IES San Clemente
  • entrar
  • ?
  • Rexistro

informática

novas rss: dzone

Is There Life Beyond Scrum?

When Scrum was first defined, it addressed a number of issues that plagued IT organizations of the 1980s. Functional silos and their key side-effect, cross-team dependencies. Lack of clear communication. Extended lead times. Poor alignment of solutions with needs. High defect rates. More. To this d ...

All You Need to Know About JSON With Swift

JSON stands for JavaScript Object Notation. It’s the de facto standard for server-client data communication. In this post, we will go over a few concepts about data and demo using JSON in a Xcode Playground. You are encouraged to try out and modify examples. A Word on Data and Information Appli ...

The Case for DNS Redundancy

The Domain Name System (DNS) provides the location/IP address of the server that hosts the domain that you are trying to access. The DNS resolution process (as explained in the image below) is the first step in the sequence of events that are triggered when you enter a domain name into your browser. ...

Removing the Dread from Internal Enterprise Systems

When you think about internal enterprise software, what first pops into your mind? When you think of using your company's internal tools, what's your initial reaction? Typically, thinking of internal enterprise tools — especially those used to manage internal processes, transactions, and issue track ...

UX/UI Designer Wannabees - Show Us Your Skills

You will not find a college degree in web design. In fact, web designers come from all sorts of fields, some with related degrees in IT, graphic design, or art, and some with just specific coursework under their belts. Others are self-taught and have learned through their own initiative and dedicati ...

How to Pass the Data Security Test

The data security test is the basic test that everyone should undergo to make sure that they’re ready to go online. Businesses have an obligation to their clients and suppliers to keep their data safe. Failing to do this can lead to huge consequences further down the line, including a loss of confid ...

RSA 2017: A Sea of Solutions Needing Big Data

I decided to take a break from my Cybersecurity Architecture series and CISO’s View series to give my thoughts on this year’s RSA conference while things are still fresh. First off, I enjoyed meeting with old colleagues and many security people that I respect which justified ...

The Integration Maturity Model: Where Does Your Enterprise Fall?

Today’s digital enterprise leaders must reshape their integration strategy to meet the demands of transformation in an increasingly digital world. For example, CIOs, IT leaders, and enterprise architects must unify enterprise APIs to enable cloud application portfolio agility. CTOs, digita ...

The Quest for Better MySQL Replication: Galera vs. Group Replication

Thanks to the Galera plugin, founded by the Codership team, we’ve had the choice between asynchronous and virtually synchronous replication in the MySQL ecosystem for quite a few years already. Moreover, we can choose between at least three software providers: Codership, MariaDB and Percona, each wi ...

Optional Method Parameters

I have recently come across an interesting problem: should you use Optional as a method parameter type? The majority of sources says that you shouldn’t, but let’s weigh the arguments before making a verdict. Why Not Just Pass Nulls Around? Before we get into the case of using Optional, we should und ...

Getting Started With OpenShift Java S2I

The OpenShift Java S2I image, which allows you to automatically build and deploy your Java microservices, has just been released and is now publicly available. This article describes how to get started with the Java S2I container image, but first, let’s discuss why having a Java S2I image is so impo ...

Hindrances to IoT's Success

To gather insights on the evolution of IoT to this point in 2017, we spoke to 19 executives who are familiar with the current state of the Internet of Things.  We asked them, "What are the most common problems preventing companies from realizing the benefits of IoT?" Here's what they ...

How to Mash Up JET and MCS Mobile Apps

Late last year, I took the chance to investigate Oracle's JavaScript Extension Toolkit (JET) for web and hybrid mobile development. Here on DZone, I shared what I had learned by publishing a number of articles about the basics of JET. I hope those articles have been useful to you; they certainl ...

A Look at Java Collections

The Java Collections framework is an architecture for storing, managing, and manipulating collections of objects. It provides many data structures and algorithms commonly used for dealing with collections — searching and sorting, for instance. Many details about storing objects are abstracted a ...

Spring Boot Actuator: A Complete Guide

Spring Boot Actuator is a sub-project of Spring Boot. It provides several production-grade services to your application out of the box. Once Actuator is configured in your Spring Boot application, you can interact and monitor your application by invoking different HTTP endpoints exposed by Spring Bo ...

Agile, Lean, Patterns: Every Project is Test Driven in the End

Let me give you the punchline and then explain myself: As soon as testing starts every “project” becomes a test driven.

What's in a Name? Spelling Matters in Code

Think back to college (or high school, if applicable). Do you remember that kid that would sit near the front of the class and gleefully point out that the professor had accidentally omitted an apostrophe when writing notes on the white board? Didn’t you just love that kid? Yeah, me neither. Fate im ...

5-Minute Interview: Turning Relationships Into Good Business Practices

“The great thing about Cypher and Neo4j is that you can start working with them easily, even without knowing everything about them,” said Duncan Grant, EMEA Sales Engineer at Cambridge Intelligence. Grant first became familiar with Neo4j when he started working for Pitney Bowes. H ...

Don’t Make Perfect Security the Enemy of Good Security

We’ve written before about what it means to meet compliance standards without going completely overboard. Today, we want to talk about how that applies to cloud security as well. Some teams mistakenly believe that their security posture needs to be absolutely perfect. That’s not only overwhelmi ...

Making it Easier to Get Started With IoT

The Internet of Things (IoT) is everywhere and you might have finally decided it is time to give it a go. Starting out might not be as easy as you think, as IoT is fast-changing, with new features and things being added and old protocols removed from the framework. To help you out, here are a few th ...

The Benefits of Hybrid Cloud

When analyzing current trends, it is clear that social and mobile are more likely to create an impact on the buyer engagement fashions. As a result, companies have a need to remodel accordingly to adapt to change. With all these changes, companies need to ensure the continuity of enterprise function ...

Sneak Preview of NativeScript 3.0

Now that NativeScript 2.5 is out, we'd like to share more information about our next release - version 3.0 - which is expected to land mid-April. This is a major release with significant performance improvements, numerous fixes, and important new features that we believe our community will ...

Box's Seamless Approach To API Documentation

The document platform Box updated their developer efforts recently, helping push forward the definition of what API documentation can be. I've long been advocating moving APIs out from the shadow of the developer portal making them more seamless with any UI, kind of like CloudFlare does with th ...

5 Code Review Tricks the Experts Use - Based on 3.2 Million Lines of Code

Getting Started with Code Reviews: Here are a Few Tips to Help You do it Right One of the work methods you’ll find in a growing number of companies is code reviews. While some might not like the idea of co-workers going through their code, others embrace it as a way to grow, learn, or simply prove h ...

Word Count With Storm and Scala

Apache Storm is a free and open-source distributed realtime computation system running on the JVM. To get started, we will implement a very simple example. Previously, we implemented a word count Hadoop job using Scala and uploaded it to HDInsight. We will focus on the same word count concept, ...

Review of Codeless Tools for Easy Automated Testing

In this article, we will be reviewing alternatives to Selenium WebDriver. The reason why some companies actually prefer to use enterprise solutions instead of Selenium is due to stability concerns and long-term development. Actually, I was surprised to find out that most Fortune 500 companies use co ...

Firebase Storage Using AngularJS

Recently, we got an awesome post about Firebase and how to use the real-time database with AngularJS. If you missed it here you go the link. Today, I want to talk about another useful feature of Firebase: an amazing tool that allows us to store and serve user-generated content, such as photos o ...

Your Next Steps If Your AppSec Program Is in the Reactive Stage

This is the first blog in a series that will look at each stage of an application security program’s maturity and outline what the next steps are to move toward an advanced program. We typically see organizations fall within one of these four stages of application security:

Theo 3.0 Release: The Swift Framework for Neo4j

Theo, the Swift framework for interfacing with Neo4j, is now available in version 3.0. With this version, Theo gets full support for Swift 3, Linux support, and better integration with popular package managers. This is on top of features you already expect, like CRUD operations for nodes and re ...

Creating Custom JDK9 Runtime Images [Video]

For a brief overview of how to take advantage of a new feature in JDK9, namely the ability to create custom runtime images, please view the YouTube video that follows. As an addendum to this video, a recently published blog explains how the creation of runtime images can be automated inside a NetBea ...

Setting Up ReactJS Environment With ES6, Webpack, and Babel

ReactJS developed by Facebook is a JavaScript library for creating large application user interfaces having continuous data changes. React is basically the V in MVC. Why ReactJS? ReactJS is very simple to implement because of its simple syntax and architecture as compared to the competitors. Comp ...

AWS/Terraform Workshop (Part 2): EC2 Networking, Autoscaling Groups, and CloudWatch

If you're just joining us for this series, we're seeing how AWS and Terraform can work together to enhance your environment and infrastructure. Before we dive in, you should make sure you take a look at the following: Go through Workshop #1 Amazon AWS EC2 Networking:  Regions and Avai ...

Migrating Your MongoDB With a Mongoose RESTful API to Couchbase With Ottoman

When talking to Node.js developers, it is common to hear about NoSQL as the database of choice for development. JavaScript and JSON come hand in hand because after all JSON stands for JavaScript Object Notation. This is a format most common in document oriented databases which Node.js developers ten ...

Dataweave and the Reduce Operator: Part II

This post is a continuation of the series in which I am explaining the usage of the reduce operator of DataWeave. In this post, I will be explaining how to perform :array to :object transformations. This type of transformation cannot be done using the map oper ...

SHA1 Is No Longer Recommended, But Hardly a Failure

The web is all abuzz about how SHA1 is “broken”, “a failure,” “obsolete”, etc. It is supposed to be computationally impractical to create two documents that have the same secure hash code, and yet Google has demonstrated that they have done just that for the SHA1 algorithm.

Friction in Software

Friction can be a very powerful force when building software. The things that are made easier or harder can dramatically influence how we work. I’d like to discuss three areas where I’ve seen friction at work: dependency injection, code reviews, and technology selection. DI Frameworks A few years ag ...

Ushering in a New Tech Era for Geospatial Data

The rapid evolution of geospatial technologies brings to mind a Yogi Berra quote: “When you come to a fork in the road, take it.” Berra made the remark while giving directions to his home. Either choice would take you to Berra’s home in the same amount of time. Like many “Yogi-isms” that blended wis ...

Problems Being Solved By IoT

To gather insights on the evolution of IoT to this point in 2017, we spoke to 19 executives who are familiar with the current state of the Internet of Things.  We asked them, "What real-world problems are being solved by IoT?" Here's what they told us:

How to Set Up a Continuous Delivery Environment

With the increasing popularity of microservices, more and more is being said about Continuous Delivery. There are many interesting books and articles about that subject. There are also many tools and solutions that can help set up a Continuous Delivery environment. The main purpose of this article i ...

An Introduction to Functional Programming in Java 8 (Part 3): Streams

In the last part, we learned about the Optional type and how to use it correctly. Today, we will learn about Streams, which you use as a functional alternative of working with Collections. Some method were already seen when we used Optionals, so be sure to check out the part about Opt ...

Creating a Word Document OutputFormatter in ASP.NET Core

In one of the ASP.NET Core projects we did in the last year, we created an OutputFormatter to provide Word documents as printable reports via ASP.NET Core Web API. Well, this formatter wasn't made by me but by my colleague Jakob Wolf at the yooapps.com. I told him to write about it, but he hadn ...

Sprint Cadence (At Scale)

A System Called ‘Scrum’ Scrum implements empirical process control. Scrum mitigates risk and optimizes value through regular inspections and adaptations in a closed-loop feedback system. Taking a step back shows that the overall input to the system called ‘Scrum’ is a stream of options, ideas, possi ...

Feature Intersection Bugs Are the Hardest to Predict

This post is the story of RavenDB-6230, or as it is more commonly known, “creating auto-index on non-existent field breaks querying via ID.” It isn’t a big or important bug and it has very little real world impact — but it is an interesting story because it shows one of the hardest things that we de ...

Security Testing Tools You Need To Know About

What Is Security Testing? Security testing is performed to determine whether the data within an information system is protected, and the anticipated functionality is sustained. Security testing assures that the following aspects of data and information are maintained at any cost: Authentication ...

The Essence of Mobile DevOps Is to Destroy Silos

Mobile DevOps is a practice of bringing the different disciplines involved in developing, testing, releasing, and operating software into being functional inside organizations or by a team that works closely together. By bringing together developers (Dev) and operations (Ops), the team is able ...

MySQL Bug 72804 Workaround

In this blog post, we’ll look at a workaround for MySQL bug 72804. Recently, I worked on a ticket where a customer performed a point-in-time recovery (PITR) using a large set of binary logs. Normally, we handle this by applying the last backup, then re-applying all binary logs created ...

35+ Examples of Regex Patterns Using sed and awk in Linux

In order to successfully work with the Linux sed editor and the awk command in your shell scripts you have to understand regular expressions, or regex for short (and to be accurate in our case, it is bash regex). Though there are many engines for regex you can use, I've deci ...

Dynatrace Identifies Root Cause of Problems for ZoomInfo

I had the pleasure of talking to John Robinson, IT Architect for ZoomInfo. John joined ZoomInfo about 18 months ago and when he came on board he saw the need for a tool that would enable he, and rest of the IT team, to quickly determine the source of a problem if a client was not able to access and/ ...

What Is Content-Based Routing With Mulesoft?

Content-based routing is used to examine messages and route them to the correct channel or destination depending on a message's content. You should always use content-based routing when you want to route messages to the correct destination. Routing can be based on various criteria like the exis ...

Big Data Concerns

To gather insights on the state of big data today, we spoke with 22 executives from 20 companies who are working in big data themselves or providing big data solutions to clients.  Here's what they told us when we asked, "What are your biggest concerns regarding the state of big data today ...