News AggregatorParent Document Retrieval (PDR): Useful Technique in RAGAggregated on: 2024-08-22 22:23:01 What Is Parent Document Retrieval (PDR)? Parent Document Retrieval is a method implemented in state-of-the-art RAG models meant to recover full parent documents from which relevant child passages or snippets can be extracted. It provides context enrichment and is passed on to the RAG model for more comprehensive, information-rich responses to complex or nuanced questions. Major steps in parent document retrieval in RAG models include: View more...Setting Up CORS and Integration on AWS API Gateway Using CloudFormationAggregated on: 2024-08-22 20:08:01 Cross-Origin Resource Sharing (CORS) is an essential security mechanism utilized by web browsers, allowing for regulated access to server resources from origins that differ in domain, protocol, or port. In the realm of APIs, especially when utilizing AWS API Gateway, configuring CORS is crucial to facilitate access for web applications originating from various domains while mitigating potential security risks. This article aims to provide a comprehensive guide on CORS and integrating AWS API Gateway through CloudFormation. It will emphasize the significance of CORS, the development of authorization including bearer tokens, and the advantages of selecting optional methods in place of standard GET requests. View more...Protect Your Alerts: The Importance of Independent Incident Alert ManagementAggregated on: 2024-08-22 18:08:01 In a world where IT infrastructure underpins countless businesses and organizations, maintaining operational integrity during critical failures or outages is non-negotiable. A key element in achieving this is ensuring that your incident alert management system remains active and accessible under all circumstances. Unfortunately, a significant vulnerability can arise when the incident alert management system shares the same cloud provider as your primary services. If that cloud provider experiences an outage, your alert management system could become unavailable just when it is needed the most. This could lead to delayed responses, prolonged downtimes, and potentially catastrophic consequences for your business operations. Understanding the Role of Redundancy in Incident Management Redundancy is a fundamental principle in IT management, especially when it comes to ensuring continuous operations. Consider a scenario where your services are hosted on a major cloud provider like Amazon Web Services (AWS), Microsoft Azure, or Google Cloud. While these platforms are indeed robust and reliable, they are not infallible. They can and have experienced failures caused by various factors such as Distributed Denial of Service (DDoS) attacks, major hardware failures, software bugs, or even human error resulting in misconfigurations. In such situations, if your incident alert management system is also hosted on the same cloud, the very tools you rely on to notify you of the outage might be compromised as well. This could leave your IT team in the dark, unaware of the issues, and unable to respond promptly. View more...Kotlin Coroutines and OpenTelemetry TracingAggregated on: 2024-08-22 16:08:01 I recently compared three OpenTelemetry approaches on the JVM: Java Agent v1, v2, and Micrometer. I used Kotlin and coroutines without overthinking. I received interesting feedback on the usage of @WithSpan with coroutines: Indeed, the @WithSpan annotation has worked flawlessly in conjunction with coroutines for some time already. However, it made me think about the underlying workings of OpenTelemetry. Here are my findings. View more...Day in the Life of a Developer With Google’s Gemini Code Assist: Part 1Aggregated on: 2024-08-22 15:08:00 I started evaluating Google's Gemini Code Assist development in December 2023, almost about its launch time. The aim of this article is to cover its usage and impact beyond basic code generation on all the activities that a developer is supposed to do in his daily life (especially with additional responsibilities entrusted to developers these days with the advent of "Shift-Left" and full stack development roles). Gemini Code Assist Gemini Code Assist can be tried at no cost until November 2024. View more...Multicluster Gateways With Kubernetes Gateway APIAggregated on: 2024-08-22 14:08:01 Kubernetes Gateway API is the new specification released by CNCF to standardize the Kubernetes Ingress traffic. Now, what if a service is configured as High Availability (HA)? (Say it is in a different cloud environment and you have to access it from the Gateway; i.e., multicluster, multi-cloud scenario.) In this article, we will showcase how to use the Gateway API spec to configure gateways for multicluster setup. Multicluster Kubernetes Gateway Demo Overview We have two clusters: one in EKS (primary) and the other in GKE (remote). I have deployed Istio in both the clusters and the setup is primary-remote Istio installation. Istio is used as the controller to implement the Gateway API resources. View more...Evolution of Governance Framework With AIAggregated on: 2024-08-22 13:08:01 We have seen that running effective projects and conducting business both depend on the governance framework. This framework lays out the fundamentals of management. These principles assisted in bringing all of the business's top stakeholders into alignment with the guided principle objectives, such as defining performance standards, determining acceptable risk levels, and determining the manner and content of reporting. These core ideas are what all projects must adhere to. It may take a lot of work to create such frameworks but once all stakeholders are aligned on this framework, it can be leveraged throughout the project management lifecycle. This framework plays an important role in managing and mitigating the risks that come throughout the project lifecycle. We have seen a lot of last-minute risk coming in the late cycle of project management where such a governance framework will be helpful. This framework will foster trust among stakeholders and enhance the decision-making ability for each risk. View more...Improving Snowflake Performance by Mastering the Query ProfileAggregated on: 2024-08-21 22:08:00 Having worked with over 50 Snowflake customers across Europe and the Middle East, I've analyzed hundreds of Query Profiles and identified many issues including issues around performance and cost. In this article, I'll explain: View more...Automatic 1111: Sketch-to-Image WorkflowAggregated on: 2024-08-21 21:08:00 In this article, we will be discussing how to convert hand-drawn or digital sketches into photorealistic images using stable diffusion models with the help of ControlNet. We will be extending the Automatic 1111's txt2img feature to develop this custom workflow. Prerequisites Before diving in, let's make sure we have the following prerequisites covered: View more...Data Pipeline Techniques in ActionAggregated on: 2024-08-21 20:08:00 The topics covered are: Data pipeline architecture High-scale data ingestion Data transformation and processing Data storage Staging data delivery Operational data Hands-on exercise View more...Securing Federal SystemsAggregated on: 2024-08-21 19:08:00 Computer systems in the federal government must demonstrate that they are secure. The process is known as accreditation and the goal is to receive an Authority to Operate (ATO). The ATO allows the system to be put into production for use by the federal workforce. While the process is specific to federal systems, state and local governments usually have similar requirements and most commercial companies have similar security reviews before releasing new systems. The foundation of the process is governed by the Risk Management Framework described in the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37. The Risk Management Framework has a seven-step process authorizing a system: View more...Using SQS With JMS for Legacy ApplicationsAggregated on: 2024-08-21 18:23:00 As part of migrating Java enterprise applications to the cloud, it is beneficial to replace parts of the technology stack with equivalent cloud services. As an example, traditional messaging services are being replaced by Amazon SQS as part of the migration to AWS. Java Messaging Service (JMS) has been a mainstay in the technology stack of Java enterprise applications. The support provided by SQS for the JMS standard helps with an almost seamless technology replacement. In this article, I have described the steps to integrate a legacy Java application with SQS through JMS. Legacy Java Application For the purposes of this article, a legacy Java application has the following characteristics: View more...Mastering React Efficiency: Refactoring Constructors for Peak PerformanceAggregated on: 2024-08-21 17:23:00 React, a popular JavaScript library for building user interfaces, offers a robust way to create dynamic and responsive web applications. However, as applications grow, performance issues can arise, especially when dealing with nested component constructor calls. This article delves into how these nested constructor calls can impact React performance, providing a step-by-step detailed example, point by point, to help you understand and mitigate these issues. Understanding React Components and Constructors What Are React Components? React components are the building blocks of any React application. They can be either functional or class-based. Class components use constructors to initialize state and bind methods. View more...Unlock AI Power: Generate JSON With GPT-4 and Node.js for Ultimate App IntegrationAggregated on: 2024-08-21 16:23:00 Generating well-structured JSON outputs can be a complex task, especially when working with large language models (LLMs). This article explores generating JSON outputs generated from LLMs with an example of using a Node.js-powered web application. Large Language Models (LLMs) LLMs are sophisticated AI systems designed to comprehend and produce human-like text, capable of handling tasks such as translation, summarization, and content creation. Models like GPT (Model by Open AI), BERT, and Claude have been instrumental in advancing natural language processing, making them valuable tools for chatbots and other AI-driven applications. View more...Intricacies of Zero-to-One Software ProjectsAggregated on: 2024-08-21 15:23:00 A zero-to-one project is also known as a greenfield project. These projects are basically small ideas with almost no tangible work. The inherent complexities of zero-to-one projects are hard and many struggle with it. There are more chances of failures in a zero-to-one project and the reasons can be very hard to detect. This article tries to summarize the main reasons why many such projects fail. Many such projects are also called Proof of Concept (POC) or MVP (Minimum Viable Product). Of course, there are some variants of perspective here, but that's not the intent of this article. View more...Preventing and Fixing Bad Data in Event Streams: Part 2Aggregated on: 2024-08-21 14:23:00 Alright, I’m back — time for part 2. In the first part, I covered how we handle bad data in batch processing; in particular, cutting out the bad data, replacing it, and running it again. But this strategy doesn’t work for immutable event streams as they are, well, immutable. You can’t cut out and replace bad data like you would in batch-processed data sets. View more...Four Essential Tips for Building a Robust REST API in JavaAggregated on: 2024-08-21 13:23:00 Creating a solid REST API in Java requires more than a basic grasp of HTTP requests and responses. Ensuring that your API is well-designed, maintainable, and secure is essential. This article will offer four critical tips to improve your REST API. It assumes you are already acquainted with the Richardson Maturity Model, especially up to Level 2, which is the minimum requirement for a good API. If you need a quick reminder about the Richardson Maturity Model, I recommend reading this article by Martin Fowler: Richardson Maturity Model. Given that prerequisite, let’s dive into the tips. For illustration purposes, we’ll use an example from the expedition domain. While we won’t focus on entities and layers in detail, imagine we have the following entity class: View more...Building Steps for Success With ScrumAggregated on: 2024-08-20 23:07:59 Discussions about Scrum keep deviating into things that aren't part of Scrum: user stories, story points, burndown charts, velocity, status meetings, tasks, sprint zero, etc. That doesn't mean those following Scrum can't use them; however, one should not perpetrate the myth that they're part of Scrum. The goal of Scrum was never to do Scrum, and it's certainly not a tool to "implement Agile." It's an enabler — and when the environment is right and the right things are in focus it will work to deliver results. View more...Building a Semantic Web Search App Using Resource Description Framework and Flask for Cyber ResilienceAggregated on: 2024-08-20 22:07:59 In cyber resilience, handling and querying data effectively is crucial for detecting threats, responding to incidents, and maintaining strong security. Traditional data management methods often fall short in providing deep insights or handling complex data relationships. By integrating semantic web technologies and RDF (Resource Description Framework), we can significantly enhance our data management capabilities. This tutorial demonstrates how to build a web application using Flask, a popular Python framework, that leverages these technologies for advanced semantic search and RDF data management. View more...Black Hat 2024, Day 2: Charting the Future of CybersecurityAggregated on: 2024-08-20 21:07:59 The 2024 Black Hat conference in Las Vegas brought together some of the most influential voices in cybersecurity, offering critical insights for security professionals navigating an increasingly complex digital landscape. From the philosophical underpinnings of software development to practical strategies for securing critical infrastructure, the keynote speakers provided a comprehensive view of the challenges and opportunities facing the industry. The Magic of Software Development Moxie Marlinspike, founder of Signal, opened his Day Two Keynote with a thought-provoking analogy comparing software development to magic in the Harry Potter universe. He argued that software is one of the few domains where individuals can create powerful, transformative tools with minimal resources: View more...Snowflake and dbt Integration To Enable Advanced AnalyticsAggregated on: 2024-08-20 20:07:59 Data strategies have to be designed today for the modern business person to help in being flexible, growing, and running efficiently. Snowflake, powered by the Data Cloud, enables you to create data-intensive applications without thinking about the infrastructure that is going to manage it so the focus may rest on data and analytics. dbt is a workflow tool to help teams quickly and collaboratively write analytics code using some of the best practices from software engineering, such as modularity, portability, continuous integration, continuous deployment, and documentation. Anyone who knows SQL can use dbt to build high-quality data pipelines without needing to manage infrastructure. View more...OpenShift Data Foundation on IBM Cloud Using Terraform, Part 1: DeploymentAggregated on: 2024-08-20 19:07:59 OpenShift Data Foundation (ODF) is a Software Defined Storage solution that manages and stores large amounts of data across multiple environments in a scalable, efficient, and secure manner. It provides a unified view of data from different sources, including databases, file systems, and cloud storage. With ODF, organizations can manage structured and unstructured data from multiple sources, and gain insights from it through analytics and machine learning enabling them to build a modern data infrastructure that is flexible, agile, and cost-effective. Under the hood, ODF utilizes Ceph as the underlying distributed storage system. Ceph stores the data and manages data replication and distribution across multiple nodes in the storage cluster, ensuring high availability and data redundancy. Rook, integrated with ODF as a storage orchestrator, automates the deployment and management of Ceph within the Kubernetes cluster. Rook handles tasks like data replication, scaling, and fault tolerance, relieving administrators from dealing with these complexities. View more...Mastering PUE for Unmatched Data Center PerformanceAggregated on: 2024-08-20 18:07:59 Data centers use a lot of electricity. Consequently, as they grow, it becomes all the more important to understand their energy use and take steps to reduce it. Learning to measure data center power usage effectiveness (PUE) is a crucial part of that goal. What Is Data Center Power Usage Effectiveness? As its name implies, PUE measures how efficiently a data center uses the energy it consumes. It represents this figure as a ratio between the facility’s total electrical usage and how much of it goes toward IT equipment. The more even the ratio, the better. View more...How Data Encryption Can Simplify Infrastructure ArchitectureAggregated on: 2024-08-20 17:07:59 Product and infrastructure engineering teams are not always aligned with the interests of security engineering teams. While product and infrastructure focus on driving business value and delivering practical solutions, security focuses on detection, prevention, and remediation, which can seem less immediately valuable. Like an insurance policy, it's not entirely obvious why it's worth the money or effort when there hasn't been an incident yet. Instead of the traditional cycle of identifying vulnerabilities, applying remediation, and following up through case management, I've found it much more effective to advocate for security solutions that also deliver business value. For example, using OAuth and IAM-based access instead of static keys and encryption instead of more granular access control can significantly simplify infrastructure, reduce complexity, and lessen the operational burden, making them very appealing to both product and platform engineering teams. View more...In-Depth Understanding of Vector Search for RAG and Generative AI ApplicationsAggregated on: 2024-08-20 16:07:59 You might have used large language models like GPT-3.5, GPT-4o, or any of the other models, Mistral or Perplexity, and these large language models are awe-inspiring with what they can do and how much of a grasp they have of language. So, today I was chatting with an LLM, and I wanted to know about my company’s policy if I work from India instead of the UK. You can see I got a really generic answer, and then it asked me to consult my company directly. View more...Beyond Static Pipelines: Enhancing AI Agents With LlamaIndexAggregated on: 2024-08-20 15:22:59 Basic Retrieval-Augmented Generation (RAG) (opens new window)data pipelines often rely on hard-coded steps, following a predefined path every time they run. There is no real-time decision-making in these systems, and they do not dynamically adjust actions based on input data. This limitation can reduce flexibility and responsiveness in complex or changing environments, highlighting a major weakness in traditional RAG systems. LlamaIndex resolves this limitation by introducing agents(opens new window). Agents are a step beyond our query engines in that they can not only "read" from a static source of data, but can dynamically ingest and modify data from various tools. Powered by an LLM, these agents are designed to perform a series of actions to accomplish a specified task by choosing the most suitable tools from a provided set. These tools can be as simple as basic functions or as complex as comprehensive LlamaIndex query engines. They process user inputs or queries, make internal decisions on how to handle these inputs, and decide whether additional steps are necessary or if a final result can be delivered. This ability to perform automated reasoning and decision-making makes agents highly adaptable and efficient for complex data processing tasks. View more...Construct Azure Shared Access Signature URL To Download File From Azure Blob StorageAggregated on: 2024-08-20 14:22:59 In any web portal, to access a file stored in an Azure Blob Storage account container, we need to connect to the Azure Blob Storage Account and construct the download link for the specified file using its name and Azure storage account details. Constructed Azure Blob URLs can also be used to upload a file and delete a file from the web portal using Java code. A shared access signature (SAS) enables you to grant limited access to containers and blobs in your storage account. When you create a SAS, you specify its constraints, including which Azure Storage resources a client is allowed to access, what permissions they have on those resources, and how long the SAS is valid. View more...How To Change PDF Paper Sizes With an API in JavaAggregated on: 2024-08-20 13:22:59 Almost every business around the world works with PDF documents daily in some capacity, and that alone establishes the value of leveraging niche technologies to automate unique PDF workflows. The purpose of this article is to demonstrate an efficient web API solution Java developers can use to quickly adjust PDFs between common ISO 216 A-Series paper sizes (A0 to A7). Before we get to our demonstration, however, we’ll first take a moment to understand the ISO 216 standard, and we’ll briefly review how PDF file structure handles page sizing to make programmatic adjustments possible. View more...How To Make a Picture-in-Picture Feature in iOS App Using AVFoundationAggregated on: 2024-08-19 23:07:59 AVFoundation works on Apple’s entire product line. With this framework, you can add recording, editing, and playback features to your apps. In this article, I will show how to place one video over another and thus enable a picture-in-picture (“duet”) mode – one of the most popular TikTok-like features. We are going to use only the native tools for this job. Building Blocks This is what we need for this task: View more...How To Decide Between Relational and Non-Relational Databases for the ProjectAggregated on: 2024-08-19 22:07:59 How do you approach data processing? What aspects are worth special consideration? Find the difference between relational vs non-relational databases to make informed decisions and learn how to choose a database regarding your project needs. What Is a Relational vs Non-Relational Database? That’s obviously the first question to address when choosing a database for your project. Knowing the difference between relational vs non-relational databases helps to be more specific with your requirements and leverage the right solutions. View more...Building Secure AI LLM APIs: A DevOps Approach To Preventing Data BreachesAggregated on: 2024-08-19 21:07:59 As artificial intelligence (AI) continues to evolve, Large Language Models (LLMs) have become increasingly prevalent in various industries, from healthcare to finance. However, with their growing use comes the critical responsibility of securing the APIs that allow these models to interact with external systems. A DevOps approach is crucial in designing and implementing secure APIs for AI LLMs, ensuring that sensitive data is protected against potential breaches. This article delves into the best practices for creating secure AI LLM APIs and explores the vital role of DevOps in preventing data breaches. Understanding the Importance of API Security in AI LLMs APIs are the backbone of modern software architecture, enabling seamless communication between different systems. When it comes to AI LLMs, these APIs facilitate the transfer of vast amounts of data, including potentially sensitive information. According to a report by Gartner, 90% of web applications will be more vulnerable to API attacks by 2024, highlighting the growing risk associated with poorly secured APIs. View more...Custom Elements Manifest: The Key To Seamless Web Component Discovery and DocumentationAggregated on: 2024-08-19 20:07:59 Even though Web Components have been the talk of being a necessity for developers to create reusable and encapsulated UI components for web applications, in totality, developers can't embrace it entirely due to the issues around tooling and integration. This is where the Custom Elements Manifest (CEM) comes in: a JSON format that provides structured metadata for Web Components. CEM wishes to make it all simpler, from development to discovery, documentation, and integration within IDEs, making a much smoother developer experience. In this article, let's dig deep into how Custom Elements Manifest works, why it is a game-changer for the development of web components, and how it can power modern tools. We will also see various cases that elucidate how CEM helps enhance the experience for both developers and users. View more...Cloud Build Unleashed: Expert Techniques for CI/CD OptimizationAggregated on: 2024-08-19 19:07:59 CI/CD and Its Importance We all know what CI/CD is and how it fosters a sense of collaboration among teams and enables them to deliver high-quality software efficiently and reliably. By automating the integration, testing, and deployment processes, CI/CD helps maintain code quality, reduce manual effort, and provide continuous feedback, ultimately leading to faster and more reliable software delivery. CI/CD is important for the following reasons: View more...Understanding PolyBase and External Stages: Making Informed Decisions for Data QueryingAggregated on: 2024-08-19 18:07:59 In the realm of Big Data and AI, data lakes and lake houses play a vital role in bringing insights and advanced analytics. The ability of the lake house is measured effectively when it can query data from external sources like cloud storage. We have two popular methodologies for querying data from external sources: View more...Transformed Meets the Scrum GuideAggregated on: 2024-08-19 17:07:59 TL; DR: Transformed and Scrum Despite criticism from the product community regarding Scrum as a framework for effective product creation, namely Marty Cagan himself, I believe that it is worthwhile to compare the principles that help form successful product teams with those of Scrum. Let’s delve into an analysis of “Transformed” and how its principles align with Scrum’s. Matching Transformed’s Product Success Principles with Scrum Principles Last week, Paweł Huryn summarized the product success principles from Marty Cagan’s book Transformed. (Please find his post on LinkedIn and consider following him.) I took those principles and compared them step-by-step with the principles derived from the Scrum Guide. View more...Data Security Solution for US Federal CustomersAggregated on: 2024-08-19 16:22:59 Federal agencies manage highly classified sensitive data, including personal information, medical records, and tax and income details of all U.S. residents. In some cases, temporary visitor data are also retained. They also handle national security information, including susceptible documents, intergovernmental communication details, and document decisions that could impact the safety of the country. The purpose of this article is to walk you through various regulations as a developer that you should know about while developing security software specifically for federal agencies. All government agencies in the U.S. are required to comply with strict data regulations specified in the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorization Management Program (FedRAMP). Developers, who design and implement data security solutions for federal customers, should ensure that the solutions help address compliance requirements. Let’s explore these requirements in some detail. View more...Benchmarking OpenAI Models for Automated Error ResolutionAggregated on: 2024-08-19 15:22:59 Large Language Models (LLMs) are increasingly shaping the future of software development, offering new possibilities in code generation, debugging, and error resolution. Recent advancements in these AI-driven tools have prompted a closer examination of their practical applications and potential impact on developer workflows. This article explores the effectiveness of LLMs in software development, with a particular focus on error resolution. Drawing from industry-wide observations and insights gained through my work with AI Error Resolution at Raygun, I’ll analyze LLMs’ current capabilities and their implications for the future of development practices. The discussion will weigh both the promising advancements and the challenges that arise as these technologies integrate into our daily work. View more...API Security: The Cornerstone of AI and LLM ProtectionAggregated on: 2024-08-19 14:22:59 As artificial intelligence and large language models (LLMs) continue to reshape the technological landscape, the importance of API security has never been more critical. In a recent interview at Black Hat 2024, Tyler Shields, Vice President of Product Marketing at Traceable, shed light on the evolving relationship between API security and AI/LLM applications. This article explores key insights for developers, engineers, and architects navigating this complex terrain. The Evolving Landscape of API Vulnerabilities With the rapid adoption of AI and LLM-driven applications, the API security landscape is undergoing significant changes. Shields highlights a "massive explosion of APIs" driven by several factors: View more...Knowledge Graphs: The Secret Weapon for Superior RAG ApplicationsAggregated on: 2024-08-19 13:22:59 RAG and Its Importance Retrieval-Augmented Generation (RAG) has emerged as a powerful paradigm, blending the strengths of information retrieval and natural language generation. By leveraging large datasets to retrieve relevant information and generating coherent and contextually appropriate responses, RAG systems have the potential to revolutionize applications ranging from customer support to content creation. Challenges With RAG However, as powerful as RAG systems are, they face challenges, particularly in maintaining contextual accuracy and efficiently managing vast amounts of data. View more...React Server Components (RSC): The Future of ReactAggregated on: 2024-08-16 20:22:57 React Server Components (RSC) represent a paradigm shift in how React's applications are rendered in its 10th anniversary. RSCs were first introduced in late 2020, and the first stable version of this feature was launched in 2024 as part of React 19. Traditionally, React applications were run on the client. This meant the browser would download the JavaScript bundle containing all the code that's needed to run the application, and then render the application. Though this had some advantages, this approach caused slow initial loads and the need to fetch and process the data on the client made things even slower. With React Server Components, React can now run on the server without necessarily being sent to the client, fundamentally changing how React works at its core and how we use it to build applications. Server Side Rendering (SSR) In order to understand React Server Components (RSC), we need to first understand how Server Side Rendering (SSR) works. If you are already familiar with SSR feel free to skip this section. SSR is a web development technique that renders a web page on the server rather than in the browser. View more...What Is SQL Injection and How Can It Be Avoided?Aggregated on: 2024-08-16 18:37:57 SQLi is one of the code injection techniques that may enable an attacker to modify the queries that the application provides to the database. By far the most frequent and severe web application security threats always hide in web applications that have some connections with a database. From such SQL injections, attackers can get around the login procedure, get, change, or even update the database, perform the administrative procedure, or do whichever variants. Understanding SQL Injection To be able to explain what SQL Injection is, one has to understand some basic principles of SQL. Indeed, it has become the common language of dealing with and virtual manipulation of these databases. It is employed in querying, inserting, updating, and erasing database records and is used by nearly all web applications to access their database; it is authored in PHP, Python, Java, PIA Utah VPN and . NET. View more...Aren’t We Transformed Yet? Why Digital Transformation Needs More WorkAggregated on: 2024-08-16 17:22:57 Digital transformation remains a clear focus for many organizations, with proactive leaders seeing opportunities worth navigating the complexities of technology and process disruption. According to Kristy Ellmer, a managing director for Boston Consulting Group, “thirty percent of any given sector is in transformation at any given time. Companies that go into a transformation mindset when they’re in a place of strength will be more successful than if they do it reactively. And then how you execute it and move the organization behind it is what actually creates competitive advantage.” View more...Default Map ValueAggregated on: 2024-08-16 15:37:57 In this post, I'll explain how to provide a default value when querying an absent key in a hash map in different programming languages. Java Let's start with Java, my first professional programming language. View more...The Relationship Between Performance and SecurityAggregated on: 2024-08-16 14:22:57 The software landscape has undergone a profound transformation over the past two decades. In the past, a substantial portion of software was designed for local desktop use. However, today, the norm for computer users is to access web-based software services through a web browser. With the prevalence of web-based software, the paradigm has changed. We, as users, have our data residing on someone else’s server. It mostly doesn’t matter how robust your computing device is, as everything happens on servers. View more...Why AI-Assisted Code Generation Is Transforming Software DevelopmentAggregated on: 2024-08-15 22:37:57 Software development and architecture is continuously evolving with artificial intelligence (AI). AI-assisted code generation stands out as a particularly revolutionary advancement, offering developers the ability to create high-quality code more efficiently and accurately than ever before. This innovation not only enhances productivity, but also opens the door to new possibilities in software creation, particularly in the realm of microservices development. The Evolution of Code Generation: Traditional Coding vs. AI-Assisted Coding Traditional coding requires developers to write and test extensive lines of code manually. This process is time consuming and prone to errors. Conversely, AI-assisted code generation leverages machine learning algorithms to analyze patterns in existing codebases, understands programming logic, and generates code snippets or entire programs based on specific requirements. This technology can drastically reduce the time spent on repetitive coding tasks and minimize human errors. It is not a substitute for developers, but rather a productivity tool that eliminates tedious and monotonous infrastructure and plumbing code. View more...Tour of Snowflake Ingestion Using CockroachDB and Redpanda ConnectAggregated on: 2024-08-15 20:22:57 Previous Articles on Snowflake Integrating Snowflake with Trino Previous Articles on CockroachDB CDC Using CockroachDB CDC with Apache Pulsar Using CockroachDB CDC with Azure Event Hubs SaaS Galore: Integrating CockroachDB with Confluent Kafka, FiveTran, and Snowflake Using CockroachDB CDC with Confluent Cloud Kafka and Schema Registry CockroachDB CDC using Minio as cloud storage sink CockroachDB CDC using Hadoop Ozone S3 Gateway as cloud storage sink Motivation I work with financial services clients, and it's common to encounter a need for streaming changes in the operational data store into a data warehouse or a data lake. A former colleague recently reached out for advice on the fastest and most efficient way to load trade data into Snowflake. I've come up with at least three methods, which I will explore in a follow-up series of articles. However, I've decided to first explore Redpanda Connect, a solution that has recently caught my attention. This is by no means a conclusive guide on how changefeed data must be loaded into Snowflake; we're merely exploring the possibilities and discussing the pros and cons in later articles. CockroachDB changefeeds are an enterprise feature and require a license. In this tutorial, I'm using a free-to-start version of CockroachDB Serverless, which has enterprise changefeeds enabled. View more...Unboxing the Black BoxAggregated on: 2024-08-15 18:37:57 Today, several significant and safety-critical decisions are being made by deep neural networks. These include driving decisions in autonomous vehicles, diagnosing diseases, and operating robots in manufacturing and construction. In all such cases, scientists and engineers claim that these models help make better decisions than humans and hence, help save lives. However, how these networks reach their decisions is often a mystery, for not just their users, but also for their developers. These changing times, thus, necessitate that as engineers we spend more time unboxing these black boxes so that we can identify the biases and weaknesses of the models that we build. This may also allow us to identify which part of the input is most critical for the model and hence, ensure its correctness. Finally, explaining how models make their decisions will not only build trust between AI products and their consumers but also help meet the diverse and evolving regulatory requirements. View more...A Hands-On Guide to OpenTelemetry: Visualizing Instrumentation for Developers Using JaegerAggregated on: 2024-08-15 17:22:57 Are you ready to start your journey on the road to collecting telemetry data from your applications? Great observability begins with great instrumentation! In this series, you'll explore how to adopt OpenTelemetry (OTel) and how to instrument an application to collect tracing telemetry. You'll learn how to leverage out-of-the-box automatic instrumentation tools and understand when it's necessary to explore more advanced manual instrumentation for your applications. By the end of this series, you'll have an understanding of how telemetry travels from your applications to the OpenTelemetry Collector, and be ready to bring OpenTelemetry to your future projects. Everything discussed here is supported by a hands-on, self-paced workshop authored by Paige Cruz. View more...Revolutionizing Billing Processes With AI: Enhancing Efficiency and AccuracyAggregated on: 2024-08-15 15:37:57 The market for software as a service (SaaS) has expanded at an extraordinary pace and given businesses access to scalable solutions. However, one major difficulty still stands in its way: generating and collecting revenue efficiently and accurately. Traditional billing systems often prove inadequate leading to inefficiencies and inaccuracies. This blog post examines the integration of AI into SaaS pricing methods, with a focus on improving efficiency and effectiveness by highlighting data analysts, data scientists, data product managers, and data-driven software professionals. The Role of AI in Modern Billing Systems Artificial Intelligence (AI) is changing the face of Saas business by addressing many challenges related to traditional billing systems. Fundamental technologies like machine learning (ML), predictive analytics, or automation simplify billing processes and make them more accurate. View more...Large Language Models: Changing the Game in Software Development With Code Generation, Debugging, and CI/CD IntegrationAggregated on: 2024-08-15 14:22:57 With AI, the domain of software development is experiencing a breakthrough phase with the continuous integration of state-of-the-art Large Language Models like GPT-4 and Claude Opus. These models extend beyond the role of traditional developer tools to directly assist developers in translating verbal instructions into executable code across a variety of programming languages, which speeds up the process of coding. Code Generation Enhancing Developer Productivity LLMs understand context and generate best-practice pieces of code, making them very good at enhancing the productivity of developers and their future research. They work as a developer on-call assistant, offering insight and alternatives that may even elude more experienced programmers. Such a role gains a lot of importance in large and complex projects where the integration of different software modules might introduce subtle, sometimes undetectable bugs. View more... |
|