Have you ever wondered about the story behind the word ‘Zephyr’? Or how does one actually test a test management tool? Recently, we held “Inside Zephyr,” a special online community event to celebrate the Zephyr family of products. It was a sneak-peak behind the curtain, and the team of extraordinary people that make Zephyr tools so great – from original founders to developers, testers, and support agents.
The data lakehouse is a promising new technology that combines aspects of data warehouses and data lakes.
Globally, the overall consumption of online video is trending up while television watch time is trending down. In a study of 4,500 consumers from 9 major countries, online video viewing grew 85% between 2016 and 2020. Meanwhile, television view time fell 10%. Previously, the onus of live stream testing and success was on networks and cable providers. But with OTT (over-the-top) streaming on the rise, media organizations face increased demand to deliver high video quality experience.
In the second of this two-part episode of Data+AI Battlescars, Sandeep Uttamchandani, Unravel Data’s CDO, speaks with Kapil Surlaker, VP of Engineering and Head of Data at LinkedIn. In part one, they covered LinkedIn’s challenges related to metadata management and data access APIs. This second part dives deep into data quality.
A common problem that our customers have is event streaming spikey traffic to their clients. For example, imagine a server which needs to stream details on cryptocurrency trades. The quantity of trades happening each second is likely to fluctuate, sometimes nothing could happen, other times perhaps thousands. In order to ensure reliable communication, it’s important that rate limits are in place on how many messages are to be sent to subscribed clients.
As developers, we know the pitfalls of the internet – the gateways that malicious actors can exploit to steal private data, siphon money and generally wreak havoc. But if we’re going to build watertight applications, it’s essential that we keep updating our knowledge base and prepare for every possible assault. In this post, we’re going to discuss five particularly common forms of attack.