You are hereFeed aggregator / Sources / Dzone

Dzone


Syndicate content
Recent posts on DZone.com
Updated: 56 min 46 sec ago

Would You Use JSF for Your Next Project?

1 hour 55 min ago

There was an excellent StackOverflow blog post last week about the “Brutal Lifecycle of JavaScript Frameworks”. The article was about the speed at which JavaScript UI frameworks (Angular, Jquery, and React) come into and fall out of fashion. The key metric for this post is questions per month on the framework, which is a reasonable metric to demonstrate these trends. Downloads would have been interesting too.

It got me thinking: Where are we with JSF? And my starting point was to superimpose JSF on top of the JavaScript data.

Categories: Technical

How to Build Cross-Platform .NET Core Apps

2 hours 55 min ago

<!-- Google Tag Manager (noscript) --> <iframe src="https://www.googletagmanager.com/ns.html?id=GTM-PDSRGWC" height="0" width="0" style="display:none;visibility:hidden"></iframe>

One of the main reasons for using .NET Core is that you can run it on multiple platforms and architectures. So you can build an app that will run on Windows, but also on Linux, macOS, and on different architectures like x86 and ARM. This is perfect for lots of scenarios, including desktop applications.

Categories: Technical

MCUXpresso IDE With i.MX RT1052 Crossover Processor

2 hours 55 min ago

In Eclipse MCUXpresso IDE 10.1 with integrated MCUXpresso Configuration Tools, I mentioned that I wanted to try the i.MX RT1050 processor. Well, finally my ordered board from Mouser arrived, right on time for the weekend, so I had a chance to use that ARM Cortex-M7 running at 600 MHz.

i.MX RT1050 EVK

Categories: Technical

Splitting Strings: How to Work With Consistent Data in SQL Server

2 hours 55 min ago

If you're a developer, you always find sanctuary in code, but there are times when you're presented with data in an unusual format and things can get... strange.

For example, I'm working with a client where they provide me with an Excel spreadsheet of rows and want to import the data into SQL Server.

Categories: Technical

Crime Analysis Using H2O Autoencoders (Part 2)

2 hours 55 min ago

This is the second part of a two-part series of Crime Analysis using H2O Autoencoders. In Part 1, we discussed building the analytical pipeline and applying deep learning to predict the arrest status of the crimes happening in Los Angeles, California. Our machine learning model can be deployed as a JAR file using POJO and MOJO objects. H2O-generated POJO and MOJO models can be easily embeddable into Java environment based on the autogenerated h2o-genmodel.jar file.

In this article, let's discuss deploying the H2O autoencoders model into a real-time production environment by converting it into POJO objects using H2O functions. As autoencoders don't support MOJO models, the POJO model is used in this article.

Categories: Technical

Spring Boot: Integrating Static Content

2 hours 55 min ago

This guide will help you create a simple web application with Spring Boot. We will add static content (CSS and JS) and use it from a JSP view.

You Will Learn
  • How to Bootstrap a simple project with Spring Initializr.
  • How to initialize a basic web application for Spring Boot.
  • How to add a JSP for a web application.
  • How to add static content - JS and CSS.
Tools You Will Need
  • Maven 3.0+ is your build tool.
  • Your favorite IDE. We use Eclipse.
  • JDK 1.8+
Overview of the Web application

We will build a static todo page (unformatted) rendered using a JSP.

Categories: Technical

Real User Monitoring and User Tracking: How Are They Different?

2 hours 55 min ago

Are you wondering about the differences between Real User Monitoring and User Tracking?

This post has you covered.

Categories: Technical

Moving Data From the Basement to the Boardroom

2 hours 55 min ago

According to IDG, 35% of companies with effective data grow faster year-over-year; however, many still take little notice of data quality or ongoing data management, pushing it into the deepest corners to eventually be abandoned and forgotten.

If this sounds like you, it’s time to consider putting data at the top of your business agenda again.

Categories: Technical

Make or Break, Design Does Both

2 hours 55 min ago

The design process is one of the most important parts of any software project. In this article, I am going to address one of the situations which might happen in an Agile project. Let's start with my experience which can help you to understand the situation. In a period of time, some components of projects became famous. This popularity happened not because they played a significant role in the application but because you can find them always in any to-do list, doing list and done list. So, it means there is always an issue or a breaking change but at the end, you could see them again in the next two Sprint with another issue. It became bothersome to see that part of the project is fragile which has always influenced the all other parts of the project. The most damage was an amount of time which team should spend on this and it was really hard in the middle of the project to start from scratch. Most team members were complaining about this situation and for a client, the most important thing was to keep production working. I think you can imagine how the situation can be chaotic like this. So, let's take a look at how we define a design process in Agile.

Problem: Lack of Design

In Agile, we have a cycle in which you have between 1 to 4 weeks' time for each sprint and you should have a complete software development cycle in each iteration. Usually, after the analysis step, we have the design part where designers usually analyze a requirement which is defined by a user story to come up with a design and then a team will make a plan to implement it.

Categories: Technical

How to Add JARs to a JetBrains MPS Project

4 hours 55 min ago

JetBrains MPS is a wonderful tool to create DSLs. We love it and use it regularly in our consultancy work, and we have written about JetBrains MPS before.

Being a projectional editor, it allows you to easily create DSLs that can be used through a graphical interface or things like mathematical formulas, though all this power requires a bit of preparatory work.

Categories: Technical

Finding Code Smells Using SQL Prompt: Procedures That Lack Schema-Qualification

6 hours 54 min ago

SQL Prompt implements a static code analysis rule, PE001, which will check code automatically during development and testing work for occurrences of a stored procedure being called via the EXECUTE command without the schema being specified.

Even when you don't have to qualify the name of a stored procedure — that is, whenever the procedure is in your default schema — performance is slightly better if you specify the schema and it makes the code more intelligible to others, more consistent, and easier to refactor.

Categories: Technical

Bootstrapping Microservices - Getting Your Microservice Architecture Ready

6 hours 54 min ago

The computing world has seen increasing attention on microservices software architecture in order to enhance software scalability and efficiency. Microservices brings many benefits for tech organizations. However, it is also clear that despite the benefits of modularization and containerization, many organizations continue to struggle with microservices.

A microservices-based application comprises numerous tiny independent services that are integrated with each other to offer the desired software functionalities. While these tiny individual services may be simple, there is a significant complexity that arises from their interaction in an effort to orchestrate the desired business operations. While in practice, the idea of microservices works excellently, in reality, the complexity rises considerably.

Categories: Technical

An Introduction to Q#

6 hours 54 min ago

Introduction

In this article, I will be talking about Q# – the new programming language introduced by Microsoft for quantum computing. We will go over the data types, expressions, and statements of Q# with the help of code snippets.

Prerequisites

Please visit my earlier article An Introduction To Quantum Computing to get a basic understanding of Quantum Computing and to also know how to install Quantum Development Kit in Visual Studio 2017.

Categories: Technical

Tetris and AI: Next Steps After a Failed Experiment

6 hours 54 min ago

The theoretical background for this experiment is available here, and the source code is available on GitHub.

Since my last experiment, I have implemented crossover, AKA a two-parent evolutionary algorithm. I have also tried changing the network structure to have two smaller hidden layers instead of one large one. The hypothesis was that this would allow more complex structures and concepts to be understood by the network. Both of these approaches have failed and that has led me to conclude that this model is a failure. A network like this is not well-suited to Tetris.

Categories: Technical

Eleven Continuous Delivery Anti-Patterns

6 hours 54 min ago

This article is featured in the new DZone Guide to DevOps. Get your free copy for more insightful articles, industry statistics, and more! 

Continuous Delivery (CD) is a design technique that is used in software engineering to automate and enhance the process of software delivery. Software is considered to be notoriously difficult to ship, and CD practices facilitate the capability of organizations to quickly and reliably push software features, enhancements, or bug fixes to production that result in improved business value for the customer.This article focuses on some of the important anti-patterns that are prevalent while implementing CD and which need to be addressed for an organization to implement effective CD practices to enhance business and organizational agility.

Categories: Technical

What Are The Keys To A Successful IoT Strategy?

6 hours 54 min ago

To gather insights on the current and future state of IoT, we talked to 23 executives involved with IoT. We asked them, "What are the keys to a successful IoT strategy?"

Value
  • Understand that collecting all of the device data is the easy part. How you use and derive value from the data is the most important step.
    1. What is the product or service being created? What is the benefit being provided? What is the value you are adding?
    2. What is the business model? Subscription models are more successful if you are adding convenience or value. Your strategy needs to be clearly articulated.
    3. Operational efficiency. Evaluate and operationalize better to save money. You need to articulate the value to the customer. What’s the ROI? You need a new stream of revenue to boost the bottom line. Everyone collects a lot of data. Not all of the data is useful. Analyze the data remotely and decide what is sent back to the data repository. Filter to capture the most meaningful information to save money and see insights more easily.
  • I believe the core components of IoT — connectivity, sensor data, and robotics — will ultimately lead to a requirement for almost all ‘dumb’ devices in order to become intelligent. In other words, the IoT needs smart machines. Hence the need for AI. AI will have a profound impact on every aspect of our personal and working lives — an impact that will be magnified and multiplied by its combination with the IoT. To get there, companies need to discern what data customers want (and will be willing to pay for) to decide on which sensors or communication protocols, for example, best suit their product and their customer. IoT is prompting companies to form a new mindset around servicing clients. So, businesses must move rapidly to identify how they’ll derive value from combining AI and IoT.
Business Need
  • What is the business need? What is the end user use case? Identify the appropriate technology to solve the business need. Define how success will be measured.
  • How are you gathering data from the edge to make real-time, informed business decisions?
  • Understand the complexity of deploying a successful project. How to develop the business model to provide new services to the customer. Ensure this makes business sense.
  • Identify a real need. Perhaps it’s your mission like ours is to reinvent the wasteful beverage supply industry. Use devices to ensure you are providing a great customer experience as well as gathering insights from customers. More sensors in the machine provide more information so you are able to troubleshoot problems (i.e. we are able to know if there is a water pressure problem or a problem with one of the parts of our dispenser before dispatching a service tech).
  • Get all of your data in one place. Operationalize the data and use in a real application.
  • Operationalize the entire network with business analytics. Increase production at lower cost with automation.
Customer Experience
  • What’s good for the consumer? What’s good for the business?
  • When it comes to CX:
    1. Establish a digital touchpoint with the customer themselves.
    2. Consider a bridging solution for self-service apps rather than direct connection by scanning a QR code or serial number for quicker resolution.
    3. Create a digital touchpoint into the client environment. Close loop on the backend to know how to improve CX, UX, parts, and service. Integrate frontend and backend. Use AR where additional support is required.
  • Clients often start with the technology. We try to get them to focus on the business value, engagement, personas, and capabilities. Solve pain and improve gains.
Other
  • Having a data fabric platform that enables applications to be holistic and inclusive of all data, real-time and legacy, seamlessly and securely.
  • Make it as easy as possible for the end user and minimize work needed by developers. Start with a kernel of usefulness. Start small and scale.
  • Every IoT application is a time series project. The collection, storage, analysis of data all with a time stamp. Business insights to solve problems. A different topology of use cases from smart meter environments to green wall technology monitoring.
  • The lessons we've learned include:
    1. Ensure the device is instrumented so the features can be monetized.
    2. Ensure the software on the device, especially Open Source, has a bill of materials with security vulnerabilities identified.
    3. Manage the initial distribution, installation, and updates once the device is in the field.
  • Be successful integrating devices with the software stack underneath and the apps created on top.
  • The keys to a success IoT strategy involve prioritizing data security, privacy, and protection. The first wave of IoT lacked necessary security features, so we want to ensure that our IoT sensors are among the most secure technologies on the market. Another tenant of success is to build a platform that aggregates data from multiple sensors into one unified platform/experience that leverages the latest machine learning and AI technologies. Having video as the primary sensor sets these platforms ahead. Be able to explore hypotheses with AI/ML to see trends humans are unable to see.
  • Adopt an iterative process whereby you are continually improving your device based on the data you are receiving. Be able to update your software and sensors remotely.
  • Success requires developers, manufacturers, security vendors, VARs, MSSPs and regulators across the entire device ecosystem to act in concert and strike a balance between ease of use and security. Market forces, as well as who responds best to the never-ending stream of new threats, will shape the eventual winners and losers in the IoT and connected devices market.

    Today, the vast majority of IoT devices are being deployed by the average home user. These users are not experts in networking and will gravitate toward devices that are simple and easy to install. To that end, device manufacturers need to ensure the ease of deployment does not significantly expand the attack surface of the average home network. In the past, we have seen devices which automatically open ports on a user’s home router/firewall, allowing direct access to IoT devices from the internet.

    While this makes it easy for users to remotely access things like video camera feeds, it also broadens the attack surface for the home network (making it a much easier target for malicious actors). Manufacturers have made improvements with the design and implementation of accessing devices remotely, and need to continue to include security in architectural design decisions.

    At the same time, network security vendors, VARs and MSSPs are recognizing that as the complexity and scale of attacks continue to increase, they can no longer play a “reactive” game trying to use signature-based approaches to prevent attacks. Rather, they need to harness much of the same technology and techniques of hackers, such as advanced AI-based systems to proactively identify anomalous behavior and predict future threats.
  • So many landscapes to choose from. Go with the platform that will solve your needs.

Here’s who we spoke to:

Categories: Technical

Modern Software Podcast: SaaS Security

6 hours 55 min ago

The New Relic Modern Software Podcast is back! For the first episode of 2018, I'm joined by my co-host, New Relic Developer/Evangelist Tori Wieldt, along with Lee Atchison, Senior Director of Strategic Architecture, to discuss the hot-button issue of SaaS security. Specifically, the heretical idea that your precious data may actually be safer with a Software-as-a-Service provider in the cloud than in your own data center.

You can listen to the episode below, subscribe to the New Relic Modern Software Podcast on iTunes, or read on for a transcript of the entire episode, edited for clarity:

Categories: Technical

Show Your Humanity by Making iOS Apps Accessible

6 hours 55 min ago

Apple takes accessibility very seriously for all their platforms to make sure all the iOS, macOS, tvOS, and watchOS apps are usable for everyone, including people with disabilities. Unfortunately, every human being is not the same; some people have disabilities like vision impairment, deafness, mental health conditions, or physical disabilities. However, technology has grown so much that people having disabilities can do all sort of things that other users do. They feel more enabled when technology helps them to make their lives happier. As an iOS application developer, we should also contribute to their lives with little efforts by making iOS apps accessible to everyone. In this post, we will see how to improve the accessibility of iOS apps to make apps accessible as well as testable.

Apple Accessibility Technologies

Apple has done a lot of work so far by improving the API that allows developers to make apps accessible. It takes very little effort and a little bit of code to make apps accessible to everyone, regardless of their needs.

Categories: Technical

PyDev of the Week: Christy Heaton

6 hours 55 min ago

This week we welcome Christy Heaton (@christytoes) as our PyDev of the Week! Christy is a blogger for the Python Software Foundation. You can see what she’s up to via her GitHub page or by checking out her website. Let’s take some time to get to know her better!

Can you tell us a little about yourself (hobbies, education, etc):

Categories: Technical

New Features in Apache NiFi 1.5: Registry and Version Control

6 hours 55 min ago

In 2018, some awesome new in-demand features came to my favorite Swiss Army Knife of IoT and enterprise development: Apache NiFi. Speaking of knives, for fun, say, “Apache NiFi” to Google Assistant.

OK, back to the awesome new release of Apache NiFi.

Categories: Technical