IES San Clemente
  • entrar
  • ?
  • Rexistro

informática

novas rss: dzone

Enum: Using the Name() and toString() Methods Correctly

The Java Enum has two methods that retrieve that value of an enum constant, name() and toString(). The toString() method calls the name() method, which returns the string representation of the enum constant. In listing 1, the value returned by calling the name() and toString() on an Animal.DOG const ...

Malicious Libraries Found on Python Package Index (PyPI)

Malicious code has been found on the Python Package Index (PyPI), the most popular location for sharing Python packages. This was reported by Slovak National Security Office which was then picked up by Bleeping Computer among other places (i.e. Reddit). The attack vector used typosquatting, which is ...

Quantifying Privacy Loss in a Statistical Database

In the previous post, we looked at a simple randomization procedure to obscure individual responses to yes/no questions in a way that retains the statistical usefulness of the data. In this post, we'll generalize that procedure, quantify the privacy loss, and discuss the utility/privacy trade-off. M ...

Automated Canary Releasing With Vamp and Jenkins on DC/OS: Part 2

In the first part of this series, we set up our Vamp and Jenkins environments on DC/OS and did our first deploy. If you want to follow along and try out the code examples, you can, however, also read this part to get a general impression of how canary releasing can work for you. In this pa ...

Should a Scrum Master Be Technical?

In a couple of short blog posts, I’ll share the most common questions I get asked during the Scrum.org Professional Scrum Master courses. I’ll focus on the Scrum Master role and will provide an answer based on my personal experience as a Scrum Master. This for sure isn’t the ultimate answer, it’s ho ...

Custom Kestrel Transports

With .NET Core 2.0 finally coming out of preview I felt like now was a good time to share one of my preview experiments with everyone. Custom Kestrel Transports! Before we begin, the source code for this preview experiment can be found here:

The Cybercrime Epidemic

Each day, the threat SMBs face while operating in the digital sphere grows. What’s changing isn’t the act of cyber-crime itself, but rather, the way the cyber-crimes are being committed. SMBs are at an immediate disadvantage when it comes to resources and having the appropriate measures in place to ...

Java Command-Line Interfaces (Part 14): google-options

The GitHub page for google-options states that google-options is a "command line argument parsing library from the folks at Google (Java)." The page goes on to say, "This is the command-line arguments parser from the Bazel Project. The com.google.devtools.common.options package has be ...

The Art of Orchestration

In the fast-paced world of digital services, speed and agility are everything. You, your team, and your beautiful crafted application are the musicians playing the sound of cloud natives. To succeed, you need orchestration on all levels of your organization and technology stack. This blog post gives ...

Anomaly Detection Using the Bag-of-Words Model

I am going to show in detail one use case of unsupervised learning: behavioral-based anomaly detection. Imagine you are collecting daily activity from people. In this example, there are six people (S1-S6). When all the data are sorted and pre-processed, the result may look like this list: S1 ...

The Biggest Change in the Industry Since I Started API Evangelist

I am spending two days this week with the Capital One DevExchange team outside of Washington DC, and they’ve provided me with a list of questions for one of our sessions, which they will be recording for internal use. To prepare, I wanted to work through my thoughts, and make sure each of these answ ...

CORS and OpenWhisk Web Actions

By default, OpenWhisk will handle the relevant responses for CORS. Specifically, it will respond to an OPTION request with these headers:

Comprehensive Data Platform Accelerates App Development and Deployment

Thanks to Paul Grabscheid, V.P. of Strategic Planning at InterSystems for speaking with me about the new InterSystems IRIS Data Platform®, which is designed to help developers build the solution to do more with analytics more quickly and easily. InterSystems IRIS is the first data platform to pr ...

What Is an Agile Retrospective?

A Retrospective (aka Retrospect Sprint Meeting according to SBOK™ guide 2016) is one of the most important ceremonies that you can implement in your SDLC if you’re going Agile. One of the main ideas behind Agile is being able to respond to changes. And for doing that the only way you can do it right ...

How to Create a Cypher Map With Dynamic Keys

I was recently trying to create a map in a Cypher query but wanted to have dynamic keys in that map. I started off with this query: WITH "a" as dynamicKey, "b" as dynamicValue RETURN { dynamicKey: dynamicValue } AS map ╒══════════════════╕ │"map" │ ╞════ ...

The Business Value of CD

Continuous delivery allows you to deliver new software and update existing software faster, with lower risk. Reducing risk is important, but the processes that underpin continuous delivery translate into even more important values to the business:

Usability Testing: Moderated or Unmoderated? Part 1

The best way to evaluate the user experience of a product is by testing it with users. Observing people trying to perform tasks in the interface gives you the best understanding of how well it works and what problems need to be fixed. However, usability testing can be moderated or unmoderated. Wha ...

How Android Fragmentation Complicates Application Quality

When there are more than 24,000 unique Android devices, fragmentation favors the consumer who loves choices but creates a massive headache for developers. Android fragmentation map (source: OpenSignal).

Chatbots and Cybersecurity: New Security Vulnerabilities and Solutions

Chatbots are becoming increasingly popular. The White House even produced an Obama Facebook chatbot. While they’re convenient for many reasons, they also bring up a variety of new security vulnerabilities. Any company taking advantage of them must be able to provide adequate security or they could b ...

Testing Time-Based Reactor Core Streams With Virtual Time

Reactor Core implements the Reactive Streams specification and deals with handling a (potentially unlimited) stream of data. If it interests you, do check out the excellent documentation it offers. Here I am assuming some basic familiarity with the Reactor Core libraries Flux and Mono types and will ...

Why We Should Consider "Virtue" as a New "V" for Big Data

Remember when "big data" meant a terabyte or so? If you don't, I suspect I know why — you blinked... and you missed it. It's hard to believe there was a time when the total volume of customer data coursing through the networks of United Airlines was a couple terabytes. Today, a decent desk ...

Tips on Using Customer Data in SaaS Solutions

If you’re a SaaS solution provider, you’ve got something that your customers want… but you may not even know it. Data.

What’s New in Swagger/OpenAPI 3?

On July 26th 2017, the OpenAPI Specification (OAS) v3 was released. OpenAPI 3 is the successor of the widely used OpenAPI/Swagger 2.0 format, for machine-readable API definitions. It contains a variety of changes, and even though everything that can be expressed in Version 2 is supported in Version ...

Database Fundamentals #11: Why Learn T-SQL?

If you've been following along with the previous 10 Database Fundamentals blog posts, you have a SQL Server installed and a database with a table in it. You may have more if you've been practicing. Now would be the time to start adding data to the database, but first, I want to talk about the impo ...

New Partnership Delivers Enhanced Driver Sensing

As we move inexorably towards a driverless future, each new generation of motor car comes equipped with an ever more extensive array of sensors and devices to make driving easier. A sign of the direction of travel comes via a recent partnership between product solutions company Jabil and comput ...

Eclipse Mosquitto MQTT Server in the Cloud

Nowadays, MQTT is one of the most widely used protocols for IoT deployments. It utilizes a lightweight publish/subscribe messaging model, which is optimal for machine-to-machine (M2M) connectivity, especially in conditions of low network bandwidth and/or limited resources. Herewith, the base of ...

Android 8.0 Oreo: Features and Updates You Need to Know

Android 8.0 Oreo is now OFFICIAL!! It is said to be faster and more powerful than ever. Let's take a look at the new features and enhancements in Android 8.0. Power Saving and Quicker Boot Time Oreo has put limits on app background activities, which will increase users' battery life and performance. ...

10 Timeline Makers to Keep Track of Development Projects

Timelines are key parts of all plans. If you are engaged in teamwork on a project, you and team members have tasks. Tasks, in their turn, have start and end dates as well as dependencies. All these elements constitute a timeline maker. But let’s first figure out what a timeline is.

Creating a REST Web Service With Java and Spring (Part 1)

In the modern world of interconnected software, web applications have become an indispensable asset. Foremost among these web applications is the Representational State Transfer (REST) web service, with Java becoming one of the most popular implementation languages. Within the Java REST ecosystem, t ...

Understand User Metrics for Network Performance Monitoring

Metrics are meaningless. Well, that's not quite true. Raw metrics, when it comes to IT monitoring, are just numbers that don't tell you anything. A number may seem high, but not result in any problem visible to end users. Another number may seem low, but not be as low as SLAs require. The only way t ...

SOLID Principles by Examples: Open/Closed

This post continues the analysis of the SOLID principles started some blog posts ago. This is the turn of the Open Closed Principle (OCP). The Definition "An object/entity should be open for extension but closed for modification."

Project Comprehension: Understanding Java Projects Efficiently

Let's start with a bit of theory. A modern Java application is a complex system that frequently operates as a node in a larger enterprise network. By the time a new developer joins the team, the project will likely have been in development for a couple of years and contain code contributions from do ...

Choosing Between an In-Memory and a Traditional DBMS

In this article, I’ll talk about when I use an in-memory database (IMDB) and when I prefer a traditional DBMS (RDBMS) and why.  

Production Monitoring: See What Your Users Are Seeing

Last week, I had the opportunity to speak to a large fast food chain, over 1,000 locations in North America. The revenue is split between users coming in vs. those ordering take-out. They have an operations-oriented reactive monitoring solution today. The thing is, with a slightly elderly infrastruc ...

Learn React.js a Little at a Time, Part 1

Smashing Boxes encourages us to find better ways to deliver high-quality products. One of the ways we do this is learning and trying new technologies. Over the past several months, developers at Smashing Boxes began experimenting with REACT.JS. It’s one of those technologies we’re excited about. Wit ...

H2O AutoML Examples in Python and Scala [Code Snippets]

AutoML is included in H2O versions 3.14.0.1 and above. You can learn more about AutoML here. H2O AutoML can be used to automate a large portion of the machine learning workflow, which includes automatic training and tuning of many models within a user-specified time limit. The user can also use ...

A React App Done Right

React is all the rage right now. And since Smashing Boxes is always all the rage, we decided that we should start using React. It all began in Smashing Labs, our weekly innovation time, when a few developers started making small apps using React. It didn't take long before we realized it had a LOT o ...

The Minimal REST Client and Server

REST applications lie at the heart of microservices and Spring Boot obviates a lot of configuration code. This naturally begs the question: What is the minimal amount of code you have to write for a REST microservice? The answer turns out to be: Nothing or nearly nothing. We demonstrate this by work ...

The Ultimate List of C# Tools: IDEs, Profilers, Automation Tools, and More (Part 2)

Here, we’ve gathered together the second half of our list of the biggest players in the C# development space. 23. FinalBuilder @FinalBuilder

How to Streamline Query Times to Handle Billions of Records

Here at Sisense, we love a challenge. So when a client comes to us and tells us they need to find a way to run queries on billions of records without this slowing them down, our ears perk up and we leap at the chance to find a solution. In fact, that’s how we recently found ourselves testing a billi ...

How Do I Create More Secure Apps?

Thanks to Ed Adams, CEO of Security Innovation for sharing his thoughts on the state of IT security today. Q: How is your company involved in security?

Using Multiple Memory Regions With the FreeRTOS Heap

ARM Cortex-M microcontrollers can have multiple memory controllers. This is a good thing, as it allows the hardware to do multiple parallel memory read/writes. However, this makes the memory map more complicated for the software: It divides the memory into different regions and memory segments. This ...

How to Create Insight Into Your Product Backlog

One of the important tasks of a product owner is to prioritize the backlog to deliver value. To cite the Scrum Guide "The product owner is the sole person responsible for managing the Product Backlog." In order to be able to prioritize, the product owner must first have insight into the ba ...

A Preview of Linux Containers on Windows

Microsoft is getting ready for the next big update for Windows Server (check out this recent complementary Microsoft blog post) and some of the new features are very exciting for Docker users. One of the most important enhancements is that Docker can now run Linux containers on Windows, using H ...

Reactors.io: Actors Done Right

In our previous blog, we tried to explore the upcoming features of Java 9. So this time, we will focus on Scala. In this article, we will be looking into a new Reactive programming framework for Scala applications — Reactors.io. Reactors.io fuses the best parts of functional Reactive programmin ...

Smoothing Out the Rocky Road to Personalization (Part 3)

dotCMS is an open source, enterprise Java CMS built from the ground up both to use open-source Java standards and to allow you to easily use your own Java code to override or extend dotCMS functionality. Although dotCMS was explicitly designed to make it easy to extend the functionality with your ow ...

Java Application Vulnerabilities

Java Applications, like any other, are susceptible to gaps in security. This Refcard focuses on the top vulnerabilities that can affect Java applications and how to combat them.

Shift-Left Your Safety-Critical Software Testing With Test Automation

We are in a cost crisis with safety-critical software, which means that the increased functionality required has grown beyond the ability to pay for its development. The Boeing 787 program, for example, required 6.5 million lines of code, which cost $4,000,000,0000 to design, develop, and test. Th ...

The MySQL High Availability Landscape in 2017, Part 3: The Babies

This post is the third of a series focusing on the MySQL high availability solutions available in 2017. The first post looked at the elders, the technologies that have been around for more than ten years. The second post talked about the adults, the more recent and mature technologies. In this po ...

Building Regression and Classification GBM Models in Scala With H2O

In the full code below, you will learn to build H2O GBM models for regression and binomial classification in Scala. Let's first import all the classes we need for this project: