Systems | Development | Analytics | API | Testing

Latest News

How to Specify and Handle Exceptions in Java

Errors happen all the time in the software world. It might be an invalid user input or an external system that is not responding, or it’s a simple programming error. In all these situations, the errors occur at runtime and the application needs to handle them. Otherwise, it crashes and can’t process further requests. Java provides a powerful mechanism which allows you to handle the exceptional event where it occurred or in one of the higher methods in the call stack.

The AI Hallucination Problem: How to Protect Your Work

Artificial intelligence has been instrumental in helping businesses streamline and speed up business operations by automating repetitive tasks. It also frees up workers to focus on higher-level tasks that require human intervention. And when paired with other intelligent automation tools, such as robotic process automation, it can improve business processes and provide a competitive advantage.

How to load test OpenID/OAUTH

Performance testing scripts need to go through authentication in order to access target services with the right authorization. They also need to validate that the authentication servers are able to handle the target load. OpenID Connect(OIDC) has become a popular authentication and authorization protocol for securing web applications. This article will present the OIDC protocol and how to implement a JMeter script to performance test it.

Snowflake's Data Classification Lets You Identify and Tag Sensitive Data Directly in Snowsight

At Snowflake, we believe in empowering our customers to harness the full potential of their data while maintaining robust compliance standards and safeguarding data privacy. We recognize the critical importance of quickly identifying and safeguarding sensitive data objects, and we consistently strive to provide solutions that help achieve these goals — from advancements such as classification and tag-based policies to the intuitive Data Governance UI.

How To Dynamically Generate Files

Generating files for data extracts, reporting and even data migration is a crucial part of any back-end team. A typical data team will have to generate many files to be sent to various clients or consumers inside or outside of the organisation. As with all things, the question is how can the generation of those files be made simpler, and can it be automated to such a degree that files are dynamically generated? The short answer is yes, it can be done dynamically.

Top 7 Puppeteer Alternatives For Your QA Team

QA Puppeteer is among the top Node.js libraries widely used for headless Chrome testing. It allows testers to do web scraping, taking screenshots, filling out forms, and many more automated testing activities. However, there comes a time when these capabilities are not enough, and testers need to find a Puppeteer alternative.

What's new in Kong Gateway 3.6?

We're thrilled to announce the general availability of Kong Gateway 3.6. This version features a high-performance compression algorithm, efficient route matching, and improved observability. Plus, Kong AI Gateway, which you can learn more about here. Let’s dive into the enhancements and explore the tangible benefits these features bring your organization. Looking for more enterprise-grade features? Check out what's new in Kong Gateway Enterprise 3.6.

Leap Forward with Kong Gateway Enterprise 3.6

We're thrilled to announce the general availability of Kong Gateway Enterprise 3.6. This version brings security, efficiency, and standards conformance to enterprise applications. Plus, Kong AI Gateway, which you can learn more about here. Let’s dive into the enhancements and explore the tangible benefits these features bring your organization.

Top 6 Security Traps to Avoid in JIRA Implementation

According to Gartner, JIRA is still one of the most popular application lifecycle management (ALM) technologies in many enterprises, with a rating of 4.4 out of 5 for its features. Determining an “issue permission” enabled with the proper security constraints and balancing its project access control is always a difficult challenge in an enterprise JIRA setup.