Systems | Development | Analytics | API | Testing

Blog

Policy-Driven Data Obfuscation: What, Why and How

How vulnerable is your sensitive data? Your data policies may put this information at risk of being breached. An ad hoc approach for dealing with this data makes it difficult to maintain your organization’s cybersecurity. Data obfuscation holds the key to improving your security and making it easier to use your data, but it must be driven by your policies to be effective.

What is No-Code?

Are you asking yourself the question “what is no-code”? You’re not alone. The concept sounds almost too good to be true: developing your own software applications without ever having to learn a programming language like Java or Python. Even your most technophobic employee can become a star software developer thanks to the proliferation of no-code development tools.

The Composable Enterprise

Traditionally, companies purchased the technology they needed to complete tasks efficiently and accurately. Today’s technology doesn’t evolve in a straight line, though. It grows at an exponential rate that shortens the life span of tools. When technology moves so quickly, an organisations needs to adopt a hyper selective approach – and in doing so move towards the phenomenon of the ‘composable enterprise’.

How to configure clients to connect to Apache Kafka Clusters securely - Part 4: TLS Client Authentication

In the previous posts in this series, we have discussed Kerberos, LDAP and PAM authentication for Kafka. In this post we will look into how to configure a Kafka cluster and client to use a TLS client authentication. The examples shown here will highlight the authentication-related properties in bold font to differentiate them from other required security properties, as in the example below. TLS is assumed to be enabled for the Apache Kafka cluster, as it should be for every secure cluster.

Test Management 101: Traceability

Why do we test? Testing proves that our application works properly. Traceability, or being able to trace requirements to test cases, forms the foundation of your testing strategy. Test traceability is the ability to link a test to a set of requirements and verify that the application works as expected. Traceability matters as your product scales. When your application is small, it’s easy to pinpoint what’s broken. Most of these requirements can be tracked in a spreadsheet.

What's New In Loadero (January 2021)

We have set some ambitious targets for 2021 in making Loadero an even better service to help our customers testing web applications easier, write scripts more comfortably and get detailed results reports that can be analyzed quickly for valuable insights about their app’s performance. With the first month of 2021 just ended, we would like to share some recently added improvements to Loadero application.

The Future of Cloud Connectivity is Here: Announcing the General Availability of Kong Konnect

Today, we’re thrilled to announce the general availability of Kong Konnect, the service connectivity platform designed from the ground up for the cloud native era, delivered as a service. We live in a connected world. Every application we use, whether within or outside of work, is a connected application built on top of dozens – sometimes thousands – of services that enable our digital, connected experiences.

Python Load Testing Best Practices

Python is one of the leading programming languages in the world. Many of the world’s most popular websites run, at least in part, on Python, including Instagram, Google, Instacart, Uber, Netflix, and Spotify. When the language is used properly, it can be very efficient and requires low processing power in most cases. It’s important for sites to rely on python load testing best practices and security testing services by companies like QAwerk to understand how efficiently their site runs.