many excellent articles on Java Garbage Collection, Java Memory usage, and generally Java heap. Unfortunately, they are all over the place. They mix architecture, concepts, and problem solving as separate pieces. A lot of the material is out of date or doesn't include pragmatic information for solving problems with the garbage collector. E.g., pause times, heap space usage, etc. In this post, I won't go into memory leaks. They're important but this is a different subject I would like to discuss in a post on its own. 

View more...

How To Create a MongoDB Projection?

Aggregated on: 2022-01-05 11:49:32

In this post, we will learn how to create a MongoDB Projection. Basically, projections allow us to retrieve selective fields of a document while querying a collection. If you are new to MongoDB, you can check out this detailed post about MongoDB CRUD Operations. This is because the CRUD operations form the basis for other complicated operations.

View more...

Kubeflow Fundamentals Part 6: Working With Jupyter Lab Notebooks

Aggregated on: 2022-01-05 11:49:32

Welcome to the sixth blog post in our “Kubeflow Fundamentals” series specifically designed for folks brand new to the Kubelfow project. The aim of the series is to walk you through a detailed introduction of Kubeflow, a deep-dive into the various components, add-ons, and how they all come together to deliver a complete MLOps platform. If you missed the previous installments in the “Kubeflow Fundamentals” series, you can find them here:

View more...

Simplify Migrating From Kafka to Pulsar With Kafka Connect Support

Aggregated on: 2022-01-05 11:19:32

Large-scale implementations of any system, such as the event-streaming platform Apache Kafka, often involve customizations and tools and plugins developed in-house. When it’s time to transition from one system to another, the task can become complicated, drawn-out, and error-prone. Often the benefits of an alternative system (which can include significant cost savings and other efficiencies) are outweighed by the risks and costs of migration. As a result, an organization can end up locked into a suboptimal situation, footing a bigger bill than necessary and missing out on modern features that help move the business forward faster.  These risks and costs can be mitigated by making the transition process iterative, breaking off the vendor lock-in in small, manageable steps, and avoiding the "big bang" switch that often results in delayed delivery and increases the cost of running two systems in parallel for A|B testing. 

View more...

The “Onion Peel” Approach to Hyper Intelligent Automation

Aggregated on: 2022-01-05 10:49:32

Hyper Intelligent Automation (HIA) was verily the flavor of 2021 and going ahead into 2022 and beyond it’s set to stamp its importance in more ways than one. The growing clout of “Intelligent Automation” is buttressed by the fact that a recent Zinnov Zones report on Hyper Intelligent Automation (HIA) shows the segment will grow at a rate of 50-55% year-on-year to cross USD 18Bn by 2026 from the existing USD 2.4 Bn. The deal ecosystem has seen a steady rise in demand for HIA and 30-35% of the overall HIA deals are over USD 500K in size. This trend underlines a fundamental shift of large enterprises who are no longer looking at automation focusing only on efficiency and cost savings but at outcomes around enhanced stakeholder experience and business resilience.

View more...

A Comprehensive Guide to Backlog Management and Everything It Contains in 2022

Aggregated on: 2022-01-05 10:49:32

If you have been a part of the project management world for a while now, then you would know that a product backlog is a prioritized set of desired features and functionalities that consists of all of the important items that are critical to complete a product release. This backlog contains many different elements like enhancements, bug fixes that the development team has to perform, new features that have to be introduced, and the technology upgrades that are needed in the current product.

View more...

CockroachDB CDC Using Minio as Cloud Storage Sink - Part 3

Aggregated on: 2022-01-05 09:49:32

This is the third in the series of tutorials on CockroachDB and Docker Compose. Today, we’re going to explore CDC capability in CockroachDB Enterprise Edition using Minio object store as a sink. To achieve this, we’re going to reuse the compose file from the first two tutorials and finally bring this to a close. Without further ado You can find the first post here and the second post here.

View more...

How We Handled the Log4j Security Vulnerability

Aggregated on: 2022-01-05 08:49:32

"The log4j vulnerability is the most serious vulnerability I have seen in my decades-long career", Jen Easterly US Cybersecurity and Infrastructure Security Agency Director  Log4j is a Java-based logging utility part of the Apache logging services. This is a popular logging tool used in tens of thousands of software packages. Google estimates that 8% of Maven Central Repository was affected with about 7000 artifacts directly dependent on log4j (either a version of log4j-core or log4j-api). Every major software company went into crisis mode, they were trying to figure out how their products could possibly be affected and if so how they were going to patch the vulnerability. Lattix being a Java-based application also needed to scan its codebase.

View more...

Step by Step Walkthrough of Your First Svelte Application

Aggregated on: 2022-01-05 08:49:32

In this post, we will do a step-by-step walkthrough of our first Svelte Application. In essence, we will be understanding the overall structure of a Svelte application. If you wish to follow along, you can first set up a Svelte Rollup application so that you have a development project ready to work with.

View more...

Free DevOps Training and Certifications You Should Know

Aggregated on: 2022-01-05 04:04:32

Our profession evolves every year, whether through the introduction of a new tool, a new cloud service, or a new working method. This constant evolution requires the establishment of a learning culture to continuously share experiences and ideas, thus encouraging everyone to gain new knowledge each year. Obviously, this demands a portion of our working time and an online library of training resources maintained by entities with authority in the domain. These entities are responsible for updating the content to allow us to continuously improve our skills, sometimes to advance in our career in order to aim for an internal or external evolution. Therefore, relying on trusted education partners is important to ensure the highest-quality learning content.

View more...

5 Dev Tools to Look Out for in 2022

Aggregated on: 2022-01-05 00:49:32

Can you believe it’s been over two years since the global pandemic had totally shaken up the way we work? The beginnings were tough, but now, with the end of 2021 right around the corner, we are already used to remote working environments and expect the market to catch up with the new normal. The demand for innovation and collaboration improvements for remote teams (and dev teams in particular) is probably one of the strongest trends we can currently observe in the industry. In this short post I rounded up 5 relatively new dev tools that have recently been on my radar and I believe have the potential to improve our daily workflows. GitLive  Pain: Lack of communication tools designed specifically for developers

View more...

Mulesoft OData

Aggregated on: 2022-01-05 00:49:32

This article will help you build an OData Rest API. Before reading, below are a few prerequisites to be taken care of: Anypoint Studio 7.1.4 or later. (Download Link: Anypoint Studio). Mule Runtime Engine 4.1.1 or later. Install OData Plugin in-studio below are the steps: Open Anypoint Studio --> Help --> Install New Software. Click on Add option and Add below URL in the location section and then select the OData v2 Plugin to install it in Anypoint Studio. http://studio.mulesoft.org/s4/apikit-for-odata/ Let's start now with the development; we will be working on a simple use case for creating an OData Rest API for Salesforce Opportunity Object. 

View more...

Lazy Load Design Pattern in Java: An Introduction and Implementation

Aggregated on: 2022-01-05 00:49:32

In the video below, we take a closer look at Lazy Load Design Pattern in Java with an introduction and implementation. Let's get started!

View more...

Perl Warnings and the Warn Function

Aggregated on: 2022-01-05 00:04:32

I mentioned in passing last week that the next major release of Perl, v5.36, is set to enable warnings by default for code that opts in to use v5.35; or above. Commemorating Perl’s 34th birthday the week before that, I noted that the warnings system has been getting ever finer-grained since its introduction in 2000. And, fellow Perl blogger and CPAN author Tom Wyant has been cataloging his favorites over the past several months — the latest as of this writing was on the “ambiguous” category of warnings, and you can find links to previous entries in his series at the bottom of that post. It occurred to me afterward that there may be some confusion between the warnings pragma and the related warn function for reporting arbitrary runtime errors. warn outputs its arguments to the standard error (STDERR) stream, or if it’s not given any then you get a string with any exception from ( under use English) followed by a tab and then “...caught at <file> line x.” If that’s empty too, a plain warn just says, “Warning: something's wrong at <file> line x.”, which isn’t exactly helpful, but then again you didn’t give it much to go on.

View more...

Errors and Suspicious Code Fragments in .NET 6 Sources

Aggregated on: 2022-01-04 21:34:32

The .NET 6 turned out to be a much-awaited and major release. If you write for .NET, you could hardly miss such an event. We also couldn't pass by the new version of this platform and decided to check what interesting things we can find in the sources of .NET libraries. Details About the Check I took the sources from the branch of .NET 6 release on GitHub. This article covers suspicious places only from the libraries (those that lie in src/libraries). I didn't analyze the runtime itself (maybe next time).

View more...

Anypoint Studio: Install and Use Mule Secured Property Editor

Aggregated on: 2022-01-04 17:49:31

Securing critical properties like passwords, tokens, and keys is an important aspect of developing a MuleSoft API. Fortunately, MuleSoft supports encryption/decryption of such properties, which can be handled pretty easily by performing the steps mentioned below. Let's say you have a mule project named Hello-Mule with critical properties like clientSecret and passwords, and these properties are saved in a property file named dev.properties:

View more...

The Role of CI/CD Pipeline in Software Development

Aggregated on: 2022-01-04 16:34:31

If you want to deliver code more frequently and reliably, you’ve probably already heard about the benefit of CI/CD tools, used exactly for that purpose. The CI/CD Pipeline is one of the modern development practices related to DevOps services. Let’s explore together what it is, the difference between Continuous Integration and Continuous Development, and more importantly, the role of CI/CD for software development. What Does CI/CD Pipeline Stand For? Continuous integration and continuous delivery/continuous deployment are abbreviated as CI and CD, respectively. In a nutshell, CI/CD is a contemporary software development methodology wherein incremental code changes are done often and consistently. CI-triggered autonomous build-and-test stages guarantee that code changes submitted into the source are trustworthy.

View more...