News AggregatorIs It Difficult to Bypass Protection That Uses Big Data?Aggregated on: 2021-11-17 04:50:58 Today I want to talk about big data in cybersecurity, or rather, how easy or difficult it is to bypass protection systems that use big data. In other words, how to fool advanced threat detection systems, past the all-seeing eye of which, according to marketers, no extra byte can slip through. I am talking about systems that use big data analytics as one of the main tools for detecting suspicious activity like SIEM and XDR. Medium and large businesses usually use such platforms. They have big networks and cloud infrastructure where millions of events occur every hour. Naturally, there is no way to analyze them manually. It is conducted with the intensive use of technical means. And it is important to note that the availability of qualified specialists — both in the field of big data and in the field of cybersecurity — is a necessary component here. View more...New VS Code Debugging Tools for AlexaAggregated on: 2021-11-16 22:50:57 During the last months, the Alexa team has launched a bunch of useful tools for Visual Studio Code. The purpose of these new features is to have a single place with everything set up. Also having all these tools in the same place, we do not have to switch between multiple apps or tabs. In this article, I will show you how you can have a full dev-env for Alexa skills on Visual Studio Code. New VS Code Debugging Tools for Alexa Prerequisites Setting up our Alexa Skill Creating the Visual Studio Configuration Alexa Simulator Launching and debugging our Alexa Skill locally Video with the full explanation Resources Conclusion Prerequisites Here are the technologies used in this project: View more...J-Fall 2021 ImpressionsAggregated on: 2021-11-16 21:05:57 The 4th of November, the J-Fall conference was organized by the NLJUG. J-Fall is the largest one-day Java conference in the Netherlands. I attended the conference and with this post, I want to share some of my impressions. Enjoy! 1. Introduction It was already the 18th edition of J-Fall and it was a live event. Of course, some COVID measures were in place, but it was a relief that it was finally possible again to attend a live event. J-Fall was held at the Pathé cinema theater at Ede which is a great location for such an event. The main room 9 is really impressive! Due to COVID measures, only 1.300 participants were allowed instead of the usual 1.500. You had to be quick to register because the event was sold out in nearly one day. More than 60 sessions were held, which makes choosing where to go quite a difficult task. But, do not worry, all sessions are recorded and will be made available via the NLUG YouTube channel. As said before, it is a one-day conference, although they cheated a bit this year because also a pre-conference was held :-). View more...Developers Are Leaving Their Jobs to Escape From Your Bad CodebaseAggregated on: 2021-11-16 20:50:57 Recently, Stepsize surveyed 200+ software engineers from different industries to learn how codebase health impacts engineer hiring and retention. In this article, I’ll share some of the key stats from the survey, why investing in a codebase is crucial for businesses, and questions you can ask in the interview as an engineer to learn about the company’s codebase health. View more...AI for Cloud-Based SaaS Applications To Enable Efficient Remote Work in 2022Aggregated on: 2021-11-16 17:05:57 The recent pandemic has emphasized the need for remote work. Especially for businesses that did not have remote capabilities, the need arose for reliable SaaS-based solutions to meet immediate demand. Migration to the Cloud and SaaS-based solutions has been pivotal to remote working capabilities, which is why significant IT expenditure is driven towards it. According to Gartner, the worldwide spending on cloud-based SaaS applications was $120,686 in 2020 and will rise to $171,915 in 2022. However, integrating SaaS-based solutions into your existing system is not that easy, and several repetitive tasks increase the cost. View more...Zero Trust’s Impact on API SecurityAggregated on: 2021-11-16 15:50:57 Developers are releasing software to keep up with users’ expanding digital presence. Many of those programs rely on Application Programming Interfaces (APIs). Per IBM, APIs enable organizations to connect the data and functionality of their applications with those of other companies. APIs make it easier for companies to deliver and improve the digital products and services on which users rely. It’s therefore no surprise that APIs have grown in recent years. Postman observed that its Collections, or folders where API developers group their API requests, doubled from 17.4 million to 34.9 million between January 2019 and January 2020 alone. As of January 2021, the number of Postman Collections had increased beyond 46 million. View more...Create a Multi-tenancy Application In Nest.js - Part 1Aggregated on: 2021-11-16 15:20:57 Overview Multitenancy is an operational mode in SaaS applications where various independent instances are allocated to the same environment. To put it simply, multitenancy is having multiple tenants (businesses) use the same Saas application. Multitenancy Archituecture This article will not discuss designing a multitenancy application, however, you can read about it in detail here: What is Multi-Tenant Architecture? From here on, we are going to work on an example about the multi-tenants using multiple databases and microservices architecture. View more...Becoming Cloud NativeAggregated on: 2021-11-16 15:05:57 The traditional model of business is undergoing radical change in an endeavor to employ digital technologies better to suit multiple purposes across a variety of sectors, and cloud-native is one of the key drivers that re-architects cloud environments with the intent of adapting the means for how to deliver services. cloud-native is a modern and advanced software development approach; which is why it is becoming of high importance to many companies. Digital Transformation Risks But moving to a new software development approach is not easy, and organizations can be slow to adopt a radical change in the interests of safeguarding their market, output, and business. So, to mitigate risk, organizations can take a step-by-step approach to become cloud-native in several phases, where they can first replicate the new approach on a smaller scale inside a department/team/project architecture to test the results. View more...Multi-Container Pod Design Patterns in KubernetesAggregated on: 2021-11-16 15:05:57 Pods In Kubernetes, Pods are the single deployable units. If an application is to be deployed it has to be deployed in a Pod as a container. Though applications run in containers, the containers must be part of the Pod. The Pod specification has attribute containers where container specifications are declared. The attribute is plural. That means we can declare more than one container in a Pod specification. Multi-Container Design Consideration But Kubernetes administrators always choose one container Pods over multi-container Pods. One Container Per Pod is an unwritten practice across the industry. Let’s see what advantage a multi-container pod has to offer. View more...Effortless Cloud-Native App Development Using Skaffold - Book ReviewAggregated on: 2021-11-16 14:35:57 I’m a developer who cares deeply about production. But I’m not a DevOps and unfortunately, I’m pretty bad at that. That’s why when I heard about Skaffold and it instantly piqued my interest. Write Kubernetes cloud-native apps without well… Writing Kubernetes native apps… Sign me up! Unfortunately, as we all know. The time to pick up new technology is when we actually need it and then it’s a rush to get something out. Few of us have time to take off from our busy day to study something and learn something new. That’s why when Ashish Choudhary, the author of the book “Effortless Cloud-Native App Development Using Skaffold” asked for reviewers in the foojay.io slack group, I jumped on the opportunity. I can learn something interesting and be productive (this book review). View more...To My Programmer Self 20 Years Ago: Do These 4 Things MoreAggregated on: 2021-11-16 14:35:57 Twenty years ago, I landed my first gig as a freelance web developer. Twenty years later, I’m still doing it. In hindsight, I see four habits that I wish I had developed in myself earlier rather than later. 1. Automate More You’ve been so good at being a one-man shop, and you’re able to keep so many details and processes in your head. The deployment for that one client has 15 steps, and you do it every month, so you’ve got it memorized and down to five minutes each run. You’re going to get into debates with co-workers about this one. With all of the features that need building and all of the bugs to fix, this question will come up again and again: View more...How MVP Development Filters User NeedsAggregated on: 2021-11-16 13:50:57 The success of any product depends on how efficiently and effectively it solves the problems of users. Rethinking the traditional development methods to MVP development has taken priority as it helps businesses in creating and capturing value faster by first understanding the requirements of users. In this blog, we have covered some of the MVP software design practices that filter user needs, enhance consumer engagement by prioritizing features and generate insights to measure business value. Identifying User Needs Through MVP MVP product development is important to identify the unsaid needs of customers. It helps in gaining insights based on which an MVP can be built to solve the right problem for the right set of people. However, the success of MVP lies in: View more...How To Use SingleStore With Spark ML for Fraud DetectionAggregated on: 2021-11-16 13:50:57 Abstract In the first part of this Fraud Detection series, we created and configured a Databricks CE cluster. In this second article, we’ll load credit card data into our Spark environment. We’ll also compare the performance of the SingleStore Spark Connector against JDBC for loading our data into SingleStore from Spark. The notebook files used in this article series are available on GitHub in DBC, HTML, and iPython formats. View more...Apache ShardingSphere 5.0.0 New Features: Middleware to Ecosystem EvolutionAggregated on: 2021-11-16 12:20:57 Having undergone nearly two years of development and polishing with versions 5.0.0-Alpha and 5.0.0-Beta, Apache ShardingSphere 5.0.0 GA version is finally available in November. Coincidentally November 10th marks the 3rd anniversary of ShardingSphere’s entry into the Apache Software Foundation. The ShardingSphere core team has been working hard together with the community to meet this special deadline and release the 5.0.0 GA version to celebrate the third anniversary with the broader community, and the entire distributed database and security ecosystem. View more...Test Case Vs. Test ScenarioAggregated on: 2021-11-16 11:50:57 Test Case A test case is a set of activities that are carried out to verify the functionality of a certain component or feature of your product application. A test case is a set of test steps, test information, preconditions, and postconditions built for specific test cases to ensure that all prerequisites are met. It's a collection of circumstances or elements. When a tester determines whether an application, programming framework, or one of its features is performing as expected. View more...Monitor Apache Kafka with Telegraf and Grafana in AzureAggregated on: 2021-11-16 11:05:57 Monitoring helps to drive productivity and improves service availability. Apache Kafka is no exception to that. With Apache Kafka gaining popularity and becoming the de-facto standard for distributed messaging in Microservice architecture, it is important for DevOps engineers to understand some key metrics like - Consumer lag? Under-replicated partitions? Or is your Kafka cluster down? - to have a highly reliable and available Kafka cluster and stay on top of data and application health. Tools to Monitor Apache Kafka There are many tools available to monitor Apache Kafka including: View more...How To Emit and Listen to Events Using The NestJS Event Emitter?Aggregated on: 2021-11-16 10:20:57 Many times we need to decouple different parts of our application and still want communication between these parts. Events come in quite handy in such situations. In this post, we will look at how to use the NestJS Event Emitter. NestJS has its own Event Emitter package. It provides a simple observer implementation. This allows us to subscribe and listen to various events. View more...2021 Guide On Bridging the Gap Between People Management and Project ManagementAggregated on: 2021-11-16 08:20:57 Project managers in the organizational paradigm are primarily responsible for carrying all of the processes and tasks that are included in the project development process, on their shoulders. They are the backbone of the whole shebang and without them, everything will go to waste. As we all know, that the primary objective of the project managers is to complete all of the projects in their roster at the appropriate time with just the resources that are in the resource pool. But that doesn’t mean that they ignore the most important element related to the whole process, the people. View more...OAuth 2.0 Session ClusteringAggregated on: 2021-11-16 08:20:57 "How do I control OAuth in a load-balanced application?" is typical of the OAuth 2.0 questions we hear. The short answer is: Session clustering for OAuth isn't unique in any way. The longer answer is that cluster session management is still likely to be a concern. This post explains how an OAuth login affects your app session. To demonstrate, we'll create a basic, secure, and load-balanced app. Table of Contents View more...Future Javascript: Javascript Pipeline OperatorsAggregated on: 2021-11-16 07:50:57 Pipeline operators are an upcoming feature to Javascript which gives us another way to pass values through a series of transformations. It gives more context to what developers were trying to achieve when they wrote their code and allows us to do some cool things to boot. Here, we'll take a quick look at pipeline operators, how they work, and how you can use them today. Javascript Pipeline Operators: Support Currently, no browser or server-side ECMAScript implementation (like Node.JS) supports pipeline operators. You can, however, get them to work using Babel 7.15. You can learn more about installing Babel here, but suffice to say this will allow you to add pipeline operators into your code. View more...A Look at IndexedDBAggregated on: 2021-11-16 00:50:57 Memory usage is an important metric for Arctype. Developers expect their tools - especially UIs - to be fast and smooth. Recently we improved our memory management algorithms using IndexedDB, Socket.IO, and Typescript. This post takes you inside our reason for the changes, design considerations, implementation, and impact. Prior to this work, querying a database from Arctype was simple. We would grab every row up to 10,000 and load them into memory. We would display a fraction of rows in the results pane, the spreadsheet view, or a chart. When you needed more rows, we would throw out the first 10,000 and fetch another batch. View more...Google Cloud VMware Engine: Bastion Host Access With IAPAggregated on: 2021-11-16 00:20:57 Welcome back! This post will build on the previous posts in this series by deploying a Windows Server 2019 bastion host to manage our Google Cloud VMware Engine (GCVE) SDDC. Access to the bastion host will be provided with Identity-Aware Proxy (IAP). Everything will be deployed and configured with Terraform, with all of the code referenced in this post is available at https://github.com/shamsway/gcp-terraform-examples in the gcve-bastion-iap sub-directory. Identity Aware Proxy (IAP) Overview Standing up initial cloud connectivity is challenging. I walked through the steps to deploy a client VPN in Establishing an SDDC in Google Cloud, but this post will show how to use IAP as a method for accessing a new bastion host. Using IAP means that the bastion host will be accessible without having to configure a VPN or expose it to the internet. I am a massive fan of this approach, and while there are some tradeoffs to discuss, it is a simpler and more secure approach than traditional access methods. View more...Querying Shopify Data in PostgresAggregated on: 2021-11-15 23:50:57 Introduction to Shopify Shopify is a SaaS company that simplifies the process of setting up and running an online business. Businesses that use Shopify have access to important information about their products, orders, customers, and more within Shopify. In most cases, businesses will want to extract this data and combine it with other data into a central database. In this article, we will be discussing how to migrate data from Shopify to Postgres. Create the Postgres Database You need to have a Postgres database in which you will store your Shopify data. You can create the database directly from Postgres, in which you will use the CREATE DATABASE database_name command. For example to give the database the name shopify, run the following command: View more...Reporting in Microservices: How To Optimize PerformanceAggregated on: 2021-11-15 20:50:57 Microservice architecture is becoming increasingly popular among app developers, thanks to its flexibility and scalability that allows for updates and new features to be added without overhauling the whole system. However, the use of separate user interfaces, databases, and servers for each microservice makes app optimization a challenge, considering the diversity of programming languages and API security issues. The Freshcode team faced the trouble of updating a legacy EdTech app running on MS SQL that used over 10,000 files created in ColdFusion and had dozens of microservices for disparate features. The app was intended for governments and education networks with hundreds of campuses and schools and had a full complement of features to appease both national universities and small schools. With conflicting microservice operations, reporting was a problem the FreshCode team had to tackle. View more...What Are the 6 Ps of Software Development?Aggregated on: 2021-11-15 17:05:57 It is not enough to be a creator of a disruptive and innovative software product or service. It is equally important that it assists you to earn enormous revenues. This is what is achieved utilizing software development services. You will be surprised that approximately out of 30,000 newly launched products, 95 % observe failure every year. It is thus vital to be open to continuous innovation. The same will go a long way in helping you become a business mogul in a short duration of time. View more...Understanding IoT and How IoT Penetration Testing Is Carried OutAggregated on: 2021-11-15 16:35:57 As we know, the Internet of things (IoT) is a network of physical objects that are embedded with sensors, smart software, and artificial intelligence (AI) technology with an intention of connecting them to different physical devices and exchanging information and data through the internet. These devices include everything from ordinary household objects to sophisticated and complex industrial tools. It is estimated that more than 7 billion objects are connected over the internet and is estimated to grow to 22 billion by the year 2025. View more...Scale-Out Databases and Get Big Data Queries 6x Faster With a MySQL AlternativeAggregated on: 2021-11-15 16:35:57 Huya Live, China's Twitch, is one of the largest live streaming platforms in China. It mainly focuses on video game live streaming, covering 3,800 games. In addition, it offers a wide range of other live broadcasts, including traditional sports, cooking, music, beauty, outdoor, and reality shows. It has 178 million+ monthly active users. It operates globally as Nimo TV, with 30 million+ monthly active users. At Huya Live, we use MySQL as our main database. As our business grew, our storage capacity became a bottleneck. We tried sharding, but it had many drawbacks. In Online Transactional Processing (OLTP) scenarios, our live broadcasts had high latency, and our database maintenance cost was high. View more...The Five Dysfunctions of an Engineering TeamAggregated on: 2021-11-15 15:20:57 Every team has some level of dysfunction. And that’s normal, because teams are made of imperfect human beings. In his book The Five Dysfunctions of a Team, Patrick Lencioni identifies these five basic dysfunctions: Absence of Trust Fear of Conflict Lack of Commitment Avoidance of Accountability Inattention to Results These dysfunctions build upon each other. A team that doesn’t trust each other is afraid to admit their shortcomings and mistakes. Teams like this aren’t vulnerable around each other. This leads to a fear of conflict, where ideas are not openly debated and bad behaviors are not called out for fear of offending someone. Rather than solving underlying problems, the team experiences growing tension manifested by occasionally passive aggressive remarks. View more...Salesforce Test Automation - What To Look For When Choosing the FrameworkAggregated on: 2021-11-15 15:20:57 “Digital transformation isn’t one app [solution], it’s a must-have. Organizations and governments around the world have a digital transformation imperative like never before, and many of them are accelerating their plans for a digital-first work-from-anywhere environment.” - Marc Benioff, founder, and CEO of Salesforce Salesforce is a complex customer relationship management (CRM) software and is highly customizable. Furthermore, it can be integrated with a wide range of applications in different ways such as web services, outbound messaging, web portals, social media, data loader, etc. To ensure that customizations, enhancements, and seasonal updates haven’t impacted your existing business processes or compromised other elements of your Salesforce ecosystems, you need to test it thoroughly. View more...Understanding Unit Testing and Popular Unit Test FrameworksAggregated on: 2021-11-15 14:50:57 Testing is one of the key parts of your software development workflow when you are building a software system. As a software developer, you want the programs you write to work as expected. You want the programs you write to be bug-free so that only the best product reaches the end-user. Testing can help give you confidence that your code works as expected. View more...Mitigate the Risks of Oracle Cloud UpdatesAggregated on: 2021-11-15 14:20:57 To achieve agility and more responsiveness, businesses are migrating to the cloud. One such cloud infrastructure is Oracle Fusion (also known as Oracle Cloud Infrastructure). Oracle Fusion is perfect for organizations that use custom applications to manage their traditional back-office and customer-facing processes. It allows custom applications to leverage Oracle databases to manage business-critical data with minimal re-architecture, re-integration, or business process changes. Oracle Fusion seamlessly integrates with legacy frameworks through cloud infrastructure and platform, offering more flexibility, more reliability while delivering higher performance at a lower cost. However, the biggest hurdle that organizations need to overcome in their cloud journey is to verify the implementations. View more...How a Distributed Database Architecture Enabled Kiwi.com To Run Nonstop Through the OVHcloud FireAggregated on: 2021-11-15 13:35:56 When a cloud provider’s data center burned to the ground, 3.6 million websites went dark. But one leading travel service kept running without a hitch, thanks to the design of their environment-aware distributed database. Learn how they architected their data infrastructure for extreme resiliency, how their strategy held up, and what lessons they learned. Incident Overview Disasters can strike any business on any day. This particular disaster, a fire at the OVHcloud Strasbourg data center, struck recently and the investigation and recovery are still ongoing. This is an initial report of one company’s resiliency in the face of that disaster. View more...SQL Server Disaster Recovery with Log ShippingAggregated on: 2021-11-15 13:05:56 While several disaster recovery (DR) techniques exist, many organizations use log shipping for its simplicity, among other factors. Also, log shipping is easy to set up and maintain compared to other DR solutions, like Database Mirroring, Clustering, Replication, etc. This article discusses the steps to configure log shipping for SQL Server disaster recovery. Before discussing the configuration, it's important to have a clear understanding of log shipping. Understanding Log Shipping Disaster Recovery Solution Log shipping helps increase database availability by maintaining backups onto a secondary (standby) server to replace the primary server. Essentially, if the primary database becomes unavailable, you can bring a secondary database online manually. View more...Sober Look at MicroservicesAggregated on: 2021-11-15 12:35:56 Note: This article is not an attempt to make readers choose or not choose microservices. Instead, I’m trying to fill some gaps in the microservices-related information, so the reader may make an informed decision. It’s hard or even impossible to ignore microservices hype. Every day one can see more and more content describing how good and advanced the microservices concept is. Anyone who isn't implementing microservices should start doing them immediately, which patterns to use and which to avoid, and so on and so forth. View more...Understanding the relationships between SLO, SLI, and SREAggregated on: 2021-11-15 11:05:56 Even after delivering a project to a client, the software engineer’s job is not complete. The next phase is ensuring service reliability. In site reliability engineering (SRE) practice, there are two key concepts that the engineer should know, service level objective (SLO) and service level indicator (SLI). This article looks into the importance of SLIs and SLOs in SREs and how to implement them. View more...Why Is Char Array Preferred Over Strings To Store Passwords in Java?Aggregated on: 2021-11-15 10:35:56 Although Java developers use both string and character for storing the text data, many people have a hard time choosing one over the other, which is a challenging question to ask. There has been a question which many people ask during a Java interview. But we know that many people prefer a Character array over a string, but they do not know the reason behind it. This post will tell you why people are more inclined to use an array than a string. View more...Analyzing Code Quality Through LoCAggregated on: 2021-11-15 10:35:56 There are several metrics you can deploy to analyze the code size and quality of an application. One of the popular metrics that you can be used is called Lines of Code, also known as LoC. What Does LoC Mean? Lines of Code or LoC is a method used to measure the size of an application by identifying the actual count of Lines of Code it has. For instance, small software projects usually have somewhere between 500 to 5000 Lines of Code, whereas large ones can have thousands or even millions of Lines of Code (LoC). View more...Fine-Tuning Microsoft’s LayoutLM Model for Invoice RecognitionAggregated on: 2021-11-15 09:20:56 Image Credit Introduction Building on my recent tutorial on how to annotate PDFs and scanned images for NLP applications, we will attempt to fine-tune the recently released Microsoft’s Layout LM model on an annotated custom dataset that includes French and English invoices. While the previous tutorials focused on using the publicly available FUNSD dataset to fine-tune the model, here we will show the entire process starting from annotation and pre-processing to training and inference. View more...Java is more like English than you thinkAggregated on: 2021-11-15 08:20:56 At a recent in-house event celebrating the launch of Java 17 I was asked to give a talk on the future of the language. I don’t have a hotline to Oracle, so I took the opportunity to dust off my linguistics degree and point out how the nature and comparatively glacial evolution of human languages is not unlike what you can witness in computer languages, compressed within decades. This is the first of two posts based on that talk. In many ways Java, Perl, Haskell, or Lisp are not at all like human languages. Lines of code only resemble English sentences at a very superficial level. Java is one of many specifications to make a digital machine do your bidding, expressed using a small set of English keywords, special characters, and structural rules to make it easy on the brain of the speaker, i.e., the programmer. Regardless of complexity, the behavior of a program follows unambiguously from its content. Sure, you can bang your head against the wall why it does what it does, but given enough eyeballs, even the worst spaghetti code is deterministic. View more...Strengthen Muscles of Software SystemsAggregated on: 2021-11-15 08:20:56 While we understand the need for "Building Software Immunity" and the importance of "Secure Software Engineering Habits", it is equally essential for heavy lifters such as software architects, tech leads, or senior engineers to ensure that the core of the software i.e. architecture or design is strong and maintained robust throughout the lifecycle of the software. Strengthening muscles of software goes far into the software development process, deployment and operations. Typically, it can be achieved via embedding security in business requirements, following design principles, and secure design approaches. Embedding Security in Requirements Incorporating security concerns in the early phases of software development is far easier and cost-effective as many common pitfalls can be avoided that get harder to fix later. There are two approaches that can be taken while defining security requirements: View more...Native-image With Spring BootAggregated on: 2021-11-15 03:05:56 The Cloud has enabled a lot of new usages that were not possible before. Among them stands Serverless: Serverless computing is a cloud computing execution model in which the cloud provider allocates machine resources on demand, taking care of the servers on behalf of their customers. Serverless computing does not hold resources in volatile memory; computing is rather done in short bursts with the results persisted to storage. When an app is not in use, there are no computing resources allocated to the app. View more...How Do CRDTs Solve Distributed Data Consistency Challenges?Aggregated on: 2021-11-14 21:35:56 This is an article about the complexity of maintaining data consistency in distributed environments. It introduces conflict-free replicated data types (CRDTs) as a way to resolve concurrent data changes. Common Data Consistency Challenges Consider a situation where there are several distributed entities that each hold a copy of the same data. Data consistency is maintained if those copies continue to match each other, even when one or more of them are updated. View more...5 Practical Tips for Successful Business Transformation ProgramsAggregated on: 2021-11-14 19:20:56 The business world has undergone some dramatic changes; a few years back the greatest concern was cybersecurity, but in 2021, the focus shifted to digital transformation. While cybersecurity remains a source of potential danger to their survival, businesses have realized that you must be in the market before you start thinking of breaches and the only thing that can make you remain relevant is to focus on improving customer experience. However, it’s not enough to just say you are embarking on business transformation; the most important thing is how to ensure your business transformation program is successful. The Kotter change model points out that improving the outcomes of business transformation programs relies heavily on the employees who are the ones actually implementing change programs. View more...Google Charts Dashboard: A Tutorial With an Artistic Touch of MoMAAggregated on: 2021-11-14 17:50:56 Here's how the end result will look like: Want to try it? Here's the live demo you can use right away. Also, the full source code is available on GitHub. View more...All Hail Bug Reports: How We Reduced the Analysis Time of the User’s Project From 80 to 4 HoursAggregated on: 2021-11-14 17:50:56 People often see work in support as something negative. Today we'll look at it from a different perspective. This article is about a real communication of 100+ messages, exceptions, the analysis that didn't complete in three days. Actually, bug reports are great If a bug report is adequately handled from both sides, it means that both the user and the software developer are interested in solving the problem. If both sides achieve the desired result, it's a win-win situation. View more...Part 2 - How to Hive on GCP using Google DataProc and Cloud StorageAggregated on: 2021-11-14 17:05:56 In part 1 of this series, we have seen how to create a Google Dataproc cluster, create external tables in HIVE, point to the data stored on cloud storage, and perform exploratory data analysis in a staging environment. As part of this analysis, we found out that our sample datasets had around: ~ 11% of non-confirming records for Green Taxi Y2019 dataset ~ 33% of non-confirming records for Yellow Taxi Y2019 dataset Identifying non-confirming records is one of the important steps of exploratory data analysis as they can lead to wrong or faulty interpretation of results. So, as part of the next step, we will create a new environment i.e. new external tables in HIVE with only valid data required for deep-dive analysis and eliminate the non-confirming records. View more...Become a Hyper-Productive Software Developer in 1 WeekAggregated on: 2021-11-14 15:35:56 Software development is an ever-changing field that demands constant learning and upskilling. Right from the first day of your career as a software developer, you will need to learn to optimize your schedule to complete projects more efficiently. The more productive you are, the better it is for everyone involved in your project: yourself, clients, and your organization. If you're a new software developer or just trying to figure out how to become more productive, this blog post is for you. View more...Podcasts for New Software DevelopersAggregated on: 2021-11-14 15:35:56 If you want to be a good software developer you have to be constantly learning. One of the best ways to learn is through listening to good podcasts. Here is a list of some of the best podcasts new software developers can learn from. View more...Predicate Composition in ScalaAggregated on: 2021-11-14 15:35:56 Function composition is a term used to define a process of a function mixing with other functions. During the composition one function holds the reference to another function. Scala language has two native ways to compose functions: View more...The Mindset of an Impactful Component Team in AgileAggregated on: 2021-11-14 14:50:56 Component teams are a reality and they do exist for specific purposes. In the programs I worked on, there were some component teams that worked on specific layers of architecture such as mid-tier validations and generating the PDFs with a click to mirror the screens. They were formed because the intended solutions at these layers required enormous explorations of different tools, open sources, design approaches, etc before these layers could cater to vertical slicing of the application to produce an increment. So essentially these teams had SME’s, Architects, or senior engineers’ part of it for a focused effort on a layered solution which otherwise was not possible to achieve as part of the feature team who primarily focus on the functional increment. View more... |
|
|