Systems | Development | Analytics | API | Testing

%term

A guide to write your tests for your Android apps

Learn how to write your tests for your Android applications! In this series of articles, you will learn how to do testing on your Android app and libraries. We will give you the most valuable and critical knowledge about testing and finding the issues in your app, and showcase how to write your test cases and how to run them in CI.

20 Best Software Development Tools in 2021

With the increase in popularity and adoption of software development across the industry, developers and organizations are constantly looking for tools to make their lives easier. The right set of tools can quickly help you get the maximum output each day, but the road to finding your arsenal of the best software development tools is not easy. That’s why we researched for you!

How To Get Mobile App Logs to Elasticsearch Using Bugfender

When we speak to our customers, they tell us that Bugfender is great for capturing application logs and then pinpointing the logs of a specific user. By pulling all the logs from a developer’s mobile and web apps and centralizing them in a single dashboard, Bugfender gives that developer a 360-degree sweep of their entire user base. But what if you want to use this data somewhere else? What if you could provide this data within an Elasticsearch database?

5G Meets Low-code: Innovation Backbone for the Post-COVID World, Part 2

The 5G hype train is generating a lot of buzz about a technology revolution that promises to pump a staggering $12 trillion into the global economy by 2035 and add over 20 million new jobs in the US alone. But behind the buzz, low-code automation is making the 5G hype legit as network operators turn to low-code platforms to deploy new 5G connectivity that’s exponentially faster and more powerful than 4th generation mobile.

What is PII Masking and How Can You Use It?

Imposter fraud is the second-most common type of fraud reported to the Federal Trade Commission, with around one-fifth of all cases resulting in financial loss to the victim. This often occurs because of a failure on the part of organizations to protect personally identifiable information (PII). Fraud is only one type of attack that may occur. Phishing is another exceptionally common data security threat. It often results from crawlers collecting email addresses, one type of PII, on the open web.

How Analytics is Becoming as Simple and Reliable as Electricity

At the Modern Data Stack Conference EMEA, Fivetran's VP of EMEA Nate Spohn provides the keynote address with added discussions with Bob Muglia, Investor and former CEO at Snowflake; Alex Billar, VP of Platform, EMEA; and Magnus Carlsson, VP & Head of Innovation I&D Nordics, Capgemeni.

[Online Meetup] Kong Kubernetes Ingress Controller 2.0

Kong Kubernetes Ingress Controller (OSS) has launched 2.0 with a number of awesome new features and fixes. Overview of 2.0 Major architectural improvements Kubernetes Testing Framework (KTF) & new testing strategies KIC 2.0 controller manager And more Kong’s Online Meetups are a place to learn about technologies within the Kong open source ecosystem. This interactive forum will give you the chance to ask our engineers questions and get ramped up on information relevant to your Kong journey.

Global Supply Chain Strategy - Building Resilience with Agility

Appian Life Sciences and Supply Chain Industry Leaders describe a low-code platform approach to drive agility and enhance resilience in the face of the current trends accelerated by the pandemic. There was always the need to boost communications, tighten controls, and enable teams to have the right information available at the appropriate time to make rapid decisions, however, with the jarring impacts of the past year new innovative approaches are needed. These approaches include moving from legacy hardened processes to building organizational capacity to build, test, and learn in rapid succession and develop the resilience to an ever changing ecosystem.