Systems | Development | Analytics | API | Testing

%term

Comparison between Testsigma and Protractor alternatives

You might already know that Google is going to stop the development of Protractor soon. Here, in this article, we will discuss what is protractor, why it was used, why it is being discontinued, and what are some of its alternatives that you can use now. So, without further ado, let’s begin.

Tips for Application Troubleshooting

It is easier to perform application troubleshooting when you know that protocols are in place. For instance, knowing the core features of the application and how the application functions is already a standard. Also, you’ll need to expand the coverage like the requirements of Quality of Service (QoS). Does the application need real-time performance or does it need to move a lot of data? Are there sub-applications running on the endpoints?

The Ultimate PII Checklist

Data breaches can happen to any company, regardless of size or technical resources. In April 2021, Facebook’s reputation took a massive hit when a data breach impacted more than half a billion users. The worst kind of data breach involves personally identifiable information (PII). PII is essentially any data that contains sensitive details about real people, such as customers and employees.

Product announcement: Say hello to the new and improved Storage UI

Keboola’s Storage UI now comes with a new - slicker - look which will improve the user experience for all Keboola veterans. (New to Keboola? Do not fear. Simply follow along with the guided tour when you sign up for free, and you can unlock all the new features after June 2nd).

Celebrating 9 Years of ThoughtSpot

Today, May 21st marks ThoughtSpot’s nine year anniversary as a company. We’ve come a long way from exchanging ideas at Starbucks and working from an office set-up inside LightSpeed Ventures for the initial few weeks. Today, we offer customers the most innovative cloud analytics platform in the world and help thousands of users ask and answer questions with data.

Why Software Bugs Are Like Mini Outages

If this past year has shown us anything, it’s the importance of resilience. Businesses of all sorts have had to find creative ways to get through a very tough time. And one of those ways is through technology. Companies that never planned to be technology-driven are now having meetings on Zoom, managing a remote workforce, and adopting new software.

How to Establish an Effective BI Security Strategy

Business intelligence (BI) tools have been a shot in the arm of the enterprise. Teams can create their own visualizations and enjoy self-service analytics, without needing IT to compile reports or wrangle big data. But, of course, there’s a catch. BI tools expose data to a wider range of people, which means there are new issues of BI security (BISEC) and privacy to think about, especially in the age of GDPR. Here’s what you need to know.