Understanding a Use Case of Fuzzing in Go | by Cheikh seck | Aug, 2022

Fuzzing in action Photo by Tim Hüfner on Unsplash “Fuzz testing is a novel way to discover security vulnerabilities or bugs in software applications.” The concept of fuzzing was introduced in 1988, when Prof. Barton Miller and his students discovered that an OS “would routinely crash when pinged by random unexpected inputs.” Fuzz tests generate … Read more

Understanding Hot Deployment and Hot Reloading in Spring Boot | by Dwen | Aug, 2022

Sprint Boot hot deployment and hot reloading Photo by Milk-Tea on Unsplash In Spring Boot development and debugging, if we need to restart and debug each line of code modification, it may be time-consuming. The Spring Boot team provides the sprint-boot-devtools (Short name: Devtools) plugin for this problem, which tries to improve the efficiency of … Read more

Understanding Cursors in Apache Pulsar

In my previous blog that introduces Apache BookKeeper, it mentions that Apache Pulsar maintains a cursor ledger for each subscription in Apache BookKeeper. After a consumer has processed a message with an acknowledgment sent to the broker and the broker has received it, the broker updates the cursor ledger accordingly. In this blog, let’s take … Read more

Understanding OAuth 2.0 – DZone Security

In a traditional client-server authentication model, a resource owner shares their credentials with the client so that the client can access its resources when necessary. The client does that by passing the resource owner’s credentials to the resource server, and the resource server validates the same before providing access to the protected resource(s). Simple, right? … Read more

Understanding Kubernetes Resource Types – DZone Cloud

Note: This is the first of a five-part series covering Kubernetes resource management and optimization. We start by describing Kubernetes resource types. Before we dive into Kubernetes resources, let’s clarify what the term “resource” refers to here. Anything we create in a Kubernetes cluster is considered a resource: deployments, pods, services, and more. For this … Read more

Understanding Data Analytics Techniques – DZone Big Data

Data is becoming crucial for success in the digital. You might ask, why do organizations rely so much on data? Well, a majority of organizations rely on data for multiple processes, from product management and fraud detection to HR, finance, and manufacturing. Data analytics allow users to use pre-made reports to track performance metrics on … Read more

Reducing bugs in React by understanding the anti-patterns in the code

Understanding patterns and anti-patterns in React Photo by Surface on Unsplash Recently, while working with our large React app codebase, we came to a screeching halt against three categories of bugs — they were not compile-time or run-time errors but unexpected code behaviors. A component does not update upon a user event. A component updates … Read more

javascript – Understanding unique keys for array children in React.js

Be careful when iterating over arrays!! It is a common misconception that using the index of the element in the array is an acceptable way of suppressing the error you are probably familiar with: Each child in an array should have a unique “key” prop. However, in many cases it is not! This is anti-pattern … Read more

Understanding Rust Ownership Model by Example | by Shanmukh Sista | Jun, 2022

Know the 3 rules which are the foundation of Rust’s ownership system Rust Ownership Model Cover Over the last few months, I’ve been intrigued by the Rust programming language — especially its memory model and ownership. At first, I thought it was just another systems programming language that I could learn in a few weeks … Read more

Understanding T-SQL Function SUBSTRING and Its Use Cases

This article will explain the T-SQL string function SUBSTRING() and its use cases. SQL Server offers various string functions to meet distinct business requirements. The SUBSTRING() function is one of them which is used to fetch part of a character, binary, text, or image expression in SQL Server. The syntax used for this function is … Read more