News AggregatorDeploying Serverless NER Transformer Model with AWS LambdaAggregated on: 2021-11-14 14:50:56 Introduction With transformers becoming essential for many NLP tasks thanks to their unmatched performance, various useful and impactful NLP models are created every day. However, many NLP practitioners find it challenging to deploy models into production. According to this report, 90% of machine learning models never make it into production. Model deployment enables you to host your model in a server environment so it can be used to output prediction when called by an API, for example. View more...How I Got a Web Development Job 1 Week After Publishing My PortfolioAggregated on: 2021-11-14 14:05:56 Using My Portfolio as An Interview Hook After spending months studying front-end development (HTML, CSS, JavaScript, React, and Git), and weeks building my portfolio (well, actually two portfolios, because I didn’t like how it ended up looking the first one), I managed to land my first job in the web development industry less than a week after I started looking for one. It all happened very fast: View more...Get Logged-in User Info in Jakarta EE - The Simplest WayAggregated on: 2021-11-14 14:05:56 The security before Java EE 8 / Jakarta EE 8 used to be a bit complicated and confusing. Every specification provided its own way to retrieve information about the logged-in user. The situation greatly improved with the introduction of the Security API that provides a unified way to do that – simply inject the SecurityContext CDI bean. There’s still a small catch – this only works in the servlet context and EJB context. Or, in other words, when processing an HTTP request or inside any type of EJB. The good thing is that this covers most of the cases in which you’ll ever need to retrieve user information. In the other rare cases, you need to use one of the APIs which I also describe in this post. View more...Becoming a Data-Driven Organization: Hidden Potential and ChallengesAggregated on: 2021-11-14 14:05:56 Data is a business gold mine for organizations, yet many companies struggle to unlock its complete potential. Through data, organizations can gain a better understanding of their operations and customers. Acting on the data to make informed business decisions is not necessarily a straightforward process. A data-driven organization can glean deep insights from data to update internal processes and respond directly to market feedback and improve their customer relationships. A data-driven organization can also leverage data to identify to create value for their consumers. Statista predicts that by 2022, the big data and analytics market will reach 274 billion dollars. Organizations are playing a vital role in the exponential growth of data by utilizing Big Data technologies for analytics to become data-driven. In this article, we will explore how organizations can benefit from data and what challenges they face in the process. View more...Connecting Red Hat Single Sign-on on Openshift to an External DatabaseAggregated on: 2021-11-14 13:35:56 The Red Hat Single Sign-On or just RHSSO is an enterprise version of Keycloak, which is an open-source Identity and Access Management solution aimed at modern applications and services. In the last few days, I needed to install RHSSO on Openshift version 4.8, however, I needed to implement small customization in the database connection. By default a non-ephemeral RHSSO installation uses an embedded installation of PostgreSQL database, however, I would change the type of database from PostgreSQL to MySQL, and even change the location of this one to the outside of Openshift. View more...Open Source, Closed SauceAggregated on: 2021-11-14 09:05:56 I have been an open source and free software advocate most of my life. I don't care too much about the philosophical differences between free software and open source software. For me it's a matter of code quality. In such a regard, I agree with Linus. It's the only way I know about that allows me to create great software View more...Row-Level Security: SQL Server vs Gallium DataAggregated on: 2021-11-14 06:50:56 Introduction In SQL Server 2016, Microsoft introduced the concept of row-level security, which gives you fine-grained control over who gets access to what data, potentially down to the level of individual rows. Normally, SQL security grants coarse access to a whole table or view (SQL Server can also do it for columns), and anything more granular than that requires the use of views or stored procedures. There is another way to do row-level security without changing the database clients, and that's with Gallium Data - a free database proxy that can change the network traffic between your database clients and your database servers. View more...Is Windows 11 Safer Than Windows 10?Aggregated on: 2021-11-14 06:50:56 Windows 11 is already here. Let's take a look at what Microsoft has changed in terms of security and privacy in its operating system. Does Windows 11 protect users’ data better than Windows 10? How does Windows 11 resist cyberattacks? Windows 11 was released on October 4, 2021. Earlier it produced plenty of hype with its version for testing. Even a simulator was created. I would like to note that this article was prepared before the official release of the new OS version. Some functions could have been changed, removed, or improved as it happened for example, with the minimum system requirements. Initially, Windows 11 was not intended for everyone (at least 8th generation Intel processors were required). However, the Windows community found a way to bypass the installation lock. Microsoft decided that it would not take action to restrict installations. In its blog, the corporation disowned possible problems, including problems with drivers on old PCs. View more...Fuzz in Your Language, Fuzzer, or ArchitectureAggregated on: 2021-11-14 06:20:56 At ForAllSecure, we’re all about fuzzing and making it easier for customers to quickly fuzz and secure their applications. That’s why we’ve gone ahead and compiled a catalog of fuzz targets intended for Mayhem that’s written and compiled using several different languages (and architectures) like C/C++, Python, Go, Rust, Java, and many others! We’ve also added several choices for specifying which fuzzer engine to use, whether that’s the popular libFuzzer, honggfuzz, AFL, or even our own Mayhem for Code fuzzer. In essence, we’ve provided a swiss army knife of fuzzing options to not only serve as a quick-and-easy reference point for users to get started with fuzzing in general but to also showcase Mayhem’s versatility for fuzzing several languages and architectures in tandem with specific fuzzer engines. This catalog of tutorial fuzzing targets also emphasizes the recommended workflow for compiling targets using Docker and fuzzing such containerized applications in Mayhem. View more...SRE Complete Resume Writing GuideAggregated on: 2021-11-14 06:05:56 You want to become an SRE. You’ve read the right books, taken the right classes, and earned the right certifications. You’re part of the way toward landing an SRE job. But, you’ll also need the right SRE resume. And, while there are no universal rules to follow about creating the ideal SRE resume, following some key best practices will help you build a resume that sets you apart from other SRE job applicants. View more...Top 11 Time Wastes as a DevOps EngineerAggregated on: 2021-11-14 05:05:56 The daily work of DevOps can be like a puzzle in the sense that the idea is to assemble several pieces in a logical order to create a structure understood by everyone. The different assembly steps are usually the same for any puzzle and therefore require learning to gain efficiency. Efficient time management is probably what every DevOps engineer seeks to advance in his career. This is the skill that the top-performing engineers have improved over time and iteration. Time is what everyone needs to learn and test something new to become an expert in the area. View more...Providing External Access to Istio Services With KongAggregated on: 2021-11-14 03:50:56 Have you ever found yourself in a situation where all your service mesh services are running in Kubernetes, and now you need to expose them to the outside world securely and reliably? Ingress management is essential for your configuration and operations when exposing services outside of a cluster. You need to take care of the authentication, observability, encryption, and integration with other third-party vendors alongside other policies. View more...Management and the Future of AI with Azure's CTOAggregated on: 2021-11-13 19:05:56 Has your entire career ever hinged on a single moment? For Darren Dillon, free beer in college set him on the path to a computer science degree and eventually a wildly successful career at Microsoft. Today, as the CTO of Azure and AI at Microsoft Industry Solutions, Darren leads an impressive team of over 130 engineers and is at the forefront of cloud computing and AI technology. View more...Understanding MongoDB and NoSQL DatabaseAggregated on: 2021-11-13 08:35:55 NoSQL data sets arose in the latter part of the 2000s as the expense of storage drastically diminished. The days of expecting to create a complicated, hard to-oversee data model to avoid data replication were long gone and the primary expense of programming and development was now focused on the developers themselves, and hence NoSQL databases were brought into the picture to enhance their productivity. As storage costs quickly diminished, the measure of data that applications expected to store increased, and the query expanded as well. This data was received in all shapes and sizes — organized, semi-organized, and polymorphic — and characterizing the schema ahead of time turned out to be almost incomprehensible. NoSQL databases permitted the developers to store colossal measures of unstructured data, providing them with a ton of flexibility. View more...Evaluating JS in The Browser for A Low Code ProductAggregated on: 2021-11-13 08:05:55 I work at Appsmith, an open-source low code platform for developers to build internal tools and workflows. At Appsmith, our developer users define business logic by writing any JS code in between {{ }} dynamic bindings almost anywhere in the app. They can use this while creating SQL queries, APIs, or triggering actions. This functionality lets you control how your app behaves with the least amount of configuration. Underneath the hood, the platform will evaluate all this code in an optimized manner to make sure the app remains performant yet responsive. View more...Services Don’t Have to Be Eight-9s Reliable [Video]Aggregated on: 2021-11-13 08:05:55 Viktor: You are known in the observability community and SRE community very well. I’ve followed your work for a while during my time at Confluent, so I’m super excited to speak with you. Can you please tell us a little bit about yourself? Like what do you do? And what are you up to these days? Liz: Sure. So I’ve worked as a site reliability engineer for roughly 15 years, and I took this interesting pivot about five years ago. I switched from being a site reliability engineer on individual teams like Google Flights or Google Cloud Load Balancer to advocating for the wider SRE community. It turns out that there are more people outside of Google practicing SRE than there are inside of Google practicing SRE. View more...A Quick Word on Hybrid AI in Natural Language ProcessingAggregated on: 2021-11-13 07:35:55 Any solution aimed at processing unstructured data (i.e., language, specifically text in most cases) is today based on one of two main approaches: Machine Learning and Symbolic. Both can be delivered in multiple ways (different algorithms in the case of ML, from shallow linguistics to semantic technology in the case of Symbolic), but not much has been done so far in the realm of hybrid approaches. While choosing one over the other is always going to present a compromise between advantages and drawbacks (higher accuracy coming from Symbolic, more flexibility derived from ML), Hybrid AI — or Hybrid NL — is a revolutionary path to solve linguistic challenges that can leverage the best of both worlds and, ultimately, make your NLP practices graduate to NLU (Natural Language Understanding). I won’t spend time explaining how ML or Symbolic work since there’s a ton of literature about that already, I’ll focus this page on Hybrid instead. What is Going Hybrid? To frame this conversation in a practical fashion, we must look at two aspects: development, and workflow. At the development stage, going hybrid means that a Symbolic solution will support the creation of a Machine Learning model in order to either reduce the effort or enhance its quality. On the other hand, at the production stage, our workflow can be supported by both ML and Symbolic to deliver a more precise outcome. In a project that considers the Machine Learning piece the pivot of the solution, the first type of integration places Symbolic at the top (before even creating a Machine Learning model), and the second one at the bottom (curating or enhancing the final output). Naturally, both of these hybrid ways can be present at the same time in a linguistic project. View more...How WebAssembly Powers Databases: Building a UDF Engine With WasmAggregated on: 2021-11-13 06:50:55 This article is based on a project at TiDB Hackathon 2020. User-defined functions (UDFs) are an important extension to the SQL language. When you want to do customized computations in a database, you can write the desired computation logic as a UDF and pass it to the database. But not all DBMSs accept UDFs. For those that don't, a UDF engine is the solution we need. View more...Meta Tag Reference and Bullet Proof HTML5 TemplateAggregated on: 2021-11-13 06:50:55 For every HTML page, you should have a few key elements to ensure fast loading and good SEO. The template below gives you all of those features, which you can quickly customize for your needs. I've also listed all useful meta tags below if you want to pull them out individually. View more...Fast Spring Boot AWS Lambdas with GraalVMAggregated on: 2021-11-13 06:05:55 In my previous blog post, I documented how to take a Java Spring Boot application and convert it into a serverless function, which can be run in AWS Lambda. Anyone who's done this before knows that cold starts are a big downside - Java and Spring Boot are not known for their speedy startup times, and a typical full fat Spring Boot-converted lambda can take anything from 10 to 90 seconds depending on how much memory and CPU you allocate it. This may force you to over-provision them to compensate for the cold starts, but that's a pretty expensive sledgehammer. There is always provisioned concurrency, but that doesn't work out much cheaper either (and negates the responsive scalability of lambda as you have to anticipate how many you'll need in advance). View more...Using Cloud to Live Test Malware DefensesAggregated on: 2021-11-13 05:35:55 In this report, The State of Ransomware in 2020, research suggests that every eleven seconds, some business is being attacked by a cybercriminal. The frequency of attacks is up year over a year along with the diversity of business types being attacked. In the same report, you can see details of various organizations being attacked. Couple this with Cybersecurity Talent Crunch to Create 350 Million Unfilled Jobs Globally by 2021, and it is apparent that many companies will have to rely on existing worker talent to combat an ever-increasing threat. Of course, high-tech companies have high-tech talent, but what about all the other types of organizations like government, education, service industry, and manufacturing. We all like to think we have skilled workers regardless of our industry. Still, under this new growing threat, our current in-house cybersecurity skills might not be at the level needed to provide maximum safeguard. View more...How to Start Cloud Application DevelopmentAggregated on: 2021-11-13 04:35:55 Cloud application development is a necessity in a modern enterprise world. You can hardly find a company that has never used a cloud-based application or any of the SaaS products. Cloud applications are now dominating the market over desktop software for various reasons. The main advantage is they can be accessed at any time from anywhere with any device that has a web browser. Besides, when a company develops a cloud application, it automatically means that all users are working with the same version of the app. This greatly reduces the time and resources required for new features introduction, security updates, and synchronization. We will look at the advantages of cloud application development later in the article. View more...How to Handle Hypergrowth in a Remote WorldAggregated on: 2021-11-13 03:20:55 Grammarly has a simple but ambitious mission: to improve lives by improving communication. Every day, our AI-powered writing assistance helps 30,000 teams and 30 million people communicate clearly and effectively wherever they write. But behind our technology is a team of engineers. Until recently, our engineers focused exclusively on building a product for consumers. When I came aboard to lead new initiatives as the Director of Engineering for Grammarly Business and Grammarly for Developers (expanding our product to support teams, organizations, and third-party developers), it was clear Grammarly approached full-on hypergrowth. View more...OWASP Top Ten and Software Composition Analysis (SCA)Aggregated on: 2021-11-12 23:20:55 One of the priority areas for PVS-Studio development is to cover categories from the OWASP Top Ten 2017 in the C# analyzer. We also plan to cover the Top Ten 2021 in the future. The most unusual for us is the A9:2017 category: Using Components with Known Vulnerabilities. This category has the A6 position in the preliminary version of OWASP 2021. The rule implementation for this category is an important task for our analyzer. It allows us to classify PVS-Studio as an SCA (Software Composition Analysis) tool. Which approach to implementation should we choose? Let's figure it out! Using Components With Known Vulnerabilities The A9 threat category (which turned into A6 in the preliminary OWASP 2021 version) is dedicated to using components with known vulnerabilities. These are the components that have the corresponding entries in the CVE database. CVE (Common Vulnerabilities and Exposures) is a database of records about real-life vulnerabilities in software, hardware, service components, etc. View more...Microsoft Cloud for Healthcare: Architect PerspectiveAggregated on: 2021-11-12 22:20:55 The COVID-19 pandemic has impacted not just every aspect of people’s lives but every aspect of the healthcare system. It’s preventing healthcare delivery practices from operating at normal business levels, disrupting patient access to high-quality medical care, and forcing everyone to think about how to continue pushing forward in new and different ways. As a result of the pandemic, the healthcare industry has seen a massive transformation. In this post-digital world, healthcare occupies a unique position. The industry has realized that digital must be integrated into all aspects of its operations since there is no longer any distinction between digital and non-digital media. Moreover, consumers are now driving the change in healthcare. There has been a massive shift in their needs. People increasingly demand healthcare on their terms, from leveraging data to identify their meal preferences to getting those meals exactly when they want them, to even delivering information to the proper channels. Digital can now support healthcare delivery based on preferences to patients — when, how, and where they want it. View more...Global Tables vs Duplicate IndexesAggregated on: 2021-11-12 19:35:55 With CockroachDB version 21.1, a new concept of “global tables” was introduced. This functionality is a good fit for situations where read latency on a table needs to be very low and write latency can be much higher than normal [read: it needs to be fast when doing lookups, but we can tolerate lengthy writes]. It is also a fit for when reads must be up to date for business reasons or because the table is referenced by foreign keys or where latency-critical reads cannot be tied to specific regions. So using the global tables functionality is ideal for any kind of reference table, where we want to get the data out very quickly, but we can handle long inserts and updates. With global tables, the lengthy writes go about doing all the pre-work to prevent any contention and serializable errors that we would traditionally see. When we read from the table, all the work has previously been done to avoid any contention and we can access the closest replica and read from it, effectively as if we were doing a follower read but in real time. View more...Why Betting on a Single Process Automation Strategy Is a Bad IdeaAggregated on: 2021-11-12 16:05:55 In the digital age, success depends on properly automating business processes. Digitizing and standardizing processes and repetitive tasks reduce operating costs by 90%. Companies that want to be future-proof must introduce process-automation systems and position themselves for growth. Automation increases efficiency drives down costs and improves both customer and employee satisfaction. Businesses that stand out are those that have adopted automation and have become more agile and cost-efficient. They are paperless and have very few manual processes. View more...Git Bash (Or Git in Bash)?Aggregated on: 2021-11-12 15:35:55 Do you know when you install Git Bash on windows what exactly you are installing? Most of the time, developers think they are only installing Git. But that's not true. Let me repeat it: actually, you are installing Git Bash. View more...ML Algorithms in Online User Reviews for Sentiment AnalysisAggregated on: 2021-11-12 15:05:55 The online ecosystem is designed to be open for live interactions. Online users can indulge in immersive web pages, engage in social conversations, and post online reviews. Web platforms are built to encourage users to post opinions without restrictions. This has stretched the scope for building several meaningful digital experiences in the web ecosystem. Online products and services get positive and, every now and then, negative reviews. A fair amount of scrutinizing behavior by users can be spotted on most online platforms. Heaps of reviews are posted online by users on marketplaces, community web pages, and social media pages. The growing volume of user review data, especially that causes damage to a company’s online reputation, requires efficient management. This has pushed companies to monitor what users write about the products and the services across the web and adopt the methodologies of sentiment analysis. View more...AWS CLI Basics – Part 2Aggregated on: 2021-11-12 13:20:55 Introduction In a previous post on this topic, we learned some basics about AWS CLI and how to install it on your machine. In this post, we will learn a few AWS CLI commands and we will also set up an s3 bucket as a static website that is publicly accessible. AWS CLI Syntax The following picture shows AWS CLI commands Syntax: View more...The Developer's Guide to Building Notification Systems: Part 2 - Scalability and ReliabilityAggregated on: 2021-11-12 12:20:55 This is the second post in our series on how you, a developer, can build or improve the best notification system for your company. In this piece, we will learn about scalability and reliability. Read the first part here: Developer's Guide to Building Notification Systems: Part 1 - User Requirements. View more...How To Obfuscate Personal Data in PracticeAggregated on: 2021-11-12 11:50:55 Introduction In order to reduce the possibility of a data breach, organizations are applying controls to ensure personal data is adequately protected. The main motivator for this shift is still the ‘dissuasive’ effect of the fines that can be applied by supervisory authorities under the GDPR (Article 83.1). Fines to sanction non-compliance issues have been steadily escalating to the upper levels allowed by the Regulation, as in the case of Amazon, facing a €746 million penalty (July 2021), or WhatsApp in Ireland, with €225 million (September 2021). View more...Free Tech to Migrate Google Emails to Office 365Aggregated on: 2021-11-12 10:35:55 Gmail is a free web-based email client preferred by many. It can configure multiple email accounts and fulfill the needs of individuals and organizations of various sizes. But after knowing the functionality of Office 365 for enterprise-level uses, a great deal of space, search capabilities, and universal access. Users want to bring all this utility to their Gmail or G Suite email by migrating Google email to Office 365 account. Here, we will be discussing the method to perform this migration. Gmail vs Office 365 Gmail has millions of users worldwide due to its speedy and secure email service that you can access from any computer with a proper internet connection. Still, it's by no means perfect, and there are common reasons why users feel the need to migrate Google Email to Office 365. View more...Detect Proactively Whether Application’s Memory Is Under-allocatedAggregated on: 2021-11-12 09:50:55 When the application’s memory is under-allocated, it will result in the following side-effects: a. Transactions response time will degrade View more...When To Use Reverse ETL and When It Is an Anti-patternAggregated on: 2021-11-12 09:50:55 Most enterprises store their massive volumes of transactional and analytics data at rest in data warehouses or data lakes. Sales, marketing, and customer success teams require access to these data sets. Reverse ETL is a buzzword that defines the concept of collecting data from existing data stores to provide it easy and quick for business teams. This blog post explores why software vendors (try to) introduce new solutions for Reverse ETL, when it is needed, and how it fits into the enterprise architecture. The involvement of event streaming with tools like Apache Kafka to process data in motion is a crucial piece of Reverse ETL for real-time use cases. View more...Production Horrors – Customer Miscommunication Leads to Ongoing NightmareAggregated on: 2021-11-12 03:35:54 This is a bit of a different story in the series. When I came up with the concept for production horrors my thoughts were mostly about a single day or a single event that made our production fail. Naturally, our mind gravitates towards crashes or issues like the recent Facebook outage. But last time around, I gave the example of problematic caching that led to a billing problem… This time the production horror is of a different kind. It started well before the product reached production and in a different era. In a time before ajax, when the web was still in request-response mode and IE 6 was state of the art (truly a horror story). I was approached about consulting for a major bank that was running a huge project to modernize its trading infrastructure. View more...Get Better APIs With Conway’s LawAggregated on: 2021-11-12 03:35:54 Mel Conway formulated his famous law in 1967 and it was a reflection on how large organizations work and produce results. The “official version” (as published by Mel Conway himself) is as follows: “Any organization that designs a system (defined broadly) will produce a design whose structure is a copy of the organization’s communication structure.” View more...How to Manage Vulnerabilities on Your Home NetworkAggregated on: 2021-11-12 03:35:54 Image Credit Many people erroneously assume that their home networks are too small to be targeted by cyberattackers and that cybersecurity is only meant for enterprises. Nothing could be more wrong. If the past few years have taught us anything about cybersecurity, it is that nothing is too small to be exploited, not even the smallest IoT device. Therefore, people need to be more serious about managing vulnerabilities on their home networks beyond the basic passwords. Now that many people are working from home, home security is more important than ever. View more...Extracting Server Certificates Made Easy With Certificate RipperAggregated on: 2021-11-12 03:35:54 Introduction As engineers, we sometimes need to grab a certificate for different purposes. It may occur that we need it to update the truststore of our application with a new trusted certificate, or just want to analyze the content of it, or use it for testing or just for some other purpose. There are multiple ways to accomplish this such as drag-and-drop the certificate from your browser to your desktop or by using OpenSSL. The browser is only capable of exporting binary certificates and the commands of OpenSSL might be sometimes complex or tricky to build depending on which kind of output you want. I was seeking a simple way of just printing server certificates to either a pem format or human-readable format and I also wanted to export all of it into a truststore file and in that way Certificate, Ripper came into life. Certificate Ripper is a CLI application available for Windows, Mac OS X, and Linux and can be found here: GitHub - Certificate Ripper View more...How to Hive on GCP Using Google DataProc and Cloud Storage: Part 1Aggregated on: 2021-11-12 03:05:54 Google Cloud Dataproc is a managed Spark and Hadoop service that lets you take advantage of open-source data tools for batch processing, querying, streaming, and machine learning. This includes the Hadoop ecosystem (HDFS, Map/Reduce processing framework, and a number of applications such as Hive, Mahout, Pig, Spark, and Hue that are built on top of Hadoop). Hive gives an SQL-like interface to query data stored in various databases and file systems that integrate with Hadoop. Queries submitted via HIVE are converted into Map/Reduce jobs that access stored data, results are then aggregated and returned to the user or application. For this exercise, we will be using New York city's yellow and green taxi trip data accumulated for the year 2019. Yellow Taxis are the only vehicles licensed to pick up street-hailing passengers anywhere in NYC while Green Taxis provide street hail service and prearranged service in northern Manhattan (above E 96th St and W 110th St) and in the outer boroughs. The dataset is available at the city portal. View more...The 10 Commandments for Designing a Data Science ProjectAggregated on: 2021-11-11 17:35:54 Introduction As businesses across industries seek to improve workflows and the delivery of products and services through increased automation, there is an ever-growing demand for the adoption of more advanced data science capabilities and projects. Artificial intelligence and machine learning can, of course, deliver great ROI — but only under the right conditions. In every instance, a data science project must be framed in the right way, both from a business and a technical point of view. To help provide this framework, I have devised the following “10 commandments” for designing a data science project. View more...Is Proof of Concept Approach Crucial in Software Development?Aggregated on: 2021-11-11 10:35:54 It’s a technique that we all love! PoC or Proof of Concept approach is a trend in software development to create a demo of a project in advance. It’s a fairly new method, especially when compared to old-school alternatives such as RFP (i.e. Request for Proposal). However, the big question to address is “how essential is the PoC approach in SDLC?” View more...How To Use MaxScale Top FilterAggregated on: 2021-11-10 23:50:54 In this blog, I am going to discuss using the MaxScale Top filter for query analysis and, in particular, how to use it to easily find the top slow queries for a particular user without using the slow log. The Top Filter is a great tool for query analysis. It can be enabled without downtime, and the logs don’t require storage space on the database server itself. MaxScale is an advanced intelligent database proxy from MariaDB. It provides load balancing and high availability functionality and includes easy-to-use filtering capabilities. The MaxScale functionalities are implemented as modules. So it is easy to integrate the modules needed for your particular use case. View more...The Role of Data Matching in Big Data Business StrategyAggregated on: 2021-11-10 23:20:54 “It is both staggering and exciting to imagine how data and analytic capabilities will transform entire industries.”– Ariel Dora Stern As promising as big data analytics sound, there’s still a huge gap between a company’s expectations with their data and the reality. In the article Companies love big data but lack the strategy to use it effectively, Harvard Business School shared some insights that they teach to executives: View more...When to Code a Stored Procedure — and When Not ToAggregated on: 2021-11-10 22:20:54 Though it might seem to be a weird title in 2021, you'll be shocked to learn the number of applications (legacy and new) that still use stored procedures. The stored procedure is a database capability that allows developers to write code at the level of the database and directly manipulate data (and sometimes define data, i.e. create tables, indexes, drop them, etc.) View more...RESTful API Example With Spring Data REST and JPA Hibernate Many To Many Extra ColumnsAggregated on: 2021-11-10 21:50:54 In the video below, we take a closer look at RESTful API Example with Spring Data REST, and JPA Hibernate Many To Many Extra Columns | Spring Boot. Let's get started! View more...Spring Boot: Building RESTful Web Services With Jersey (XML) + JPA | Spring Boot Jersey Example [video]Aggregated on: 2021-11-10 21:05:54 In the video below, we take a closer look at Spring Boot: Building RESTful Web Services With Jersey (XML) + JPA | Spring Boot Jersey Example. Let's get started! View more...Mirai Variant Dark.IoT Expands Reach Beyond IoT Devices to Linux Servers Hosted in the Cloud in Attempt to Increase DDoS CapabilityAggregated on: 2021-11-10 20:35:54 Radware researchers have found that a Mirai variant in development since February 2021 has continued to evolve, making it more capable and dangerous than ever. Back in August 2021, Radware reported that a Mirai variant campaign known as Dark.IoT had begun leveraging a vulnerability, CVE-2021-35395, in Realtek's SDK just days after its disclosure. Researchers named the botnet Dark.IoT, based on the use of "Dark.[architecture]" filenames for its malware binaries and the reoccurring use of "lmaoiot" variations throughout its infrastructure naming. View more...CockroachDB TIL: Volume 4Aggregated on: 2021-11-10 20:35:54 Topics Topic 1: Reset Network and Execution Statistics in CLI This topic will cover what trivial misconfigurations may lead to if you don't keep client and server versions uniform. These mismatched versions may lead to unforeseen consequences. This is one of those situations where a user reported missing info from their CLI. In this case, they were missing execution and network latency which we conveniently output after every query. select * from results limit 1; id | city | type | owner_id | creation_time | status | current_location | ext ---------------------------------------+-----------+---------+--------------------------------------+---------------------+--------+-----------------------+------------------- aaaaaaaa-aaaa-4800-8000-00000000000a | amsterdam | scooter | c28f5c28-f5c2-4000-8000-000000000026 | 2019-01-02 03:04:05 | in_use | 62609 Stephanie Route | {"color": "red"} (1 row) Time: 49ms total (execution 2ms / network 48ms)" data-lang=""> artem@free-tier.gcp-us-central1.cockroachlabs.cloud:26257/defaultdb> select * from results limit 1; id | city | type | owner_id | creation_time | status | current_location | ext ---------------------------------------+-----------+---------+--------------------------------------+---------------------+--------+-----------------------+------------------- aaaaaaaa-aaaa-4800-8000-00000000000a | amsterdam | scooter | c28f5c28-f5c2-4000-8000-000000000026 | 2019-01-02 03:04:05 | in_use | 62609 Stephanie Route | {"color": "red"} (1 row) Time: 49ms total (execution 2ms / network 48ms) Specifically, the last line of the output above. View more...All You Need to Know About Automation Testing Life CycleAggregated on: 2021-11-10 20:35:54 Introduction Testing has become standardized and more competent, and its processes are evolving every day. The technical adeptness of the testers also matters in the success of the complete testing stages. Testing no longer means discovering bugs only; its scope has broadened, and its importance can be seen right from the start of any development project. When we talk about the automation testing life cycle, most of us believe it is just a part of SDLC, but it is a lot more than that. It is necessary to understand that automation testing should be a prominent part of the automation testing strategy and has a life cycle. Businesses have to adapt it to enhance the quality of their software products. View more... |
|
|