Systems | Development | Analytics | API | Testing

How to assess your readiness to deploy with Coverage Analysis in Xray

Effective Coverage Analysis provides powerful insights into the status of what your team is building, so you can make smart decisions based on real-time analysis. Coverage Analysis in Xray for Server and Data Center provides you the ability to analyze in real-time how requirements, features, user stories, and tests are, in a particular context.

Scaling Down to Scale Up Using Kong's API Gateway

This blog post is part two of a two-part series on how we broke down our monolith to scale our API management with Kong Gateway, the world’s most popular open-source API gateway. (Here’s part one.) At NexJ, the pioneer of intelligent customer management with client engagement products designed for the financial services industry, we sought to capture the full addressable market by breaking down the monolith and going API-first.

APIs are Now at the Center of Digital Transformation

As we take stock of how COVID-19 has affected the way we operate, nothing in technology is more apparent than the switch to digital. Although many of us have transitioned from water-cooler conversationalists to reluctant zoom dwellers, the impact on business processes themselves might actually be more profound. According to McKinsey, coronavirus has acted as an accelerant on companies offering digital products and services.

Hardware Design Best Practices

Hardware design typically entails teams of many designers with a wide range of disciplines. Each of these designers manage a different aspect of the project, maybe with different workflows, and generate a large amount of diverse data. Data management tools like Helix Core manage a substantial portion of this data. In this blog, find out how these tools are best used with an IP lifecycle management platform like Methodics IPLM to solve the unique challenges for hardware design projects.

Creating Envoy WebAssembly Extensions

In the CNCF ecosystem, Envoy, an open source service proxy developed by Lyft, is a very common choice in service mesh networking. In a previous post we discussed that both Consul and Istio leverage Envoy. Were you aware that you can extend Envoy’s capabilities with WebAssembly? What is WebAssembly? WebAssembly, or Wasm as it is often abbreviated, is not so much of a programming language as it is a specification for a binary instruction format that can be run in sandboxed virtual machines.

Understanding IIS Log Files: Operating Instructions

Commonly, your website or app functions perfectly until you release it. During testing, you might seem to have control over everything. But, sooner or later, you will face some challenges. In fact, it is totally normal when something goes wrong. The most important thing is how you settle these problems. In most cases, issues with availability alerts and users’ complaints can be addressed by the means of IIS logs. IIS logging will provide you with the necessary data to deal with a breakdown.