Systems | Development | Analytics | API | Testing

Event-Driven Architecture (EDA) vs Request/Response (RR)

In this video, Adam Bellemare compares and contrasts Event-Driven and Request-Driven Architectures to give you a better idea of the tradeoffs and benefits involved with each. Many developers start in the synchronous request-response (RR) world, using REST and RPC to build inter-service communications. But tight service-to-service coupling, scalability, fan-out sensitivity, and data access issues can still remain.

How Snowflake Powers The Next Generation Of Cybersecurity Applications

Cybersecurity is extremely data-intensive and complex. Top cybersecurity companies such as Lacework, Sophos, Panther, Hunters, Auditboard, Orca Security, and Dassana leverage Snowflake to provide out-of-the-box solutions. These companies are building the next generation of cybersecurity applications by harnessing the power of the Snowflake Data Cloud to provide differentiated product capabilities to security teams.

GitTogether | Open Source Dev Containers with DevPod | Hrittik Roy

Many developers are excited about Dev Containers, but until now, people needed to use a managed service like Codespaces or Gitpod to experience that Dev Container magic. DevPod is a new open-source tool that allows users to launch Dev Containers with any infrastructure they have available. DevPod introduces a way to define a development environment that can then be run on any cloud infrastructure or even on a localhost machine using Docker or Kubernetes locally or on the cloud. This talk is all about how you can use DevPod locally or on cloud to run your developer workloads easily.

Are We in an AI Information Bubble?

Are we in an AI bubble? We can't stop talking about AI in tech. It's at every conference and in every startup pitch. But is the rest of the world as enamored as we are? In this conversation, we explore AI’s impact beyond the echo chamber of the tech industry. We look at attitudes toward AI in other spaces, from healthcare to finance, weighing the risks and benefits of its application. We also look to the future, questioning whether we’ve reached the limits of AI given compute power constraints.

How to Create Visual Button Selection States - Do More with Qlik

Ever wonder how those Qlik experts make those awesome interactive dashboards? It is easier than you think. Check out this video that quickly shows you how to create custom beautiful buttons to apply selections and visually represent an active or non-active selection state. Allowing users just another way to analyze data in a way that is easy and familiar.

Confluent Connectors | Fast, frictionless, and secure Apache Kafka integrations

Every company faces the perennial problem of data integration but often experiences data silos, data quality issues, and data loss from point-to-point, batch-based integrations. Connectors decouple data sources and sinks through Apache Kafka, simplifying your architecture while providing flexibility, resiliency, and reliability at a massive scale.

Displaying Google Dorking: Revealing Hidden Online Information | Security Testing | BugRaptors

Dive into the realm of Google Dorking, also known as Google Hacking, an advanced method leveraging specialized search queries to unveil concealed data, exposed databases, and potential security vulnerabilities across the web. Join us as we explore the responsible application of this technique for information retrieval and delve into the critical importance of safeguarding against potential risks lurking in the digital landscape.

Snowflake Horizon Demo For Data Engineers

In this demo targeted at data engineers, Ravi Kumar, Senior Partner Sales Engineer at Snowflake, shows you how to govern and discover data, apps, and more in Snowflake Horizon. Learn and try the core capabilities of Snowflake Horizon to unify data across different sources and formats, such as by loading data securely into Snowflake based on RBAC privileges and being interoperable with Iceberg Tables in external cloud storage.