Smart speakers such as echo or google home, have enabled us to do wonderful things with speech. Instead of just plain commands, they can also start a smooth conversation with you and do tasks for you, such as ordering food, making payments, reading news, listening to music, reading books, telling jokes, entertain your kids and a lot more stuff.
Remapping elastic search index For every change in the mapping or settings of the elastic search index, we have to create a new index as there is no way to edit an existing index. So here are the basic requests that you have to fire to achieve it, but first thing first, lets create an … Continue reading Change Elastic Search Mapping
Scalability is one of the most important factors which decides the success of any application. Scaling an application is non trivial, hence it becomes more critical. Scaling can become a nightmare if not planned well. Keeping in mind some of the best practices, architectural patterns and application design concepts can make it easier and straightforward. … Continue reading Scaling applications : The Scale Cube
Every developer encounters situations on a day to day basis where he has to write a code that flows based on some condition, and every condition eventually resolves to a Boolean. When conditions become complex enough to be part of flow control constructs like ifs..whiles..whens we tend to extract them into a method with meaningful … Continue reading Optimistic Boolean Functions
XTreme programming advocates that developers should do things in a certain way, to be able to function smoothly and eventually have a shorter time to market. It is opinionated and strict about developer practices. One of those practices is doing Test Driven Development.
How and where do you store your secrets? Well, I am not talking about your personal secrets 🙂 , but here secrets mean your application credentials such as database passwords, account information or any other unencrypted data that you want to store securely. Problem : Credentials should be kept in an encrypted and secure manner … Continue reading Managing credentials with AWS KMS