Systems | Development | Analytics | API | Testing

Latest Blogs

CI/CD Pipeline: What, Why & How to Build The Best One

To gain full potential of the software development workflow, developers today must familiarize themselves with the best workflows, practices, and tools. Fast software production is no longer enough to win today’s technology marketplace. Deployments have to be faster, more reliable, and more accurate than the competitors. A sturdy CI/CD pipeline is the solution to this challenge.

Kong and Istio: Setting up Service Mesh on Kubernetes with Kiali for Observability

Service mesh is redefining the way we think about security, reliability, and observability when it comes to service-to-service communication. In a previous blog post about service mesh, we took a deep dive into our definition of this new pattern for inter-service communication. Today, we’re going to take you through how to use Istio, an open source cloud native service mesh for connecting and securing east-west traffic.

People Don't Want Software Products Anymore - They Want Software Ecosystems

Recently, I read an article called “For IoT, think about creating a minimum viable ecosystem” on Stacey on IoT blog, which got me thinking about what we ourselves have been observing in the SaaS sector. In particular, the article says: “With the internet of things, companies are no longer trying to create a product to offer value, but rather establish relationships between companies and individuals to create value.

5 best practices to deliver trust in your data project: Tip #3 Take ownership around a single source of trusted data

Would you imagine e-commerce without an electronic catalog or the web without search engines? Digital transformation requires single points of access to enable a wider range of people to access a wider range of information.

Data Privacy through shuffling and masking - Part 2

In the first part of this blog two-part series, we took a deep dive on Data Shuffling techniques aiming to mix up data and allowing to optionally retain logical relationships between columns. In this second part, we will now focus on Data Masking techniques as one of the main approach to guarantee Data Privacy.

5 best practices to deliver trust in your data project : Tip #2 control your data wherever

Whenever an IT system, application or personal productivity tool is used inside an organization without explicit organizational approval, we talk about shadow IT. Shadow IT is not only a security and compliance nightmare, it creates a data sprawl where each group can create its data silos.

What we learned selling subscriptions before they became trendy

Our decision to change from a perpetual licence model to subscriptions was one of the great naive moments in Yellowfin’s history. It was about eight years ago and we had great sales growth but it was getting harder to start from scratch every year and sell more perpetual licenses. At the same time, our maintenance business was growing so we decided to flip our model and sell subscriptions. It seemed like a good idea at the time as none of our competitors were selling subscriptions.