Systems | Development | Analytics | API | Testing

Run Java Tests in Parallel on Sauce Labs

In this lesson you will be learning how to set up your Selenium Java test to run tests in parallel on Sauce Labs with the JUnit4 test runner. Using the Maven Surefire Plugin, you can run two or more tests or classes at the same time. In this tutorial you will; include the Maven Surefire Plugin in pom.xml, use the plugin with the parallel tag to run tests in parallel, and finally, add some additional configuration to optimize running tests in parallel on Sauce Labs.

Configuring a Kubernetes Application on Kong Konnect

Hello, everyone! Viktor Gamov, a developer advocate with Kong here. In this article, I would like to show you how to set up service connectivity using Kong Konnect and Kubernetes. I will deploy an application in Kubernetes, configure a runtime through Konnect and demonstrate some management capabilities like enabling plugins. Let’s dive right in!

JWT Authentication: When and How To Use It

JWT stands for JSON Web Token, is a famous technology that comes with its own controversy. Few people find it quite beneficial, while others feel one must never use it. Nonetheless, in this article, we shall discuss the reason behind this controversy, understand JWT in detail, and when and why one must use it. We'll cover the following section in this blog. JWT (JSON Web Token) authentication is a process or method used to verify the owner of JSON data.

Rollbar Tip of the Day: Filter by Date Range

Learn how you can filter your items and occurrences by date range in the UI. Rollbar is the leading continuous code improvement platform that proactively discovers, predicts, and remediates errors with real-time AI-assisted workflows. With Rollbar, developers continually improve their code and constantly innovate rather than spending time monitoring, investigating, and debugging.

BigQuery admin reference guide: Tables & routines

Last week in our BigQuery Reference Guide series, we spoke about the BigQuery resource hierarchy - specifically digging into project and dataset structures. This week, we’re going one level deeper and talking through some of the resources within datasets. In this post, we’ll talk through the different types of tables available inside of BigQuery, and how to leverage routines for data transformation.

Interview With Cybersecurity Expert Tom Kirkham

For our latest expert interview on our blog, we’ve welcomed cybersecurity specialist Tom Kirkham to share his wealth of experience on the topic of cybersecurity. Tom is the founder and CEO of IronTech Security, a managed security service provider (MSSP) that focuses on educating and encouraging law firms, court systems, water utilities, and financial firms to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks.

PII Pseudonymization: Explained in Plain English

Data processors handle an abundance of data — including personal information about individuals. As the collection and use of data become more widespread, governments continue to enact laws that protect personally identifiable information (PII). Failing to comply with such laws means risking serious fines and penalties, and damaging public trust. Masking PII through pseudonymization is one way to protect it.

SmartBear Addresses Rapid Expansion of APAC Business and Channel Partners with New Office in Melbourne, Australia

With more than 50% growth in APAC-based business year over year, SmartBear increases headcount and support for local customers and partners with new, larger office in downtown Melbourne.