DevOps celebrated its tenth anniversary in 2018. In the technology industry, this is already a long enough life cycle. Although DevOps has been relatively mature, the DevOps philosophy is still avoiding even the most famous and resourceful organization. A shocking Gartner report showed that 75% of DevOps projects failed to achieve their goals.

Why is the failure rate of DevOps so high? When implementing the DevOps concept, what are the common challenges that organizations face? How to overcome these challenges?

Photo by ThisisEngineering RAEng on Unsplash

This article will solve these problems and provide companies with reproducible strategies to improve the success rate of DevOps plans.

1. Irregular resource allocation

With the rapid popularization of AI technologies such as autonomous driving technology, smart assistants, face recognition, smart factories, and smart cities, and the rapid growth of related security incidents, consumers and the industry are paying more and more attention to AI cybersecurity issues and threats. Continuous improving.

Recently, at the request of the European Union and the US government, Adversa, a trusted AI research and consulting company, published the industry’s first comprehensive research report on the security and credibility of artificial intelligence. The report also combines Gartner’s relevant predictions and recent AI research reports. Of confrontational attacks.

Oliver Rochford, a…

Application software leaking user data has long been a common topic, but every time it is mentioned, I still have to feel the dangers that are difficult to prevent, especially when the scope of influence is too large and you may be a “victim”.

On the 20th of May, 2021, the network security company Check Point Research (hereinafter referred to as CPR) released a report: Because developers did not properly configure third-party cloud services, some popular Android applications leaked the personal data of more than 100 million users.

Photo by Denny Müller on Unsplash

Multiple misconfigurations

The CPR team said that by testing 23 applications, they found that…

The era of Adobe Flash Player has come to an end.

Photo by Przemyslaw Marczynski on Unsplash

Starting from January 1, 2021, Adobe officially stopped supporting Adobe Flash Player. Prior to this, including Microsoft Edge, Google Chrome, Mozilla Firefox, and Apple Safari, Flash had been eliminated before this date. Use other technologies instead.

Recently, Microsoft has launched another “killer” on the Windows system. This is bound to root out the poorly secured and low-performance Flash Player from its own products. …

Recently, the well-known analysis company SlashData, after surveying more than 19,000 developers in 155 countries/regions around the world, released the “Developer Report” (20th edition) for the first quarter of 2021. In this report, focusing on tools and fields such as programming languages, machine learning, emerging technologies, and embedded, analyze the application status of development tools and the latest development trends of the developer ecology.

Source: Slashdata

Highlights at a glance:

Programming language development prospects

  • JavaScript is still the most popular programming language, used by nearly 14 million developers worldwide;
  • Since the beginning of 2020, the popularity of Python has surpassed that of Java, becoming the second…

The purpose of this article is to give you a detailed list of the learning route and important knowledge points of Python OpenCV. The core is divided into 24 small chunks, all of which are mastered.

Photo by Nguyen Dang Hoang Nhu on Unsplash

OpenCV first understanding and installation

In this part, you need to understand the related introduction of OpenCV (Open Source Computer Vision Library). OpenCV can run on multiple platforms. It is lightweight and efficient. It consists of a series of C functions and a small number of C++ classes. It provides Python, Ruby, MATLAB, etc. …

Recently, JetBrains announced that all its IntelliJ-based IDEs will stop supporting 32-bit operating systems, including AppCode, Clion, DataGrip, GoLand, IntelliJ IDEA, PhpStorm, PyCharm, Rider, RubyMine and WebStorm.

Original Photo by Miguel Á. Padriñán from Pexels

The main reason for giving up compatibility with 32-bit operating systems is that JetBrains has discovered that the number of users using Linux and Windows 32-bit operating systems has dropped significantly over the years, and they want to focus more on compatibility with the most commonly used operating systems. And emerging architectures, such as the AArch64 architecture, which is becoming more and more popular in the macOS field.

For all IntelliJ-based IDEs, the…

In the previous article, we have implemented the use of custom annotations to verify token information, so we will find that when we need to verify more interfaces, we need to add the @ JwtToken annotation to each method, which is also very troublesome. In this article, we continue to use interceptors to verify token information.

Photo by AltumCode on Unsplash

If you are not familiar with the integration of JWT, you can take a look at my article: Integrate JWT in SpringBoot to achieve Token verification (Integration)

If you are interested in custom annotation verification token information, you can check out my article: Integrate…

In the last article, we have integrated JWT in SpringBoot and implemented Token verification. In actual applications, we will find that if each view layer (controller) manually verifies the token, the code will be particularly bloated. This article The article is mainly to solve this problem.

Photo by Mimi Thian on Unsplash

If you are not familiar with the integration of JWT, you can take a look at my previous article: Integrate JWT in SpringBoot to achieve Token verification (Integration)

Custom Annotation

Create custom annotations

We have created an annotation named JwtToken, which has no parameters. An explanation for some of the above annotations:

  • @Target(ElementType.METHOD), Target indicates…

JSON web token (JWT) is a JSON-based open standard ((RFC 7519) implemented to transfer claims between web application environments. The token is designed to be compact and secure, especially suitable for single-spots on distributed sites. Sign-on (SSO) scenario.

JWT statements are generally used to pass the authenticated user identity information between the identity provider and the service provider, in order to obtain resources from the resource server, and can also add some additional business logic necessary, The token can also be used for authentication directly, or it can be encrypted.

Photo by Maximilian Weisbecker on Unsplash

Why do we need JWT?

When we develop a front-end and back-end separation project, we…

Shingai Zivuku

Student • SecOps • Can read and write code

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store