Author: Sakshi Mittal

red blue and yellow textile

Twitter Finagle Ecosystem

Reading Time: 4 minutes In this blog, we will learn about the very basics of the Twitter Finagle Ecosystem and see how it is used in Twitter. In order to create high-concurrency servers and clients in Scala, developers leverage the open-source, asynchronous, protocol-neutral RPC framework known as Twitter Finagle. Hence, to manage the enormous traffic and size that Twitter required to serve, it was created by Twitter. The entire Continue Reading

distributed-agile-mindset

Working With Liquibase Changelogs

Reading Time: 4 minutes In the previous blog, we learned about best practices for managing Liquibase changelogs. In this blog – “Working With LIquibase Changelogs” we will see the actual working of Liquibase changelogs and all we can implement using Liquibase Changelogs. Let’s re-visit to see what are changelogs – Liquibase Changelogs Liquibase changelogs are a collection of database changes that can be executed on a database to bring Continue Reading

Best Practices for Managing Liquibase ChangeLogs

Reading Time: 4 minutes In the previous Liquibase blog we saw the essential introduction to Liquibase and its advantages. Now, let’s move to the second step of the series in which we will see the “Best Practices for Managing Liquibase ChangeLogs”. Let us start by seeing ChangeLog formats ChangeLogs are an ordered list of changes to be deployed to the database. You can also try to mix and match Continue Reading

background

Introduction to Liquibase and its Advantages

Reading Time: 5 minutes New to Liquibase? Welcome! This blog will explain the essential introduction to Liquibase and its Advantages. Common Liquibase Definition Liquibase is an open-source database-independent library for tracking, managing, and applying database schema changes. A little background Before we go into detail about Liquibase, let us see the common problems we face as a developer while working with the application and the database scripts. Now, as Continue Reading

Hacker using computer, smartphone and coding to steal password and private data. Screen with code

Understanding Profiles in Microservices

Reading Time: 4 minutes In this blog, we will learn and try to build an Understanding of Spring Profiles in Microservices. I’ll answer a few questions: what are profiles and why do we need them? Your application is running, at the initial stages, it will run on the dev environment. After some time it will be running in a test environment and finally, it will be in production. So Continue Reading

background

Apache Camel – Error Handling

Reading Time: 4 minutes In the Apache Camel series, we have already reached the halfway mark. But, in this blog, you’ll tackle one of the most difficult aspects of integration: dealing with the unexpected. When it comes to handling unforeseen occurrences, developing applications that integrate different systems is difficult. You can manage these occurrences and recover in a single system that you fully control. In the same way, network-connected Continue Reading

Introduction To Using Beans With Camel

Reading Time: 3 minutes We’ve been developing software for a long time, and have dealt with several component models like CORBA, EJB, JBI, SCA, and many more. Some of these, particularly the older ones, put significant restrictions on the programming paradigm, defining what we could and couldn’t do. Because of the increasing complexity and its accompanying difficulties, the open-source community developed a simpler, more pragmatic programming style: the Plain Continue Reading

Apache Camel – The Beginner’s Guide

Reading Time: 4 minutes Are you using microservices architecture? Are you having trouble implementing integration patterns between microservices and different applications? Enterprise integrations can be very complex. Apache Camel simplifies enterprise integrations and makes it easy to communicate with queues, databases, file systems, and a number of other endpoints. Problem that Apache Camel solves? Enterprise integrations are very complex, whenever we talk about enterprises, they have hundreds of applications Continue Reading

Apache Airflow: Automate Email Alerts for Task Status

Reading Time: 4 minutes In this blog, we will learn how to Send Email Alerts to the user about the Task Status using Apache Airflow. Prerequisite: Airflow SMTP Configuration Step 1 Generate Google Application Password Visit this link and log in with your email Id and password. When you have successfully logged in, you will see the below window: You have to choose “Mail” as an app and select Continue Reading

Apache Airflow: DAG Structure and Data Pipeline

Reading Time: 6 minutes What is a DAG in Apache Airflow? In this blog, we are going to see what is the basic structure of DAG in Apache Airflow and we will also Configure our first Data pipeline. A DAG in apache airflow stands for Directed Acyclic Graph which means it is a graph with nodes, directed edges, and no cycles. An Apache Airflow DAG is a data pipeline Continue Reading

Apache AirFlow: Introduction and Installation

Reading Time: 4 minutes What is Apache Airflow ? Apache Airflow is a workflow engine that makes scheduling and running complex data pipelines simple. It will ensure that each activity in your data pipeline executes in the proper order also with the appropriate resources. Airflow is a workflow platform that allows you to define, execute, and monitor workflows. A workflow can be defined as any series of steps you Continue Reading

Generating your own Javadocs for your Package

Reading Time: 4 minutes Documenting whatever work you are doing as a developer or tester is always a good idea hence we are going to learn about Generating JavaDocs for your own package. Documentation can easily describe info about which method/class/entity to use and when. Hence, a reliable documentation is a must for a developer. Just think if you are not aware of a certain language then how difficult Continue Reading

Spring Security – A Starter Guide

Reading Time: 5 minutes spring security – authentication and authorization in detail Topics covered Basics of spring security What is spring security? What spring security can do? 5 core concepts of spring security and their detailed breakdown. Definition of Spring Security : The proper definition of spring security is: spring security is an application level security framework that provides ways to to apply application level security to the application. Continue Reading