Systems | Development | Analytics | API | Testing

%term

5 best practices to deliver trust in your data project : Tip #2 control your data wherever

Whenever an IT system, application or personal productivity tool is used inside an organization without explicit organizational approval, we talk about shadow IT. Shadow IT is not only a security and compliance nightmare, it creates a data sprawl where each group can create its data silos.

What we learned selling subscriptions before they became trendy

Our decision to change from a perpetual licence model to subscriptions was one of the great naive moments in Yellowfin’s history. It was about eight years ago and we had great sales growth but it was getting harder to start from scratch every year and sell more perpetual licenses. At the same time, our maintenance business was growing so we decided to flip our model and sell subscriptions. It seemed like a good idea at the time as none of our competitors were selling subscriptions.

Got microservices? Service mesh management might not be enough

A lot of enterprises are evolving their monolithic applications into microservices architectures. In this pattern, applications are composed of fine-grained services that communicate via APIs. Microservices promise, faster development, innovation, cloud scaling, better infrastructure optimization—and happier developers. No wonder this architecture gets so much attention.

Angular Workspaces: Multi-Application Projects

OctoPerf’s Load Testing IDE (Kraken) is an application with two frontends - The Administration UI used to manage Docker containers and images, The Gatling UI to debug and execute load tests with Gatling. Both UI are based on Angular 8 and share many components, CSS and external library dependencies. This blog post is a guide for every developer that would like to create an Angular Workspace with several applications and libraries.

Kong 1.3 Released! Native gRPC Proxying, Upstream Mutual TLS Authentication, and Much More

Today, we are excited to announce the release of Kong 1.3! Our engineering team and awesome community has contributed numerous features and improvements to this release. Based on the success of the 1.2 release, Kong 1.3 is the first version of Kong that natively supports gRPC proxying, upstream mutual TLS authentication, along with a bunch of new features and performance improvements.

Generating a Heat Map with Twitter data using Pipeline Designer - Part 3

If you have got through part 1 and part 2 of this series of blogs, there are only a few more steps to carry out before you can see the end to end flow of data and create your Heatmap. If you have not read the first two blogs, the links to the blogs are above. Although these blogs have been quite lengthy, I hope you understand that I have tried to make sure that any level of experience can achieve this. Since Pipeline Designer is a new product, I felt that it made sense to be as explicit as possible.

The Privacy Hazard in High Tech Heritage

DNA kits like 23andMe, Helix and AncestryDNA topped holiday gift guides again this past year. Kits range in the market from $60 to $200, and they’re meant to help consumers understand family history, genealogy and can even connect unknown family members. Collecting genetic data can also have broader impacts in healthcare and justice for law enforcement.

Qlik (Attunity) Recognized Again in Gartner Magic Quadrant for Data Integration

Every time a new Gartner Magic Quadrant is published, I always have a flashback to the scene in the old Steve Martin movie “The Jerk” – when his character gets overly enthusiastic about seeing his name published in the new phonebook. As a software vendor, I think we sometimes look like this when the Gartner MQ is released, and everyone gets a little too excited.