Systems | Development | Analytics | API | Testing

Latest Blogs

Python Virtual Environment: A comparison of venv, pyvenv, pyenv, virtualenv, virtualenvwrapper, and pipenv

To maintain consistency and avoid challenges between different projects, you need to manage dependencies and isolate their project environments. Virtual environments solve this problem by allowing dependencies to be installed in isolated environments without affecting the Python installation system-wide. We'll compare venv, pyvenv, pyenv, virtualenv, virtualenvwrapper, and pipenv for creating isolated Python environments.

Building a Full-Stack Application With Kafka and Node.js

A well-known debate: tabs or spaces? Sure, we could set up a Google Form to collect this data, but where’s the fun in that? Let’s settle the debate, Kafka-style. We’ll use the new confluent-kafka-javascript client (not in general availability yet) to build an app that produces the current state of the vote counts to a Kafka topic and consumes from that same topic to surface them to a JavaScript frontend.

Legacy System: Definition, Challenges, Types & Modernization

Over 66% of organizations still rely on legacy applications for their core operations, and more than 60% use them for customer-facing functions. This widespread dependence on outdated technology highlights the significant role legacy systems play in modern business environments. Despite their critical functions, these systems also lead to increased maintenance costs, security vulnerabilities, and limited scalability.

Mastering REST API for Test: Essential Methods and Tools for Quality Assurance

Testing REST APIs is crucial for reliable software. This article zeroes in on harnessing REST API for test, focusing on the practicalities of verifying API performance and security. Learn the steps and techniques for testing REST API, including the tools and methods used, the challenges faced, and the significance of REST API testing in web applications. Skip the guesswork and discover surefire tools and techniques that fortify your testing protocol.

How to develop a Women's Fashion App like Shein - Antino

As the e-commerce industry continues to expand rapidly, projected to surge from 4,248 billion dollars to 12 trillion dollars by 2027, it's evident that the sector is continually growing. Retailers are also actively seeking avenues to tap into this flourishing sector, often emulating the success of leading e-commerce platforms through app cloning.

MiFID II: Data Streaming for Post-Trade Reporting

The Markets in Financial Instruments Directive II (MiFID II) came into effect in January 2018, aiming to improve the competitiveness and transparency of European financial markets. As part of this, financial institutions are obligated to report details of trades and transactions (both equity and non-equity) to regulators within certain time limits.

Introducing our new status page

We are thrilled to announce that we are transitioning from our legacy status page to a brand-new, upgraded one. This change is part of our ongoing commitment to provide Ably users with the best possible developer experience. Our legacy status page has served us well, but technology and customer needs are constantly evolving. We recognized the need for a platform that can keep pace with these changes and offer an improved experience.

Swift Machine Learning: Using Apple Core ML

A sub-discipline of artificial intelligence (AI), machine learning (ML) focuses on the development of algorithms to build systems capable of learning from, and making decisions based on, data. In iOS development, ML allows us to create applications that can identify patterns and make predictions, adapting a user’s experience by learning from their behaviour.

Introducing Cloudera Observability Premium

There’s nothing worse than wasting money on unnecessary costs. In on-premises data estates, these costs appear as wasted person-hours waiting for inefficient analytics to complete, or troubleshooting jobs that have failed to execute as expected, or at all. They manifest as idle hardware waiting for urgent workloads to come in, ensuring sufficient spare capacity to run them amidst noisy neighbors and resource-hungry, lower-priority workloads.