• ?
  • Rexistro

Dzone

Fixing Your Microservices Architecture Using Graph Analysis

Editor’s Note: This presentation was given by Nicolas Mervaillie at NODES 2019 in October 2019. Presentation Summary So for your brand new project, you decided to throw away your monolith and go for microservices. But after a while, you realize things aren’t going as smoothly as expected.

Built-In, Not Bolted-On—What It Takes To Build-In Info Security

Introduction Application security is more critical now than ever before.  Given the increasing trend of remote access to applications and online transactions by end-users the attack vector is growing larger.  And with undetected vulnerabilities, the applications face the potential risk of ...

How to Setup/Install MLFlow and Get Started

In this post, you will learn about how to setup/install MLFlow right from your Jupyter Notebook and get started tracking your machine learning projects. This would prove to be very helpful if you are running an enterprise-wide AI practice where you have a bunch of data scientists working on differ ...

How to Build IoT Infrastructure and App Using AWS IoT

There are numerous IoT platforms available in the market that can help you handle the challenges of building IoT applications. But, it is vital to choose a suitable and effective platform to create such diverse applications. Amazon Web Services IoT platform is one of the most sought-after platforms ...

Inversion of Control (IOC), Dependency Injection (DI) Oversimplified

Introduction IOC and DI are very useful patterns that are used in almost every production project. But, for me personally, they are pretty misleading and difficult concepts to understand. Here, I'll example what both of them are and implement a simplified proof of concept.  Inversion of Control ...

What Are Garbage Collection Logs, Thread Dumps, and Heap Dumps?

Java Virtual Machine (JVM) generates 3 critical artifacts that are useful for optimizing the performance and troubleshooting production problems. Those artifacts are: Garbage collection (GC) log Thread Dump Heap Dump In this article, let's try to understand these 3 critical artifacts, where to ...

API Security Weekly: Issue #107

This week, we check out three API vulnerability reports for Waze, Amazon Web Services (AWS), and the UK NHS COVID-19 app. In addition, the new Forrester study of the technologies constituting application security as of Q4 2020 has been published. Vulnerability: Waze Remember the fun “other cars” ico ...

How to Reduce Docker Image Size

If there are top ten buzzwords in the technology industry in the year 2019, the container is sure to be one of them. With the popularity of Docker, more and more scenarios are using Docker in the front-end field. This article shows how do we use Docker in the visualization interface of Nebula Graph, ...

7 Best Log Management Tools for Kubernetes [2020]

You may be wondering why you should bother with Kubernetes' log management tools? Kubernetes dominates the container orchestration market and is often used to host microservices. Each instance of a microservice generates large numbers of log events that can quickly become difficult to manage.   ...

CI/CD Pipeline: Seven Tips for Success

Continuous integrations and deployments are key elements to a company's success in releasing software actively in the multifold. It is common in a small engineering team that only one person has the knowledge to package up the project to release and distribute. Building a system with one engine ...

Java CI/CD: From Local Build to Jenkins Continuous Integration

This post is part of a series that demonstrates a sample deployment pipeline with Jenkins, Docker, and Octopus: From JAR to Docker From local builds to Continuous Integration From Continuous Integration to Kubernetes deployments From Continuous Integration to release management From rele ...

Java CI/CD: From Continuous Integration to Release Management

This post is part of a series that demonstrates a sample deployment pipeline with Jenkins, Docker, and Octopus: From JAR to Docker From local builds to Continuous Integration From Continuous Integration to Kubernetes deployments From Continuous Integration to release management From rele ...

RBAC for SSH and Kubernetes Access With Teleport [Webinar Sign-up]

Enterprises are best served by leveraging an RBAC system to manage access to their SSH and Kubernetes resources. With Teleport, an open source software, employers are able to provide granular access controls to developers based on the access they need and when they need it. This makes it possible fo ...

Performance Optimization Techniques

Performance is an integral part of the Application design and plays a vital role in the success of your product/application. This is Part-2 of the performance optimization articles series. Performance optimization considerations for an enterprise-level application are discussed as part of Part-1. Be ...

12 Factor App Principles and Cloud-Native Microservices

12 Factor App Principles and Cloud-Native Microservices A 12-factor app is a methodology or set of principles for building scalable and performant, independent, and most resilient enterprise applications. It establishes the general principles and guidelines for creating robust enterprise applicat ...

Terraforming Your Cloud Infrastructure The Right Way

"Greenfield" vs "Brownfield" Projects In IaaC According to many authors, software architectures come from two different types of projects. In the first place, there are the "Greenfield" projects. Which are brand new projects; this means the software engineering team starts implementing the architect ...

How to Deploy a Spring Boot App to AWS Elastic Beanstalk

In this post, we are going to explore how we can deploy a simple Spring Boot application to AWS Elastic Beanstalk. We will explain how to setup an AWS account and provide a step-by-step guide how to deploy to AWS. 1. Introduction AWS provides numerous services and in the beginning it is difficult to ...

[CSF] Raspberry Pi Podcasting Station

I began my writing career armed with an English BA and a minor in creative writing. My first ever paid writing gig was as a film critic. While I continue to cover cinema, tech media pays the bills. But I took a bit of a roundabout method of segueing into technology journalism. As a lifelong tinkerer ...

On-Premise to Cloud Migration: 4 Key Challenges in Becoming Cloud-Native

83% of enterprise workloads is going to move to Cloud by the end of 2020. It indicates that businesses are releasing the importance of deploying workloads in the cloud and are migrating applications from on-premises to the cloud. The dynamic nature of the cloud platf ...

Deploy and Auto Scale Isolated Workloads Across Multiple Zones

With the Auto Scale for VPC, you can create an instance group to scale according to your requirements. Based on the target utilization metrics that you define, the instance group can dynamically add or remove instances to achieve your specified instance availability. Let's start with a ...

14 Simple Ways to Be More Productive Every Day

Early in my career, I placed a lot of focus on doing more in less time. I thought I was being productive. The reality was I was simply scrambling from one task to the next without clarity on whether my work was effective or how I could do better. I focused on the end goal, the result I wanted to ...

A Dummies Guide to Building APIs in Low-code

Building an API Can Be Easy if You Have the Right Approach Building a fully functional REST API from the ground up is a large project for any developer, and even more challenging for IT professionals unfamiliar with the nuances of how APIs are coded, deployed, and maintained.  A low-code develo ...

Mulesoft 4: Continuous Delivery/Deployment With Maven

The main aim of this article is to provide a standard mechanism to release project artifacts and deploy to Anypoint Platform, from the local machine or configure in continuous delivery pipelines. Normally multiple people involved in the deployment process, one team/team member may handle check-in o ...

The Cloud Is Booming, so Is the Cloud Spending

Cloud waste is proving to be a major hurdle for CTOs and CEOs. According to DevOps.com, enterprises will waste more than $17 billion in cloud spend on excess and idle resources in 2020. Most organizations opine that almost 40% of their cloud spend is buried into unused and over-provisioned infrastru ...

How to Resize a Video in Java

With the vast genres of online media platforms, like social media, online video sites, and more, there are more opportunities than ever before to share your products and content globally. With websites like YouTube, Twitter, and Facebook, and apps like Snapchat and Instagram, your organization’s rea ...