Systems | Development | Analytics | API | Testing

Interview With CTO Venkat MotuPalli

For our latest specialist interview in our series speaking to technology leaders from around the world, we’ve welcomed Venkat MotuPalli to share his insights as the CTO of BlueTape, as well as his advice for would-be CTOs. Venkat is an innovative entrepreneur with 20+ years of experience in leadership, driving the architecture and delivery of large scale software solutions.

Change Data Capture: CDC for E-Commerce

Change data capture is one of the fundamental underpinnings of modern data management. Without knowing when their enterprise data has changed or refreshed with new information, businesses wouldn’t be able to access up-to-the-minute insights that help them stay competitive in a constantly shifting landscape. In change data capture (CDC), users are promptly notified (either in real-time or near real-time) when changes have been made to a source table or source database.

Spectacular growth: Beaumotica accelerates expansion with data-driven insights from Talend

Beaumotica combines smart lighting, design, and top brands to create the perfect mood and atmosphere for any room. And with help from Talend, the company can now combine data, analytics, and automation to optimize business decisions and accelerate growth. Last year alone the company tripled its business and expanded into new territories across Europe. Based in The Netherlands, Beaumotica has been growing steadily since 2007.

Top 10 Tools For Google Cloud Architect

Google Cloud Platform is a complex suite of services that are aimed at satisfying client’s computing, storaging, and application operating needs. App Engine, Cloud SQL, Cloud Speech API, Deployment Manager ( just a share of ) are the proud services of a GCP. All of them are developed for optimizing business and making business-client relationships easy and comfortable for sealing the deals and conversions go high.

9 Best Practices for Application Logging that You Must Know

Have you ever glanced at your logs and wondered why they don't make sense? Perhaps you've misused your log levels, and now every log is labelled "Error." Alternatively, your logs may fail to provide clear information about what went wrong, or they may divulge valuable data that hackers may exploit. It is possible to resolve these issues!!!

Interview With Pieter Vaniperen

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Pieter Vaniperen, Managing Partner at PWV Consultants. Pieter is a veteran software architect and security expert who is an industry authority and influencer providing thought leadership and execution to develop widely adopted processes, methodologies, and technologies that are at the forefront of digital innovation and software development.

What to Do About Java Memory Leaks: Tools, Fixes, and More

Memory management is Java’s strongest suit and one of the many reasons developers choose Java over other platforms and programming languages. On paper, you create objects, and Java deploys its garbage collector to allocate and free up memory. But that’s not to say Java is flawless. As a matter of fact, memory leaks happen and they happen a lot in Java applications. We put together this guide to arm you with the know-how to detect, avoid and fix memory leaks in Java.