Systems | Development | Analytics | API | Testing

%term

Successful Methodologies with Talend

For those who are familiar with my previous Talend blogs perhaps you’ve noticed that I like to talk about building better solutions through design patterns and best practices. My blogs also tend to be a bit long. Yet you read them; many thanks for that! This blog is going to focus on methodologies as they apply to Talend solutions.

Exporting and Converting Selenium Files with Ghost Inspector

Ghost Inspector has the ability to export Selenium files in the same Selenium 1 (HTML) format that it imports, as well as Selenium 2 (JSON) format. You can export a single test as a .html or .json file, or an entire suite of tests in a .zip archive. This can be done through both our API and our application.

Data-driven Testing with Selenium using Ghost Inspector

Data-driven testing allows you to supply a set of inputs and verifiable outputs to be used within a test to quickly and easily ensure that your application performs as expected with a range of data. Ghost Inspector has a built-in option for data-driven testing that allows you to upload a CSV spreadsheet file with rows of values corresponding to variables in your test(s).

Six Top Technology Trends to Watch in 2018

Usually, predictions for a new year are brimming with optimism for a future yet unfurled. But 2018 is a roaring exception, given it’s the grand finale of decisions made back in 2016. Yes, perhaps we should have seen much of this coming, but few did. Hold onto your hats, because 2018 is almost upon us and it’s going to be a rough ride. The good news is that we’ll likely all be better off on the other side for having gone through these ‘data growing pains.’

Disaster Recovery 101: 3 Strategies to Consider

When a disaster strikes and takes down the IT systems that are essential to operations, the IT team is often called on to enable a quick recovery. A disaster recovery plan (DRP) can help get systems back online quickly and efficiently. This plan documents the procedures required recover critical data and IT infrastructure after an outage.