Welcome to curated list of handpicked free online resources related to IT, cloud, Big Data, programming languages, Devops. Fresh news and community maintained list of links updated daily. Like what you see? [ Join our newsletter ]

How IKEA Retail standardizes docker images for efficient machine learning model deployment

Categories

Tags docker software web-development containers app-development

What do Docker and IKEA Retail have in common? Both companies have changed how products are built, stored, and shipped. In IKEA Retail’s case, they created the market of flat-packed furniture items, which made everything from shipping, warehousing, and delivering their furniture to the end location much easier and more cost effective. This parallels what Docker has done for developers. Docker has changed the way that software is built, shipped, and stored, with Docker Images taking up much less space “shelf” space. By Karan Honavar, Fernando Dorado Rueda.

The article then does a good job to explain:

  • Standardization deployment process via Docker
  • Model training and simple evaluation
  • Model class creation
  • Testing model locally
  • Encapsulating the model into a Docker image
  • What is Docker’s role in MLOps?
  • Dockerfile creation
  • Building and pushing Docker image
  • Deploy ML model using Docker: Unleash it into the world

… and more. Plenty of screenshots and each step explained. At IKEA Retail, Docker has become an indispensable element in our daily MLOps activities, serving as a catalyst that accelerates the development and deployment of models, especially when transitioning to production. The transformative impact of Docker unfolds through a spectrum of benefits that not only streamlines our workflow but also fortifies it via standardization, compatibility, isolation, security. Nice one!

[Read More]

What are docker image layers and how do they work?

Categories

Tags docker software learning containers app-development

Docker is a widely used containerization platform that enables developers to run and manage applications inside containers. One of the key components of Docker is the Docker image, which acts as a blueprint for creating containers. By Hemanta Sundaray.

This guide then explains:

  • Prerequisites
  • Building a Docker Image
    • Analyzing Docker Image Build Steps
  • Viewing Docker Image Layers
    • Using the docker history command
    • Using the docker inspect command
  • Understanding Docker Image Layer Cache

In this blog post, you learned about Docker image layers, docker image layer cache, and how Docker leverages caching to speed up the build time. Armed with this understanding, you’re now well-equipped to use Docker more efficiently. There are screengrabs and commands explained so you can follow the tutorial easily. Good read!

[Read More]

A beginner's guide to behavior-driven development (BDD)

Categories

Tags tdd software learning infosec

BDD is the next step in the evolution of Test-Driven Development (TDD). It shifts the focus from thinking in tests to thinking in behavior. Imagine transitioning from assembling puzzle pieces to crafting a compelling story. BDD integrates various aspects of software development into a coherent narrative, fostering better communication and collaboration. By Rustam Sabirov.

In this article you will find:

  • Introduction: What is behavior-driven development?
  • How does behavior-driven development work?
  • Writing test scenarios in Gherkin syntax
  • The “Given When Then” approach
  • Examples
  • Advantages of behavior-driven development
  • Disadvantages of behavior-driven development
  • Behavior-driven development requires a strategic approach

… and more. Behavior-Driven Development introduces a profound paradigm shift in software development, fostering enhanced collaboration and a shared understanding among stakeholders. Its “Given When Then” approach, analogous to a structured recipe, delineates the software’s behavior in a comprehensible manner. Nice one!

[Read More]

Security considerations for your internal developer platform

Categories

Tags cio software-architecture devops infosec

In today’s world, where cloud resources and data management tools play an increasingly critical role, the concept of an Internal Developer Platform (IDP) is gaining momentum. With great power comes greater responsibility. Security within IDPs isn’t just an optional add-on; it’s the core essence. This article is a guide for teams eager to strengthen their developer platforms. By Morgan Perry.

Whether you’re new to the IDP environment or a seasoned developer, our objective remains unchanged: to arm you with the knowledge to transform your developer platform into an impenetrable fortress.

Further in the article:

  • The priority of security in IDPs
  • Robust access control and user authentication
  • Ensuring data security and encryption protocols
  • Key security measures for internal developer platforms
  • How to build a security-centric culture

Security is of utmost importance if you are building an Internal Developer Platform. It is not just a collection of some best practices to follow. It is a mindset that you need to adopt. In this article, we have discussed all the security-related aspects of IDPs, including access control, data security, network protection, real-time monitoring, etc. Nice one!

[Read More]

Scanning Terraform code with Checkov: Comprehensive guide

Categories

Tags kubernetes containers learning how-to devops infosec

Learn how to enhance your Terraform code’s security by using Checkov for scanning. Our step-by-step guide walks you through the process, ensuring your infrastructure is secure and compliant. By Arun Lal.

As we discuss the growth of Infrastructure as Code (IaC), we encounter challenges related to security, quality, and testing, which are also critically important. To address these concerns, we can utilize static code analysis tools like Checkov.

This guide then covers:

  • Infrastructure as code
  • The need for IAC code analysis
  • Checkov integrate with Terraform
  • Checkov setup
  • How to use custom policies?
  • Checkov report
  • Hard and soft fail

Most organizations have their own coding standards and regulations. When a developer writes a code, it should meet the organization’s criteria. For example, tags, proper descriptions, directory structure, etc. Compliance is also very important for organizations. It helps to avoid unnecessary resource provisioning in cloud environments. For example, in AWS different types of EC2 instances are available, and each instance’s costs are different. If someone provisions R5d.xLarge instance without the necessity, it will lead to excessive expense.

Combining these tools simplifies safer infrastructure provisioning in cloud environments, we can simply use this tool to scan the Terraform code or can integrate with CI/CD tools to automate the scanning process. Good read!

[Read More]

How to stream JSON data using server-sent events?

Categories

Tags python programming web-development app-development event-driven

Server-Sent Events (SSE) is a simple and efficient technology for sending real-time updates from the server to the web browser over a single HTTP connection. By @workfall.com.

In this blog, authors will cover:

  • What are server-sent events?
  • Why stream data using server-sent events (SSE)?
  • What is FastAPI?
  • Hands-on

FastAPI is a modern, high-performance web framework for creating Python APIs using standard type hints. Its performance is comparable to NodeJS and Go, owing to Starlette and pydantic.

In this hands-on project, we learned about using Server-Sent Events to smoothly stream JSON data using FastAPI. We started by making a new project using PyCharm IDE and putting in the necessary stuff we need. Then, we got FastAPI set up in our project. Excellent guide!

[Read More]

How to develop APIs with Django REST framework [Step-by-step guide]

Categories

Tags restful learning app-development python

In this article, we’ll talk about how develop APIs with Django REST framework by step by step. Author believes this is going to be useful for all beginner Django developers, as REST APIs are used in every application or piece of software to connect the backend and frontend parts. If you master this, you can build all kinds of products. By Oleg Kovalyov.

Many frameworks allow you to easily build APIs for blog applications, but we will use only one – the Django REST framework (DRF). It’s convenient in many ways.

You will find further information in the article on:

  • Why use the Django REST framework?
  • Difference between Django and Django REST framework
  • The step-by-step guide to your API in Django
  • Test-driven development (TDD) of APIs
  • Browsable API
  • Which famous companies are using Django REST framework?

If you still have questions and would love to learn more, there’s plenty of great Python Django REST API tutorials and resources for self-improvement. Here’s a reading list authors highly recommend. Nice one!

[Read More]

Analysis of Istio Service Mesh

Categories

Tags kubernetes containers web-development app-development devops

Istio is a leading service mesh solution with a proven track record of successful use cases in production. The Istio community is prolific, dynamic, and continues to introduce new features very frequently. Istio is possibly the most feature-rich solution on the market and has a mature ecosystem of tools and vendors. By Kamesh Chauhan.

The article pays attention to:

  • Service mesh comparison
  • Istio architecture
  • Heart of Istio – Envoy (sidecar)
  • Istio features
    • Intelligent routing and load balancing
    • Resilience across languages and platforms
    • Service identity and security
    • In-depth telemetry and reporting
  • Enable Istio in the Mesh

Comparing service mesh to existing systems identifies the clear benefits of new designs. It describes new applications of existing architectures, and highlights effective new configurations to evolve future development and productivity. Nice one!

[Read More]

Four steps to managing your cloud logging costs on a budget

Categories

Tags cloud learning web-development app-development monitoring analytics

As part of our ongoing series on cost management for observability data in Google Cloud, we’re going to share four steps for getting the most out of your logs while on a budget. While we’ll focus on optimizing your costs within Google Cloud, we’ve found that this works with customers with infrastructure and logs on prem and in other clouds as well. By Afrina M, Mary Koes.

The article focuses on:

  • Analyze your current spending on logging tools
  • Eliminate waste — don’t pay for logs you don’t need
  • Optimize costs over the lifecycle of your logs
  • Setup alerts to avoid surprise bills

One final way to stretch your observability budget is to use more Cloud Operations. We’re always working to bring our customers the most value possible for their budget such as our latest feature, Log Analytics, which adds querying capabilities but also makes the same data available for analytics, reducing the need for data silos. Good read!

[Read More]

The small business owner's guide to data analytics

Categories

Tags analytics learning big-data cio data-science

Big data technology is transforming nearly every industry quickly by providing actionable business information. Because of its effectiveness, even business leaders who are generally slow to adopt new technology are curious about implementing big data analytics and using its insights. By Jennifer Dublino.

The article then coverse:

  • What is big data?
  • What is the importance of big data for businesses?
  • How can small businesses use big data?
  • How can small businesses get started with big data?
  • What is the future of big data?
  • Big data and data analytics FAQs

Big data is defined by the three V’s: bigger variety of data, a larger volume of data (minimum of 1 terabyte) and a higher velocity of data. In other words, with big data, many different types of information are coming in fast. Another two V’s ― value and veracity ― describe big data that is truly useful and accurate.

Tracking sales data, customer retention statistics and gross revenue is a good start. However, in addition to tracking these metrics, you must ask insightful questions like the following: Which vendors offer the most value? Which product lines need the most improvement? Then, review the granular details that reveal the consequences of your current operational practices. These insights can yield crucial improvements. Nice one!

[Read More]