Systems | Development | Analytics | API | Testing

Welcome to Test Automation Day | Mobile Testing (EMEA)

To kick off Test Automation Day Online | Mobile Testing, Ashwini Sathe, Product Marketing Manager at Sauce Labs, provides an introduction to Sauce Labs and our commitment to creating a world of digital confidence. She also discusses the importance of building a comprehensive mobile testing strategy, and how Sauce Labs can help.

An Alternative to Native Apps: How to Test Progressive Web Apps

Progressive Web Apps (PWA) are often seen as the easier alternative to native applications. During this session Wim Selles, Senior Solutions Architect at Sauce Labs, will look at why PWAs are seen as an alternative for native apps, the pros and cons and especially, are they easier to test than native apps.

Navigating the 8 fallacies of distributed computing

The fallacies of distributed computing are a list of 8 statements describing false assumptions that architects and developers involved with distributed systems might make (but should undoubtedly steer away from). In this blog post, we’ll look at what these fallacies are, how they came to be, and how to navigate them in order to engineer dependable distributed systems.

Rails Security Threats: Authentication

Authentication is at the heart of most web development, yet it is difficult to get right. In this article, Diogo Souza discusses common security problems with authentication systems and how you can resolve them. Even if you never build an authentication system from scratch (you shouldn't), understanding these security concerns will help you make sure whatever authentication system you use is doing its job.

BigQuery row-level security enables more granular access to data

Data security is an ongoing concern for anyone managing a data warehouse. Organizations need to control access to data, down to the granular level, for secure access to data both internally and externally. With the complexity of data platforms increasing day by day, it's become even more critical to identify and monitor access to sensitive data.