Systems | Development | Analytics | API | Testing

What is Mobile Testing? Definition, Tools, Best Practices

We are living in a mobile-first world. It dominates the world, when there are over 10.37 billion mobile connections worldwide, which is even higher than the global population. This number will only increase in the upcoming years. Mobile testing is therefore more critical than ever to accommodate for the ever-rising bar for mobile app quality. This article is written to help testers of any level and expertise to get started with mobile testing. Here are the items we are going to include: 1.

The Sliding Doors for Responsible AI

In this blog series, I have been exploring the “sliding doors” – or divergent paths - organizations can take with data and analytics. Sometimes, grabbing the wrong door means missing out on creating the most value with your data. But in some instances, it can also lead you on a more serious path of breach of compliance with regulations.

Swift Standard Library Protocols - A guide to Equatable, Comparable, Hashable, and Identifiable.

There are several protocols featured in the Swift Standard Library that enable generic programming in Swift. By defining common behaviors and functionalities for types and collections, these protocols provide a standard way for types to interact with each other. Today we’re going to take a look at four of the key Swift Standard Library Protocols, these are: We’ll provide a brief overview of how each works, and then how we can implement them in our projects.

Blockchain, Deepfakes, and AI, Oh My!

Imagine a world where every piece of digital content can be verified and traced back to its source. Lindsay Walker, Product Lead at Starling Lab for Data Integrity, walks us through the emerging tools that could make this possible. While AI tools hold incredible potential for good, Lindsay also warns against threats and countermeasures needed to keep our virtual representations safe. She emphasizes the need to build provenance into tools, discusses blockchain use cases, and shares systems that implement hashes for security.