Systems | Development | Analytics | API | Testing

%term

Creating Effective Test Plans: A Guide to Success

Imagine being at the helm of a project, excited to launch an innovative software application, but then... the testing phase reveals critical flaws that could have been caught earlier. This experience is a stark reminder of how vital a cohesive test plan can be. Join me as we explore how a visual test plan builder can transform your approach to crafting robust test plans, ensuring quality at every step of the way!

NeoLoad 2024.3 to include extensive RTE support and more!

We’re excited to unveil a sneak peek of the upcoming NeoLoad 2024.3 release, which will be generally available this November. One of the most anticipated features in this release is remote terminal emulation (RTE) support — a game-changer for teams responsible for the performance of mainframe and other legacy systems.

Why Slowing Down Can Lead to Better Products

Balancing speed and quality isn’t just about product development—it’s about shaping the future of your business. @Evelyn Coleman shares why the limitations on development speed are actually a blessing. Moving too fast without gathering feedback can send your product down the wrong path. It’s the balance between velocity and quality that helps teams gather the insights they need to build something truly impactful.

Zephyr Enterprise - Parameterization in Zephyr Enterprise

Achieve greater test coverage with less effort using parameterization, now available in Zephyr Enterprise 8.2. In this short video we will show you how you can now add global and local parameters to your tests in Zephyr, allowing for more test coverage and less maintenance for your test suites overall.

How to Implement API Product Tiering with Kong Konnect

In this blog post, we'll talk about how to implement API product tiering, a powerful way to customize access, control usage, and monetize APIs. This model can help you scale efficiently while maintaining a smooth user experience. Read on to learn more! We'll be talking about how to implement API product tiering with Kong Konnect, an API lifecycle management platform designed from the ground up for the cloud-native era and delivered as a service.

Qlik Anonymous Access - SaaS in 60

Qlik Anonymous Access is an exclusive, new capability that enables organizations to share analytics insights with a public audience easily. It leverages Qlik Cloud’s secure and scalable platform, allowing you to embed Qlik Sense apps, dashboards, and visualizations into websites or third-party applications using shareable links or our new Qlik Embed APIs. With Anonymous Access, no login credentials are required, simplifying engagement with embedded analytics.

Generating Quality Data

The problem with test data is that it can become stale very quickly. This is either through its use from testing or from the fact that it is naturally aging in the test environments. This is not just an issue for performance testing, although the volumes of data sometimes required for performance testing do make it harder. This also affects functional testing as well as batch testing and business acceptance testing amongst others.

Developing Agile ETL Flows with Ballerina

Organizations generate vast amounts of data daily during various business operations. For example, whenever a customer checks out out at a retail outlet, data such as the customer identifier, retail outlet identifier, time of check out, list of purchased items, and the total sales value can be captured in the Point of Sales (PoS) system. Similarly, field sales staff may record possible sales opportunities in spreadsheets.

Low-Code vs No-Code: The Differences & Similarities

Many vendors have started calling their platforms “low-code” or “no-code.” Competitors often pit the terms against each other. But what do low-code and no-code really mean? And what's the difference between the two? Both platforms offer improvements over traditional high-code approaches. The biggest differences are the target user groups.

How DreamFactory Prevents SQL Injection Attacks

A SQL injection attack is an attempt to modify the syntax of a SQL query executed in conjunction with a user-initiated action within a software application. Some examples of user-initiated actions include searching for a product within an e-commerce catalog, adding a comment to a blog post, and creating a new user account. In each of these scenarios, the user uses a form to submit input (e.g.