Insights and perspectives to keep you updated.

Basic String Operations and Interpolation in Scala

Reading Time: 3 minutes In this blog post, we will talk about strings and some basic string operations. Then, we will discuss string interpolation in Scala. What are Strings ? A string in Scala is a collection of characters. In Scala, string objects are immutable, meaning they can not be changed after they have been created. What are string operations ? Task performed on a string to get any Continue Reading

Recursion v/s Loops in Scala

Reading Time: 3 minutes Loops need mutation, As it keeps changing the value of the variable, Scala hates mutation. Why? What is Mutation? A mutation is changing an object, variable and is one of the common side effects. Now the question arises why does scala hate mutation? Mutation might result in ambiguity, unanticipated errors, and a difficult time debugging the problem. Mutation makes it more difficult to decipher code. Continue Reading

Basic things related to Apache Spark

Reading Time: 3 minutes What is Apache Spark – Apache Spark is an open-source data processing engine to store and process data in real-time across various clusters of computers using simple programming constructs. Spark has consistent and composable API’s and Spark supports multiple languages like Python, Java, Scala And R. Developers and data sientists incorporate Spark into their applications to rapidly query, analyze, and transform data at large scale. Continue Reading

Best Way of Optimization: Bucketing in Hive

Reading Time: 4 minutes Apache Hive is an open-source data warehouse system used to query and analyze large datasets. Data in Apache Hive can be categorized into the following three parts : Tables Partitions Buckets What is Bucketing in Hive? Bucketing in the hive is the concept of breaking data down into ranges, which are known as buckets, to give extra structure to the data so it may be Continue Reading

Future Type Operation with Scala

Reading Time: 6 minutes Introduction Scala Future represents a result of an asynchronous computation that may or may not be available yet. When we create a new Future, Scala spawns a new thread and executes its code. Once the execution is finished, the result of the computation (value or exception) will be assigned to the Future. Type Future Operations Map When we have a Future instance, we can use the map method to transform its successful result Continue Reading

Communication – Spine of Project Success

Reading Time: 5 minutes Problem Statement We all know when it comes to ‘Communication’ it’s regarded as something that must happen as a part of project management activities, using basic/generic tools, such as Slack or eMails. However, without a well-thought-out communication strategy and tools designed to store and regulate project information and communications, many companies are throwing lakhs of rupees out the window with every project they attempt to Continue Reading

Getting Started with Spring Cloud Gateway

Reading Time: 3 minutes Introduction First of all, we will know what is “Spring Cloud Gateway”. Spring Cloud Gateway provides a library for building API gateways on top of Spring and Java. API gateway is the single entry point to multiple microservices. On the other hand, we can understand that any external system can not access all other microservices directly. It can access through only one common entry to Continue Reading

How To Use Pattern Matching

Reading Time: 3 minutes Overview In this blog, we will show a functional feature of Scala which is pattern matching. If you have used Java or .NET in the past, it may at first sight appear similar to switch statements. But, Scala’s pattern matching is a lot more powerful! Different ways of Pattern Matching 1. Pattern matching – a very basic example Suppose you want to test a variable called donutType. In the case that its value Continue Reading

auth0 logo

How to add a role to a user in Auth0 dynamically using Auth pipelines Rules :-

Reading Time: 4 minutes Tired of adding Roles to every new User, who wants to access your particular service, manually by logging into auth0. And giving it permission to access the service by attaching the Roles to it. And are you looking for a better approach to it. Like a Role automatically getting attached to all the valid users of a particular organisation as soon as they login. Then Continue Reading

auth0 logo

How to create a custom API, a User and a Role in Auth0 :

Reading Time: 4 minutes When we use an application for internal purpose, or to be accessible to certain people only and not for everyone on internet. We develop solutions for its authentication and authorisation. What if I say we have a tool that solves our this purpose. And is very easy to use and implement. Here, I am talking about Auth0. Which is a flexible, drop-in solution to add Continue Reading

Helm logo

How to turn your Git Hub repo into a Helm Chart repo :

Reading Time: 3 minutes Imagine creating a helm chart application of kubernetes but what if someone wants to access your helm-chart. As you know you can access or install helm charts present over internet on helm repositories, by using helm install. You have to first add the repo so that helm can figure out and perform its operations. By <helm repo add command>. For that you must have your Continue Reading

close up photo of programming of codes

Chef Inspec Configuration Steps

Reading Time: 2 minutes Introduction: Hello Readers. In this blog, we are going to see how to configure chef inspec in our local system to execute the tests. Chef is an open-source testing framework. They are used to test or validate the configurations, security components as per the client’s requirements or organization’s requirements. It is mainly used to test infrastructure configurations. we can even test cloud services such as Continue Reading

Things That Make You Love Machine Learning

Reading Time: 3 minutes This blog is about Machine Learning and its overview. What is Machine? In a simple sentence, we can say that it is the functional system made by humans which follows some steps defined by the person who made it. The system consists of functional properties and this model is called a system architecture model. This is used to perform a particular task that reduces human Continue Reading