<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>software developer Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/software-developer/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/software-developer/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Thu, 21 Nov 2019 06:34:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Data Science Market New Research Report&#124; Microsoft Corporation, IBM Corporation, SAS Institute Inc</title>
		<link>https://www.aiuniverse.xyz/data-science-market-new-research-report-microsoft-corporation-ibm-corporation-sas-institute-inc/</link>
					<comments>https://www.aiuniverse.xyz/data-science-market-new-research-report-microsoft-corporation-ibm-corporation-sas-institute-inc/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Thu, 21 Nov 2019 06:34:40 +0000</pubDate>
				<category><![CDATA[Data Science]]></category>
		<category><![CDATA[data science]]></category>
		<category><![CDATA[DevOps methodology]]></category>
		<category><![CDATA[global Big Data market]]></category>
		<category><![CDATA[IT technology]]></category>
		<category><![CDATA[software developer]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=5313</guid>

					<description><![CDATA[<p>Source:-5gigs.com An aim of Data Science Market report is to guide the user to know the market in terms of its definition, market potential, vital trends, and the challenges <a class="read-more-link" href="https://www.aiuniverse.xyz/data-science-market-new-research-report-microsoft-corporation-ibm-corporation-sas-institute-inc/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/data-science-market-new-research-report-microsoft-corporation-ibm-corporation-sas-institute-inc/">Data Science Market New Research Report| Microsoft Corporation, IBM Corporation, SAS Institute Inc</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source:-5gigs.com<br></p>



<p>An aim of Data Science Market report is to guide the user to know the market in terms of its definition, market potential, vital trends, and the challenges facing by the market. Step by step study of Data Science market provides an extensive outlook on the market trends from 2019 to 2028 covering crucial information on product demand, Data Science industry segmentation and market abstract in each region. We have given a detail analysis of the vendor landscape to offer you with a full picture of ongoing and future Data Science market competitive scenarios. The report covers Data Science market inforrmation including historical and upcoming trends for supply, prices, competition, trading, and value chain. Moreover, the report also provides a SWOT analysis that comprise the strengths, weaknesses, challenges, opportunities, and threats impacting the overall market.</p>



<p>At first the report introduced the definitions, classifications, Data Science market applications and market outlook; product statement; manufacturing processes; cost frame, raw materials and so on. Then it studied the main region market conditions globally, containing the product price, profit, Data Science capacity, supply, demand, production, market growth rate and forecast to 2028 etc. In the end, the report offers new project SWOT analysis, Data Science market investment feasibility study, and investment return analysis.</p>



<p><strong>If you are a stakeholder in the Data Science Market, this research study will help you understand the growth model. Click to get a Free Brochure report in PDF (including ToC, Tables and Figures)</strong></p>



<p><strong>The Prime Manufacturers Covered In This Report Are:</strong>&nbsp;Apteryx Inc, Rapid Miner Inc, SAS Institute Inc, IBM Corporation, Datalink SAS, Microsoft Corporation, SAP SE, Math Works Inc and Fair Isaac Corporation (FICO)</p>



<p><strong>Global Data Science Market Segmentation, 2019-2028:</strong></p>



<p>By type: Solutions, Services. By end user: Banking and Financial Institutions (BFSI), Telecommunication, Transportation and Logistics, Healthcare, Manufacturing</p>



<p><strong>On the basis of region</strong>, the Data Science market is segmented into Europe, Japan, Southeast Asia, United States, China, South America, South Africa, India and the rest of the world.</p>



<p>The future of the industries is projected on the basis of the ongoing scenario, profit, and Data Science market growth opportunities. Distinct graphical presentation methods are used to demonstrate the facts. Further, we discuss some internal and external factors that drive or restraint the Data Science market. The study is a thorough mixture of qualitative and quantitative data including Data Science market size, revenue, and volume (if applicable) by vital segments. It also scrutinizes the performance of the Data Science market key players operating in the industry including their company profile, corporate summary, financial review. The report examines market segmentation based upon the different segments like type, application, end user and region. In addition foremost regions featuring ‘North America, Asia-Pacific, United Kingdom, Europe, Central &amp; South America, Middle East &amp; Africa.’</p>



<p><strong>Any Query? Fill Free To Inquire Here. We’ll Put You On The Right Path:</strong></p>



<p><strong>The main features are covered in the Global Data Science Market 2019 report:</strong></p>



<p>– The Data Science market report comprises the latest mechanical enhancements and latest releases to engage our consumers to produce, settle on instructed business decisions, and build their future estimated achievements.</p>



<p>– The Data Science market report further focuses more on ongoing business and progressions, future methodology changes, and open entryways for the worldwide Data Science market.</p>



<p>– The investment return study, SWOT analysis, and feasibility study are also used for data study.</p>



<p><strong>Key questions include:</strong></p>



<p>1. What will the outstanding growth rate and also Data Science industry size globally by 2028?</p>



<p>2. What will be the crucial elements driving the Data Science market?</p>



<p>3. What will be the impact of existing and new emerging Data Science market trends 2019-2028?</p>



<p>4. What would be the future Data Science market behavior forecast 2028 with trends, challenges, opportunities and drivers, challenges for development?</p>



<p>5. Who are the leading vendors of the market?</p>



<p>6. Which would be Data Science industry opportunities and dangers faced with most vendors in the market?</p>



<p>7. What are the parameters that affecting the Data Science market share?</p>



<p>8. What will be the outcomes of Data Science market SWOT five forces study?</p>
<p>The post <a href="https://www.aiuniverse.xyz/data-science-market-new-research-report-microsoft-corporation-ibm-corporation-sas-institute-inc/">Data Science Market New Research Report| Microsoft Corporation, IBM Corporation, SAS Institute Inc</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/data-science-market-new-research-report-microsoft-corporation-ibm-corporation-sas-institute-inc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DeepLocker: When malware turns artificial intelligence into a weapon</title>
		<link>https://www.aiuniverse.xyz/deeplocker-when-malware-turns-artificial-intelligence-into-a-weapon/</link>
					<comments>https://www.aiuniverse.xyz/deeplocker-when-malware-turns-artificial-intelligence-into-a-weapon/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Fri, 10 Aug 2018 05:52:33 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Big Data Analytics]]></category>
		<category><![CDATA[Cyberattackers]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[software developer]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=2723</guid>

					<description><![CDATA[<p>Source &#8211; techrepublic.com AI can be used to automatically detect and combat malware — but this does not mean hackers can also use it to their advantage. Cybersecurity, <a class="read-more-link" href="https://www.aiuniverse.xyz/deeplocker-when-malware-turns-artificial-intelligence-into-a-weapon/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/deeplocker-when-malware-turns-artificial-intelligence-into-a-weapon/">DeepLocker: When malware turns artificial intelligence into a weapon</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; techrepublic.com</p>
<p>AI can be used to automatically detect and combat malware — but this does not mean hackers can also use it to their advantage.</p>
<p>Cybersecurity, in a world full of networked systems, data collection, Internet of Things (IoT) devices and mobility, has become a race between white hats and threat actors.</p>
<p>Traditional cybersecurity solutions, such as bolt-on antivirus software, are no longer enough. Cyberattackers are exploiting every possible avenue to steal data, infiltrate networks, disrupt critical systems, rinse bank accounts, and hold businesses to ransom.</p>
<p>The rise of state-sponsored attacks does not help, either.</p>
<p>Security researchers and response teams are often hard-pressed to keep up with constant attack attempts, as well as vulnerability and patch management in a time where computing is becoming ever-more sophisticated.</p>
<p>Artificial intelligence (AI) has been touted as a potential solution which could learn to detect suspicious behavior, stop cyberattackers in their tracks, and take some of the workload away from human teams.</p>
<p>However, the same technology can also be used by threat actors to augment their own attack methods.</p>
<p>According to IBM, the &#8220;AI era&#8221; could result in weaponized artificial intelligence. In order to study how AI could one day become a new tool in the arsenal of threat actors, IBM Research has developed an attack tool powered by artificial intelligence.</p>
<p>Dubbed DeepLocker, the AI-powered malware is &#8220;highly targeted and evasive,&#8221; according to the research team.</p>
<p>The malware, carried along by systems such as video conferencing software, is dormant until it reaches a specific victim, who is identified through factors including facial recognition, geolocation, voice recognition, and potentially the analysis of data gleaned from sources such as online trackers and social media.</p>
<p>Once the target has been acquired, DeepLocker launches its attack.</p>
<p>&#8220;You can think of this capability as similar to a sniper attack in contrast to the &#8220;spray and pray&#8221; approach of traditional malware,&#8221; IBM says. &#8220;It is designed to be stealthy and fly under the radar, avoiding detection until the very last moment when a specific target has been recognized.&#8221;</p>
<p>DeepLocker&#8217;s Deep Neural Network (DNN) model stipulates &#8220;trigger conditions&#8221; to execute a payload. If these conditions are not met — and the target is not found — then the malware remains locked up, which IBM says makes the malicious code &#8220;almost impossible to reverse engineer.&#8221;</p>
<p>Finding a target, triggering a key, and executing a payload may bring to mind an &#8220;if this, then that&#8221; programming model. However, the DNN AI-model is far more convoluted and difficult to decipher.</p>
<p>To demonstrate DeepLocker&#8217;s potential, the security researchers created a proof-of-concept (PoC) in which WannaCry ransomware was hidden in a video conferencing application. The malware was not detected by antivirus engines or sandboxing.</p>
<p>The AI model was then trained to recognize the face of an individual selected for the test, and once spotted, the trigger condition would be met and the ransomware executed.</p>
<p>&#8220;What makes this AI-powered malware particularly dangerous is that similar to how nation-state malware works, it could infect millions of systems without ever being detected, only unleashing its malicious payload to specified targets which the malware operator defines,&#8221; the research team added.</p>
<p>Thankfully, this kind of cyberthreat has not been actively used — yet. However, DeepLocker was created in order to understand how AI could be bolted-on to current malware techniques and to research just what threats the enterprise and consumers alike may face in the future.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.aiuniverse.xyz/deeplocker-when-malware-turns-artificial-intelligence-into-a-weapon/">DeepLocker: When malware turns artificial intelligence into a weapon</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/deeplocker-when-malware-turns-artificial-intelligence-into-a-weapon/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>An introduction to hands-on microservices with Java</title>
		<link>https://www.aiuniverse.xyz/an-introduction-to-hands-on-microservices-with-java/</link>
					<comments>https://www.aiuniverse.xyz/an-introduction-to-hands-on-microservices-with-java/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Sat, 29 Jul 2017 10:14:05 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[develop microservices]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[Microservices Architecture]]></category>
		<category><![CDATA[software developer]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=358</guid>

					<description><![CDATA[<p>Source &#8211; jaxenter.com “Microservices Architecture” is now a popular concept in programming. In order to keep up-to-date as a software developer, I’ve been trying to get a good <a class="read-more-link" href="https://www.aiuniverse.xyz/an-introduction-to-hands-on-microservices-with-java/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/an-introduction-to-hands-on-microservices-with-java/">An introduction to hands-on microservices with Java</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211;<strong> jaxenter.com</strong></p>
<p>“Microservices Architecture” is now a popular concept in programming. In order to keep up-to-date as a software developer, I’ve been trying to get a good understanding of this architecture. Specifically, I’ve been looking at a better way to implement microservices architecture in Java using Spring.</p>
<p>Some background: my company, although great, had a woefully out of date tech stack. Basically, we weren’t using Java 8 or microservices yet. So I had to look outside of the company if I wanted to know more about either of those things. The easiest way to learn is by just doing it, so I decided to create a To Do system anddocument my experience for future reference.</p>
<h3><b>Overview</b></h3>
<p>My goal for this article is to have a source code walkthrough for different microservices. I’m not planning to go deep in the concepts and tools; there are a lot of posts about those out there. My intention here is to present an application example containing the patterns, tools, technologies used to develop microservices.</p>
<p>Since this is a reference application, I have intentionally made it as simple as possible so the source code is easy to understand. You should follow along at home and be able to run this application on your own computer as a reference.</p>
<p>In this article, we are going to work with a “To Do” application which will be composed of 8 applications:</p>
<ul>
<li>Reminder</li>
<li>User</li>
<li>Service discovery server</li>
<li>Mailer</li>
<li>OAuth Server</li>
<li>System integration test</li>
<li>API Gateway</li>
<li>Web application client</li>
</ul>
<p>This article will provide an overview of the whole project. Later, I will explain more deeply about what and how we are using the components in each microservice.</p>
<h3><b>How our system will work with Microservices</b></h3>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-136072" src="https://jaxenter.com/wp-content/uploads/2017/07/microservices-alexsandro.jpg" sizes="(max-width: 714px) 100vw, 714px" srcset="https://jaxenter.com/wp-content/uploads/2017/07/microservices-alexsandro.jpg 953w, https://jaxenter.com/wp-content/uploads/2017/07/microservices-alexsandro-120x77.jpg 120w, https://jaxenter.com/wp-content/uploads/2017/07/microservices-alexsandro-300x193.jpg 300w, https://jaxenter.com/wp-content/uploads/2017/07/microservices-alexsandro-768x495.jpg 768w, https://jaxenter.com/wp-content/uploads/2017/07/microservices-alexsandro-200x129.jpg 200w, https://jaxenter.com/wp-content/uploads/2017/07/microservices-alexsandro-150x97.jpg 150w, https://jaxenter.com/wp-content/uploads/2017/07/microservices-alexsandro-350x225.jpg 350w" alt="microservices" width="714" height="460" /></p>
<p>In the image above, you can see how our system interacts along with all microservices. The user will access a Web Application written using Angular 2. It will then connect to an OAuth Authorization Server, which will be a central point of where users and authorities can be assigned. This server will return a JSON Web Token containing info about the client with its authorities and the grated scope. After the user is authenticated and has a token, the Web Application will be able to talk to the API gateway. It will take the JWT, verify if it’s coming from the Authorization Server, and then make calls to the microservices and build the response.</p>
<p>The OAuth server uses the User service to get the user’s authentication details. Also, the API gateway uses the OAuth server to get the user’s information.</p>
<p>The <i>Remainder Service</i> is where are placed the ToDo functionalities, The ToDo service has a scheduled job to check for reminders and notify the user by email, the emails are sent by the <i>Mailer Service</i> which is triggered from <i>Reminder service</i> by event using Kafka.</p>
<p>The System Integration Test is a Java application responsible for reaching the Reminder service’s endpoints.</p>
<h3><b>Connecting Microservices</b></h3>
<p>In Microservice architecture, we have to deal with many microservices running in different IPs and ports. Therefore, we need to find a way of managing each address without hard coding.</p>
<p>This is where Netflix Eureka comes to the rescue. It is a client-side service discovery that allows services to find and communicate with each other automatically. We are using Spring Cloud Eureka in our system; you should take a look at how it works so you can understand how our REST services are communicating between different microservices. Once Eureka cares about where the services are running, we can add instances and apply load balancing to distribute the incoming application traffic between our microservice.</p>
<p>In our system, we are using Netflix Ribbon as a client-side load balancer. That enables us to achieve fault tolerance and increase the reliability and availability through redundancy. We are using Netflix Foreign for writing declarative REST client, and integrating Ribbon and Eureka to provide a load balance HTTP client.</p>
<p>Our system does have some dependencies. We are trying to isolate our application from dependency failure using Netflix Hystrix Circuit Breaker. It helps stop cascading failures and allows us to fail fast and rapid recovery, or add fallbacks. Hystrix maintains a thread-pool for each dependency; it rejects requests instead of queuing them if the thread-pool becomes exhausted. It also provides circuit-breaker functionality that can stop all requests to a dependency. You can also implement fallback logic when a request is failed, rejected, or timed-out.</p>
<h3><b>Authentication</b></h3>
<p>Security is something very important when developing any kind of system. Microservices architecture is no different. “How can I maintain security in my microservices?” comes up immediately, and the first answer is OAuth2. OAuth2 is definitely a good solution: it is a well-known authorization technology that is widely used for Google, Facebook, and Github.</p>
<p>Anyways, it’s impossible to talk about security without mentioning Spring Security. I use it alongside OAuth2 in this project. Spring Security and OAuth2 are obvious choices when talking about secure distributed system.</p>
<p>However, we are adding one more element to our security concern: JSON Web Token (JWT). If we were only using OAuth, we would need to have an OAuth Authorization Server to authenticate the user, generate the token as well as act as an endpoint for the <i>Resource servers</i> to ask if the token is valid and which permission does it grant. This requires twice more requests to the <i>Authorization Server</i> than we really need. JWT provides a simple way of transmitting the permissions and user data in the access token. Once all data is already in the token string, the resource servers don’t need to ask for token checks. All the information is serialized into JSON first, encoded with base64 and finally signed with a private RSA key. It is assumed that all resource servers will have a public key to check if the token was signed for the proper private key and deserialize the token to have the information.</p>
<p>You can have a look at the OAuth2 Authorization Server(OAuth-server) and the <i>Resource Server(API Gateway)</i> implementations to see the code looks like. The implementation was done following mainly this blog post.</p>
<h3><b>REST</b></h3>
<p>In our system, we have two interaction styles: synchronous and asynchronous. For the async style, we are using distributed events with Kafka, following the model publish/subscribe. For synch, we have REST style supporting JSON and XML.</p>
<p>There are four levels of maturity of RESTful, starting at <b>level 0,</b> as described for Martin Fowler here. Our microservices is in the <b>level 2, </b>because I decided not implement the Hypermedia Controls using the HATEOAS design pattern for the simplicity.</p>
<p>Because we are using Spring Cloud, we have to out-of-box some scalability patterns, which are placed in our HTTP connections that deserve a mention: Circuit breaker, Bulkheads, Load Balancing, Connection pooling, timeouts, and retry.</p>
<h3><b>Distributed Event</b></h3>
<p>As mentioned above, our communication between the <i>Reminder service</i> and <i>Mailer service</i> is done asynchronously using Kafka to distribute our events across the others Microservices. In the <i>Reminder service</i>, we have a scheduled task to check for reminders time and publish the event <i>RemainderFound. </i>There will be a subscribed event in the <i>Mailer service</i> which will start the process of sending an email to the user. I invite you to have a look at how we are doing this integration and how I wrote the serialization/ deserialization of the data sent to Kafka in the <i>Kafka event Module.</i></p>
<h3><b>Event sourcing and CQRS</b></h3>
<p>Monolithic applications typically have a single relational database. We can use ACID transactions. As a result, our application can simply begin a transaction, change multiple rows, and commit the transaction if everything go right or rollback if something goes wrong. Unfortunately, to deal with data access in the microservice architecture is much more complex. This is due to the fact that the data is distributed in different databases. Implementing business transactions across multiple services is a big challenge.</p>
<h4>SEE MORE: From the Monolith to Microservices</h4>
<p>In our “ToDo” project, we are using events to deal with business transaction that spans multiple services. You can look at the implementation of Event Sourcing with CQRS applied in the <i>Mailer service</i>. You can see how to separate Reads and Writes that enable us to scale each part easily. We are using a relational database as an event store and then distributing the events using Kafka. We will need to make these two actions Atomic and avoid storing the event, that way it won’t publish an eventual JVM crash. I’m not using Kafka as the event store because is simpler to construct the aggregates from a relational database. We are trying to make things easy here!</p>
<h3><b>Next step</b></h3>
<p>As you can notice, we already have a lot of things in this project and there are still many challenges that are not addressed here yet. However, this is a project in development and we are planning adding more things into it, such as Spring cloud config, Containers with Docker, continuous integration with Jenkins, Distributed trace with Spring Sleuth, Logging management with ELK and more. So keep tuned on our Github repository to see more fun things.</p>
<p>The post <a href="https://www.aiuniverse.xyz/an-introduction-to-hands-on-microservices-with-java/">An introduction to hands-on microservices with Java</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/an-introduction-to-hands-on-microservices-with-java/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
	</channel>
</rss>
