Systems | Development | Analytics | API | Testing

%term

PII Pseudonymization: Explained in Plain English

Data processors handle an abundance of data — including personal information about individuals. As the collection and use of data become more widespread, governments continue to enact laws that protect personally identifiable information (PII). Failing to comply with such laws means risking serious fines and penalties, and damaging public trust. Masking PII through pseudonymization is one way to protect it.

SmartBear Addresses Rapid Expansion of APAC Business and Channel Partners with New Office in Melbourne, Australia

With more than 50% growth in APAC-based business year over year, SmartBear increases headcount and support for local customers and partners with new, larger office in downtown Melbourne.

MS3 Supports 10K+ Transactions/Second With Kong Gateway and Kuma Service Mesh

MS3 specializes in enterprise integration software, cloud migration strategies and API enablement. I’ve worked at MS3 for about five years. For the last year, I’ve been the principal product manager for Tavros, an enterprise integration platform from MS3. This article will dive into how we’re leveraging Kong Gateway and Kuma service mesh in Tavros.

Application Lifecycle Management: A Comprehensive Guide

Discipline is the key to success for all companies doing well in their field or reaching a trillion-dollar valuation. They manage the software and update it very frequently when it comes to providing services. So how are they able to manage it and keep their software updated every moment? The answer is ALM—Application Lifecycle Management. ALM includes the people, the software, the tools, and the processes included in software development, from planning to deploying it for end customers.

When 'Good Enough' Isn't Good Or Enough

You know the phrase “good enough”? As in, “it’s good enough right now, we can worry about fixing it in the future”? Well, when it comes to software development, I really hate that phrase. Let me explain why. Simply, it’s because the concept of ‘good enough’ isn’t true. It’s the best type of paradox. Something is either good or it’s holding you back.

What's new with BigQuery ML: Unsupervised anomaly detection for time series and non-time series data

When it comes to anomaly detection, one of the key challenges that many organizations face is that it can be difficult to know how to define what an anomaly is. How do you define and anticipate unusual network intrusions, manufacturing defects, or insurance fraud? If you have labeled data with known anomalies, then you can choose from a variety of supervised machine learning model types that are already supported in BigQuery ML.

Interview With CTO & Co-founder Alexander De Ridder

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed the CTO & co-founder of INK, Alexander De Ridder to share his journey to launching the first AI-based web content optimization editor. Alexander is the mastermind behind the award-winning technology that's helped deliver over a million more organic visitors per month for Fortune 100 companies and freelance content creators alike.

Privacy & Security Rules for Healthcare Marketers

Marketing is more complex if you're engaged in the healthcare field. Whether you work with patients or market to consumers interested in healthcare products, it's important to understand HIPAA guidelines. This article explains the basics of HIPAA Privacy and Security Rules, and how this legislation affects your marketing strategy.