Systems | Development | Analytics | API | Testing

Latest Videos

What Does Testing a Generative UI Look Like?

Imagine a world where every piece of digital content can be verified and traced back to its source. Lindsay Walker, Product Lead at Starling Lab for Data Integrity, walks us through the emerging tools that could make this possible. While AI tools hold incredible potential for good, Lindsay also warns against threats and countermeasures needed to keep our virtual representations safe. She emphasizes the need to build provenance into tools, discusses blockchain use cases, and shares systems that implement hashes for security.

Have You Heard of Devin the AI Software Engineer??

Imagine a world where every piece of digital content can be verified and traced back to its source. Lindsay Walker, Product Lead at Starling Lab for Data Integrity, walks us through the emerging tools that could make this possible. While AI tools hold incredible potential for good, Lindsay also warns against threats and countermeasures needed to keep our virtual representations safe. She emphasizes the need to build provenance into tools, discusses blockchain use cases, and shares systems that implement hashes for security.

How to Verify Digital Content to Avoid Misinformation

Imagine a world where every piece of digital content can be verified and traced back to its source. Lindsay Walker, Product Lead at Starling Lab for Data Integrity, walks us through the emerging tools that could make this possible. While AI tools hold incredible potential for good, Lindsay also warns against threats and countermeasures needed to keep our virtual representations safe. She emphasizes the need to build provenance into tools, discusses blockchain use cases, and shares systems that implement hashes for security.

Blockchain, Deepfakes, and AI, Oh My!

Imagine a world where every piece of digital content can be verified and traced back to its source. Lindsay Walker, Product Lead at Starling Lab for Data Integrity, walks us through the emerging tools that could make this possible. While AI tools hold incredible potential for good, Lindsay also warns against threats and countermeasures needed to keep our virtual representations safe. She emphasizes the need to build provenance into tools, discusses blockchain use cases, and shares systems that implement hashes for security.

What Does Success Look Like in DevRel?

Join Test Case Scenario with Scott McAllister, Developer Advocate at ngrok. Explore ngrok's innovative approach to securing and exposing local services online, aiding businesses like restaurants with seamless order integrations. Learn how ngrok differs from traditional VPNs, saving developers time while ensuring security through OAuth integration.