This article is a continuation of Part 1, ‘Kafka Technical Overview.’ In Part 2 of the series, let’s look into the details of how a Kafka producer works and important configurations.

Producer Role

The primary role of a Kafka producer is to take producer properties, record them as inputs, and write them to an appropriate Kafka broker. Producers serialize, partition, compress, and load balance data across brokers based on partitions.

Source de l’article sur DZONE

Anyone who is acquainted with the concept of iOS app development knows that testing an app is a crucial part of the development process. However, many people don’t know about an especially important subset of testing — beta testing. Also referred to as end-user testing, or pre-release testing, or user acceptance testing (UAT), beta testing involves the product being tried out by a small section of the target audience. At this stage, apps undergo real-world testing, and the early users’ experiences are analyzed to make essential changes before the app is added to the App Store.

While several mediums enable beta testing, iOS apps are known to be quite complicated. There is, however, one alternative that has proven to be quite handy: TestFlight. Launched in 2011, it does away with the inconvenience that accompanies distribution and management of beta builds. It has this ability to ease the entire process to a great extent that led to Apple integrating TestFlight into App Store Connect.

Source de l’article sur DZONE

Welcome to our latest episode of Tom’s Tech Notes! In this episode, we’ll hear advice from Heide Abelli, senior VP of Content Product Management at Skillsoft. Together, the two of them will talk about how IT professionals can improve themselves as well as how companies can foster good learning environments for their employees.

This interview comes hot off the heels of Skillsoft Perspectives 2019, so settle in and see how and where you should be focusing your self-improvement.

Source de l’article sur DZONE

Photo credit by Unsplash/Hermes Rivera

It’s no secret these days that AI is a big deal in the world of business. According to Gartner, the percentage of enterprises using the technology has jumped astronomically over the past several years, tripling in the last year alone.

Source de l’article sur DZONE

In this episode, Andrew and Paul discuss the issue of tracing and debugging microservices in Kubernetes. This is a technical deep dive into a subject that can make or break your ability to build, test, and operate a large production system.

A while back we wrote an article "Best Practices for Tracing and Debugging Microservices" that has turned out to be our most viewed web page ever on the 345 site. The original article is a brief look at some of the main considerations, so when we were looking for a subject for our first podcast episode this was an ideal candidate.

Some of the main points from the episode:

Source de l’article sur DZONE


Introduction

This time it won’t be my favorite rant about certain operating system. Instead, just a few thoughts about the psychology of bad code.

The broken windows theory, an academic theory proposed by James Q. Wilson and George Kelling in 1982, is a metaphor for disorder within neighborhoods. Their theory links disorder and incivility within a community to subsequent occurrences of serious crime. – Encyclopedia Britannica 

The Tale of Shrubbery Code

Once, in the past, me and my team had a discussion about event handlers in front-end code. We looked in bewilderment at some ancient code. Something similar to this Vanilla JS (I’m a big fan of Vanilla JS, to be clear):

Source de l’article sur DZONE

As DevSecOps takes hold in organizations, there’s a noticeable difference in the maturity of application security testing practices for mobile apps versus web apps. NowSecure sought to understand the role of DevSecOps in the mobile application development lifecycle by polling IT leaders about their release and testing practices. Consult this infographic to see how your organization stacks up against your peers and the top benefits companies have achieved by incorporating security testing into mobile DevOps.

Source de l’article sur DZONE

Photo credit by Unsplash/Lionello DelPiccolo

Let’s be real: We could all use some time away from the office. Even if it’s just a business trip to middle-of-nowhere Kansas – I can say that because I’m from KS; don’t @ me – a change of scenery is one of the best things there is for the soul.

Source de l’article sur DZONE


The Internet of Things, or IoT, is what allows us to take the power of computing beyond desktops, servers, and smartphones. The goal of IoT is to integrate all the “things” in the world and enable them to send or receive information, or both. If you use devices like Amazon Alexa or Google Home, you’re already interacting with IoT on a basic level. But IoT extends well beyond household devices: International Data Corporation (IDC) estimates that by 2022, global expenditure on IoT devices will exceed $1 trillion.

In this article, we’re going to look at some of the IoT systems in use within our world. We’ll talk about the security considerations with these systems, and finally, we’ll look at how CyberArk’s Conjur can be used to create more secure and well-managed IoT applications.

Source de l’article sur DZONE

Photo credit by Unsplash/Japheth Mast

It turns out, getting an interview at Google is easier than you’d think. Well, at least if you’re an honest person who knows how to use spellcheck.

Source de l’article sur DZONE