What Is a Data Breach? A data breach is a cyberattack in which sensitive, confidential or protected data is accessed or exposed in an unauthorized manner. If sensitive data is viewed or directly stolen by unauthorized persons, the organization … Read more
Backend
The Backend Developer is a programmer who creates the logical back-end and core computational logic of a website, software or information system. The main activities usually concern the three functional aspects of the back-end:
Programming: he has the knowledge of different programming languages like Java, JavaScript (NodeJS), PHP and the knowledge of methodologies and Frameworks such as Spring and
Hibernate. It is also able to work on more structured languages such as Ruby and Python.
Database Designing: a Back-end Developer has expertise in database management such as Oracle, MySQL or MongoDB.
Web Tool: is essential to be familiar with SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) for integration with different infrastructures.
What is Message Modeling and Why is it Key for Communication in Java?
Message modeling is the structuring of information for transfer between applications. Modern software systems rely on effective data transfer between applications, modules, or processes. More than ever before, business and other systems are running … Read more
Multi-Layered Defense for Web Applications
What Is Web Application Security? A web application is an application that is stored on a remote server and delivered over the Internet, typically through a browser interface. Web application security is complex, because web applications are … Read more
This is How Mathematics Keeps Your IoT Device Safe
The Internet of Things (IoT) is a paradigm expected to bring about a new era of connectedness and collaboration, and is already revolutionizing the way we live and work. However, it comes with a number of new security challenges. Because IoT devices … Read more
Socket Programming in Java: How to Establish a Solid Computer Networking Protocol
Looking to get up to speed on Java socket programming? You’re not alone. Whether you’re planning to write game console applications or focusing on the benefits of implementing DevSecOps in your processes, knowing more about how sockets … Read more
Modern Tips and Tricks with C++
Despite its age and complexity, C++ is still a vital performer in the IT world. Originally released in 1985, it has since undergone a series of improvements, extensions and refinements. But its core values remain those that drove its development in … Read more
How to Validate an IP Address Using Python
Did you know that there are currently around 4,294,967,296 IPv4 addresses in use? That’s a big number. So big, in fact, that a new standard is being introduced to cope with demand: IPv6. In this article, we’re going to explore how to … Read more
Web Progressive Apps: Creating Bluetooth Robots
In this video, Developer Nico Martin shares how, thanks to having some extra time during quarantine, he started experimenting with Browser APIs (Web Progressive Apps) that allowed him to communicate with hardware devices using JavaScript. He … Read more
Developing Industrial IoT Applications with Blazor
Why is Blazor becoming so popular? Web applications have been developed for approximately 30 years, and during this period both hardware and software technologies have undergone drastic changes. However, the nature of web applications and websites … Read more
Design-first gRPC APIs for microservices: a sample workflow for parallel teamwork
Key Takeaways: You can allow teams to work in parallel by designing gRPC APIs before starting to code. When teams work in parallel, you significantly decrease the time-to-market of your products. A sample workflow has a few key … Read more
Black Friday: How to Manage Huge Traffic on Your App
It's a known issue both for users and developers: the extra traffic during Black Friday and Cyber Monday can cause e-commerce and payment apps to crash, generating many problems such as bad user experience, faulty transactions, revenue loss due to … Read more
How to Prevent Data Loss: 13 Best Practices and Strategies
According to a report by Information Security Buzz, ransomware attacks during Black Friday 2021 rose to a staggering 495 million globally. With Black Friday 2022 just around the corner, experts predict there will be a new record this year. With … Read more
10 Commonly Used SQL Commands For Solid Databases
Structured Query Language (SQL) databases have a long history of reliability. That’s why, despite being invented in the 1970s, they are still in use today. By inputting SQL commands, a user can gain instant access to data records. Over the … Read more
Zero-Trust Model and Secretless Approach: A Complete Guide
As organizations shift more of their workloads and data to the cloud, they face new security challenges. The cloud presents a unique set of challenges for security teams, who must now deal with a more complex and dynamic attack surface. One of these … Read more
5 Things You Cannot Miss When Setting Up Your Cloud Security Checklist
The adoption of cloud-based software, platforms and infrastructure has expanded massively in recent years and the trend looks set to continue. Cloud infrastructure services, for example, are forecast to grow by 30.5% in 2023 compared to 2022. It's no … Read more
2 Ways to Build a Phone IVR System With Python
Interactive voice response (IVR) systems allow for the automation of telephone conversations, which provide a better user experience for customers, and save time for your employees. Let's build one using Python! Used alongside technologies … Read more
Security First: Getting Started With Minimum Secure Products
Minimum Secure Products or Minimum Viable Secure Product (MVSP) are guidelines and criteria for creating enterprise or market-ready solutions or services. It consists of a checklist with best practices to follow. The objective is to ensure that B2B … Read more
How to Easily Migrate from Spring Boot to Micronaut
In the beginning there was only JVM The JVM (Java Virtual Machine) is a virtual machine that acts as a runtime engine for running java applications and programs and programs in other languages compiled by Java bytecode. It has two main functions: … Read more
Fast Document Similarity in Python (MinHashLSH)
Why is document similarity more important than ever? In the big data era, it is always more frequent that companies need to detect similar items in their database. Imagine platforms like Kijiji or Subito, trying to detect people that constantly … Read more
This is Why The Future of Programming Is Composable
Let's start with the basics of composable programming and why it's such a big thing in software development. The "bible" of composability states that the best way to build an app is to write code once, deploy many times, stack, and expand … Read more