Systems | Development | Analytics | API | Testing

9 Best Practices for Application Logging that You Must Know

Have you ever glanced at your logs and wondered why they don't make sense? Perhaps you've misused your log levels, and now every log is labelled "Error." Alternatively, your logs may fail to provide clear information about what went wrong, or they may divulge valuable data that hackers may exploit. It is possible to resolve these issues!!!

Qlik

Qlik® delivers intuitive platform solutions for self-service data visualization, guided analytics applications, embedded analytics and reporting to approximately 45,000 customers worldwide.

Interview With Pieter Vaniperen

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Pieter Vaniperen, Managing Partner at PWV Consultants. Pieter is a veteran software architect and security expert who is an industry authority and influencer providing thought leadership and execution to develop widely adopted processes, methodologies, and technologies that are at the forefront of digital innovation and software development.

What to Do About Java Memory Leaks: Tools, Fixes, and More

Memory management is Java’s strongest suit and one of the many reasons developers choose Java over other platforms and programming languages. On paper, you create objects, and Java deploys its garbage collector to allocate and free up memory. But that’s not to say Java is flawless. As a matter of fact, memory leaks happen and they happen a lot in Java applications. We put together this guide to arm you with the know-how to detect, avoid and fix memory leaks in Java.

5 Tips for Pushing Data from Your Warehouse to SAP

Reverse ETL flips the targets and destinations of the standard ETL (extract, transform, load) process. Instead of collecting your data within a centralized data warehouse, reverse ETL transfers information out of this warehouse and into third-party operational systems for ease of access and better analytics and reporting. That’s all very well and good — but what does reverse ETL look like in practice with systems and software such as SAP?

6 Database Schema Designs and How to Use Them

In this guide, we'll discuss what a database schema is, six database schema designs, and how and why they are used. We know a lot of thought goes into database construction. Before creating any database, developers plan what it should include and how the different aspects work together. This planning ensures a database has the necessary design for its intended use. Coders then use the schema to implement the database’s design.