Showing posts with label DZone.com Feed. Show all posts
Showing posts with label DZone.com Feed. Show all posts

Friday, 15 March 2019

Demystifying Edge Vs. Cloud Computing

Around 10 percent of enterprise-generated data is created and processed outside a traditional centralized data center or cloud. Gartner predicts that by 2022, this figure will reach 75 percent.

The very existence of cloud took the entire world by storm, and in the process, it proved that it was more than just hoopla. It’s still a big deal, and we have seen an exponential growth of SaaS applications over the years. Since the inception of artificial intelligence (AI), the industry is having a paradigm shift from cloud to something known as ‘edge.’ Moreover, with the Internet of things (IoT) bemusing the digital space, edge computing is gaining domain authority. There have been various speculations by the industry pundits that edge computing is going to edge out cloud computing. Well, the short answer is: no. But a more complex answer is that with the growing data crunch and quick adoption of AI, the cloud may not always be a viable option!



from DZone.com Feed https://ift.tt/2HnluoS

What Is an IoC Container in Spring? [Video]

In the video below, we take a closer look at what the IoC container is and how to use it in Spring. So, let's get started!

Check out the links below to download the code:



from DZone.com Feed https://ift.tt/2Co30Aa

Pillar #2 Of The AWS Well-Architected Framework: Security

Today’s post continues our sequence on the 5 Pillars of AWS Well-Architected Frameworks. Catch up on the first post here on Operational Excellence. In today’s cloud computing landscape, security is paramount. The increasing number and intensity of cyber attacks, the challenges faced by systems and users, and the business objectives that need to be achieved all require the highest standard of cloud security. Setting up a secure environment is only the beginning. Ways to deal with security events and additional measures to protect data transmissions are also parts of the equation.

With Amazon Web Services (AWS) becoming the go-to ecosystem for cloud implementation for many businesses who want to scale, security is a necessity rather than an option. This is also the reason why one of the AWS Well-Architected Framework’s five pillars—the second pillar, to be exact—is security. For the environment and systems it hosts to be completely secure, there are several design principles to follow to expand your chances of achieving a truly well-architected system.



from DZone.com Feed https://ift.tt/2T7ufEH

Secure File Transfer With AWS

A very common use case for enterprise applications is to make secure file transfers with external entities like customers and suppliers. These file transfers not only need to be secure but also cost-effective. Traditionally, enterprises have been using Secure-Shell File Transfer Protocol (SFTP) servers to meet such ends. But running these servers is an overhead and often not cost-effective.

Amazon Web Services have launched a new service recently, known as AWS Transfer for SFTP. Let us delve deeper into this service, see what it offers, and how is it better than running your own file transfer servers.



from DZone.com Feed https://ift.tt/2XTG7Op

Antipattern of the Month: Micromanagement

Micromanagement commonly occurs when an old organization tries to establish Agile practice. Agility requires the empowerment of largely autonomous teams, and some managers can find it hard to let go of the authority they have traditionally held. They will involve themselves in the details of the work and how it is conducted, rather than letting an Agile team get on with the job. There is a desire, for one reason or another, to retain control.

Micromanagement can result in the inability of a team to inspect and adapt product and process. The manager takes action instead. Waste is then incurred since team focus and collaborative potential cannot be fully brought to bear. A micromanager can often become a bottleneck. Sometimes a micromanager will "dip in and out" of work, leading to inconsistencies in team approach and productivity.



from DZone.com Feed https://ift.tt/2TarJxL

Integrating Systems Into a Swift App

Steps to Integrate Paytm via the SDK

1. Import the Library

A library can be imported via two processes:

a) Via pods



from DZone.com Feed https://ift.tt/2XZJ7ZB

Attacks, Vulnerabilities, and Tools: The Fate of DevSecOps

"Only with the introduction of trucks and tanks in World War I did horses finally become supplanted as the main assault vehicle and means of fast transport in war. Arabian and Bactrian camels played a similar military role within their geographic range," shared Jared Diamond, in his seminal 1997 book entitled Guns, Germs, and Steel: The Fates of Human Societies. In all these examples, people with domestic horses or camels (later with trucks and tanks), or with improved means of using them, enjoyed an enormous military advantage over those without them.

Throughout all of history, elite societies have both been formed and crushed through the advent of new technologies or the availability of better resources to them. The have's have outpaced the have nots. The better equipped prospered and those without, languished.



from DZone.com Feed https://ift.tt/2T4b6n7

An Introduction to JavaScript/ES6 Arrow Functions

Arrow Functions help programmers to write declarative code with JavaScript. While everyone may have different feelings about this addition to Javascript/ES6, whatever camp you belong to you, you will have to deal with variations of Arrow Functions.

Why Do You Need to Know This?

Theoretically, you don't need to learn to use arrow functions at all. You can do everything with good old "function" that you have been doing since you started writing JavaScript code. It could be advantageous in some cases, but you can get away without using them. But even if you don't use it right now, you might end up using arrow functions in the future or you might have to maintain code that was written by someone who loved using arrow functions. 



from DZone.com Feed https://ift.tt/2XWGnMs

Prepare Your Data for ML Training

The process to prepare data for machine learning model training looks somewhat similar to the process of preparing food ingredients to cook dinner. You know that in both cases it takes time, but then you are rewarded with a tasty dinner, or in this case, a great ML model.

I will not be diving into data science or discussing how to structure and transform data. It all depends on the use case, and there are so many ways to reformat data to get the most out of it. I would rather focus on a simple but practical example — how to split data into training and test datasets with Python.



from DZone.com Feed https://ift.tt/2TQ31qC

Fun With SQL: Text and System Functions

SQL by itself is great and powerful, and Postgres supports a broad array of more modern SQL including things like window functions and common table expressions. But rarely do I write a query where I don't want to tweak or format the data I'm getting back out of the database. Thankfully, Postgres has a rich array of functions to help with converting or formatting data. These built-in functions save me from having to do the logic elsewhere or write my own functions. In other words, I do less work because Postgres has already done it for me, which I'm always happy about.

We've covered a set of functions earlier, and today we're going to look at some different categories of functions to dive deeper.Image title



from DZone.com Feed https://ift.tt/2Jf4Eds

Integrating With Box API: Transferring Box File Ownership While Preserving Version History

Data security apps integrate with several different cloud providers via Kloudless, enabling them to offer solutions such as Data Loss Prevention across multiple content repositories without having to learn the ins-and-outs of each one.

Security-oriented apps commonly need to identify malicious or compromised files or objects. For example, by scanning through all content in a cloud storage tenant via admin account privileges. Once identified, the app can then “quarantine” the threat by moving it out of reach to an isolated location. A lot of the time, that secure location is simply within an administrator account in the cloud service itself. This lets the DLP app preserve important information such as the file’s version history, its original creator, links to the file, and more.



from DZone.com Feed https://ift.tt/2W2Xx9B

Simplify and Improve Your Security Model With SQL Census

In the R&D division of Redgate, Foundry, we're working on a new tool, SQL Census, in an effort to make your SQL Server permissions more manageable by seeing who has access to your servers and restructuring existing access rights into a simpler and more compliant format.

We're now building out the SQL Census preview to make improving your security model a simple, more efficient and less painful process. We're looking for people who are currently working to improve their SQL Server security to co-create with. If you want to have direct access to the Census team on a weekly basis to help solve your problems, .



from DZone.com Feed https://ift.tt/2ubl6Rn

How to Make the Most of ML by Investing in People and Technology

Machine learning is poised to pave the way for many exciting opportunities for businesses, but there are many hurdles to be crossed before getting to the finishing line. Many organizations are still struggling with legacy systems and are slow to invest in more advanced technologies. But the more pressing issue at hand, one that has been an ongoing problem for the technology sector, is the short supply of qualified talent to match what is a fast-moving and demanding industry.Image title

Unexplored Territory

By design, machine learning is experimental and often unpredictable — a lot of exploration is required before organizations can even begin to make sense of the data and which machine learning algorithms will work best. While the unpredictable nature of machine learning is understandably daunting, many organizations have yet to fully grasp what is required to effectively deploy and manage it.



from DZone.com Feed https://ift.tt/2VYXdbM

Agile Release Planning: Getting to a Shared Understanding

Introduction

How often are you satisfied with the speed, timing, and results of your release planning activities? What remains a mystery and what works for you? This paper describes what was learned over an 18-month journey of wrestling with how to effectively prepare for release planning. How do we define "effective" in our context of a small number of Agile teams working on a single product backlog?

We believe our learning and planning is effective if we can plan quickly, start on a path, and have a resulting delivery that meets our desired business outcomes in a projected timeframe that, on average, does not vary beyond acceptable limits. Our finding is that having a lightweight Discovery and Estimation Process that is centered on individuals and interactions with the teams doing the work results in effective release planning. It is a flexible process that is disciplined, heightens collaboration, builds understanding, uses techniques that fit the new work, and, when timed right, avoids a “Sprint 0.”



from DZone.com Feed https://ift.tt/2TTCuJf

Continuous Compliance on AWS Using AWS Config Rules

How does compliance work in many organizations? From what I've seen, it might look something like this:

Internal compliance is conducting an audit in three weeks, and we need to make sure we're compliant with all of our internal policies. What ensues is a heroic effort of people discovering or creating documents and other artifacts indicating what their policies are along with some checklists stipulating that they have indeed been executed against "the software system" and this often includes signed approvals from bodies like Change Advisory Boards and such. If the scope is at the enterprise level, people might spend late nights and weekends just to prepare themselves for the audit, or they might run through mock Q&As. After the audit, the team receives a report based on a snapshot in time and — viewing with a cynical lens — people try to determine who was most at fault for any arising issues.



from DZone.com Feed https://ift.tt/2JfjoZJ

Data Dictionaries and the Big Data Lifeline

Data Dictionaries. Sounds like a blast from the past, right? Wrong. This simple, long-standing tool is even more relevant to us today than it ever was in the past. Working with data people every day, I know what it takes for our analysts and data engineers to go through the data and make it easier to analyze (it's a known fact that 80% of their time is spent preparing and managing data for analysis). And as more data is collected and stored, data dictionaries will become a much-needed lifeline in this ever-growing sea of data.

So what are data dictionaries, and how can they help us with all this complex data? A data dictionary, as defined by the UC Merced Library, is a "collection of names, definitions, and attributes about elements that are being used or captured in a database." Essentially, it is a communications tool that defines the critical information in a business-focused way, typically displayed in a spreadsheet format.



from DZone.com Feed https://ift.tt/2HkAWSv

Implementing Integration Tests Using Testcontainers

Tests are an integral part of the development process. No feature or functionality can be considered done without a set of tests implementing scenarios, which verify that what’s implemented works according to specifications. If we talk in terms of functional or integration tests, more often than not, they depend upon some infrastructure, like some kind of database, messaging queue, distributed cache, etc.

Usually, when we want to create integration tests (e.g. to test the persistence layer), it is convenient to load up the in-memory database for that purpose. Although, this is easy to set up and get started, it carries some drawbacks and challenges with it.



from DZone.com Feed https://ift.tt/2Hxqear

The Argument Against Open Office Plans

Photo credit Peter Bennets

If you’ve visited SD Times recently, you may have been surprised to see that near the top of their list of trending articles is not a piece about Java or microservices or Uber’s latest homicidal AI project. While the usual suspects are certainly there giving it some company – OpenJS, SAFe, statistics on the ubiquity of developers – rounding out the top of the list is this seeming anomaly: “For Development Teams, It’s Time to Throw Out the Open Office Plan.”



from DZone.com Feed https://ift.tt/2F63VFV

Using Quarkus to Run Java Microservice Apps on Kubernetes

Last week Red Hat introduced Quarkus, which is a “next-generation Kubernetes native Java framework” that is available as open source. Quarkus promises really fast boot times and low memory usages. This makes Quarkus a perfect fit for Java workloads running as microservices on Kubernetes as well as Java workloads running as serverless functions.

Read the article Why Quarkus to learn how Quarkus works. In a nutshell, Quarkus compiles Java source code in native binaries via GraalVM. The Quarkus framework helps developers to easily build applications that can leverage the GraalVM benefits.



from DZone.com Feed https://ift.tt/2HlPQYN

This Week in Spring: Releases, Spring Cloud, JVM, and More

Hi, Spring fans! What a week! I’m in Seattle, Washington, where I’ve been spending time with Pivotal partner Microsoft talking about all things Spring, Cloud Foundry, and Azure, and then, tonight, I spoke at the Seattle Java User Group on Reactive Spring.

Tomorrow morning, I’m off to jolie Montreal, Canada, for the epic ConFoo conference. Are you going to be around? Say hi!.



from DZone.com Feed https://ift.tt/2UwhwNo