Systems | Development | Analytics | API | Testing

%term

How to Handle the Incompatible Types Error in Java

Variables are memory containers used to store information. In Java, every variable has a data type and stores a value of that type. Data types, or types for short, are divided into two categories: primitive and non-primitive. There are eight primitive types in Java: byte, short, int, long, float, double, boolean and char. These built-in types describe variables that store single values of a predefined format and size.

9 Expert Tips for Using Snowflake

Snowflake is a robust data warehouse that has changed the data science game for many organizations. Snowflake lets you analyze your data using the most sophisticated query engine available today with its cloud-native architecture. But using Snowflake is not always as simple as using other products on the market. Below are nine expert tips to help you master the Snowflake platform.

G2 Winter 2022 Fastest Implementation: DreamFactory Awarded!

DreamFactory is proud to announce its achievement in the G2 Winter Quarter 2022 Fastest Implementation report. Our accomplishment in the Winter 2022 quarter shows not only the hard work our team has put in over the last quarter, but also reflects how satisfied our customers are with our product.

Migrating Data During a Merger or Acquisition

Since I’m now migrating NodeGraph’s processes to Qlik, I thought it may be a good time to talk about migrating data during a merger or acquisition. There are many aspects to consider. Here are some of my thoughts on why companies merge or migrate data landscapes, common M&A migration pitfalls and how to avoid them, the time and cost involved migrating data during a merger or acquisition, and other topics.

logit.io

Logit is an ISO 27001 certified centralised logging and metrics management company. Our platform delivers you with a fully customised log and metrics solution based on Elasticsearch, Logstash and Kibana which is scalable, secure and compliant.

Security Risks On Rails: Misconfiguration and Unsafe Integrations

In the third and final article of our series on the OWASP Top 10 Web Application Security Risks, we’ll explore the lesser-known risks associated with the development of web applications on Rails when it comes to threats involving security misconfiguration, JSON escaping, etc.

Embracing Failure With Gremlin Chaos Engineering

In this episode of Kongcast, I spoke with Jason Yee, director of advocacy at Gremlin, about the concept of chaos engineering, why even the best engineers can’t control everything, and tools and tactics to help build app resiliency. Check out the transcript and video from our conversation below, and be sure to subscribe to get email alerts for the latest new episodes.