Podcast: Configuration Manager Security — Protect the Protector!
3 hours ago, dzone

Cyberattackers are targeting ConfigMgr more often and in more ways than ever. In this podcast, MVPs Tom Degreef and Kim Oppalfens share their tips, tricks, tools, and techniques for securing ConfigMgr itself....

Vue Tutorial: How to Create an Interactive YouTube Video Selection
3 hours ago, dzone

In this post I want to share my observations during my implementation of an interactive YouTube Video selection in Vue. Maybe this can save you some time, if you plan to do the same. Let’s start with my motivation. It came from the improvements of the #BlueCloudMirror game UI. We decided to provide the #BlueCloudMirror users a recorded YouTube LiveStream of us. This video provides an awesome overview of our major technologies....

Using 'Critical Uncertainties' to Quickly Respond to Future Challenges
3 hours ago, dzone

Critical Uncertainties make planning for the future a little bit easier. Liberating Structures are a collection of interaction patterns that allow you to unleash and involve everyone in a group - from extroverted to introverted and from leaders to followers. In this series of posts, we show how Liberating Structures can be used with Scrum. Scrum is a framework that thrives on complexity. This could be complexity related to software development, product development, or something else in whic...

What is PaaS? Platform-as-a-Service Types Explained
4 hours ago, dzone

There's no single PaaS for everyone. Even the definition of this cloud computing service model is quite vague today. Commonly, it is described as a cloud hosting platform with a set of deployment and scaling automation, application management, and DevOps tools that can be run on shared infrastructure or on-premise. Also, PaaS eliminates the complexity of building and maintaining the underlying infrastructure. Let's see how PaaSes differ through the prism of their use cases and supported technolo...

Smart Pipes and Smart Endpoints With Service Mesh
4 hours ago, dzone

Microservices communicate significantly over the network. As the number of services grows in your architecture, the risks due to an unreliable network grows too. Handling the service to service communication within a microservices architecture is challenging. Hence the recommended solution has been to build services that have dumb pipes and smart endpoints. The first fallacy from the comprehensive list of ' Eight Fallacies of Distributed Computing ' is that the 'Network is reliable.'...

Java Class Name Locator in Selenium
4 hours ago, dzone

The CSS Locator in Selenium is one of the most important aspects of writing a script. If you cannot locate an element by using any CSS locator in Selenium, then being proficient at Selenium automation will be a tough task. Selenium provides multiple ways of locating an element. I have written a complete guide to help illustrate the practical demonstration of CSS locator in Selenium....

Would You Trust an Automated Doctor?
4 hours ago, dzone

You're in the park going for a run, and your wearable device is tracking your performance, your heart rate, and various other aspects of your physical health. Pooling this data over a period of time gives you a strong idea about your physical fitness. Combine that data with your diet, your genetic data, and your electronic medical records, and you can paint a comprehensive picture of your physical health. Making sense of this data, together with any symptoms you volunteer, is increasingly the p...

5 Reasons to Learn SQL This Summer
4 hours ago, dzone

Do you think summer is reserved for flying to warm places and hanging out at the beach? Sure! But it’s also a great time to learn new skills that you haven’t had time for. If you recently graduated from high school and want to get a head start on computer programming for college, learning SQL over the summer is a great opportunity. You have nothing to lose and everything to gain — SQL is easy to learn, especially with so much free time over the summer....

Writing Java APIs Using Apache Atlas Client
4 hours ago, dzone

In the previous blog, Data Governance using Apache ATLAS we discussed the advantages and use cases of using Apache Atlas as a data governance tool. In continuation to it, we will be discussing building our own Java APIs, which can interact with Apache Atlas using Apache atlas client to create new entities and types in it. How to Create New Entities and Types Using Atlas Client Atlas Client Maven Dependency The following dependencies can be used to update pom.xml:...

How to Make Simple End-To-End Tests With JavaTea
4 hours ago, dzone

Although automated testing is an effective way to validate web applications, creating automated tests is time-consuming and maintaining the tests is painful. End-to-end testing is especially complex and taking time to execute. To make it easier, this article proposes to use JavaTea, which is an end-to-end functional automation framework. It is built on Selenium WebDriver but it allows you to describe tests with less code compared to Selenium. The following three topics are focused in this articl...

Custom Text Classification in SmartReader
5 hours ago, dzone

Text classification is the process of assigning a set of predefined categories or tags to open-ended text. It is an important and fundamental part of Natural Language Processing with large applications like emotion analysis, sentiment analysis, labeling, etc. Text classification can be used for various purposes such as auto-tagging customer queries, understanding the sentiment of the audience from social media, categorizing articles, blogs into defined topics, etc. Nowadays, many companies are l...

An Angular PWA From Front-End to Backend: Kubernetes Deployment
6 hours ago, dzone

This is the fourth part of the series about the AngularPwaMessenger project. It is a chat system with offline capability. The third part showed how send and receive messages. This part will be about the deployment of the AngularPwaMessenger on a Kubernetes cluster with a Helm Chart. The Kubernetes cluster is provided by Minikube(V1.0.0 or newer) and Ingress is used as ssl endpoint. The image is available at DockerHub....

Deep Dive into Cloud Firewall: Addressing Aggressive Mining Worms
7 hours ago, dzone

According to the 2018 In-Cloud Mining Analysis Report released by the Alibaba Cloud security team, each round of popular 0-day attacks was accompanied by the outbreak of cryptocurrency mining worms. Cryptocurrency mining worms may interrupt businesses by occupying system resources. Some of them even carry ransomware (such as XBash), resulting in financial and data losses to enterprises. For many enterprises, improving the level of security and protecting against the threat of cryptocurrency mini...

Embracing Data Silos: Journey Through a Fragmented Data World
7 hours ago, dzone

Over the years of working in the big data and machine learning space, we've frequently hear dfrom data engineers that the biggest obstacle to extracting value from data is being able to access the data efficiently. Data silos, isolated islands of data, are often viewed by data engineers as the key culprit or public enemy number one. There have been many attempts to do away with data silos, but those attempts themselves have resulted in yet another data silo, with data lakes being one such exampl...

How to Deal With Different JDK Versions and Vendors
7 hours ago, dzone

We're going to talk about an open source project that includes a generator to build all needed scripts to create JDK and JDK/Maven Docker images. Why Basic Docker Images Again? Different people or organizations maintain the available "original" Docker images. This situation leads to small differences, and this was leading to different behaviors while using these images at runtime. Instead of hunting bugs, I decided to create a clean and straightforward solution. All Docker images are using the o...

What Is Continuous Deployment? Everything You Need to Know
8 hours ago, dzone

Many developers have asked the same question: what is continuous deployment? We provide an answer. There are 3 common methods for managing software development and deployment: Continuous Integration Continuous Delivery, and then there’s Continuous Deployment. Although they’re often confused for each other, they’re distinctly different....

15 WPF Performance Tips for 2019
8 hours ago, dzone

Are you a WPF developer? Do your WPF apps have areas of poor performance or don’t run as quickly as you would like? If so, I have 15 tips to help you identify and improve the performance of your WPF applications. While WPF is over a decade old and has been improved greatly over the years, there are still several areas that can suffer from poor performance. The reasons for this poor performance include things such as bad coding practices, broken bindings, complex layouts, the lack of UI virtuali...

Serverless Technology and Integration With DevOps: An Interview With Glenn Buckholz [Video]
8 hours ago, dzone

Glenn Buckholz, a technical manager at Coveros Inc., discusses methods to gain an understanding of serverless technology, the motivation behind businesses moving to serverless technology, and how a serverless infrastructure changes your testing strategy and bug reports. Originally published on StickyMinds. ...

A Bootiful Podcast: IBM's Pratik Patel on Java, Functions-as-a-Service, Cloud Infrastructure, Spring, and More
10 hours ago, dzone

Hi, Spring fans! This week, Josh Long (@starbuxman) speaks to @IBM’s Pratik Patel (@prpatel) about function-as-a-service, Spring Cloud Function, Spring, Java, and Devnexus. Check it out....

Apache HTTP 2.4: How to Build a Docker Image for SSL/TLS Mutual Authentication
10 hours ago, dzone

Many times I have to write clients that need to interact with services (HTTP, SOAP, REST, etc.) that are protected by an SSL/TLS Mutual Authentication mechanism. For this reason, I decided to create a project whose purpose is to provide a ready-to-use template and which realizes a mutual authentication or bilateral SSL/TLS authentication system based on Apache HTTP. In this way, I have the possibility to test the client, in particular, the process of mutual authentication. In this article, I wil...

Next