Systems | Development | Analytics | API | Testing

%term

Adobe and Snowflake Deepen Partnership to Rewrite the Next Era of Customer Experience

Adobe launched Adobe Experience Platform Federated Audience Composition, now generally available on Snowflake, allowing organizations to unlock seamless interoperability for marketers by integrating Snowflake's AI Data Cloud with Adobe Real-Time Customer Data Platform (CDP) and Adobe Journey Optimizer.

How DreamFactory Prevents SQL Injection Attacks

A SQL injection attack is an attempt to modify the syntax of a SQL query executed in conjunction with a user-initiated action within a software application. Some examples of user-initiated actions include searching for a product within an e-commerce catalog, adding a comment to a blog post, and creating a new user account. In each of these scenarios, the user uses a form to submit input (e.g.

How to Fix the OutOfMemoryError in Java

Picture this: It's Black Friday, and you're circling a packed mall parking lot. Every space is taken, and cars are lined up waiting for spots. You keep circling, but there’s just no place to park and you run out of gas. When you see a java.lang.OutOfMemoryError it’s just like what you experienced in that overcrowded parking lot. The Java Virtual Machine (JVM) has run out of space to "park" new objects in memory. Now here's the thing about Java: it loves objects. It can't get enough of them.

Gen AI for Marketing - From Hype to Implementation

Gen AI has the potential to bring immense value for marketing use cases, from content creation to hyper-personalization to product insights, and many more. But if you’re struggling to scale and operationalize gen AI, you’re not alone. That’s where most enterprises struggle. To date, many companies are still in the excitement and exploitation phase of gen AI. Few have a number of initial pilots deployed and even fewer have simultaneous pilots and are building differentiating use cases.

SQL for data exploration in a multi-Kafka world

Every enterprise is modernizing their business systems and applications to respond to real-time data. Within the next few years, we predict that most of an enterprise's data products will be built using a streaming fabric – a rich tapestry of real-time data, abstracted from the infrastructure it runs on. This streaming fabric spans not just one Apache Kafka cluster, but dozens, hundreds, maybe even thousands of them.

Govern an Open Lakehouse with Snowflake Open Catalog, a Managed Service for Apache Polaris

To enhance security and ease operational burden, many organizations with data lakes or lakehouses want flexibility to securely integrate their tools of choice on a single copy of data. An open standard for storage format and catalog API has helped, but there’s still a need for open standards for the catalog, including a consistent way to apply security access controls to data.

What Is Contract Testing: A Knowledge Guide

Let’s Take an e-commerce platform, where there are different services for user authentication, product catalog, and order processing. These services communicate through APIs. For example, the order processing service needs to get product details from the catalogue service. Contract testing ensures that the agreement between these services—specifying what data the order service expects from the product catalogue service—stays consistent.

AI in UX design - Vital AI Impacts & Enhanced Features

Did you know that the AI market size is likely to reach USD 826.73 billion dollars by 2030? Yes, you read it right! The use of artificial intelligence can be seen in every field. AI in UX design is bringing about a revolution in the way users interact with technology. Traditionally, UX design relied on designer intuition, manual processes, and labor-intensive user testing. No doubt, the conventional approach had a positive impact on the user experience.

How to Manage Your API Policies with OPA (Open Policy Agent)

APIs are essential to modern applications, but managing access and security policies can be complex. Traditional access control mechanisms can fall short when flexible, scalable, and fine-grained control over who can access specific resources is needed. This is where OPA (Open Policy Agent) steps in. OPA provides a unified framework for consistently defining and enforcing policies across microservices, APIs, Kubernetes clusters, and beyond. Consistent policy management is essential for enterprises.

Subdomain takeover: ignore this vulnerability at your peril

The Domain Name System (DNS) is often described as the address book of the Internet. A and AAAA records map a human-friendly hostname like honeybadger.io to some machine-friendly IP address like 104.198.14.52. Other types of DNS records also exist; in particular, CNAME records are records that map a hostname to some other hostname, thereby delegating IP resolution to the latter.