Systems | Development | Analytics | API | Testing

Cloudera DataFlow for the Public Cloud: A technical deep dive

We just announced Cloudera DataFlow for the Public Cloud (CDF-PC), the first cloud-native runtime for Apache NiFi data flows. CDF-PC enables Apache NiFi users to run their existing data flows on a managed, auto-scaling platform with a streamlined way to deploy NiFi data flows and a central monitoring dashboard making it easier than ever before to operate NiFi data flows at scale in the public cloud.

Event-Driven Architecture is unblocking data-driven decisions in shipping

In March 2021, a 200,000 tonne ship got stuck in the Suez Canal, and the global shipping industry suddenly caught the world’s attention. It made us realize ships play an important role in our daily lives. Really important in fact; 90% of the things we consume arrive by ship. Take a look at this map. By visualizing vessel routes over time, the pattern creates a map of the earth. Note the lack of vessels travelling close to the coast of Somalia where piracy is common.

14 Useful Bash Aliases that Make Shell Less Complex and More Fun

Do you frequently find yourself typing a long command on the command line or checking the bash history for a command you've already typed? If you answered yes to any of the above questions, bash aliases will come in helpful. You can use aliases in Bash to create a shortcut command for a longer command. When working on the command line, bash aliases are essentially shortcuts that can save you time and effort by eliminating the need to remember long commands.

How to Make Digital Transformation Work

The best way to appreciate key concepts involving digital transformation is to look at real-world examples. In a recent Kong webinar, I sat down with Solutions Engineer Ahmed Koshok as he reviewed several real-world case studies that help illuminate the role of microservices in making digital transformation successful for organizations. The case studies included Papa John’s, NextJ Systems, and Yahoo! Japan.

Monolithic vs Microservices Architecture

Microservices are an accelerating trend thanks to rousing endorsements from the likes of Google, Netflix, and Amazon. The microservice architecture is advantageous for it’s scalability, agility and flexibility. In contrast, the monolithic approach is the traditional tried-and-true model for building software. It’s much easier to debug and test. But how do you know which approach is best for your organization?

Securing Your SQL Server Application: Enabling Client-Initiated Encrypted Connections

In the previous article we discussed how to enable a server initiated encrypted connection to a Microsoft SQL Server. But what if we have a scenario where we do not want to incur the overhead of encryption for every application? In that scenario instead of configuring the server to force encryption we will instead need the client to initiate the encrypted connection.

9 Crucial Low-Code Automation Capabilities to Evaluate

Low-code automation platforms enable businesses to rapidly automate their applications and workflows. Basic low-code tools can create applications that help users perform simple tasks. But rapid app delivery is only the beginning of what low-code can do. The most advanced low-code automation platforms deliver powerful business process automation capabilities.

Building an ETL Pipeline in Python

Thanks to its user-friendliness and popularity in the field of data science, Python is one of the best programming languages for ETL. Still, coding an ETL pipeline from scratch isn’t for the faint of heart — you’ll need to handle concerns such as database connections, parallelism, job scheduling, and logging yourself. The good news is that Python makes it easier to deal with these issues by offering dozens of ETL tools and packages.

What Is Homomorphic Encryption?

Data encryption is one of the smartest things any organization can do to protect the privacy and security of confidential and sensitive data. Using a unique encryption key, data is converted to an intermediate representation known as “ciphertext,” which usually appears as a jumbled mixture of letters and numbers to the human eye. This encrypted data will be meaningless to anyone without the corresponding decryption key—even malicious actors who breach an organization’s defenses.