SPONSOR AD Using a common online shopping scenario, this white paper examines 6 key microservices issues that Spring Boot and Hazelcast IMDG help address: sharing, asynchronicity, security, simplicity, evolution, and health. Download Now. |
In an ideal world, devs would like to be ethical in their work but they ultimately don’t consider it to be part of their responsibilities. This eMag sets out to understand why they might feel that way and whose job it is to take reasonable steps to ensure that tech products don’t harm users or anyone else. (eMag) |
Martin Fowler chats about the work he’s done over the last couple of years on the rewrite of the original Refactorings book. He discusses how this thought process has changed and how that’s affected the new edition of the book. (Podcast) |
In this podcast Shane Hastie, Lead Editor for Culture & Methods, spoke to Jeff Foster of Red Gate on their approach to continuous learning through 10% time, open space and running an internal conference. (Podcast) |
|
TOP AI, ML & Data Engineering NEWS HEADLINES |
-
-
|
Yuval Degani shows how hardware accelerations in Azure can be utilized to speed-up Spark jobs, with the aid of RDMA (Remote Direct Memory Access) support in the VM. (Presentation) |
- The New “Streams” Data Type in Redis 5.0
- New Features in Azure HDInsight 4.0
- Concept and Object Modeling Notation for Data Modeling NoSQL Databases
- And more...
|
SPONSOR AD - Configure UIs with camera settings
- Perform face detection by adding it to your app
Get this Video for $9 only with code ORIQS09. Offer valid till Nov 15, 2018. |
|
|
TOP DevOps NEWS HEADLINES |
-
-
-
-
|
Pieter Humphrey and Jared Ruckle discuss some of the features in CF 2.3, including polyglot service discovery, service instance sharing, Spring Cloud Services 2.0, PAS for Windows and Steeltoe.io. (Presentation) |
SPONSOR AD Get unmatched visibility into the way your applications behave. Identify performance bottleneck and optimize your application performance with Site24x7 APM Insight. Get started by monitoring 3 applications for $35 per month. |
|
|
TOP Development NEWS HEADLINES |
-
-
|
On October 21, 2018, GitHub users experienced a degraded service during 24 hours due to an incident caused by routine maintenance work. This led to the display of outdated and inconsistent information and to the unavailability of webhooks and other internal services for 24 hours. GitHub post-incident report shows where things failed and suggests how to improve site reliability. (News) |
|
Violeta Georgieva discusses the architecture of Reactor Netty along with the major features and best practices and recommendations which are demonstrated with live coding. (Presentation) |
Juergen Hoeller illustrates the benefits of a JDK 8 baseline and the compatibility challenges on JDK 11, providing upgrade advice for Spring applications on the classpath and the module path. (Presentation) |
Ben Hale and Rossen Stoyanchev explore how to create a fully reactive multi-service architecture utilizing the RSocket protocol. (Presentation) |
|
Jeremy Clark discusses consuming asynchronous methods with Task, covering continuations, cancellation, and exception handling. (Presentation) |
|
TOP Dynamic Languages NEWS HEADLINES |
-
-
-
-
-
|
Learn how to use Vue CLI to build a Vue.js 2 application for searching and displaying Giphy images, and then manipulating/transforming them by using the Cloudinary API. Also, you'll learn how to deploy this application to AWS. (Article) |
|
Chelsea Komlo looks at what defense in depth means from a variety of roles and perspectives- from developers to architects, to building secure products for users who can't remember a 50-character password. She also talks about how defense in depth can help organizations prevent unforeseen attacks and limit damage when compromises do occur. (Presentation) The next QCon is QCon London, March 4-6, 2019. Join us! |
Angelo Prado discusses seven strategies for scaling and embedding security in a product. (Presentation) The next QCon is QCon London, March 4-6, 2019. Join us! |
Alex Holden shares his lessons learned by observing and assisting with data breaches, and explains how to avoid them and what can be done to emerge successfully from a bad situation. It is a behind-the-scenes look into many major data breach dynamics. (Presentation) The next QCon is QCon London, March 4-6, 2019. Join us! |
Get your monthly guide to all the topics, technologies and techniques that every professional or aspiring software architect needs to know about. Recent topics include serverless, chaos engineering and event-driven design. |
|
TOP Culture & Methods NEWS HEADLINES |
-
-
-
|
In the book Bitwise - A Life in Code, David Auerbach discusses the gap between how computers picture the world and how it really is, and provides his story of attempting to close that gap. The book explores how technology has impacted society and aims to make you think about what computers do to people. (Article) |
In a new book From Hierarchy to High Performance, the authors provide a series of essays designed to help “Unleash the Hidden Superpowers of Ordinary People to Realize Extraordinary Results”. The premise of the book is that the management structures and employee engagement systems that most organizations apply are not (may never have really been) relevant and useful for the 21st century. (Article) |
Illia Pavlichenko and Sergei Muzykantov share how MTS Kassa has adopted LeSS, some of the lessons learned and the failures encountered. (Presentation) |
Anastasiia Voitova goes through several stages of inception and implementation of database encryption and intrusion detection tools. She shows "behind the scenes" work inside a cryptographic engineering company, how customers are one of the most useful people to learn from, and how getting over "we tell you what to do" mentality makes security tools better. (Presentation) The next QCon is QCon London, March 4-6, 2019. Join us! |