Systems | Development | Analytics | API | Testing

Latest News

14 Useful Bash Aliases that Make Shell Less Complex and More Fun

Do you frequently find yourself typing a long command on the command line or checking the bash history for a command you've already typed? If you answered yes to any of the above questions, bash aliases will come in helpful. You can use aliases in Bash to create a shortcut command for a longer command. When working on the command line, bash aliases are essentially shortcuts that can save you time and effort by eliminating the need to remember long commands.

5 Signs you need to implement Automated web testing

We now live on the internet! DataReportal states that around 4.80 billion of the global population use the internet, as of July 2021. That’s around 61% of the entire world population. From reading the news and booking tickets to buying groceries and meeting people — everything is now online. In the vast ocean of mobile apps and websites/web apps, we’re going to talk about web apps and web testing in this post.

How to choose a tool when shift left testing is your requirement?

Traditional Software Development Life Cycle such as Waterfall Model relied on step by step movement from left to right in SDLC. It started from requirement gathering and moved towards the right one step at a time. Evidently, testing came last in the cycle and any delays in it resulted in coinciding with the deadlines. That had the testing team stressed out because the bugs should be identified and fixed before the software release.

How to Make Digital Transformation Work

The best way to appreciate key concepts involving digital transformation is to look at real-world examples. In a recent Kong webinar, I sat down with Solutions Engineer Ahmed Koshok as he reviewed several real-world case studies that help illuminate the role of microservices in making digital transformation successful for organizations. The case studies included Papa John’s, NextJ Systems, and Yahoo! Japan.

Monolithic vs Microservices Architecture

Microservices are an accelerating trend thanks to rousing endorsements from the likes of Google, Netflix, and Amazon. The microservice architecture is advantageous for it’s scalability, agility and flexibility. In contrast, the monolithic approach is the traditional tried-and-true model for building software. It’s much easier to debug and test. But how do you know which approach is best for your organization?

Securing Your SQL Server Application: Enabling Client-Initiated Encrypted Connections

In the previous article we discussed how to enable a server initiated encrypted connection to a Microsoft SQL Server. But what if we have a scenario where we do not want to incur the overhead of encryption for every application? In that scenario instead of configuring the server to force encryption we will instead need the client to initiate the encrypted connection.

9 Crucial Low-Code Automation Capabilities to Evaluate

Low-code automation platforms enable businesses to rapidly automate their applications and workflows. Basic low-code tools can create applications that help users perform simple tasks. But rapid app delivery is only the beginning of what low-code can do. The most advanced low-code automation platforms deliver powerful business process automation capabilities.

Building an ETL Pipeline in Python

Thanks to its user-friendliness and popularity in the field of data science, Python is one of the best programming languages for ETL. Still, coding an ETL pipeline from scratch isn’t for the faint of heart — you’ll need to handle concerns such as database connections, parallelism, job scheduling, and logging yourself. The good news is that Python makes it easier to deal with these issues by offering dozens of ETL tools and packages.

What Is Homomorphic Encryption?

Data encryption is one of the smartest things any organization can do to protect the privacy and security of confidential and sensitive data. Using a unique encryption key, data is converted to an intermediate representation known as “ciphertext,” which usually appears as a jumbled mixture of letters and numbers to the human eye. This encrypted data will be meaningless to anyone without the corresponding decryption key—even malicious actors who breach an organization’s defenses.