• ?
  • Rexistro

Dzone

Software Delivery Excellence – a Bird's Eye View on The Process

Making a timely decision during software development is an important aspect of software delivery. Some of the important stages of the software development cycle are: Requirement finalization UI prototypes Design Development Testing Deployment Let’s discuss important processes that ...

Mixins Via Kotlin Delegation

The State of the Inheritance Union When Java 8 arrived, interfaces could be fitted out with default methods. This freed developers from having to repeat implementations across classes and enabled you to achieve multiple inheritance of behavior. As compelling as this advancement is, this cannot addre ...

Introducing Azure Logic Apps Integration Service Environment (ISE)

Introduction In the recent Consumption vs. Dedicated Billing Models, we discussed an upcoming capability within Azure Logic Apps called Integration Service Environment, or ISE for short. In this article, we are going to dive deeper into ISE and identify some of the opportunities for organizations w ...

Practical DNS

Introduces DNS and explains how DNS works, DNS configuration, security, and common problems, in order to get you up and running quickly, safely, and reliably.

Reviewing My Year in DZone Articles

As we reach the end of the year, I have been looking back at the 34 articles I published on DZone this year. I’m lucky: I love my job and it's been a pleasure to write them. I hope you have enjoyed reading them! Since my day job involves data analysis, I spent some time checking on the statistics fo ...

Auditing Open Ports in AWS EC2 Security Groups Using AWS Console [Comic]

Even as we think of regular security audits, sweat droplets pour out of the forehead. AWS EC2 Security Groups open to 0.0.0.0/0 are known nightmares. If there are hundreds of instances running on your AWS cloud, auditing for open ports ‘0.0.0.0/0 allow` rule on AWS EC2 Security Groups ...

Topology-Based Event Correlation With Apache Spark Streaming

Let’s consider a network of devices emitting real-time events. It could be a telecommunication network with equipment sending health signals, or it could be an IoT network sending telemetry data. The question is: how can we enrich the information delivered in the events with the knowledge about topo ...

Get Your First Application on Kubernetes

This article talks about the technical details on deploying your first application on Kubernetes. What Is This Application? This is a very simple Node.js application. This application exposes a GET endpoint "/", and when invoked will return "Hello World" message!

What Happened When 500 Atlassians Worked Remotely for A Week

Like most companies, Atlassian has a mixture of people who are working from home full-time (like me) and those who grab an ad-hoc day when the plumber is coming or they can't stop sneezing. But our collective WFH muscles got a major workout recently when 500 of us went remote during the we ...

Putting Streaming ML Into Production

Productionize Streaming ML So you've done all the work in your hosted Jupyter or Zeppelin notebooks and you are ready to deploy for real production Machine Learning and Deep Learning use cases. What do you need to do and think about beforehand? There are some common features that every system will n ...

Database Continuous Integration With SQL Clone and SQL Change Automation

When you are working as part of an application development team, it is worth settling down into a routine of doing a daily build from source control, and then provisioning test and development instances of the database. One major advantage is that the code and database can be scrutinized as early as ...

IoT and Food Waste: Have You Eaten All Your Food Today?

Food waste is a major challenge today. Over the years, many studies have been conducted to draw our attention and highlight the impact of food waste globally. It is a fact that the need for food production will be increased in order to meet the demands of global population growth. However, technolo ...

New User Empathy

This blog post will focus on the situation for Haskell, though the ideas likely generalize well to other languages, or even to non-programming disciplines. I’m simply speaking to the topic I have the most experience with. Many people will make claims that a certain decision needs to be made “for new ...

5 Awesome Tips for Super Productive Meetings

Peacefully sitting at your workstation and you suddenly get a notification for another meeting. That’s right! Another long, boring, unproductive that makes you wish for a magical teleport machine to help you depart from there. Often times, during a meeting, you’re just questioning yourself as to why ...

Let's Chunk

There is huge amount of JavaScript libraries that give us all kinds of functionality – DOM manipulations, AJAX calls, animations, DB querying, you name it. There is a library (and usually more than one) for everything. All those functions provided by the libraries can be done, of course, in pure Jav ...

Top 20 Cloud Computing Service Providers

Cloud computing companies are sprouting up faster than flowers in springtime. The surest sign of a new industry is a plethora of startups, and that is certainly the case in the cloud computing industry. But after cloud computing’s first decade, there are two distinctly different truths – regardless ...

These Silent Fixes Are Silent Killers in Open-Source Security

When it comes to open-source software, it’s natural for development and security leaders to want to know that the code they’re using is secure. Historically, they’ve relied on traditional software composition analysis solutions and the National Vulnerability Database to mine for open-source issues. ...

Atrous Convolutions and U-Net Architectures for Deep Learning: A Brief History

A Turning Point for Deep Learning Every once in a while a new tool is developed that is so much more effective than what was previously available that it spreads through people and their endeavors like a wild fire, permanently altering the landscape that came before. Deep Learning is one of those ...

Key Differences Between Apache Ignite, Hazelcast, Cassandra, and Tarantool

Apache Ignite is widely used around the world and is growing all the time. Companies like Barclays, Misys, Sberbank (3rd largest banks in Europe), ING, JacTravel all use Ignite to power pieces of their architecture that are critical to the day-to-day operations of those organizations. Moreover, the ...

Introduction to Project Lombok

Project Lombok is a boilerplate code remover and space saver that generates code in ".class" file instead of in the source code file. In this article, I will try to explain why Lombok is so popular and its implementation with a step-by-step example. Introduction Project Lombok is a Ja ...

How the SQLite Database Works

Introduction A database is an essential part of building a software system, which used to store and read data efficiently. Here, we are going to discuss some architectural details of database implementation by using an early version of SQLite. SQLite is a small database application that is used in m ...

API Security Weekly: Issue #10

Vulnerabilities Another API vulnerability has been found in Google+ (we reported on the previous one in our first newsletter back in October). Turns out that an update that Google rolled out in November put user data at risk because permissions were not properly enforced. The API could provide acces ...

Kubernetes News: High Severity Vulnerability Discovered

In case you haven't heard already, a major security flaw in Kubernetes has recently been discovered — one that has a CVSS score of 9.8. CVE- 2018-1002105, a Privilege Escalation flaw, can potentially enable attackers to gain remote access to parts of a Kubernetes cluster through an API Server and pe ...

JPA, HTML, and MySQL Code Generation in One Minute

With the current trends in the software development field, agility and faster delivery of software applications have become an important part of the IT industry. In fact, this has been one of the main reasons for the evolution of many of the modern technologies and trends, such as single page applic ...

Postmodern Agile: A Story of Collaborating Beyond Buzzwords

The Product Owner (PO) arrives in the team room first thing in the morning. The team is already all there. “Yesterday you delivered the ability to start capturing the date of birth for our library patrons,” the PO says to the team. “It looks like it works great; thank you. We now want to make this f ...

Friends Don't Let Friends Add Options to Code

Sometimes, when trying to make it easier to work in an application, our instinct is to add optional features that users can enable if their situations require a specific functionality. Our intentions may be good, but these actions can actually cause more problems, since we invite users to second-gue ...

HDP 3.1 Released! All The Kafka!

The upgrade documents to use can be found here. I was able to quickly and easily upgrad from HDP 3.0.1 to HDP 3.1. This is the stable release you were looking for. This is the new Dockerized platform you need.

DZone Research: IoT Use Cases

To understand the current and future state of IoT, we spoke to more than a dozen IT executives active in the space. Here's what they told us when we asked, "What are a couple of IoT use cases you'd like to highlight?": 1) Home automation: connects devices securely to a hub or mobile app, ...

JVM Calendar: Coder's Little Helper

We all know that feeling: time is of the essence. Deadlines, quality time with your loved ones, and still time for toy projects to keep yourself up-to-date — everything demands time, but the day can’t offer us more than 24 hours. And don’t get me started on sleep. But wait, there is more. Our reposi ...