News AggregatorAI Protection: Securing The New Attack FrontierAggregated on: 2025-04-02 22:43:18 We’re amidst a paradigm shift in society where many product verticals are being reimagined through an ‘AI-first’ architecture. An AI-first architecture is one where much of the core business logic is driven by AI, and the product is architected to fully exploit the capabilities of the underlying AI models. A striking example is IDEs; intelligent editors such as Cursor have quickly gained popularity in the software community. Countless startups have emerged to challenge well-established experiences (email, online shopping, real estate, to name a few) with AI-first alternatives. This promises not only an exciting future but also a more dangerous one. Traditional attack paths are outmoded under the new regime of AI-centric architectures. In this article, we discuss novel attack paradigms that AI-first architectures are vulnerable to and how companies operating in this space can defend against them. View more...Create Your Own AI-Powered Virtual Tutor: An Easy TutorialAggregated on: 2025-04-02 22:43:18 It is a very powerful world with AI being a thing. Now you can have a tutor who never gets tired, who doesn’t roll their eyes at your dumb questions (we all have them, I do admit it), and who is available 24/7 — no scheduling problems, no coffee breaks, just straight knowledge on demand. That’s the magic of AI-based tutors. But before we start dreaming about how AI could replace your least favorite professors, let’s first discuss how to build one. As someone who has tinkered with AI models for countless hours (and broken them here and there), I have been somewhat obsessed with the notion of an AI tutor. In this guide, I’m going to take you through the main components needed to build one for yourself — from natural language processing (NLP) to knowledge graphs and adaptive learning models. No, this is not a plug-and-play recipe, though it will provide you with a strong road map for your path. View more...From Engineer to Leader: Scaling Impact Beyond CodeAggregated on: 2025-04-02 21:58:18 Back in college, I thought that technical excellence was everything. But after a decade in the tech industry, I've learned that leadership requires a completely different mindset. One day you're sitting there writing code and shipping features, and suddenly you're making project plans, helping your teammates, and thinking about the bigger picture. Moving from being an IC to a tech lead can feel like a big and uncomfortable jump. Let me share what I've learned about growing beyond just coding through some real examples from my journey. View more...Practical Use of Weak SymbolsAggregated on: 2025-04-02 21:28:18 In today's software development, flexibility, maintainability, and performance are paramount, especially in systems software programming, embedded systems development, and library design. A lesser-known technique, yet a powerful tool to achieve these goals, is the weak symbol. For developers building frameworks and platform libraries, weak symbols provide a clean way to define default behaviors and enable optional functionality — all without complex build configurations or runtime hacks. Let’s explore what weak symbols are, how they work, and where they can unlock better architecture patterns. View more...Seamless Security Integration Strategies in Software DevelopmentAggregated on: 2025-04-02 19:13:18 During the software development, builders face challenges between building a better product faster versus dealing with various responsibilities that come with software development. Getting security right is one of them. Due to the increased cyber attacks, organizations started focusing on security, which resulted in developers spending more time in security-related activities in recent years. This brings up the critical need for integrating security practices in the software in the early stage instead of making security an afterthought. Integrating security practices early and more often will not only reduce the cost but also be more effective. In this article, we will talk about how we can achieve that. View more...Efficiently Migrating From Jest to Vitest in a Next.js ProjectAggregated on: 2025-04-02 18:13:18 Vitest is a state-of-the-art testing framework that was created to solve problems encountered with older testing frameworks such as Jest. It's designed to be faster and leaner, with a tidier API, and more importantly, to be more efficient with projects that use modern JavaScript features and toolchains. Why Was Vitest Invented? Vitest was created to offer a new spin on testing JavaScript. Light and lightning-fast, it focuses on performance and modern JavaScript features, such as ES modules. Unlike Jest, Vitest is built with Vite, a modern front-end build tool, which means it can exploit ES modules (and other shiny new things) to initialize and run tests much more quickly. View more...Why Generative AI Needs Human Oversight to Build TrustAggregated on: 2025-04-02 17:13:18 In 2023, a generative AI-powered chatbot for a financial firm mistakenly gave investment advice that violated compliance regulations, triggering regulatory scrutiny. Around the same time, an AI-powered medical summary tool misrepresented patient conditions, raising serious ethical concerns. As businesses rapidly adopt generative AI (GenAI), these incidents highlight a critical question: Can AI-generated content be trusted without human oversight? View more...Maintaining ML Model Accuracy With Automated Drift DetectionAggregated on: 2025-04-02 16:58:18 In production machine learning (ML) systems, data drift is defined as changes in the statistical features of input data over time. Such shifts can weaken model performance, resulting in erroneous predictions. As a result, monitoring and mitigating data drift is critical for maintaining the trustworthiness of machine learning models. KitOps is an open-source DevOps solution for packaging and versioning AI/ML models, datasets, code, and configurations into a reproducible artifact known as a ModelKit. By standardizing these components, KitOps enables the seamless integration of drift detection and management into MLOps workflows, improving collaboration among data scientists, developers, and operations teams. View more...Lessons from Migrating an Oracle Database to AWS RDSAggregated on: 2025-04-02 15:28:18 After nearly a decade of managing our on-premise database infrastructure, our team finally took the plunge into cloud database services with AWS RDS. The migration journey came with its share of surprises — both pleasant and challenging. Here's what I discovered during our transition to AWS RDS managed services, along with key insights that might help your organization make informed decisions about your own database strategy. I still remember the morning my boss walked into our weekly team meeting and dropped the bomb: "We're finally moving our databases to the cloud." View more...AWS CloudTrail Monitoring Using Event-Driven AnsibleAggregated on: 2025-04-02 14:43:18 AWS CloudTrail is a service that tracks everything happening in your AWS environment. It makes it easier to track activities like unauthorized access, configuration changes, or unusual behavior. It also supports compliance and auditing by maintaining a clear history of activity. When we integrate CloudTrail with Event-Driven Ansible, we can automatically respond to these events in real time without manual intervention. This integration turns monitoring into action, helping teams keep their cloud systems secure, reliable, and easier to manage as they scale. View more...Bridging OT and IT: IIoT Middleware for Edge and Cloud With Kafka and FlinkAggregated on: 2025-04-02 11:28:18 As industries continue to adopt digital transformation, the convergence of Operational Technology (OT) and Information Technology (IT) has become essential. The OT/IT Bridge is a key concept in industrial automation to connect real-time operational processes with business-oriented IT systems ensuring seamless data flow and coordination. This integration plays a critical role in the Industrial Internet of Things (IIoT). It enables industries to monitor, control, and optimize their operations through real-time data synchronization and improve the Overall Equipment Effectiveness (OEE). By leveraging IIoT middleware and data streaming technologies like Apache Kafka and Flink, businesses can achieve a unified approach to managing both production processes and higher-level business operations to drive greater efficiency, predictive maintenance, and streamlined decision-making. Industrial Automation — The IT/OT Bridge An OT/IT Bridge in industrial automation refers to the integration between Operational Technology (OT) systems, which manage real-time industrial processes, and Information Technology (IT) systems, which handle data, business operations, and analytics. This bridge is crucial for modern Industrial IoT (IIoT) environments, as it enables seamless data flow between machines, sensors, and industrial control systems (PLC, SCADA) on the OT side, and business management applications (ERP, MES) on the IT side. View more...Cost-Aware Resilience: Implementing Chaos Engineering Without Breaking the BudgetAggregated on: 2025-04-01 22:13:18 Modern distributed systems, like microservices and cloud-native architectures, are built to be scalable and reliable. However, their complexity can lead to unexpected failures. Chaos engineering is a useful way to test and improve system resilience by intentionally creating controlled failures. However, it can be costly due to resource usage, monitoring needs, and testing in production-like environments. This article explores ways to make chaos engineering more cost-effective while maintaining its quality and reliability. Understanding Chaos Engineering Costs Resource Utilization: Running chaos experiments often requires extra resources, like more compute instances or virtual machines. Monitoring Overheads: Better monitoring is needed to track how the system behaves during experiments, which can increase costs. Production-Like Environments: Testing in environments similar to production can be expensive because of the high infrastructure costs. Downtime Risks: Inadequately planned experiments can cause unexpected outages. Importance of Cost-Aware Chaos Engineering: Cost-Aware chaos engineering makes sure testing resilience doesn't become too expensive. By using resources wisely and relying on existing tools, organizations can include chaos engineering in their work without going over budget or affecting their goals. View more...Creating a Web Project: RefactoringAggregated on: 2025-04-01 21:28:17 In the previous article, we spoke about hunting bugs. But a time will come when your hunters’ ‘trophy collection’ grows to a scary size. More and more ‘targets’ will be coming as if it were a zombie apocalypse. There will be red lamps flashing across your metrics dashboard. If (or rather when) that happens, it would mean it’s time for a bigger change than just routine debugging and streamlining your codebase. Today, I am going to talk you into refactoring, which is basically digging into and altering the very foundations of your project. Don’t take anything for granted, check everything yourself and think twice before diving into this work. It’s just as easy as swapping an engine in a flying airplane. But that’s exactly what you will have to do. Let’s get started! Monsters Beneath the Surface In the troubleshooting guide, I already mentioned how important it was to create and closely watch the metrics of your project. System metrics — like response time, memory consumption, etc. — and product metrics — like user acquisitions and engagement — are equally important (you watch and log your metrics, right?). It may happen that the problems you see with these instruments keep mounting up. Solving them consumes more and more time and resources, and you become short of both for growth and development. This is the worst symptom that your project needs refactoring. Ideally, you should be alert before skyfall gets at your doorstep. But for a lot of people, "If it ain't broke, don't fix it" is a motto for stability. Well, it doesn’t really work that way. You will actually save more if you start refactoring your project before real trouble hits you. View more...How to Build a New API Quickly Using Spring Boot and MavenAggregated on: 2025-04-01 19:58:17 In my last post, I wrote about how quick and easy it is to turn an idea into reality. I built a Spring Boot API service using Gradle as my build management tool and then deployed it to Heroku. But what about my readers who have Maven in their toolchain? View more...Understanding SQL Server Query Store: A Comprehensive GuideAggregated on: 2025-04-01 19:28:17 SQL Server Query Store is an essential feature introduced in SQL Server 2016, designed to provide insights into query performance by storing a history of executed queries, query plans, and runtime statistics. Acting as a flight recorder for your database, Query Store simplifies performance troubleshooting and helps DBAs optimize database workloads efficiently. In this article, we will explore what Query Store is, its benefits, scenarios for its use, and steps to implement it with examples. View more...Building Scalable Data Lake Using AWSAggregated on: 2025-04-01 17:28:17 Data lakes are centralized repositories that facilitate flexible and economical data management, and businesses are using them to store, process, and analyze this data effectively. AWS offers a strong ecosystem for creating a safe and scalable data lake with services like Lake Formation AWS Glue and Amazon S3. Along with best practices for implementation, this article examines the essential elements of an AWS Data Lake architecture, including ingestion storage processing and analytics. View more...Safeguarding Sensitive Data: Content Detection Technologies in DLPAggregated on: 2025-04-01 16:28:18 The 2024 IBM Cost of a Data Breach Report found that data breaches cost organizations an average of $4.88 million per incident globally. Many of these breaches were caused by accidental or intentional mishandling of sensitive information. As businesses rely more on cloud collaboration tools, SaaS applications, and global data sharing, Data Loss Prevention (DLP) solutions have become essential to cybersecurity. Content detection technologies are the core of DLP tools. They identify and protect confidential data at rest, in motion, and in use. This article explores the key content detection technologies, their applications in various industries, and the best practices for effective deployment. View more...Generative AI in Agile: A Strategic Career DecisionAggregated on: 2025-04-01 15:13:17 TL;DR: A Harvard Study of Procter and Gamble Shows the Way Recent research shows AI isn’t just another tool — it’s a “cybernetic teammate” that enhances agile work. A Harvard Business School study of 776 professionals found individuals using AI matched the performance of human teams, broke down expertise silos, and experienced more positive emotions during work. For agile practitioners, the choice isn’t between humans or AI but between being AI-augmented or falling behind those who are. The cost of experimentation is low; the potential career advantage, on the other side, is substantial. A reason to embrace generative AI in Agile? View more...Testing AI Is the First Step to Using AIAggregated on: 2025-04-01 14:28:17 Sales and marketing professionals in high tech are being told — daily, loudly, and from every direction — that they should be using AI. And while it's absolutely true that AI has real potential to boost productivity and unlock new insights, there's a crucial first step that often gets skipped: testing. This article is the result of testing AI with data from a large developer community with over 2,800 registered users, almost 800 unique organizations, and nine years of cumulative data from 41 countries. It's simply too much data for a marketing team to realistically try to analyze, too much information for working in a spreadsheet or a series of spreadsheets. View more...Predicting Ad Viewability With XGBoost Regressor AlgorithmAggregated on: 2025-04-01 13:28:17 Extracting insights from data and leveraging them in decision-making processes is becoming increasingly prevalent. Today, this approach enables impactful actions across various domains, including digital advertising. In the world of digital advertising, interactions between users exposed to ads and the platforms displaying those ads hold critical importance. Matches between advertisers and publishers are facilitated by auctions conducted within milliseconds on demand-side platforms (DSPs) and supply-side platforms (SSPs). Accurate matching is vital for both user satisfaction and revenue management. One of the most important KPIs in this regard is the ad viewability rate. View more...Testing DeepSeek-R1 Locally Using OllamaAggregated on: 2025-04-01 12:28:17 DeepSeek-R1 has made a significant impact since its release. A number of cloud-based providers offer the ability to use DeepSeek-R1. It is also possible to use DeepSeek-R1 locally using Ollama. In this article, we'll test the smallest DeepSeek-R1 model, using Ollama, with a number of different tasks and evaluate its response. The notebook file used in this article is available on GitHub. View more...Function Calling and Agents in Agentic AIAggregated on: 2025-04-01 11:13:17 One of the most exciting innovations in the rapidly advancing field of AI is the development of agentic AI, a new paradigm that focuses on creating intelligent systems capable of performing autonomous tasks with humanlike reasoning and actions. Among the key concepts driving this field are function calling and the development of AI agents. These elements are paving the way for more sophisticated AI systems that learn from data and actively perform tasks, solve problems, and interact with humans in meaningful ways. View more...Python and Open-Source Libraries for Efficient PDF ManagementAggregated on: 2025-03-31 21:28:17 Python has become a popular choice for developers working with PDF documents because it's flexible and has many free libraries available. Whether you need to create PDFs, edit them, extract information, or analyze them, Python has strong tools to help. This guide looks at different Python libraries for handling PDFs, compares what they offer, and helps you choose the best one for various needs. View more...From Ruby on Rails to Spring BootAggregated on: 2025-03-31 20:13:17 Like Rails, Spring Boot also follows Convention over Configuration principles. The goal of this tutorial is to focus on the similarities and differences between both frameworks to provide a quick guide for developers who are migrating from one to another. Prerequisite Java Development Kit 23 Maven instalation On Ubuntu Shell sudo apt update sudo apt install maven View more...Understanding Database Consistency: A Key Concept in Distributed SystemsAggregated on: 2025-03-31 19:28:17 Database consistency is a fundamental property that ensures data remains accurate, valid, and reliable across transactions. In traditional databases, consistency is often associated with the ACID (atomicity, consistency, isolation, durability) properties, which guarantee that transactions transition the database from one valid state to another. However, in distributed databases, consistency takes on a broader meaning, balancing trade-offs with availability and partition tolerance, as described in the CAP theorem. With the rise of cloud computing, global-scale applications, and distributed architectures, database consistency models have become critical for ensuring seamless and reliable data operations. This article explores different types of database consistency models, their trade-offs, and their relevance in modern distributed systems. View more...Doris vs Elasticsearch: A Comparison and Practical Cost Case StudyAggregated on: 2025-03-31 18:13:17 In the domain of big data real-time analytics and log search, enterprises frequently find themselves choosing between Elasticsearch and Apache Doris. Elasticsearch is well-known for its powerful full-text search and flexible aggregation capabilities. On the other hand, Apache Doris, with its distributed MPP architecture, columnar storage, and continuously evolving inverted indexing mechanism, shines in complex aggregations and data analysis. View more...Stop Exposing Secrets! Secure Your APIs in Postman Like a ProAggregated on: 2025-03-31 17:13:17 API security is crucial, as it directly impacts your business's success and safety. How well you secure your APIs can make or mar your product, and it is of utmost importance to spend time thinking about security. I have seen developers work in Postman without properly securing their credentials, often leaving API keys exposed in shared environments or logging sensitive data in the console. For example, some developers unknowingly expose credentials when they make their workspaces public, allowing anyone to access sensitive API keys and tokens that are not properly stored. View more...Supervised and Unsupervised Learning in Machine LearningAggregated on: 2025-03-31 16:13:17 Supervised and unsupervised learning are the most popular machine learning models that companies are widely using to make things easier. Whether you are seeking a new career in AI or just planning to deepen your expertise, it is important to understand these two models because both have different functions and applications. So, without wasting time, let’s find out what these models are and how to use them to guide decision-making. What Is Supervised Learning? It is one of the most used machine learning algorithms trained on labeled data sets to predict outcomes accurately. The model can measure correctness and learn over time using labeled inputs and outcomes. This algorithm has two types: classification and regression. View more...The Production-Ready Kubernetes Service ChecklistAggregated on: 2025-03-31 15:13:17 Kubernetes has emerged as a powerful tool for managing and orchestrating containerized applications. It provides scalability and availability and manages workloads so you can focus on your software's core functionality. However, moving your application from a test environment to a production environment is not straightforward. The purpose of this article is to list the checks we use before pushing an application to production. View more...AWS WAF Classic vs WAFV2: Features and Migration ConsiderationsAggregated on: 2025-03-31 14:28:17 Amazon Web Services Web Application Firewall (AWS WAF) protects web programs against widespread vulnerabilities including SQL injection and cross-scriptability. Amazon Web Services WAFV2, a new WAF Classic service, introduces with it increased agility, elasticity, and operational efficiency. In this article, we will compare WAF variants, emphasize their differences, and discuss migration guidance for WAFV2 in detail. View more...How Does Video Annotation Augment Computer Vision?Aggregated on: 2025-03-31 13:28:17 Video annotation has become the central element for conducting research on AI and machine learning in computer vision. In essence, it equips the machines with the ability to comprehend and process visual information coming from video streams. This way, it contributes to the indispensable process of training models for applications like driverless cars or a surveillance system. In this article, we will discuss the core aspects of video annotation, its role in computer vision, popular techniques, challenges, and how companies use outsourcing services to fulfill their labeling needs. View more...Product Design vs Platform Design for Software DevelopmentAggregated on: 2025-03-31 12:13:17 An enterprise architect must understand the business's need for building either a platform or a product. A product is software that has “off-the-shelf,” more generic features and functions. In contrast, a platform is a software or service that allows external parties to extend and develop complementary functions and services. Choosing the right fit for business needs is extremely important after careful consideration of factors for driving product/platform development. Platforms are more flexible in connecting two or more parties, usually called producers and consumers. In recent days, organizations have been more focused on building digital platforms or digital products based on the business vertical's needs. While anyone can build products on top of a platform, the platform itself is not the product. The program perspective difference between product and platform is important for project strategy, execution, and stakeholder management. The table below shows the difference between the product and the platform. View more...The Role of DevSecOps in Securing Multi-Cloud ArchitecturesAggregated on: 2025-03-31 11:28:17 In this article, we will explore how DevSecOps transforms security in multi-cloud ecosystems. Starting with the DevSecOps phase, we will delve into how multi-cloud environments can be implemented effectively and safely. Additionally, we will examine the most significant challenges associated with their use and discuss strategies to counter them successfully. If a company uses several cloud providers, each cloud has its specifics and challenges for IT operation and development teams while promoting code and movement flexibility. Securing such an environment is a challenging proposition since it requires a delicate maintaining flexibility of an organization and its ability to defend against new and constantly emerging threats. View more...In-App Browsers in Mobile Apps: Benefits, Challenges, SolutionsAggregated on: 2025-03-28 21:13:15 Mobile apps use in-app browsers to keep users hooked to the app ecosystem and make their experience better. These browsers let people see web content without leaving the app. When users go to external browsers to look at web content, they might get sidetracked by other things. In-app browsers provide users with simple browsing features without all the bells and whistles of a full browser. Cordova InAppBrowser The InAppBrowser plugin for Cordova creates a separate browser window that works on its own apart from the main Cordova WebView. This window acts like a regular web browser, but with one key difference: it can't access Cordova APIs. This separation makes it a good choicefor loading third-party (untrusted) content, as it adds an extra layer of protection compared to loading such content straight into the main Cordova WebView. View more...Getting Started With LangChain for BeginnersAggregated on: 2025-03-28 20:28:15 Large language models (LLMs) like OpenAI’s GPT-4 and Hugging Face models are powerful, but using them effectively in applications requires more than just calling an API. LangChain is a framework that simplifies working with LLMs, enabling developers to create advanced AI applications with ease. In this article, we’ll cover: View more...Challenges of Using LLMs in Production: Constraints, Hallucinations, and GuardrailsAggregated on: 2025-03-28 19:13:15 Large language models (LLMs) have risen in popularity after the release of Chat-GPT. These pre-trained foundation models enable rapid prototyping, and companies want to use this cool technology. However, their probabilistic nature and lack of built-in constraints often lead to challenges once they are out of prototyping mode. Let us consider an example of classifying news articles based on the content in the article to discuss the challenges one would encounter. Current LLMs have issues such as non-adherence to instructions, hallucinations, and possibly spitting out something that you don't want. This article explores these challenges with an example of classifying news articles into categories based on the content in the article and offers actionable strategies to mitigate them. View more...Ansible Security and Testing Tools for AutomationAggregated on: 2025-03-28 18:13:15 Automation has become the cornerstone of modern IT operations, enabling organizations to streamline processes, reduce manual errors, and improve efficiency. However, as automation grows in complexity and scale, security risks also increase. Misconfigured infrastructure, untested playbooks, and vulnerabilities in automation workflows can expose organizations to significant threats. After my article on using SonarQube for Ansible code scanning and quality checks, this article covers additional tools and frameworks required for secured automation. View more...Understanding the Importance of Web AccessibilityAggregated on: 2025-03-28 17:28:15 The process of creating websites and web apps that are usable by individuals with disabilities is known as web accessibility. This encompasses people with a range of disabilities, including: Visual: Low vision, color blindness, and blindness Auditory: Hard of hearing, deaf Cognitive: Memory problems, learning issues Motor: Paralysis, tremors, and trouble using hands An accessible web enables these individuals to view, understand, interact with, and contribute to the online environment. Here are a few examples of accessibility features: View more...Real-World Garbage Collection Scenarios and SolutionsAggregated on: 2025-03-28 16:13:15 If you’re experiencing Java performance problems, where do you start looking for solutions? Is GC tuning really worthwhile? How do you analyze the GC logs to identify and fix bottlenecks? This article looks at some real-life success stories, where organizations were able to achieve dramatic performance gains simply by tweaking GC. View more...Why Mocking SucksAggregated on: 2025-03-28 15:13:15 Developers love mocking. It’s been a go-to solution for years: Simulate external services, run tests faster, and avoid the overhead of real APIs. But here’s the truth — mocking is overused and often dangerous. It deceives you into thinking your system is stable, hiding critical failures that only appear when your code hits the real world. APIs change. Rate limits throttle you. Authentication flows break. Your tests will still pass with green colors while your app crashes in production. Overusing mocks can turn your tests into a house of cards, giving you false confidence and creating hidden technical debt that slows teams down. In complex workflows — like payments or authentication — mocks fail to capture the true behavior of interconnected services. View more...Security in the CI/CD PipelineAggregated on: 2025-03-28 14:28:15 As development cycles speed up, integrating security into the CI/CD pipeline is essential to embed security checks early and throughout the process to prevent vulnerabilities from creeping into production. This article delves deeper into the technical details, code examples, and configurations to build a robust, secure CI/CD pipeline. A CI/CD pipeline is an automated workflow that streamlines the process of software development from code integration to deployment. It comprises two main practices: View more...Using Terraform Moved Block to Refactor ResourcesAggregated on: 2025-03-28 13:28:15 Terraform introduced the moved block in version 1.1.0. This block provides a straightforward way to refactor resources by explicitly mapping old resource addresses to new ones. It significantly reduces the risk of losing state or manually managing imports during renames or moves. In this article, we’ll explain what the moved block is and how to use it to streamline resource restructuring for smoother and safer Terraform updates. View more...Building a Scalable ML Pipeline and API in AWSAggregated on: 2025-03-28 12:13:15 With rapid progress in the fields of machine learning (ML) and artificial intelligence (AI), it is important to deploy the AI/ML model efficiently in production environments. This blog post discusses an end-to-end ML pipeline on AWS SageMaker that leverages serverless computing, event-trigger-based data processing, and external API integrations. The architecture downstream ensures scalability, cost efficiency, and real-time access to applications. View more...The Art of PostmortemAggregated on: 2025-03-28 11:28:15 How an individual responds to setbacks defines their character, and the same is true of companies. Authoring a postmortem is the traditional way to learn from failures. The postmortem is a core foundation of company culture. Successful tech companies have rigorous postmortem processes that have been refined meticulously over time. A company that learns from its mistakes will protect an incalculable amount of business value by preventing future outages. View more...Accurate Quantitative Analysis With ChatGPT and Azure AI HubAggregated on: 2025-03-27 21:13:15 LLMs are not very good at quantitative analysis. For example, when I asked ChatGPT, "Which number is bigger, 9.9 or 9.11?" it incorrectly responded with 9.11. In another example, I have an Excel file containing a large amount of quantitative data. The maximum word count for a single prompt that ChatGPT can handle is around 4,000 words (approximately 16,000 characters). If I try to query this data, it may not fit within the context window. View more...Moving PeopleSoft ERP Data Between Databases With Data Mover ScriptsAggregated on: 2025-03-27 20:28:15 Why Transfer or Move Data? Transferring PeopleSoft application data between databases is necessary for various business needs, including: Application upgrades User or system testing Training environment setup This article covers the essential commands and step-by-step instructions needed to perform data transfer effectively. View more...Using Heap Dumps to Find Memory LeaksAggregated on: 2025-03-27 19:13:15 A JVM (Java Virtual Machine) runs programs in Java and many other languages and provides the runtime environment, CPU, memory, and security management. At any particular moment, the running JVM has many objects, and a heap dump is a snapshot of the memory allocated to all these objects. In this post, we will discuss how to use heap dumps to find memory leaks. View more...Self-Healing Data Pipelines: The Next Big Thing in Data Engineering?Aggregated on: 2025-03-27 18:13:15 I'm an enthusiastic data engineer who always looks out for various challenging problems and tries to solve them with a simple POC that everyone can relate to. Recently, I have thought about an issue that most data engineers face daily. I have set alerts on all the batch and streaming data pipelines. When the errors reach a threshold limit or if the data pipeline fails, we get failure notifications immediately in the email inbox. Everything seemed fine until I noticed one of our critical datasets could not be loaded into BigQuery. After investigating the error logs, I found several messages with "missing required data." I felt ‘lost’ seeing these frequent raw data issues from a user-inputted file. View more...XAI: Making ML Models Transparent for Smarter Hiring DecisionsAggregated on: 2025-03-27 17:28:15 Recruiting is extremely tough as outsiders may disagree with you — I’ve been there, sifting through resumes, trying to spot the perfect fit for a role. I’ve noticed more companies using machine learning to screen candidates and predict job success lately. The problem? When an algorithm rejects someone, there’s often no clear reason why. That’s where explainable AI (XAI) changes the game. Think of it as a recruiter’s secret weapon — it takes the mystery out of AI decisions and turns machine learning into a real hiring partner. Let’s dive into why this matters and how to use it. View more...Automatic Versioning in Mobile AppsAggregated on: 2025-03-27 16:28:15 Picture this: Your mobile app is evolving quickly, with new features requiring changes to the local database. Your users expect seamless upgrades, and your stakeholders want new functionality delivered fast. The challenge becomes even trickier when you realize you need to update the app's database schema without disrupting existing data or forcing users into error-prone migrations. In this article, I’ll share a practical, automatic versioning approach I developed that simplifies database versioning and migration for mobile apps. This system lets developers focus on data models instead of manually scripting version changes, while making sure users’ data stays intact across updates. View more... |
|