Skip to main content

Posts

SD Times news digest: Sauce Labs’ new shift-left capabilities, Nintex Workflow Cloud launched, CircleCI privacy enhancements

Sauce Labs announced new shift-left capabilities such as new end-to-end visual testing as well as Sauce Testrunner, which supports a host of developer-preferred test frameworks such as Cypress, Playwright, and TestCafe.  “Successful testing in the DevOps era is about giving developers the optionality and flexibility to work within the frameworks with which they’re most comfortable, and about giving them the ability to harness and understand the different test signals proliferating throughout the dev cycle,” said Matt Wyman, chief product officer at Sauce Labs. The end-to-end testing also enables users to compare both screenshots and DOM snapshots to visual changes, automatically pull in the initial baseline and accept updates, and integrate seamlessly into CI/CD processes.  Nintex Workflow Cloud launched The company’s workflow automation cloud platform includes advanced data technology, added functionality and pre-built connectors to automate and optimize enterprise-grade workflows

SD Times Open-Source Project of the Week: GoReleaser

GoReleaser is an open-source project that aims to help users release Go projects as fast and easily as possible. Key features include the ability to cross-compile Go projects; release to GitHub, GitLab and Gitea; create Docker images and manifests; and create Linux packages and Homebrew taps.  According to the team, it adheres to the Contributor Covenant code of conduct, which is put in place to foster an open and welcoming environment.  “GoReleaser is a release automation tool for Go projects. The goal is to simplify the build, release and publish steps while providing variant customization options for all steps,” according to the project’s website . “GoReleaser is built for CI tools, you only need to download and execute it in your build script. Of course, you can also install it locally if you wish.” Some known limitations of the project include having to have CGO enabled when cross-compiling, its Docker image is not supported and won’t make configurations look “clean,” and tag

Difference between Primary Key and Unique Key Vijay Sinha The Crazy Programmer

In this article we look into the difference between Primary Key and Unique Key Constraints. We will see the description of both along with how to define a schema and create attributes in a table with these constraints. Primary Key A Primary Key is a key attribute or a column which is used to uniquely identify a row (tuple) in a table (relation). It maintains the integrity constraints of a table. A table can have only one primary key attribute. The data of primary key must be unique. Hence, no duplicate values are valid. Also, no NULL (empty) values are allowed during insertion as it violates the integrity constraint. The database automatically creates a Clustered Index over primary key which orders data on the basis of primary key. We define a Primary Key Attribute as follows: Column_Name DataType PRIMARY KEY Unique Key A Unique Key is a constraint or key attribute which also uniquely identifies a row in a table. It’s purpose is somewhat same as primary key. It differs in ways

.NET 6 first developer preview offers startup and throughput improvements

Microsoft has announced the first developer preview for .NET 6, which is scheduled for November 2021 as a long-term support (LTS) release. This release will include major improvements for cloud, desktop, and mobile apps, as well as deliver on the .NET unification vision.  According to Microsoft, .NET 6 centered around a more open planning process, enabling developers to see the release at a broader scope, provide feedback on what features to prioritize, and make it easier to find engagement and contribution opportunities.  A key theme around this release is improving startup and throughput using runtime execution information, such as profile-guided optimization (PGO). According to Microsoft, PGO helps optimize native code in binaries, making it easier to be executed by a CPU. In .NET 6, Microsoft will add new tools for PGO training and data manipulation, publish training data for .NET libraries, enable collecting training data, enable the JIT to use static training data at runtime, a

CTO.ai announces serverless Kubernetes solution for cloud-native apps

CTO.ai wants to make it easier for developers to deploy and manage cloud native applications with the release of its new Serverless Kubernetes platform. According to the company, the solution enables development teams to consolidate all of their workflows on Kubernetes and deploy cloud-native apps instantly without worrying about operations.  Users will have the ability to instantly build and release a containerized application on their managed Kubernetes. CTO.ai also announced that it will add the functionality to connect its GitHub App with the organization to configure workflows that go beyond CI/CD builds.  RELATED CONTENT: GitOps: It’s the cloud-native way Data-driven software — cloud-native, open source, and collaborative Enterprise teams can also set up a service mesh with their existing private cloud to enable them to manage their infrastructure in-house while using infrastructure tooling of their choice.  CTO.ai explained it designed the platform to help developers with

OpenAPI Specification 3.1.0 now available

The OpenAPI Initiative has announced the release of the OpenAPI Specification 3.1.0. The OpenAPI Specification is an industry standard for describing APIs that allows developers and computers to understand what an API does without needing to access source code, documentation, or network traffic. Updates in 3.1.0 include compatibility with the latest draft of JSON Schema, a new top-level element for describing Webhooks, and support for identifying API licenses using SPDX identifier.  In addition, the PathItems object is now optional, which makes it simpler to create reusable component libraries.  “The benefits of using the OpenAPI Specification are broadly applicable, ranging from API lifecycle management, to documentation, to security, to microservices development and much, much more,” said Marsh Gardiner, product manager at Google, and technical steering committee at OpenAPI Initiative. “Great care was taken in evolving to version 3.1.0 to ensure it is an incremental upgrade for exi

SD Times news digest: Puppet launches DevOps scaling consulting service, ShiftLeft Illuminate, and Sentry’s latest funding round

Puppet launched its Scaling DevOps Service, which was established to advise businesses on how to organize and scale their DevOps practices. The service includes DevOps coaching, evolutionary assessment to see what stage teams are at, toil reduction for freeing up bandwidth across teams, and automation for the DevOps toolchain.  “Structural change is hard, and it’s not something that can be learned from a book. We believe in helping organizations discover the right answers through open dialogue and framework, putting their situations and context at the center of their transformation, whilst helping them plan IT investments appropriately. So far, we’ve been extremely successful and saved thousands of hours of toil and millions of dollars for some of our early customers,” said Nigel Kersten, the field CTO of Puppet.  ShiftLeft Illuminate released  The new solution leverages ShiftLeft technology to identify insider attacks and to offer remediation advice.  “Identifying such ‘insider a

Google to address memory-safety issues in open source

Google is tackling one of the most problematic security issues in open source: memory-safety vulnerabilities. According to a recent report from Microsoft’s Security Response Center, a majority of vulnerabilities are due to memory-safety issues, and Google believes almost half of these issues could be prevented with a memory-safety language.  “Software written in unsafe languages often contains hard-to-catch bugs that can result in severe security vulnerabilities, and we take these issues seriously at Google,” Dan Lorenc from Google’s infrastructure security team wrote in a post .  To address these issues, Google is expanding its partnership with the Internet Security Research Group (ISRG), and will work to reimplement critical open-source software in memory-safe languages.  RELATED CONTENT: What’s all the fuss about Rust “It’s time to start taking advantage of memory-safe programming languages that prevent these errors from being introduced. At Google, we understand the value o

Code security scanner creator Spectral announces $6.2M in funding

Israeli DevSecOps startup Spectral today announced $6.2 million in funding for its developer-first code security scanner. The seed round was led by Amiti and MizMaa, according to the company’s announcement. “Scanning tools today take long minutes or even hours to run in a given pipeline,” said Dotan Nahum, co-founder and CEO of Spectral. “Developers just don’t have that kind of time, or the funds,” he explained in the announcement, noting that many providers of continuous integration solutions meter activity by the minute. “Some developers are so overwhelmed by slow, irrelevant and non-intuitive results that they stop using scanners altogether,” Nahum said. According to the company, Spectral’s platform is a developer-facing solution that the company said monitors, crawls and protects organizations by discovering developer-facing systems such as Slack, npm, maven and logs, which often are not included in an organization’s threat modeling. “We observe that with so many tech stacks, Sa

Bottom View of Binary Tree in Java Vijay Sinha The Crazy Programmer

In this article, we see how to print the bottom view of Binary Tree. We discuss our approach to solve this problem and analyze the time and space complexities. It is recommended to first learn Top View Of Binary Tree before proceeding with this problem. A lot of the implementation is based on the Top View Approach. By Bottom View of Binary Tree, we mean the nodes visible when the tree is viewed from the bottom or from the leaves. A node is present in our bottom view it is the last node or the bottom-most node at it’s respective horizontal distance. We calculate the horizontal distance of each node as follows: We fix the Horizontal Distance of Root of tree=0. Then, Horizontal Distance of Left Child=Horizontal Distance of it’s Parent Node – 1. Horizontal Distance of Right Child=Horizontal Distance of it’s Parent Node + 1. Now let us look into an example. Consider this binary tree:   The Bottom View of this tree will be : 2 5 6 7. Explanation The nodes highlighted in the fi

Report: Error monitoring a big pain point for majority of developers

A new report has revealed that a majority of developers (88%) believe that error monitoring isn’t living up to expectations.  The 2021 State of Software Code report was done by continuous integration company Rollbar and almost 1,000 developers in the U.S. were surveyed.  Rollbar’s research indicates that fixing bugs and errors is the number one pain point for developers. This is especially true for Gen Z developers, with 94% of developers aged 18 to 24 years old complaining that the “old-school approach” to error monitoring doesn’t meet their requirements. Reasons for traditional monitoring not meeting needs include that it requires manual intervention, it takes too long to find details needed to fix problems, it focuses more on system stability than code health, it is difficult to detect errors, and its approach to error aggregation is often either too broad or too narrow.  “This research highlights the extreme challenges that developers – and their businesses – face when addre

SD Times news digest: Nylas announces Workflows for automating tasks in software applications, OutSystems raises $150 million, Quantum Computing Inc. launches Qatalyst

Nylas Workflows are pre-built composable templates that help developers quickly create end-to-end workflow automations across a broad range of applications. Also, Workflows extend the Nylas platform’s automation capabilities from email, calendar, and contacts to integrate with business applications such as Slack and Microsoft Teams. Additional details on the new platform are available here .   OutSystems raises $150 million  The latest funding round co-led by Abdiel Capital and Tiger Global puts OutSystems’ valuation at $9.5 billion.  OutSystems said that it will use the funding to expand its investments in research and development as well as its GTM strategy.  “By fundamentally changing the way software is built, OutSystems makes it possible for every organization to compete, innovate and grow with the developers they already have. We’re focused on helping customers succeed with their most challenging digital transformation initiatives, and today’s announcement is an acknowledg

Top View of Binary Tree in Java Vijay Sinha The Crazy Programmer

Given a binary tree we have to print top view. We will discuss our approach to solve this problem along with its implementation and code in Java language. We will also analyze the time and space complexity of our implementation. The top view of binary tree means the set of nodes visible when the tree is viewed from top. In other words, a node is included in our top view if it is the topmost node at it’s respective horizontal distance. We calculate the horizontal distance as follows: The Horizontal Distance of Root of tree=0.  Horizontal Distance of Left Child=Horizontal Distance of it’s Parent Node – 1. The Horizontal Distance of Right Child=Horizontal Distance of it’s Parent Node + 1. Let us consider binary tree give below: The top view of this tree will give output:  2  1  3  6. Explanation: The nodes are highlighted in the figure above. We put nodes with same horizontal distance together. We start from the root node 1 at level 1 the horizontal distance is 0 at root, then

Apache Gobblin now top-level project

The Apache Software Foundation (ASF) announced that Apache Gobblin , the open-source distributed Big Data integration framework, has reached top-level project status. According to the foundation, achieving top-level status means that the project graduated from the Apache Incubator and has demonstrated that it’s community and products have been well-governed under the ASF’s meritocratic process and principles. The project is dedicated for both streaming and batch data ecosystems and can integrate hundreds of terabytes and thousands of datasets per day by making it easier to ingest, replicate, and organize lifecycle management processes across different types of environments. The project also simplifies data lake creation by supporting simple transformations and enabling organization within the lake through compaction, partitioning and deduplication. Users can also benefit from the life cycle and compliance management of data within the lake that includes data retention and fine-grai

Solving the big challenge: Where do I get test data?

Regardless of the application that needs testing, companies need compliant test data to adequately test applications. For example, such data might take the form of a user ID and password, a person’s name, a phone number, a credit card number or a Social Security number. The challenge for companies is to figure out where to get such data. In many cases, companies pull data from actual production records; however, using real data forces them to mask it in order to ensure that the data is non recognizable to meet security and compliance regulations. Such processes make generating test data difficult, time consuming, costly and challenging.  Alternately, companies can synthetically create test data; however, doing so has required a specialized skill set, driving up the cost and slowing the process for generating the necessary data. Announcing BlazeData, A new way to create test data Since the expansion of BlazeMeter to a Continuous Testing Platform in late 2019, one of the biggest “a