Can’t-miss sessions for AWS Summit Chicago


However, building serverless applications requires a change in architectural thinking. Best Practices for Queue Processing in Serverless Applications. Amplifying Fullstack Serverless Applications with AWS Services and Tools. Twelve-Factor Serverless Applications.

Application Monitoring Using Stagemonitor

This article covers important steps to monitor a typical Java application using Stagemonitor tool, Kibana as a dashboard viewing tool and Elasticsearch as a data processing engine. The post Application Monitoring Using Stagemonitor appeared first on

Book Review: Designing Data-Intensive Applications

Henrik Warne

What a great book Designing Data-Intensive Applications is! In a document model, joins are shifted from the database to the application. But in general, only the application can define what is valid or invalid data – the database only stores the data.

Speaking the Language of Applications

The post Speaking the Language of Applications appeared first on I arrived early to a meeting, and the pleasant security guard at AT&T suggested I take a look at their innovation museum while I wait.

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

application and maximize the value of embedded analytics. application. was often enough for product teams to charge more for their applications and set them. Two trends in particular are forcing application providers to. Applications, User. Application FUTURE-PROOF.

How to Modernize Mainframe Applications

The post How to Modernize Mainframe Applications appeared first on Application Performance Management/Monitoring Blogs DevOps Practice application modernization infrastructure modernization legacy apps modernizing mainframe applications

Application Performance Management for DataOps

Over the years, application performance management (APM) tools have been utilized typically to measure and monitor the performance of software such as web applications. The post Application Performance Management for DataOps appeared first on

The Challenge of Securing Open Source Applications

As enterprises have increased their reliance on applications over the years, there has been a significant rise in the use of reusable software components such as third-party libraries and open source code.

Application Errors: Are They Costing You More Than You Thought?


You can figure out how much errors cost when they crash your application, but what about other errors and issues that are caught and known? The application has crashed. It takes a few hours (or even days) and some new grey hairs, but eventually the application is up and running again.

Using machine learning to improve dialog flow in conversational applications

O'Reilly Media - Data

In this episode of the Data Show , I spoke with Alan Nichol , co-founder and CTO of Rasa , a startup that builds open source tools to help developers and product teams build conversational applications.

How to Package and Price Embedded Analytics

to Lift Value and Revenue01 Today’s organizations are embedding analytics in commercial software applications at an exponential rate. 2017 State of Embedded Analytics Report, 93 percent of applications offer some form of embedded analytics capabilities. application into.

6 application performance management trends to watch


Once relegated as a niche IT operations tool with limited enterprise deployments, APM, or application performance management—also known as application performance monitoring—is on a tear. Enterprise IT, IT Ops, Application Performance Management (APM

4 ways to ease application migration to the cloud


Application transformation and migration requires skilled […]. Applications Cloud application migration cloud migrationMany system integrators and cloud hosting providers claim to have their own unique process for cloud migration.

The Importance of Distributed Tracing for Apache-Kafka-Based Applications


Apache-Kafka ® -based applications stand out for their ability to decouple producers and consumers using an event log as an intermediate layer. Distributed tracing has been key for helping us create a clear understanding of how applications are related to each other.

Optimizing Kafka Streams Applications


We will wrap up this article with some operational guidelines on how to turn on topology optimizations when upgrading your Streams application to Kafka 2.1 In Kafka Streams, there are two ways you can specify your application logic—via the Processor API or the Streams DSL.

5 Early Indicators Your Embedded Analytics Will Fail

Updating your application’s dashboards and reporting features. application’s dashboards and reports tend. Why do application teams find themselves in. Consider this: 68 percent of commercial applications. their application knows how painful. And application.

DevOps and Security: Be Ready to Shield Your Application

The post DevOps and Security: Be Ready to Shield Your Application appeared first on Blogs DevOps Toolbox DevSecOps application security CI/CD pipelines devops tools devsecops Jenkins OWASP software security

Improve Your Application Performance with Garbage Collection Optimization


Application performance is on the forefront of our minds, and Garbage Collection optimization is a good place to make small, but meaningful advancements. In healthy applications, GC execution time is relatively low and doesn’t have a large effect on application performance.

Progressive Web Application


Progressive Web Application- PWA

Web Application Architectures


Web Application Architectures

Why “Build or Buy?” Is the Wrong Question for Analytics

12 TABLE OF CONTENTS 1The question of embedding analytics in an application has. applications, and they’re pushing for faster time to market. It’s no surprise then, that 93 percent of application teams. To stay competitive, many application teams are realizing.

Applications of Artificial Intelligence (AI) in business

Hacker Earth Developers Blog

Although AI has been around since the 1950s, it is only recently that the technology has begun to find real-world applications (such as Apple’s Siri). Applications of AI. Fraud detection is an important application of AI in financial services.

Kentik: Cloud Native Applications Need Network Analytics

The post Kentik: Cloud Native Applications Need Network Analytics appeared first on Moving everything into the cloud seems to have taken the spotlight from the network. As the internet is ubiquitous, who worries about the networks?

Applications and innovations in the Internet of Things (IoT)

Hacker Earth Developers Blog

Real-world applications of IoT can be found in several sectors: 1. The major application of IoT in healthcare has been in remote health monitoring or telehealth. Growlink and Farmapp are agriculture technology companies that offer greenhouse automation services which use M2M technology, big data tools, and mobile applications to help growers monitor and track crop parameters like soil health, weather conditions, crop infestation, and abuse of agrochemicals.

Licensing and Support for Oracle Applications on AWS

Apps Associates

Moving Your Legacy Applications to Cloud One of the most frequent questions that we are asked by customers is whether their Oracle license and support will remain valid when running on Amazon Web Services (“AWS”).

AWS 75

The 5 Levels of Analytics Maturity

Cloud-Native vs Traditional Application Development


As we move from traditional applications into the cloud world we’re seeing differences in how they are written. In general, we are moving away from a slow, and sluggish world of traditional applications to one which is smarter, faster and more agile.

Applications of data science and machine learning in financial services

O'Reilly Media - Ideas

We had a great conversation spanning many topics, including: Potential applications of data science in financial services. Continue reading Applications of data science and machine learning in financial services

What you should know about web application firewall testing


If you already have end-to-end tests, UI tests, or other tests that behave like real end users, consider adding a web application firewall (WAF) to those tests starting early in your development lifecycle. Security, Application Security, Special Coverage: SecureGuild Security Testing Conference 2019, Application Security Testing (AST), Application Testing, Web Application Firewall (WAF

The Pivotal Application Service Addresses Kubernetes Complexity

The New Stack

This week, Pivotal has released an alpha version of its Pivotal Application Service (PAS) on Kubernetes. The post The Pivotal Application Service Addresses Kubernetes Complexity appeared first on The New Stack.

UX and Design Tips for Better Dashboards: Product Manager Laura Klein Explains How to Improve Your Analytics

Speaker: Laura Klein, Principal at Users Know and Author of UX for Lean Startups

UX Research Techniques and Their Applications


UX research techniques and their applications will result in better designs that avoid costly mistakes such as cost overruns, guesswork, following best practices, and reliance on industry knowledge

Middleware in Express applications


If you have recently moved or are thinking of moving to the nodejs Express framework than you should primarily get acquainted with its routing and middleware concepts, as an Express application is essentially a series of middleware function calls. Middleware are functions that primarily work with the two main objects in an Express application – the request object ( req ) and the response object ( res ). The post Middleware in Express applications appeared first on codediesel.

Securing a Web Application with AWS Application Load Balancer


It was pretty convenient for me to use AWS Certificate Manager (henceforce “ACM”) to generate the server certificate, since my application was already running on an EC2 instance in Amazon’s cloud. Since I have only a single application instance I choose its AZ and subnet for the ALB.

Clean Architecture in Android Applications


Even though mobile applications look quite simple for users, there is much complexity hidden behind the veil of neat UIs. User Storage realization provides itself here for a transition of all the data which is necessary for the application.

Embedding Operational Reports: Everything Product Managers Should Know

Speaker: Dean Yao, Sr. Director of Product Marketing, Logi Analytics

3 Ways IoT Developers Can Make Their Applications More Secure

When the IoT was still young, IoT application developers got away with making security an afterthought, as they built prototypes and minimum viable products designed to demonstrate the different ways the IoT could be used to transform the way we work, play and live.

IoT 54