Your 12 hourly digest for DZone.com Feed

DZone.com Feed
Recent posts on DZone.com 
thumbnail Testing Repository Adapters With Hexagonal Architecture
Mar 7th 2023, 01:02, by David Cano

When applying hexagonal architecture (ports and adapters) with access to infrastructure elements like databases is done by the mean of adapters, which are just implementations of interfaces (ports) defined by the domain. In this article, we are going to provide two implementations of the same repository port, one in-memory and another based on JPA, focusing on how to test both implementations with the same set of tests.

Context

Many software solutions usually developed in the enterprise context have some state that needs to be persisted in a durable store for later access. Depending on the specific functional and non-functional requirements, selecting the correct persistence solution can be hard to make and most likely require an Architecture Decision Record (ADR) where the rationale of the selection, including alternatives and tradeoffs, is detailed. For persisting your application state, most likely, you will look at the CAP Theorem to make the most adequate decision.

thumbnail Getting Started With Astro
Mar 7th 2023, 00:11, by Tomas Fernandez

Web development, like most technologies, moves in waves and cycles. Static websites were all we had in the beginning. But, pretty soon, developers were hacking together the first server-generated sites thanks to Perl and PHP. This was the advance that would eventually kickstart frameworks like Laravel, Django, or Rails.

Mobile devices would come to change how people consume the web. So long server-generated websites, hello client-rendered applications. The next wave brought frameworks that could give users a more app-like experience—without reloads—like React or AngularJS.

thumbnail Building Custom Solutions vs. Buy-and-Build Software
Mar 6th 2023, 21:58, by Rob Austin

The Challenges of Building a FIX Protocol

The first day I was introduced to FIX was when I worked at an investment bank in London as a developer, I was told to write a feed handler to retrieve market data. Bear in mind that at this time, I knew nothing about FIX, apart from googling it for about 10 mins on the internet. With a touch of overconfidence and slight arrogance, I set to work coding a direct socket connection to the remote FIX endpoint, thinking, "How hard could it be?"

So, What Is FIX? 

Financial Information eXchange (FIX) is both a market data format and a protocol: it is used by investment banks to place orders and receive market data and has become a global language in financial trading. The format of a FIX message controls how it is encoded. All FIX messages start with 8=FIX, which denotes the start of a FIX message. They then go on to list key and value pairs. The keys are represented as numbers (known as TagNumbers) followed by a = delimiter to delimit the values. Each key=value combination is then delimited by the \u0001 character, which is sometimes visually represented as either ^ or |. The value is often written in a semi-human-readable format. I say semi-human readable because most of the time it is human-readable, but all too often, FIX will use a single character to denote a state or type of message. These characters are not always that obvious. I agree that the character B for "Buy" and S for "Sell" makes sense, but other characters are used that make no sense. For example, D denotes a "New Order Single" message, which is a message that is often used when you wish to place an order with your counterparty. 

thumbnail Develop XR With Oracle, Ep. 5: Healthcare, Vision AI, Training/Collaboration, and Messaging
Mar 6th 2023, 21:52, by Paul Parkinson

This is the fifth piece in a series on developing XR applications and experiences using Oracle and focuses on XR applications of healthcare, vision AI, training and collaboration, and messaging, including other topics such as multi-platform development, etc. Find the links to the first four articles below: 

Develop XR With Oracle, Ep 1: Spatial, AI/ML, Kubernetes, and OpenTelemetry
Develop XR With Oracle, Ep 2: Property Graphs and Data Visualization
Develop XR With Oracle, Ep 3: Computer Vision AI, and ML
Develop XR With Oracle, Ep 4: Digital Twins and Observability

thumbnail Know Why Super Apps Are on Emerging Rise
Mar 6th 2023, 19:20, by Mohit Shah

We all live in a technologically advanced world where software applications have become essential to life. If this software malfunctions, it isn't incorrect to say that our daily lives could completely halt.

As technology spreads worldwide, existing tech hubs have developed an upgraded platform called the 'Super App.' Although the term was coined by Mike Lazaridis (Founder of Blackberry) in 2010, its impact in the real world has recently increased.

thumbnail Node.js vs Python: Which Suits Your Application?
Mar 6th 2023, 19:03, by Nanthini .

Would you like to know the best technology for your web application? Have a glance at Node.js and Python. 

It is an arduous task to hand-pick the best platform that enables you to create a web application. Many were baffled to select one from a few. Here is a wide range of multiple featured technologies, which will facilitate you to identify the right one. We will discuss the differences between the various apps and their applications.

thumbnail Product Security (DevSecOps Practices)
Mar 6th 2023, 18:41, by Sunil Kumar Rangineni

What Is Product Security?

Product Security is a process within the Cybersecurity function which aims to deliver a secure product, which includes the organization's Web applications, Web services, Mobile applications, or any hardware manufactured. This focuses on considering security at every stage, starting from design, development, and implementation, i.e., the secure SDLC process.

Product Security involves multiple activities, including threat modeling, Security testing (Static application security testing (SAST)), Dynamic application security testing (DAST), Penetration Testing, Secure coding practices, Incident response, and Continuous monitoring. The primary goal of product security is to protect the CIA (Confidentiality, Integrity, and Availability).

thumbnail React Native vs Kotlin: A Quick Comparison
Mar 6th 2023, 18:18, by Nanthini .

Mobile apps have become an emerging platform, and mobile app traffic is very high, with a well-appreciated response from the people. So, entrepreneurs are focusing on the mobile app development process to develop their businesses to the next level. 

To meet all the business requirements, many technologies are introduced, and many developers and businesses are confused with different languages and frameworks. 

thumbnail How To Use Linux Containers
Mar 6th 2023, 17:52, by Dmitry Chuyko

Linux containers are a powerful solution for:

  • Software standardization
  • Acceleration of development and testing
  • Effective resource management throughout the whole lifecycle of an application

Here, we will provide a step-by-step guide to building Linux containers with applications intended for Cloud deployment. As an example, we will use BellSoft's open-source Alpaquita Stream containers hosted on the Docker Hub Container Image Library.

thumbnail 20 Concepts You Should Know About Artificial Intelligence, Big Data, and Data Science
Mar 6th 2023, 16:56, by Usama Amin

Introduction

Entrepreneurial ideas take advantage of the range of opportunities this field opens up, thanks to what is engineered by scientific profiles such as mathematicians or programmers.

  1. ALGORITHM.  In Computer Science, an algorithm is a set of steps to perform a task. In other words, a logical sequence and instructions form a mathematical or statistical formula to perform data analysis.
  2. SENTIMENT ANALYSIS.  Sentiment analysis refers to the different methods of computational linguistics that help to identify and extract subjective information from existing content in the digital world. Thanks to sentiment analysis, we can be able to extract a tangible and direct value, such as determining if a text extracted from the Internet contains positive or negative connotations.
  3. PREDICTIVE ANALYSIS. Predictive analysis belongs to the area of Business Analytics. It is about using data to determine what can happen in the future. The AP makes it possible to determine the probability associated with future events from the analysis of the available information (present and past). It also allows the discovery of relationships between the data that are normally not detected with less sophisticated analysis. Techniques such as data mining and predictive models are used.
  4. BUSINESS ANALYTICS. Business Analytics encompasses the methods and techniques used to collect, analyze, and investigate an organization's data set, generating insights that are transformed into business opportunities and improving business strategy. AE allows an improvement in decision-making since these are based on obtaining real data and real-time and allows business objectives to be achieved from the analysis of this data.
  5. BIG DATA.  We are currently in an environment where trillions of bytes of information are generated every day. We call this enormous amount of data produced every day Big Data. The growth of data caused by the Internet and other areas (e.g., genomics) makes new techniques necessary to access and use this data. At the same time, these large volumes of data offer new knowledge possibilities and new business models. In particular, on the Internet, this growth begins with the multiplication in the number of websites, beginning search engines (e.g., Google) to find new ways to store and access these large volumes of data. This trend (blogs, social networks, IoT…) is causing the appearance of new Big Data tools and the generalization of their use.
  6. BUSINESS ANALYTICS (Business Analytics). Business Analytics or Business Analytics allows you to achieve business objectives based on data analysis. Basically, it allows us to detect trends and make forecasts from predictive models and use these models to optimize business processes.
  7. BUSINESS INTELLIGENCE Another concept related to EA is Business Intelligence (IE) focused on the use of a company's data to also facilitate decision-making and anticipate business actions. The difference with EA is that EI is a broader concept, it is not only focused on data analysis, but this is an area within EI. In other words, EI is a set of strategies, applications, data, technology, and technical architecture, among which is EA, and all this focus on the creation of new knowledge through the company's existing data.
  8. DATA MINING or data mining.  Data Mining is also known as Knowledge Discovery in Database (KDD). It is commonly defined as the process of discovering useful patterns or knowledge from data sources such as databases, texts, images, the web, etc. Patterns must be valid, potentially useful, and understandable. Data mining is a multidisciplinary field that includes machine learning, statistics, database systems, artificial intelligence, Information Retrieval, and information visualization, ... The general objective of the data mining process is to extract information from set data and transform it into an understandable structure for later use.
  9. DATA SCIENCE.  The opportunity that data offers to generate new knowledge requires sophisticated techniques for preparing this data (structuring) and analyzing it. Thus, on the Internet, recommendation systems, machine translation, and other Artificial Intelligence systems are based on Data Science techniques.
  10. DATA SCIENTIST.  The data scientist, as his name indicates, is an expert in Data Science (Data Science). His work focuses on extracting knowledge from large volumes of data (Big Data) extracted from various sources and multiple formats to answer the questions that arise.
  11. DEEP LEARNING is a technique within machine learning based on neural architectures. A deep learning-based model can learn to perform classification tasks directly from images, text, sound, etc. Without the need for human intervention for feature selection, this can be considered the main feature and advantage of deep learning, called "feature discovery." They can also have a precision that surpasses the human being.
  12. GEO MARKETING. The joint analysis of demographic, economic, and geographic data enables market studies to make marketing strategies profitable. The analysis of this type of data can be carried out through Geo marketing. As its name indicates, Geo marketing is a confluence between geography and marketing. It is an integrated information system -data of various kinds-, statistical methods, and graphic representations aimed at providing answers to marketing questions quickly and easily.
  13. ARTIFICIAL INTELLIGENCE.  In computing, these are programs or bots designed to perform certain operations that are considered typical of human intelligence. It is about making them as intelligent as humans. The idea is that they perceive their environment and act based on it, focused on self-learning, and being able to react to new situations.
  14. ELECTION INTELLIGENCE.  This new term, "Electoral Intelligence (IE)," is the adaptation of mathematical models and Artificial Intelligence to the peculiarities of an electoral campaign. The objective of this intelligence is to obtain a competitive advantage in electoral processes.  Do you know how it works?
  15. INTERNET OF THINGS (IoT) This concept, the Internet of Things, was created by Kevin Ashton and refers to the ecosystem in which everyday objects are interconnected through the Internet.
  16. MACHINE LEARNING (Machine Learning).  This term refers to the creation of systems through Artificial Intelligence, where what really learns is an algorithm, which monitors the data with the intention of being able to predict future behavior.
  17. WEB MINING.  Web mining aims to discover useful information or knowledge (KNOWLEDGE) from the web hyperlink structure, page content, and user data. Although Web mining uses many data mining techniques, it is not merely an application of traditional data mining techniques due to the heterogeneity and semi-structured or unstructured nature of web data. Web mining or web mining comprises a series of techniques aimed at obtaining intelligence from data from the web. Although the techniques used have their roots in data mining or data mining techniques, they present their own characteristics due to the particularities that web pages present.
  18. OPEN DATA. Open Data is a practice that intends to have some types of data freely available to everyone, without restrictions of copyright, patents, or other mechanisms. Its objective is that this data can be freely consulted, redistributed, and reused by anyone, always respecting the privacy and security of the information.
  19. NATURAL LANGUAGE PROCESSING (NLP).  From the joint processing of computational science and applied linguistics, Natural Language Processing  (PLN or NLP in English) is born, whose objective is none other than to make possible the compression and processing aided by a computer of information expressed in human language, or what is the same, make communication between people and machines possible.
  20. PRODUCT MATCHING. Product Matching is an area belonging to Data Matching or Record Linkage in charge of automatically identifying those offers, products, or entities in general that appear on the web from various sources, apparently in a different and independent way, but that refers to the same actual entity. In other words, the Product Matching process consists of relating to different sources those products that are the same.

Conclusion

Today there are numerous data science and AI tools to process massive amounts of data. And this offers many opportunities: performing predictive and advanced maintenance, product development, machine learning, data mining, and improving operational efficiency and customer experience.

thumbnail Understanding and Resolving a Common Error
Mar 6th 2023, 16:43, by Eden Allen

If you have ever encountered the ERR_SSL_VERSION_OR_CIPHER_MISMATCH error, you may have been puzzled by what it means and how to fix it. In this post, we will explain what causes this error and provide some tips on how to resolve it.

What Is the ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error?

The ERR_SSL_VERSION_OR_CIPHER_MISMATCH error is a common error that occurs when there is an issue with the SSL/TLS configuration of a client connecting to a server. When a client attempts to connect to a server over HTTPS, the two parties negotiate an SSL/TLS protocol and cipher suite to use for the connection. If the client and server cannot agree on a common protocol and cipher suite, the ERR_SSL_VERSION_OR_CIPHER_MISMATCH error may occur.

thumbnail Paginating JOINs via jOOQ and DENSE_RANK()
Mar 6th 2023, 16:25, by Anghel Leonard

Working With DENSE_RANK()

DENSE_RANK() is a window function that assigns a rank to each row within a partition or result set with no gaps in ranking values. A simple example is shown here:

Let's assume that we want to rank employees (EMPLOYEE) in offices (OFFICE) by their salary (EMPLOYEE.SALARY). Expressing this via jOOQ and DENSE_RANK() can be done as follows:

thumbnail DevOps Automation Tools for SaaS Companies
Mar 6th 2023, 16:24, by William Talluri

As DevOps has become mainstream now, it is time for businesses to stop thinking about what DevOps is and start leveraging the amazing benefits offered by DevOps automation tools.

DevOps is a methodology that integrates development and operations teams to seamlessly collaborate throughout the product development lifecycle. While it started with Dev and Ops, the functionality is not limited to these two departments anymore. Based on your project requirements and niche, you can create cross-functional teams composed of members from development, design, testing, QA, security, business, etc. DevOps not only transforms business operations but also brings a culture change across the organization.

thumbnail Java Bytecode: Journey to the Wonderland (Part 3)
Mar 6th 2023, 15:26, by A N M Bazlur Rahman

Our previous article unpacked bytecode further and discussed ConstantPool. Today, I'll go through several resources for working with it now.

Java bytecode is the Java Virtual Machine's (JVM) intermediate representation of Java code. While Java bytecode is not meant to be human-readable, it may be edited and manipulated for several reasons. This article examines the tools and methods used to change and work with Java bytecode.

You are receiving this email because you subscribed to this feed at blogtrottr.com. By using Blogtrottr, you agree to our policies, terms and conditions.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions.

Comments

Popular posts from this blog

Digg

DZone.com Feed

Yahoo! News: Technology News