Well, the main.ts is the entry point for the Angular application. Here, we’re not able to query instances of services or get them injected because we’re outside of the Angular application. It looks like that storage object is completely decoupled from the Angular application as well, so any dependency injection you’re after you’d have to do yourself.

Also of note: while I can’t find any explicit documentation on this, Amazon’s example of this Storage class has all of its properties as static, so I’m not sure if the configuration is expecting an instance of a class at all.

Source de l’article sur DZONE

Today we held an internal, yep, an internal only mini Red Hat Summit.

This is a chance for talks to be presented select content to an internal worldwide audience at Red Hat, but that does not mean that all the content is confidential. That means I would be remiss if I didn’t share my session content.

Source de l’article sur DZONE


Welcome to the future. Life is good, but it can be better. And why shouldn’t it be? All you need is to want it. Think about finally having everything you always wanted.

— Max Lord (Wonder Woman 1984)

Source de l’article sur DZONE

I love side projects. They give me the opportunity to flex my creative muscles and tinker with tech like the Internet of Things (IoT) in new ways. Fortunately, I didn’t have to look far for my next one; a common conundrum for pet owners fueled this concept for an IoT dog collar.

My dog had been out in the backyard for a while. When I decided it was time to bring him back into the house, I couldn’t find him anywhere! After several minutes of searching and calling his name, I found him napping in the shade of a tree. If this scenario sounds all too familiar to you, then this post is for you!

Source de l’article sur DZONE

The beginning of 2020 put the world in a hard situation. The coronavirus outbreak and its distribution has affected not only particular countries but the global economy on the whole. SMBs and enterprises worldwide are experiencing the catastrophic impact of the COVID-19 pandemic. 

To cope with unexpected difficulties, companies are compressing their budgets and searching for the ways to reduce their costs. They are striving to optimize a number of processes to cut app development expenses and save efforts since they have no extra money to pay for outsourced development services.

Source de l’article sur DZONE

For this document, we have created an Angular UI application and containerized it using NGINX for OpenShift 4.3.

Deploying Application by Updating Dockerfile

By default, OpenShift Container Platform runs containers using an arbitrarily assigned user ID. This provides additional security against processes escaping the container due to a container engine vulnerability and thereby achieving escalated permissions on the host node.

Source de l’article sur DZONE

Machine learning and artificial intelligence, in general, have been on everyone’s lips for some time now. While the topic of AI is in the foreground in the media, most people (especially the management) still don’t know how machine learning is best applied.

Ultimately, machine learning can be described as a synergetic relationship between man and machine. Machine learning in practice requires the application of the scientific method and human communication skills. Successful companies have the analytical infrastructure, know-how, and close collaboration between analysts and business professionals to translate these synergies into ROI.

Source de l’article sur DZONE

Just a couple of years ago, serverless was a sparsely used technology, recognized mostly for its cost-efficiency. Today, we’re seeing a radical shift in the attitude towards serverless. Developers have begun to realize that serverless not only minimizes operational overhead but can considerably enhance core applications in production. As cloud vendors continue to develop their serverless offerings, serverless is being used in production more than ever before.

In this blog post, we explain what serverless is, dive into some of its major advantages, and point out some factors contributing to its growing popularity.

Source de l’article sur DZONE


Steps to Use JCE Encrypt and JCE Decrypt Connectors

  1. Check if Crypto module is available in Mule Palette. If not, download it from exchange.
  2. Then, search for JCE in the Mule palette. The Crypto module should be visible now.

Mule pallette
3. To use Jce encrypt and decrypt connector, we need a keystore.

  • Generate a keystore using following command:  

keytool.exe -genseckey -alias jksvalue -keyalg Blowfish -keystore encKeystore.jceks -keysize 128 -storeType JCEKS

Source de l’article sur DZONE

SOLID is one of those words we developers throw around us, implying some deeper meaning, hopefully helping us to create better software systems. It should be second hand nature to all (OO) developers, but unfortunately is often misunderstood, or used to defend a decision, based upon flawed logic. Hence, in this article, I will try to "dumb it down" and use analogies for each of its 5 items, in an attempt at making it more easily understood, to avoid confusion.

Single Responsibility Principle

The "S" I’m solid implies that each class should only do one thing. It often helps to break down your flow into verbs to make sure you follow this principle. For instance, imagine you have a task scheduler, that should implement the ability to create tasks for execution at some point into the future. Maybe you want it to have the ability to persist tasks, in case the process is recycled, without dropping tasks. Imagine Hangfire here as an example. Well, ask yourself how many verbs you have in the above feature requirement, and then try to group them into related actions. I could find the following.

Source de l’article sur DZONE