DZone.com Feed
DZone.com Feed |
- AWS KMS Use Case With Serverless Application Model (SAM): An End To End Solution
- How to Combine PST Files Into One
- How to Use Snapshot of Library in Maven Project
- Implementing One Way and Two Way SSL (Mutual Authentication) for MuleSoft Application
- Microservices Security in Action
- Tips to Choose the Right Cloud Solution for Your Web App Development
- Work Breakdown Structure in Project Management
- Helping CEOs Make Sense of the Modern IT 'Acronym Soup'
- Upload Files to Google Cloud Storage with Python
- Shall I Use ADD or COPY in the Dockerfile, and What's the Difference?
- Exposing HTTP Functions With Corvid
- Podman for Docker Users
- Create Multiple Instances in a VPC Using Terraform
- User Authentication With Amazon Cognito
- Building a Database Written in Node.js From the Ground Up
- Text Analysis Within a Full-Text Search Engine
- Imputing Missing Data Using Sklearn SimpleImputer
- Why Your Organization Is Struggling to Adopt AI (And How to Fix It)
- Android Log Analysis
- Infrastructure Automation with Open Source Tools
- Automate Your Excel-Based Workflow in Java -- Invoice Builder Example
- Functional Interface Explained in Detail Introduced From Java 8
- Amazon Simple Queue Services Using C#
- RESTful API Design-Driven Approach
- Understanding Binary Trees Part 1
- Leadership in Open Source Project
- 32 Best Jira Alternatives For Agile Project Management Teams In 2020 [Free and Paid]
AWS KMS Use Case With Serverless Application Model (SAM): An End To End Solution Posted: 18 Aug 2020 04:13 PM PDT The BasicsAWS KMS is a Key Management Service that lets you create Cryptographic keys that you can use to encrypt and decrypt data and also other keys. You can read more about it here. Important Points About KeysPlease note that the CMK generated can only be used to encrypt a small amount of data like passwords, RSA keys. You can use AWS KMS customer master keys (CMKs) to generate, encrypt, and decrypt data keys. However, AWS KMS does not store, manage, or track your data keys, or perform cryptographic operations with data keys. |
How to Combine PST Files Into One Posted: 18 Aug 2020 04:04 PM PDT When we talk about the best email client application, Outlook first came to mind. The outlook was developed by Microsoft, with which the user can send/receive emails and smoothly manage other daily tasks. Aside from that, Outlook users are concerned about their large amount of data that is difficult to manage. Outlook users have multiple PST files and now want to merge them into one. But how can you combine PST files into one? This is the big question that arises. In this blog, you will learn how to combine Outlook PST files. Before moving further, let's discuss the reasons behind merging Outlook PST files into a single one. |
How to Use Snapshot of Library in Maven Project Posted: 18 Aug 2020 03:59 PM PDT So, for today I bring you a real-time problem which I and my teammates faced. One of my teammates contributed to an open-source library, Scanamo, and the contribution which was being made was very crucial for the next release of our project. We could not keep waiting for the next release of the library to happen, so we learned a workaround for that. That is, using a snapshot of a library dependency. Fortunately, the library I'm are talking about, releases its snapshot version after small updates to the code. So, let's find out what was the workaround I learned, 1. Adding OSS Sonatype Repository To Maven Project To Use Snapshot of the LibraryFirstly, we need to enable our project to look for a snapshot version of a library that we want to add to our project. To do that, add below snippet to pom.xml |
Implementing One Way and Two Way SSL (Mutual Authentication) for MuleSoft Application Posted: 18 Aug 2020 03:50 PM PDT IntroductionIn this article, we will be going to learn how to set up the one-way SSL and two-way SSL for MuleSoft applications. In one way SSL, the client always verifies the server certificates and the server never verifies the client certificates whereas in two-way SSL client verifies the server certificates and server verifies the client certificates. Sometimes two-way SSL is also known as Mutual Authentication. One Way SSLAs mentioned above in one way SSL only client verifies the server certificates. At the server end, there will be a Keystore that will hold the private and public certificate of the server whereas, at the client end, there will be a truststore that will hold the public certificate of the server. |
Microservices Security in Action Posted: 18 Aug 2020 11:45 AM PDT The book Microservices Security in Action, which I authored with Nuwan Dias is now available to buy online from Amazon and Manning. Nuwan and I spent last 27+ months writing/re-writing the book. It was a marathon effort, but yet a great experience, and we both are very glad to see how it came out at the end! This is the story, which lead us to write the book. While working at WSO2 for more than a decade, we've seen how the integration domain evolved over time from SOAP-based services to JSON/RESTful services and then to microservices. We spent most of our early days at WSO2 contributing to the Apache Axis2 project, which was a popular SOAP engine in those days, and to the Apache Rampart project, which implements many Organization for the Advancement of Structured Information Standards (OASIS) standards for web services security. |
Tips to Choose the Right Cloud Solution for Your Web App Development Posted: 18 Aug 2020 10:52 AM PDT The cloud computing environment considerably matured last year. Cloud-native computing is now the beating heart of enterprise Information Technology. Nonetheless, the ecosystem of the industry continues to evolve fast, and new trends are on the horizon this year and for the years to come. It's expected that by the end of 2020, over 80 percent of the entire enterprises would be in the cloud. Organizations are unearthing the power of mixing and matching cloud service to solutions that address almost any organization need as the adoption to the cloud hits another growth spurt. These days, the cloud has become a metaphor for modern computing itself in which everything is a service that could connect and combine with other services in order to meet an endless number of app needs. |
Work Breakdown Structure in Project Management Posted: 18 Aug 2020 10:51 AM PDT If you are starting as a project manager you may have seen WBS or work breakdown structure, and we are sure you wondered what is a work breakdown structure? A work breakdown structure, although despite what its' name may suggest involves breaking down deliverables not work. This simple confusing fact reiterates why you need to understand what is a work breakdown structure. Therefore, we have curated this guide to clue you in on all that is WBS. Let's start with the basics. |
Helping CEOs Make Sense of the Modern IT 'Acronym Soup' Posted: 18 Aug 2020 10:44 AM PDT The domain of enterprise software is littered with acronyms that may be intimidating even to seasoned managers. Things get even murkier for those seeking to develop their own mobile enterprise app and encountering design-specific terms. The fact that some of them are often used interchangeably also doesn't help. So the best place to start figuring out these terms is to understand their similarities and differences and identify the areas where they overlap. Acronyms in Enterprise Systems ContextERPERP stands for enterprise resource planning – the process of managing business-related data. In the modern business context, the term refers specifically to software solutions that collect, process, store, and interpret data. The idea of ERP was introduced in the domain of manufacturing but has since expanded to cover: |
Upload Files to Google Cloud Storage with Python Posted: 18 Aug 2020 10:42 AM PDT Google Cloud is a suite of cloud-based services just like AWS from Amazon and Azure from Microsoft. AWS dominates the market with Azure but Google's not far behind. Google Cloud Platform or GCP is the third largest cloud computing platform in the world, with a share of 9% closely followed by Alibaba Cloud. Amazon undoubtedly leads the market with a share of 33% but GCP is showing tremendous spike with the growth rate of whooping 83% in 2019. GCP leads AWS on the cost front, though. Google has a lesser number of services to offer but maintains its position as one of the most cost-effective cloud platform. |
Shall I Use ADD or COPY in the Dockerfile, and What's the Difference? Posted: 18 Aug 2020 10:14 AM PDT Every developer and every team faces confusion about Both |
Exposing HTTP Functions With Corvid Posted: 18 Aug 2020 10:11 AM PDT Creating and exposing HTTP functions from your site doesn't have to be a long and tedious process. Sometimes, you may need to share access to your data or functionality from your site. Let's take a look at an easy (and FREE!) way to expose some site data! Using Corvid, we can easily expose an HTTP function version of our site data or site functionality. I am working on building a Kickstarter style site, so I am going to work on building a function that GETs the current total value of pledges on the product. The site only has one product, so this makes it easier :) |
Posted: 18 Aug 2020 09:57 AM PDT Podman is the command-line interface tool that lets you interact with Libpod, a library for running and managing OCI-based containers. It is important to note that Podman doesn't depend on a daemon, and it doesn't require root privileges. The first part of this tutorial focuses on similarities between Podman and Docker, and we'll show how you can do the following: |
Create Multiple Instances in a VPC Using Terraform Posted: 18 Aug 2020 09:44 AM PDT Rather than directly diving into the Terraform scripts, let's quickly learn about what is Terraform and how IBM Cloud Schematics simplifies the Terraform scripting experience on IBM Cloud. What is Terraform?Terraform is an open-source software, developed by HashiCorp, that enables predictable and consistent provisioning of IBM Cloud platform, classic infrastructure, and VPC infrastructure resources by using a high-level scripting language. You can use Terraform to automate your IBM Cloud resource provisioning, rapidly build complex, multi-tier cloud environments, and enable Infrastructure as Code (IaC). |
User Authentication With Amazon Cognito Posted: 18 Aug 2020 09:33 AM PDT IntroductionIn this article, I will walk you through that what is Amazon Cognito service and how you can use this for your user management, authentication, and authorization. I will create a simple web application using AngularJS with login/sign-up functionality, and I will showcase how easy it is to make it full fledge application with all user management functions handled using Amazon Cognito. PrerequisitesThis article assumes that you have a basic understanding of web application development. This article doesn't require you to have advanced skills in using Angular or AWS, but having familiarity with these technologies will help you to get most out of this. Here is a list of tools technologies I have used in this article. |
Building a Database Written in Node.js From the Ground Up Posted: 18 Aug 2020 09:11 AM PDT The founding team at HarperDB built the first and only database written in Node.js. A few months back, our CEO Stephen Goldberg was invited to speak at a Women Who Code meetup to share the story of this (what some called crazy) endeavor. Stephen discussed the architectural layers of the database, demonstrated how to build a highly scalable and distributed product in Node.js, and demoed the inner workings of HarperDB. You can watch his talk at the link above, and even read a post from back in 2017, but since we all love Node.js and it's an interesting topic, I'll summarize here. The main (and simplest) reason we chose to build a database in Node is because we knew it really well. We got flak for not choosing Go, but people now accept that Go and Node are essentially head to head (in popularity & community support). Zach, one of our cofounders, recognized that with the time it would have taken to learn a new language, it would never be worth it. |
Text Analysis Within a Full-Text Search Engine Posted: 18 Aug 2020 09:08 AM PDT Full-Text Search refers to techniques for searching text content within a document or a collection of documents that hold textual content. A Full-Text search engine examines all the textual content within documents as it tries to match a single search term or several terms, text analysis being a pivotal component. You've probably heard of the most well-known Full-Text Search engine: Lucene with Elasticsearch built on top of it. Couchbase's Full-Text Search (FTS) Engine is powered by Bleve, and this article will showcase the various ways to analyze text within this engine. |
Imputing Missing Data Using Sklearn SimpleImputer Posted: 18 Aug 2020 09:04 AM PDT In this post, you will learn about how to use Python's Sklearn SimpleImputer for imputing/replacing numerical and categorical missing data using different strategies. In one of the related articles posted sometime back, the usage of fillna method of Pandas DataFrame is discussed. Here is the link, Replace missing values with mean, median and mode. Handling missing values is a key part of data preprocessing and hence, it is of utmost importance for data scientists/machine learning engineers to learn different techniques in relation imputing / replacing numerical or categorical missing values with appropriate value based on appropriate strategies. The following topics will be covered in this post: |
Why Your Organization Is Struggling to Adopt AI (And How to Fix It) Posted: 18 Aug 2020 09:00 AM PDT Artificial intelligence (AI) offers a lot of promise today, but it's still a bit of a black box for most people. There are many obstacles to adopting AI for today's organizations, no matter your industry. Understanding what they are will help dispel some of the myths surrounding AI, its limits and potential, and risks to your people and business. Over 73 % of organizations say that adoption is their biggest challenge with AI. In the same report, over 90% say they don't have the people and processes to become the data-driven organization they need to be to adopt AI fully. |
Posted: 18 Aug 2020 08:48 AM PDT Android uses a centralized system for all logs and application programmers can also write custom log messages. The tooling to develop Android applications allows you to define filters for the log statements you are interested in. Log analysis is a phase of development and developers encounter it from time to time. Bug log helps in identifying the bugs in the Android application while in the development phase. Once the app is released into the market, the support engineers analyze the bug logs to resolve the issue. There are for different types of Logs available in the Android Eco-System – Application Logs, Android System Logs, Event Logs, and Radio Logs. The logging system consists of a kernel driver and kernel buffers for storing Android log messages, C, C++ and Java classes for making log entries and for accessing the log messages, a standalone program for viewing log messages (logcat) and the ability to view and filter the log messages from the host machine (via eclipse or ddms). |
Infrastructure Automation with Open Source Tools Posted: 18 Aug 2020 08:44 AM PDT Enterprises across the globe are implementing infrastructure automation to save time, eliminate manual error/variability, and reduce costs. Automation opens the door for developers to rapidly provision new environments. Cloud architects, support executives and others looking at infrastructure automation across the enterprise Infrastructure ManagementIt is the administration and management of physical and virtual assets, data, and software to support all IT Operations in the facility. This structure is required to run all Business Operations smoothly. The main goal is to minimize downtime and maintain business productivity. |
Automate Your Excel-Based Workflow in Java -- Invoice Builder Example Posted: 18 Aug 2020 08:42 AM PDT After helping my colleague in the administration department turning her Excel file into a Buy Currency Web App, I now have the chance to help my colleague in the sales department by automating their invoice-generating process. In this article, I will share with you how I did it. Create an Invoice With Excel templatesFor salespersons, it is very common to create an invoice with Excel. But the process usually involves many error-prone manual actions like inputting data, copy/pasting,... etc. My colleague, like any salesperson, wishes that the data can be populated from the database into the invoice Excel template automatically, instead of having to input it manually. Therefore I took the time and created a web application, Invoice Builder, and turned such a manual process into an integrated, automated process leveraging Excel files, Java, and Keikai. |
Functional Interface Explained in Detail Introduced From Java 8 Posted: 18 Aug 2020 08:42 AM PDT Functional interfaces are introduced as part of Java 8. It is implemented using the annotation called @FunctionalInterface. It ensures that the interface should have only one abstract method. The usage of the abstract keyword is optional as the method defined inside interface is by default abstract. It is important to note that a functional interface can have multiple default methods (it can be said concrete methods which are default) but only one abstract method. The default method has been introduced in interface so that a new method can be appended in the class without affecting the implementing class of the existing interfaces. Because prior to java 8 the implementing class of an interface has to implement all the abstract methods defined in the interface. The functional interface has been introduced in Java 8 to support the lambda expression in java 8 on the other hand it can be said lambda expression is the instance of functional interface. |
Amazon Simple Queue Services Using C# Posted: 18 Aug 2020 08:37 AM PDT ASQS (Amazon Simple Queue Services)Amazon SQS (Amazon Simple Queue Services) is a queuing service used for high-throughput, system-to-system messaging. You can use queues to decouple heavyweight processes and to buffer and batch work. Amazon SQS stores messages until microservices and serverless applications process them. Steps to Implementing Amazon SQSCreate a QueueYou will have the provide the name of the Queue to create a simple queue in the Amazon cloud. |
RESTful API Design-Driven Approach Posted: 18 Aug 2020 08:03 AM PDT In this tutorial I will show you the fundamentals of designing a RESTful API specification by applying REST principles and best practices, then you'll be ready to try my online tutorial: How to design a REST API with API Designer? If you already know what is meant by API in the context of RESTful web services, you can skip to the next section. If not, read on. |
Understanding Binary Trees Part 1 Posted: 18 Aug 2020 08:01 AM PDT Quick recap of some basic tree vocabulary, before getting in depth into this series of Binary Trees... What Is a Tree?Unlike Arrays, Linked Lists, Stack, and Queues, which are linear data structures, trees are hierarchical data structures. Trees represent non-linear data structures and can be defined as collection of entities called "Nodes" linked together to simulate hierarchy. In other words, Tree is a widely used abstract data type (ADT) that simulates a hierarchical tree structure |
Leadership in Open Source Project Posted: 18 Aug 2020 07:49 AM PDT IntroductionThe goal of this article is to understand how to build a team or a community based on open source principles and become a leader in this team to effectively solve problems. "Companies often go through a phase of thinking 'Oh, well, we're huge. Why can't we pound our fist on the table and just make the community do what we want?' They soon come to realize that tactic won't work. They come to understand that the only way to gain leadership is to earn the role within the community. And the only way to do that is to gain credibility and make contributions." |
32 Best Jira Alternatives For Agile Project Management Teams In 2020 [Free and Paid] Posted: 18 Aug 2020 06:37 AM PDT If Jira seems disappointing to you and your team, in this quite lengthy article you'll discover the best Jira alternatives. Or if you are just browsing the web for a great project management tool, this guide will ease your final decision. DISCLAIMER: This is not the typical biased "Jira sucks, instead check our tool; it's better than Jira" article. |
You are subscribed to email updates from DZone.com Feed. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
Comments
Post a Comment