News AggregatorWhat Are DORA Metrics? (And Why Is Everyone Talking About Them?)Aggregated on: 2021-10-26 20:29:28 In order to improve DevOps practices, teams need to be able to measure them and are turning to DORA metrics as the gold standard. These four metrics, change lead time, deployment frequency, change failure rate, and mean time to restore, are measures of how well teams deliver value to customers and can help inform decisions around what and how to make improvements to DevOps processes. “You can’t improve what you don’t measure.” It’s a maxim to live by when it comes to DevOps. Teams need to make data-driven decisions in order to continuously improve practices, deliver software faster, and ensure that it remains reliable. Making DevOps measurable is key for being able to know and invest in what processes and tools work and fix or remove what doesn’t. DORA metrics have become the golden standard for teams aspiring to optimize their performance and achieve the DevOps ideals of speed and stability. View more...Agile Integration - What Is It?Aggregated on: 2021-10-26 20:14:28 Have you heard about Agile Architecture practices or about how adaptive methods can help us create solutions iteratively without the Big Up-Front Design? Agile Integration arises among these scenarios of constant innovation, where solutions need to be published in ever-smaller development cycles and meet the business needs and the expected time-to-market. We can say that Agile Integration practices are among the main catalysts for accelerating companies' digital transformation journeys. View more...Better Perl: 4 List Processing Best Practices With Map, Grep, and MoreAggregated on: 2021-10-26 19:44:28 Six months ago I gave an overview of Perl's list processing fundamentals, briefly describing what lists are and then introducing the built-in map and grep functions for transforming and filtering them. Later on, I compiled a list (how appropriate) of list processing modules available via CPAN, noting there's some confusing duplication of effort. But you're a busy developer, and you just want to know the Right Thing To Do™ when faced with a list processing challenge. First, some credit is due: these are all restatements of several Perl::Critic policies which in turn codify standards described in Damian Conway's Perl Best Practices (2005). I've repeatedly recommended the latter as a starting point for higher-quality Perl development. Over the years, these practices continue to be re-evaluated (including by the author himself) and various authors release new policy modules, but perlcritic remains a great tool for ensuring you (and your team or other contributors) maintain a consistently high standard in your code. View more...What Developers Can Expect as Digital Gratitude Is on the RiseAggregated on: 2021-10-26 18:29:28 Introduction Digital services and applications continue to play a significant role in people’s everyday lives especially during the pandemic when dependency on technology has increased to an all-time high. As a result, applications have become a lifeline to normalcy. Today, people rely on applications not only for entertainment and staying connected with friends and family but also for maintaining their health, finances, and overall lifestyle. This, of course, has placed brands under immense pressure to speed up their digital transformation efforts to stay relevant while also satisfying customers’ needs and providing an enhanced user experience. While companies, IT teams, and developers have continued to navigate new solutions for alleviating some of the pressure and addressing some of the “quick fixes” made to remain afloat during the pandemic, the digital world continues to shift, and is still a tumultuous period for some. View more...RESTful API Example with Spring Data RESTAggregated on: 2021-10-26 18:29:28 In the video below, we take a closer look at RESTful API Example with Spring Data REST, and JPA Many To Many. Let's get started! View more...How to Check DAG Health Status for All Exchange ServersAggregated on: 2021-10-26 18:29:28 Database Availability Group (DAG) is a built-in framework in Microsoft Exchange Server that uses continuous replication and failover clustering to ensure high availability and site resilience. In Exchange Server, DAG refers to a cluster of Exchange Servers (up to 16 Exchange Mailbox Servers) that hosts a set of database copies and provides protection against switchover and failover. In DAG, there is one active server and a copy of the database on the active server is replicated across all passive servers. View more...Think Your On-Prem App is Cloud Stubborn? Think Again!Aggregated on: 2021-10-26 18:29:28 At some point, we’ve all heard the phrase: “My app can’t be moved to the cloud…it’s based on AIX or IBM i.” These words often come from application owners who don’t want to re-engineer their application to use cloud-native services; they’d much rather do a classic lift-and-shift to move their application without any code changes. While some claim it’s an anti-cloud method to do a straight lift-and-shift without making use of cloud-native services, there are some instances where migrating to the cloud without changing application infrastructure makes sense. These include: Development: If the business is growing, there’s a chance it’ll need more sandbox space for developers; rather than expanding on-premises resources, they can leverage the cloud instead. Disaster Recovery: Run the DR systems in the cloud instead of having another physically separate customer-financed data center to host a disaster recovery architecture. The DR system must “look and operate” the same as the on-prem system for this to work effectively. Test: Due to new initiatives or even old quality issues, there’s a need for additional test systems that act like production. Instead of broadening on-prem assets, developers turn to the cloud, but they need ‘Test’ to look like on-prem ‘Prod.’ Since IBM i (AS/400) and AIX are based on PowerPC and not x86, the route to AWS, Azure, or Google Cloud is not apparent for these kinds of apps. They are “cloud stubborn.” View more...How to Be an Engineering Leader: A Letter to My Past SelfAggregated on: 2021-10-26 18:29:28 Everyone has their own definition of true leadership. What I didn't understand at the start of my leadership journey was that each of us is a leader. Regardless of intent, we influence and impact our communities, industries, workplaces, and relationships. Yet, often we don't understand the importance or impact of simply being present. So I wanted to write a message to anyone looking to grow into engineering leadership. This was the letter the younger version of myself needed and I hope that it will highlight the importance of self-empowerment in your journey. To Whom It May Concern, Anyone remembered by history has taken it upon themselves to venture down their own path. In some instances, these individuals stood their ground and continued forward in the face of violence, war, political and economic systems, beliefs, and stereotypes never before challenged. And so they changed the perspectives and consequently the lives of individuals around them. These individuals didn't stand out by being just like everyone else. Instead, they took up the metaphorical shovel and paved their path by taking actions in alignment with what they believed and desired. View more...What’s Cooking in Tridion Sites 9.6 PotAggregated on: 2021-10-26 17:59:28 RWS is about to drop a new, facelifted version of their Tridion Sites product. 9.6 version is the new and improved version of the 9.5 version and with it RWS is delivering on what they promised in previous versions like adding features to new UI, building on the new GraphQL-based public content API, and continuing with deprecations of CIS and CIL libraries. New 9.6 is supposed to drop later in the year, so let’s see what some of the changes are that will be introduced. View more...Creating an Impact Analysis for Support Driven DevelopmentAggregated on: 2021-10-26 17:59:28 Note: This is the 3rd post in the series around Support Driven Development. If you have the time and wish to start from the beginning, you can find the intro here. One of the leading reasons a project takes more time than was estimated is because a proper impact analysis was not carried out. In some cases, they may not be done at all. If and when an impact analysis is carried out, rarely is there thought put into how the new development is going to be supported. View more...Common Challenges of Automation TestingAggregated on: 2021-10-26 17:59:28 The rise of technology and the use of software in several industries lead to the rise of automation testing. Any testing related to software launches is one of the most extensive and most challenging tasks. It becomes imperative for developers to render the content and software that works appropriately. During automation testing, several methodologies are used, such as the nested CSS algorithm for recognizing magnetic targets and custom solutions like angular in protractor, based on JS pages. View more...AWS vs Azure vs GCP: Cloud Web Services Comparison in DetailAggregated on: 2021-10-26 16:59:28 I am sure you are acquainted with the third wave of the digital revolution — cloud computing. Well, it's time to know them in person and figure out by using these cloud services, do you actually have a shot or not. Digitalization is being embraced by all of us across the globe, especially cloud computing technology. Whether it's because of its scalability or security or reduced costs, cloud platforms have sprung up to a great extent over a few years. Gone are the days when businesses were confused about whether to choose a cloud service provider or not. Now the confusion surrounds the question of which cloud service provider to use. AWS, Azure, and Google Cloud are our top three contenders. View more...Convert REST to GraphQL With No-CodeAggregated on: 2021-10-26 15:59:28 So you want to take advantage of GraphQL? Perhaps you have some related data you want to expose as a single graph? Rather than refactor those endpoints, you can take those related REST endpoints or APIs, and using Tyk you can quickly wire them together and expose them as a single GraphQL API, with full API Management security applied, too, if you want. View more...The Major Role of AI in Mobile App DevelopmentAggregated on: 2021-10-26 15:29:28 These days, technology evolves to combine AI with other domains like robotic process automation (RPA) and even mobile app development. The expanding scope of AI technology impacts app development and adds more value to enterprise apps. On one hand, enterprise software can simplify complexities, and on the other hand, it can fulfill the end user’s requirements while taking user experience to the next level. Here, AI technology lends a helping hand. It not only enhances the user experience but also increases productivity and efficiency while integrating into the enterprise-level software. View more...Red Hat Summit Connect Dublin - Talking Architecture ShopAggregated on: 2021-10-26 14:44:28 The Red Hat Summit Connect Dublin is a one day event, part of a new series of small-scale events, that brings the discussion of open source technology to your local cities. The day provides updates and insights into the latest technologies and will also offer the opportunity to get hands on with Red Hat technologies. There will be different streams of session topics that will host tech talks led by Red Hat experts and also business focused sessions delivered from industry leaders including some fantastic partner and customer stories. View more...CICD Doesn’t Have To Be a Four Letter Word for Oracle Database DevelopersAggregated on: 2021-10-26 10:44:28 Part 1: Beginning Continuous Integration for the Database What is CI/CD? View more...CTO’s Practical Guide to Comply With CPRA Cybersecurity RequirementsAggregated on: 2021-10-26 08:29:28 Upcoming Changes in the Law If you’re not a privacy geek you may not have noticed that California recently voted to change its two letters in the name of its privacy law: from CCPA to CPRA. But that’s not all. The change in the name comes with an amendment that places more pressure on businesses operating in California to take consumer data protection more seriously. Under the CCPA - Cybersecurity measures in California had to be applied to a specific set of sensitive data: social security numbers, drivers’ license numbers, other government identifiers, and medical, biometric, and other information. View more...DZone Cloud Show: KubeCon 2021 RecapAggregated on: 2021-10-26 01:44:27 KubeCon Recap Show Join us for the first-ever DZone Cloud Show as we recap and bring you up to speed with everything that happened at KubeCon NA 2021. Have a question or topic you want us to address? Then, be sure to leave a comment! The DZone Cloud Show is broadcast across all DZone social media channels. View more...Defining the Developer ExperienceAggregated on: 2021-10-25 23:29:27 If you run a software company, it’s common to think about the User Experience (UX), how they experience your product when they use it, how intuitive it is to interact with, how quickly someone can accomplish an activity within your product, and how they feel about that process when it is completed. The developer experience (DX) is similar, but instead of how your customer experiences using your software, it’s how your developers experience the process of adding features, fixing bugs, doing code reviews, meeting testing objectives, coordinating on QC/QA requirements, and fulfilling their responsibilities in the release process. View more...Using LoopBack Connectors With IBM App Connect EnterpriseAggregated on: 2021-10-25 23:29:27 IBM® App Connect Enterprise provides a LoopBackRequest node, which enables you to issue synchronous requests to backend data sources by using LoopBack® connectors such as MongoDB, Cloudant®, or PostgreSQL. In this article, we provide detailed information on the installation and configuration of the required LoopBack® connectors for use with IBM® App Connect Enterprise in container-based deployment in Cloud Pak for Integration. We will primarily cover Cloudant and CouchDB databases; however, a similar technique can be applied to other databases like MongoDB and PostgreSQL. View more...8 Things to Consider When Choosing an Embedded Analytics VendorAggregated on: 2021-10-25 23:14:27 Choosing an embedded analytics vendor is not an easy task. There are so many solutions available on the market that it is overwhelming. How can you make the best decision and ensure you invest in a solution that is really going to make an impact? The truth is that there is no straight answer. In fact, the right answer is a combination of a couple of right answers, and of course, your specific business needs. View more...Why Do We Need Spring Boot? Before Spring Boot and After Spring Boot | Spring Boot FeaturesAggregated on: 2021-10-25 23:14:27 In the video below, we take a closer look at why we need Spring Boot. Also, learn about Before Spring boot and After Spring boot | Spring boot features. Let's get started! View more...Writing Clean Code: NamingAggregated on: 2021-10-25 21:29:27 When you start learning how to code your main focus is writing code that works correctly for the problem you are solving. Yes, code needs to work correctly and that is a good place to start learning. However, in a real work environment, you also want to ensure you write clean code. Clean code is readable, extensible, changeable, and maintainable. These are all important qualities for a code to have. View more...Text Preprocessing Methods for Deep LearningAggregated on: 2021-10-25 20:59:27 Deep Learning, particularly Natural Language Processing (NLP), has been gathering a huge interest nowadays. Some time ago, there was an NLP competition on Kaggle called Quora Question insincerity challenge. The competition is a text classification problem and it becomes easier to understand after working through the competition, as well as by going through the invaluable kernels put up by the Kaggle experts. First, let’s start by explaining a little more about the text classification problem in the competition. View more...How to Customize User Interface in Apereo CASAggregated on: 2021-10-25 20:59:27 In this article, we are going to see how to customize the user interfaces of a CAS application. As you may know already, we are dealing with WAR overlay installation of the CAS project. Within this overlay project, there are no view pages available for us to modify. So first of all, we need to bring down any CAS views which we need to modify into our overlay from the CAS source code. View more...How to Know When to Utilize Cross-Browser TestingAggregated on: 2021-10-25 20:29:27 We all know that if we are developing something that runs on the web using browsers then cross-browser testing needs to be done. However, there is another variation of cross-browser testing – cross-device testing. If we have an application that is supposed to work on a device and is used by a set of people who may be using multiple devices then cross-device testing is needed. Thus, cross-device testing here is equivalent to testing your application on multiple devices (at least all the devices that your customers might be using). View more...Two Keys to Agile TransformationAggregated on: 2021-10-25 20:29:27 Enterprise agility has rapidly become one of the most crucial variables for a business’s long-term resiliency. With the COVID-19 pandemic, never-ending disruptions to the global supply chain, and nearly every industry’s typical processes flipped upside down, there has never been a more important time to prioritize agility than now. While the rewards of agility are high, organizations are struggling to implement key technologies and adhere to the methodologies that can get them there. In fact, the 14th Annual State of Agile Report notes that 59 percent of organizations are following agile principles, but only 4 percent of these organizations are getting the full benefit. But the ability to adapt quickly, seize new opportunities, and reduce costs is critical for survival in the ever-evolving and hypercompetitive digital age. View more...The Best VS Code Extensions for Remote WorkAggregated on: 2021-10-25 19:59:27 Programming is a team sport and without proper communication, you can’t really expect spectacular results. A remote setup can make developer-to-developer communication challenging, but equipped with the right tools you have nothing to fear. Let’s take a look at the best VS Code extensions that can seriously improve your remote working routine. View more...Spinnaker Meets Minikube: Part 1Aggregated on: 2021-10-25 19:14:27 Spinnaker is a continuous integration/continuous delivery tool that was started by Netflix in its quest for more agility. This posting will show how to get hands-on experience running Spinnaker on Windows 10. Minikube provides the ability to run a Kubernetes cluster on local Linux, Mac, or Windows. It can therefore serve as a sandbox environment for Spinnaker training, experimentation or even to keep ones local development environment up to date with all the latest commits. View more...NetSuite Integration Using MulesoftAggregated on: 2021-10-25 18:29:27 NetSuite software is an online service that enables companies to manage all key business processes in a single system. NetSuite provides cloud-based business management software that helps companies manage core business processes, ERP financials, CRM, e-commerce, inventory, and more. Mulesoft provides NetSuite Connector, which synchronizes data and automates business processes between NetSuite and third-party applications, either on-premises or in the cloud. View more...Tips for Cutting Down Web Development TimeAggregated on: 2021-10-25 18:14:27 When planning the creation of a website or web app, underestimating the time needed to deliver can sink a project. The longer the project is in development the more money, time, and other resources are required to see it to delivery. Also, the longer it is developed, the more that excitement for the project wanes and it might just be cast to the rubbish heap of other discarded projects. Fortunately, over the years with advancements in tech stacks and the development of best practices, development times can be significantly reduced. This article looks at 10 easy-to-adopt practices that will reduce development time. View more...The Middle Developer PlateauAggregated on: 2021-10-25 18:14:27 So, you are a middle developer. Moving from the status of a junior developer to the middle was not difficult. However, it seems as if no matter how much you try, you cannot become a senior developer. Moreover, you frequently feel that the projects aren’t as attractive as they used to be, and the joy from completing even the most challenging task has gone. Why so? View more...How Agile Teams Automate Their TestsAggregated on: 2021-10-25 18:14:27 Test automation is a vital part of agile development. Serving as a force that helps to maximize QA procedures, an agile project with no automation can be conveniently referred to as a waterfall project in phases. In this article, we examine the importance of agile test automation in agile methodologies. Software Testing for Agile Teams and Why It Matters Agile testing is a continuous software testing process that follows all the principles of agile software development. This methodology has dominated the software testing industry in the last few years. Companies moved from waterfall testing to agile testing to promote the software life cycle’s continuous iteration. View more...Why PKI Is Critical to Your Cloud StrategyAggregated on: 2021-10-25 17:29:27 Modern businesses are becoming ever more reliant on digital data and electronic activities, and as a result, meet rigorous data privacy compliance hurdles and information security regulations. Also, with companies increasingly under threat of online cyber-attacks and malicious insiders, enterprise applications and interfaces are now reliant on using digital credentials to manage how users and companies access sensitive information and crucial system resources. This is why businesses rely on several data authentication systems to guard their key customer and enterprise data. However, out of all different authentication systems, PKIs (Public Key Infrastructure) ensure the trustworthiness of identity credentials. View more...How Agile Eases Software Development Process?Aggregated on: 2021-10-25 16:29:27 The changing market dynamics and technological acceleration have pushed organizations to deliver at a higher pace. Organizations that have embraced the holistic approach of Agile in the software development industry, have shown improved quality, speed to market, and an impressive boost in productivity of the teams. Considering the best possible outcomes, covered in this blog is the agile way of working. Understanding Agile Earlier in the day, there were traditional management methods like command-and-control that included a structured regime that had defined the phases of software development life cycle, from requirement gathering to deployment. View more...Software Testing: Essential 4 LevelsAggregated on: 2021-10-25 16:29:27 The goal of Levels of Testing is to make software testing more structured and efficient, as well as to make it easier to identify all available test cases and test scenarios at a given level. There are various steps in the SDLC paradigm, such as requirement gathering, analysis, coding, design, execution, testing, and deployment. All of these steps go through the software testing process's tiers of testing. There are numerous testing levels that are employed or assist in the verification of actions and performance in software testing. These testing levels are intended to fill in any gaps, and they are re-coded and re-linked as the development lifecycle progresses. View more...How to Migrate Your Data From Redshift to SnowflakeAggregated on: 2021-10-25 15:59:27 For decades, data warehousing solutions have been the backbone of enterprise reporting and business intelligence. But, in recent years, cloud-based data warehouses like Amazon Redshift and Snowflake have become extremely popular. So, why would someone want to migrate from one cloud-based data warehouse to another? The answer is simple: More scale and flexibility. With Snowflake, users can quickly scale out data and compute resources independently by automatically adding nodes. Using the VARIANT data type, Snowflake also supports storing richer data such as objects, arrays, and JSON data. Debugging Redshift is not always straightforward as well, as Redshift users know. Sometimes it goes beyond feature differences that could trigger a desire to migrate. Maybe your team just knows how to work with Snowflake better than Redshift, or perhaps your organization wants to standardize on one particular technology. View more...How to Use OpenAPI for Secure and Robust API IntegrationAggregated on: 2021-10-25 13:44:27 Standards are awesome. What kind of world would this be if programming languages allowed () and [] and {} to be used interchangeably or even mixed together? Chaos would ensue. View more...5 Security Concerns for Developers In Workload ProtectionAggregated on: 2021-10-24 22:29:25 As more workloads move to the cloud, there’s an increased focus on securing them differently. Here are some useful tips for developers to keep in mind as they explore workload protection strategies this year. 1. Streamline and Automate Your Protection Efforts When Possible Succeeding with workload protection becomes easier when people use tools that allow monitoring regardless of location. Some products enable overseeing physical, cloud, and application workloads from a single console and making changes as necessary. View more...Bias vs. Fairness vs. Explainability in AIAggregated on: 2021-10-24 22:29:25 Over the last few years, there has been a distinct focus on building machine learning systems that are, in some way, responsible and ethical. The terms “Bias,” “Fairness,” and “Explainability” come up all over the place but their definitions are usually pretty fuzzy and they are widely misunderstood to mean the same thing. This blog aims to clear that up. Bias Before we look at how bias appears in machine learning, let’s start with the dictionary definition for the word: “Inclination or prejudice for or against one person or group, especially in a way considered to be unfair.” Look! The definition of bias includes the word “unfair.” It’s easy to see why the terms bias and fairness get confused for each other a lot. View more...Insights Into Proactive Threat HuntingAggregated on: 2021-10-24 22:29:25 Proactive search for complex threats seems to be a useful technology but inaccessible for many organizations. Is it really so? What do companies need to do to start Threat Hunting? What tools are needed for threat hunting? What trends in this area can be seen on the market in the coming years? Here's everything you should know. What Is Threat Hunting? Threat Hunting is a search for threats in a proactive mode when the information security specialist is sure that the network is compromised. They should understand how the network operates in order to be able to identify various attacks by examining the existing anomalies. View more...The Debugger Checklist – Part IAggregated on: 2021-10-24 21:59:25 I’m a disorganized person by nature. When I follow a process, it’s by habit and intuition. But when a debugging problem keeps me up at night and gets me to that state of mind where a career of raising sheep in New Zealand seems like an attractive option … That’s when I need to back off and walk through this process in an orderly fashion. This process never fails. When you walk through it, you can track any problem. Now I’m going to skip a lot of common advice. Most debugging tutorials start with things that relate to a process: File an issue, reproduce as a test case, etc. I think there’s plenty written on that online. People use it as filler since they assume debugging is a simple process. It is sometimes, but as we will learn in this blog, there’s a lot of depth and breadth to this misleadingly simple process. View more...Emerging EA Trend: Digital Twin of an OrganizationAggregated on: 2021-10-24 21:59:25 The need to innovate and continuously change is a necessary survival skill for enterprises. How your organization executes that change is something that is unique to your organization. Keeping in touch with the newest ways of implementing change can be overwhelming, given that there are always new enterprise architecture trends vying for your attention. One that is particularly interesting to EA professionals is the digital twin of an organization (DTO). A DTO is a dynamic software model of any organization. It relies on data to understand how an organization operationalizes its business model, connects with its current state, responds to changes, deploys resources, and delivers expected customer value. View more...CSS Layers Tutorial: Real CSS EncapsulationAggregated on: 2021-10-24 13:14:25 Just around the corner, a new feature is rearing its head and it's getting frontend developers excited. That feature is CSS layers. With layers, we'll finally be able to fully encapsulate our CSS for import. That means modules, scripts, or anything else imported into your projects can have CSS that is entirely separate from your own, putting to bed the age-old problem of styles overriding each other. It will also let us be more agile with the CSS we add to our pages with custom import statements. Let's take a deep dive into CSS layers, and how they will work when they land in a browser near you. View more...Interesting Application Garbage Collection PatternsAggregated on: 2021-10-24 13:14:25 As the author of GCeasy – Garbage collection logs analysis tool, I get to see a few interesting Garbage Collection Patterns again and again. Based on the Garbage collection pattern, you can detect the health and performance characteristics of the application instantly. In this post, let me share a few interesting Garbage collection patterns that have intrigued me. 1. Healthy Saw-tooth Pattern You will see a beautiful saw-tooth GC pattern when an application is healthy, as shown in the above graph. Heap usage will keep rising; once a ‘Full GC’ event is triggered, heap usage will drop all the way to the bottom. View more...Forget Squid Game. Low-code’s a Better Way To Thrive Amid an Existential CrisisAggregated on: 2021-10-24 12:44:25 In the Netflix drama Squid Game, the characters risk everything in a series of ruthless games to escape a crisis. But in the fiercely competitive digital economy, you don't have to put everything on the line to find redemption from an existential threat. For many businesses, adapting to the fast-evolving risks of the COVID-19 crisis wasn't in the digital transformation playbook. This is where low-code comes in. It gives companies the agility to avert technical debt, the flexibility to react to the unavoidable, the unpredictable, and the resilience to adapt to the cliff-hanging drama of the next crisis which could be worse than the one we're experiencing now. View more...Solve Every Problem TwiceAggregated on: 2021-10-24 12:44:25 I remember first reading about a similar concept in Joel Spolsky’s blog, Joel on Software, where he wrote back in 2007: Fix Everything Two Ways Almost every tech support problem has two solutions. The superficial and immediate solution is just to solve the customer’s problem. But when you think a little harder you can usually find a deeper solution: a way to prevent this particular problem from ever happening again. View more...Hyperlambda is twice as fast as Entity FrameworkAggregated on: 2021-10-24 12:17:50 I remember when .Net originally came out some 20 years ago and Microsoft had created a website called "pet shop" or something, where they were able to "prove" that .Net and SQL Server was faster than the Java and Oracle equivalent. Of course, the Java version was built using Java's best practices at the time, while the .Net version was almost in its entirety implementing 100% of its business logic in stored procedures. Needless to say of course, but this was a ridiculous comparison, since no (sane) human being would put that much business logic into stored procedures. When we do benchmarks, it's important that we measure best practices, and typical usage. Benchmarking anti patterns and stored procedures tells us nothing about the development model we typically see out there as we actually start using the thing. It is also important that we are able to isolate the library we are measuring as much as possible, to avoid measuring irrelevant things. In this article I will provide you with Entity Framework example, typically resembling the type of code you'd see being used out there, against the typical Hyperlambda equivalent. Watch me run you through the code below. View more...Technical Sharing: Apply Configuration Changes on Milvus 2.0 Using Docker ComposeAggregated on: 2021-10-24 12:17:50 As a frequent user of Milvus, I was very excited about the newly released Milvus 2.0 RC. According to the introduction on the official website, Milvus 2.0 seems to outmatch its predecessors by a large margin. I was so eager to try it out myself. And I did. However, when I truly got my hands on Milvus 2.0, I realized that I wasn’t able to modify the configuration file in Milvus 2.0 as easily as I did with Milvus 1.1.1. I couldn’t change the configuration file inside the docker container of Milvus 2.0 started with Docker Compose, and even force change wouldn’t take effect. Later, I learned that Milvus 2.0 RC was unable to detect changes to the configuration file after installation. And future stable releases will fix this issue. View more...A Deep Dive into AWS Control Tower — An Innovative Multi-Account Management SolutionAggregated on: 2021-10-24 11:40:32 As the complexity of a growing cloud infrastructure expands, so does the complicated challenge of setting up and governing a secure multi-account environment. As a result, Amazon Web Services developed its AWS Control Tower solution to simplify the management of multiple teams and accounts in the cloud. Unlike the challenge it solves, AWS Control Tower is fairly easy to use. The service supports the full automation of setup processes for multi-account environments as well as governance policies. Unique to AWS, the service also cuts down the time-consuming element of such lengthy processes by simplifying AWS accounts creation while supporting your cloud environment to remain compliant with all governance policies. View more... |
|
|