Welcome to curated list of handpicked free online resources related to IT, cloud, Big Data, programming languages, Devops. Fresh news and community maintained list of links updated daily. Like what you see? [ Join our newsletter ]

Haskell in enterprise: Interview with Rob Harrison

Categories

Tags functional-programming software-architecture web-development app-development

We’ve all heard about Haskell success stories from famous companies like Meta and Tesla. But did you know that Haskell is successfully used in plenty of enterprises, many of which you wouldn’t think of as being at the forefront of technology? By Gints Dreimanis.

We are living through a slow period of change towards functional declarative programming and away from procedural imperative approaches. This led me to research where some of these ideas came from originally, and subsequently to discovering category theory, which I see as a beautiful and highly useful framework for thinking about software and logic and relating this to the physical world around us

Our guest is Rob Harrison, a Lead Architect at Flowmo.co. He has worked as a technical lead on projects for clients like Vodafone and Tesco. . In the interview, we’ll be talking about his experience and techniques that he uses to bring the power of functional programming to consulting projects.

What do you think is the single biggest problem in the software development industry that functional programming solves?

If I were to pick one, I’d have to say parallelisation/concurrency. It’s a recent problem really, because for much of the history of software, there was only one CPU or core to execute anything on. This fact, along with the increase in available RAM seems to be the driver towards the functional declarative style in the industry as a whole. Mental models of computing where the programmer thinks their computer is still doing one instruction at a time are really no longer valid.

Follow the link to this very interesting interview to learn more!

[Read More]

From 50 ML projects, 48 made it to production within 2 weeks. How?

Categories

Tags big-data data-science cloud cio devops

Putting machine learning (ML) models in production is considered an operational challenge that is performed after all the hard work on training and optimizing the model is completed. In contrast, serverless ML starts with a minimal model, including the operational feature pipeline(s) and inference pipeline. By Jim Dowling.

In this article, we show you that writing feature pipelines and inference pipelines should not be hard and if you don’t have to configure/build the MLOps infrastructure yourself, getting to a minimal viable production model within a couple of weeks should be feasible for most models. You will learn:

  • The MVP for Machine Learning
  • 3 Programs: Feature, Training, and Inference Pipelines
  • When >90% build complete ML Systems

There is no such thing as a single machine learning pipeline - there are feature pipelines, training pipelines, and inference pipelines. And if you structure your ML systems as such, you too will be able to quickly build an end-to-end working ML system that can be iteratively improved. Good read!

[Read More]

Intrusion detection network – Protecting from cyber attacks

Categories

Tags infosec cloud cio miscellaneous how-to

As cyber threats continue to evolve, it’s essential for businesses to have systems in place to protect against attacks. One important tool in the cybersecurity toolkit is an intrusion detection network (IDN). By Priyanshu Sahay.

An IDN is a system that monitors a network for signs of unauthorized access or malicious activity. It does this by analyzing network traffic and looking for patterns or anomalies that could indicate an intrusion. If an IDN detects a potential threat, it can alert the system administrator or take automated action to prevent or mitigate the attack.

In this blog you will learn:

  • So, what is an IDN, and how does it work?
  • Types of Intrusion Detection Network (IDN)
  • How does a network intrusion detection system work?
  • How Intrusion Detection Network (IDN) helps from Cyber Threats?

It’s important to note that IDNs are just one part of a comprehensive cybersecurity strategy. Businesses should also consider implementing other measures, such as antivirus software, firewalls, and employee training, to help protect against cyber threats. Nice one!

[Read More]

AI and robotics – How are they connected?

Categories

Tags robotics management miscellaneous cio big-data

Robotics and AI are two fields that have created buzz worldwide. Artificial Intelligence (AI) refers to developing computer programs or machines that can perform tasks that normally require human intelligence, such as learning, problem-solving, and decision-making. By moonpreneur.com.

Robotics‌ refers to the design, construction, and operation of robots. A robot is a machine that can be programmed to carry out a series of actions automatically without human intervention. Robots can be used in various settings, from manufacturing and assembly lines to space exploration and search and rescue missions.

Leading countries in AI and robotics, 2015-2021

Source: https://moonpreneur.com/blog/ai-and-robotics/

How are Robotics and AI connected:

  • Robotics generate data for AI
  • AI improves robotics capabilities
  • AI and robotics create new opportunities
  • AI is used for controlling robots
  • Robotics facilitates AI research
  • The combination of robotics and AI is transforming various industries

Finally, the convergence of robotics and artificial intelligence is reshaping many sectors of the economy and the entire nature of technological progress. Robots and other forms of artificial intelligence are becoming smarter and more common in industries ranging from manufacturing to healthcare to agriculture and transportation. Good read!

[Read More]

NGINX tutorial: How to securely manage secrets in containers

Categories

Tags nginx infosec devops containers

Many of your microservices need secrets to operate securely. Examples of secrets include the private key for an SSL/TLS certificate, an API key to authenticate to another service, or an SSH key for remote login. Proper secrets management requires strictly limiting the contexts where secrets are used to only the places they need to be and preventing secrets from being accessed except when needed. By Robert Haynes of F5.

In this tutorial, we show how to safely distribute and use a JSON Web Token (JWT) which a client container uses to access a service. In the four challenges in this tutorial, you experiment with four different methods for managing secrets, to learn not only how to manage secrets correctly in your containers but also about methods that are inadequate:

  • Hardcode secrets in your app
  • Pass secrets as environment variables
  • Use local secrets
  • Use a secrets manager

Although this tutorial uses a JWT as a sample secret, the techniques apply to anything for containers that you need to keep secret, such as database credentials, SSL private keys, and other API keys. There is also configuration and code included together with youtube tutorial. Nice one!

[Read More]

Embracing the power of functional programming: A comprehensive guide

Categories

Tags functional-programming programming performance software

Functional programming has steadily gained traction in the software development world, thanks to its ability to create more maintainable, efficient, and robust code. By Arthur Frank.

In this blog post, author will delve into the core concepts of functional programming, discuss its advantages, and explore popular functional programming languages:

  • What is functional programming?
  • Key concepts of functional programming
    • Immutability
    • Pure functions
    • First-class functions
    • Higher-order functions
    • Recursion
  • Advantages of functional programming
  • Popular functional programming languages

Functional programming offers numerous benefits in terms of maintainability, testability, and modularity. This is nice and comprehensive introduction to the topic with pseudo code examples included. Nice one!

[Read More]

Pandas 2.0 and its ecosystem (Arrow, Polars, DuckDB)

Categories

Tags big-data data-science python programming

Data manipulation and analysis can be challenging and involve working with large datasets. Thankfully, a widely used Python library known as Pandas has become the go-to tool for processing and manipulating data. Pandas recently got an update, which is version 2.0. This article takes a closer look at what Pandas is, its success, and what the new version brings, including its ecosystem around Arrow, Polars, and DuckDB. By Simon Späti.

That makes it an excellent time to reflect on what Pandas is and why it’s successful. Further in the article:

  • What is Pandas
  • How does Pandas work?
  • What are the highlights of version 2.0
  • What changes code-wise?
  • What is Apache Arrow?
  • Why Apache Arrow?
  • Interoperability
  • When not to use Pandas
  • The alternatives
  • Polars: Riding the fast train of rust
  • DuckDB: The SQL version
  • What about Dask?
  • Others: Koalas, Vaex, VertiPaq

Apache Arrow sets the open standard to exchange in a heterogeneous data pipeline, which needs to read and share data among different steps. Overall, this article provides insights into the benefits of using Pandas, particularly with its 2.0 version, and the exciting changes in its ecosystem around Arrow, Polars, and DuckDB. Excellent read!

[Read More]

A deep dive into AIOps and MLOps

Categories

Tags big-data data-science devops cloud

Monitoring and managing a DevOps environment is complex. The volume of data generated by new distributed architectures (such as Kubernetes) makes it difficult for DevOps teams to effectively respond to customer requests. By Hicham Bouissoumer, Nicolas Giron.

The future of DevOps must therefore be based on intelligent management systems. Since humans are not equipped to handle the massive volumes of data and computing in daily operations, artificial intelligence (AI) will become the critical tool for computing, analyzing, and transforming how teams develop, deliver, deploy, and manage applications.

Further in the article:

  • What are Machine Learning operations?
  • Lifecycle of a Machine Learning model
  • Core elements of MLOps
  • What are Artificial Intelligence operations?
  • Core element of AIOps
  • AIOps toolset
  • What is the difference between MLOps and AIOps?

Coupled with the increasing complexity of architectures of modern applications, the demands of this digital economy have made the role of IT operations much more complex. As a result, ML and AI have emerged to automate some manual business processes to increase efficiency. Organizations throughout the world are increasingly looking to automation technologies as a means of improving operational efficiency. This indicates that tech leaders are becoming more and more interested in MLOps and AIOps. Good read!

[Read More]

Building serverless Java applications with the AWS SAM CLI

Categories

Tags apis devops aws app-development serverless

When using Java in the serverless environment, the AWS Serverless Application Model Command Line Interface (AWS SAM CLI) offers an easier way to build and deploy AWS Lambda functions. You can either use the default AWS SAM build mechanism or tailor the build behavior to your application needs. By Mehmet Nuri Deveci, Steven Cook, and Maximilian Schellhorn.

Since Java offers a variety of plugins and tools for building your application, builders usually have custom requirements for their build setup. In addition, when targeting GraalVM or non-LTS versions of the JVM, the build behavior requires additional configuration to build a Lambda custom runtime.

In this guide you will learn:

  • Building Uber-Jars with AWS SAM CLI
  • Running the build process inside a container
  • Using your own base build images for creating custom runtimes
  • Deploying the application without building with AWS SAM

This blog post shows how to build Java applications with the AWS SAM CLI. You learnt about the default build mechanisms, and how to customize the build behavior and abstract the build process inside a container environment. Visit the GitHub repository for the example code templates referenced in the examples.

[Read More]

Introduction to Web Audio API

Categories

Tags apis devops web-development app-development miscellaneous browsers

A critical part of WebRTC is the transmission of audio. Web Audio API is all about processing and synthesizing audio in web applications. It allows developers to create complex audio processing and synthesis using a set of high-level JavaScript objects and functions. By Madhu Balakrishna.

Web Audio API provides several ways to capture and playback audio in web applications. The article then details:

  • Capture and playback audio
  • Autoplay
  • Codecs
  • Permissions
  • Audio processing

Web Audio API provides a powerful set of tools for manipulating audio, including filtering, mixing, and processing. This allows developers to create web-based audio editing tools that can be used to record, edit, and export audio. Authors covered the basics of Web Audio transmission and concepts around it in case of WebRTC in this blog post. There is more to catch up on this topic. Nice read!

[Read More]