There are many great articles out there on microservices. For those who have been hiding under a rock about the controversial technique—or are new to the idea—this article simply aims to collate the top open source tools available in one handy place. Microservice architecture, or just microservices, is a highly scalable structural style for developing software systems. Such architecture can be used for enterprise applications for businesses, governments, schools, and charities, etc. It is quite the opposite of the legacy-style monolithic architecture that focuses on a single unit application.

Microservices are small, independent, and unique. And the architecture can be complex in both construction and maintenance. Microservices communicate with each other to serve business goals utilizing synchronous protocols, HTTP/REST or asynchronous protocols. HTTP/REST or AMQP are examples of collaborating services that implement functions related to one another to work as efficiently as possible.

Source de l’article sur DZONE

In this article, I will explain how to implement a logic in Mule ESB that will avoid parallel processing or simultaneously running of the same mule application. 

This Mule Application is triggered via HTTP GET Request. Once there’s a new request, it will create a variable #[flowVars.correlationId], which the value came from #[message.rootId]. This ID is a unique identifier of a particular Mule process and in this application, it will be stored inside the Cache Scope as a payload using the Transform Message { correlationId: flowVars.correlation } (Map Object Data Type). Then after that scope, we have a Choice Router that will determine if there’s an existing running process or not by checking if the #[payload.correlationId == flowVars.correlationId] (TRUE means there’s no cached data yet) response an HTTP status 200, if FALSE return HTTP status 409 Conflict.

Source de l’article sur DZONE

To secure AWS resources 24-7 from unwanted attacks, the right combination of VPC, Network Access Control Lists (NACLs), and Security Groups are a must. AWS Security Groups are cloud firewalls that help protect applications and data.

AWS Security Groups (SGs) restrict access to certain IP addresses or resources. It guards your AWS security perimeter, always, provided you configure them in the right way! Here are the five best practices you can never ignore while configuring AWS SGs.

Source de l’article sur DZONE

As the number of systems within an IT infrastructure increases, the number of integrations needed by enterprises also multiplies. Recognizing that the old times of overnight file exchanges are no longer meeting real-time demands, a well-organized enterprise integration strategy is a critical success factor when your systems need to be connected all day.

In this webinar with Enno Runne, Tech Lead for Alpakka at Lightbend, Inc., we’ll look at why integrations should be viewed as streams of data, and how Alpakka—a Reactive Enterprise Integration library for Java and Scala based on Reactive Streams and Akka—fits perfectly for today’s demands on system integrations. Specifically, we will review:

Source de l’article sur DZONE

DevOps has become more than a trend—it’s a survival imperative for the enterprise. In today’s digital economy, software innovation drives business innovation.  The faster developers can deliver on the next wave of software innovation, the faster the business can deliver customer value, bring new revenue streams online, and respond to market events. DevOps practices across the enterprise can deliver business results at the speed and quality customers expect.  

Many IT organizations start their DevOps journey implementing automation and tools only to quickly face hurdles when trying to scale DevOps practices across the organization.  Their journey starts to take a detour as they struggle with organizational boundaries, unwieldy system-wide processes, and cultural resistance to change. It’s common to blame the people and teams that are not getting on board, but to quote Edward Deming, “People work in the system, management creates the system.”

Source de l’article sur DZONE


Python and Machine Learning

In this article, we will introduce you to Machine Learning with Python. Moreover, we will discuss Python Machine Learning tasks, steps, and applications. Then, we will take a look at 10 tech giants that adopt Python Machine Learning to improve what they do.

So, let’s begin!


Source de l’article sur DZONE (AI)


SQL Books

In this article, we are going to learn about 9 books in SQL and provide the details of SQL Books for beginners, as well as advanced learners.

Let’s get started!

Source de l’article sur DZONE

There is a simple principle for naming methods in OOP. I’m trying to demonstrate this in the following code — it’s a verb if it manipulates; it’s a noun if it builds. That’s it. Nothing in between. Methods like saveFile() or getTitle() don’t fit and must be renamed and refactored. Moreover, methods that "manipulate" must always return void, for example, print() or save(). Let’s take a closer look!

The Night Of (2016) by Richard Price et al.

Source de l’article sur DZONE

From time to time in your life, you probably need to reach out to someone. This might be someone you barely know or used to know. It might be a complete stranger.

But if you’re reaching out to them, it’s probably because you want something or need something. And if they don’t know you very well, you’re on thin ice from the get-go with this outreach. This is easy to get wrong.

Source de l’article sur DZONE

For autonomous vehicles to successfully navigate myriad road obstacles, AI must be constantly trained to accurately perceive real-world 3D objects for what they are — traffic cones, pedestrians, electric scooters, etc. In order to do so, 2D images and video collected by sensor cameras must be refined and then annotated into 3D cuboid training data, which autonomous vehicle AI systems can leverage to become more intelligent. (This same method of creating 3D cuboid training data is also useful for teaching perception to AI in the field of robotics.) With cuboid annotation, drawings are first done manually and then calibrated for greater precision through a dynamic mathematical process that provides full 3D data for each cuboid. It’s an interesting process, and here’s a look under the hood at how it works.

Manual Cuboid Annotation

Manually annotating 2D images requires, rather simply, drawing boxes representing two sides of a cuboid around an object, like so:


Source de l’article sur DZONE (AI)