Systems | Development | Analytics | API | Testing

%term

Display Moesif Reports Within Tableau

As a product leader, there’s no better way to show the value of your API platform then by graphically displaying key metics. If you’re already working with Tableau, it’s easy to extract key charts, or workspaces, from Moesif’s dashboards and insert them into your visualization platform. The information from Moesif will be inserted into Tableau as a web page object.

Performance, Stress, and Load Tests in Rails

Tests are an integral part of most well-working Rails applications where maintenance isn’t a nightmare and new features are consistently added, or existing ones are improved. Unfortunately, for many applications, a production environment is where they are put under heavy workload or significant traffic for the first time. This is understandable as such tests are costly.

A guide to write your tests for your Android apps

Learn how to write your tests for your Android applications! In this series of articles, you will learn how to do testing on your Android app and libraries. We will give you the most valuable and critical knowledge about testing and finding the issues in your app, and showcase how to write your test cases and how to run them in CI.

20 Best Software Development Tools in 2021

With the increase in popularity and adoption of software development across the industry, developers and organizations are constantly looking for tools to make their lives easier. The right set of tools can quickly help you get the maximum output each day, but the road to finding your arsenal of the best software development tools is not easy. That’s why we researched for you!

How To Get Mobile App Logs to Elasticsearch Using Bugfender

When we speak to our customers, they tell us that Bugfender is great for capturing application logs and then pinpointing the logs of a specific user. By pulling all the logs from a developer’s mobile and web apps and centralizing them in a single dashboard, Bugfender gives that developer a 360-degree sweep of their entire user base. But what if you want to use this data somewhere else? What if you could provide this data within an Elasticsearch database?

5G Meets Low-code: Innovation Backbone for the Post-COVID World, Part 2

The 5G hype train is generating a lot of buzz about a technology revolution that promises to pump a staggering $12 trillion into the global economy by 2035 and add over 20 million new jobs in the US alone. But behind the buzz, low-code automation is making the 5G hype legit as network operators turn to low-code platforms to deploy new 5G connectivity that’s exponentially faster and more powerful than 4th generation mobile.

What is PII Masking and How Can You Use It?

Imposter fraud is the second-most common type of fraud reported to the Federal Trade Commission, with around one-fifth of all cases resulting in financial loss to the victim. This often occurs because of a failure on the part of organizations to protect personally identifiable information (PII). Fraud is only one type of attack that may occur. Phishing is another exceptionally common data security threat. It often results from crawlers collecting email addresses, one type of PII, on the open web.