Copy
View this email in your browser

Friday, November 4, 2022

A selection of the top articles and videos from the last week on SystemsDigest.com. Don't forget to check back regularly for daily updates from around the globe.

If you like SystemsBuzz, why not forward it to some friends or share the online version?

Until Next Time! 👏

Tweet
Share
Share
Forward

Transforming Kong Logs for Ingestion into Your Observability Stack

03-Nov-22   |   By Damon Sorrentino   |   In Kong , API
Kong

As a Solutions Engineer here at Kong, one question that frequently comes across my desk is “how can I transform a Kong logging plugin message into a format that my insert-observability-stack-here understands, i.e. ELK, Loki, Splunk, etc.?” In this blog, I’m going to show you how to easily accomplish converting a Kong logging payload to the Elastic Common Schema. In order to accomplish this task, we’re going to be running Kong Gateway in Kubernetes and using two Kong plugins. If you don’t already have an instance of Kong running in a Kubernetes cluster, connect to your cluster and run the following the commands to get one in seconds.

Read More

Dynamic Routing Based on JWT Token's Claim with Kong Konnect

03-Nov-22   |   By Shlomi Tubul   |   In Kong , API
Kong

A common use case that is frequently requested is how to dynamically route requests based on authentication attributes. An example of this technique is routing requests to relevant upstream services based on claims contained in a JWT token. Admins would like all their clients to go to the same URI as it makes the implementation easier. But behind the scenes they might need to tailor specific configuration/applications for them, hence routing their request based on their identity.

Read More

Brad x Ahmed: Elements for Building Cloud Native Applications

03-Nov-22   |   By Kong   |   In Kong , API
Kong

From time to time, Kong’s Brad Drysdale and Ahmed Koshok exchange emails about the latest trends in tech. In this exchange, Brad and Ahmed discuss the continued quest for more innovation faster, the role of automation in API strategy, and more. from: Brad to: Ahmed date: Oct. 29, 2022, 6:58 PM subject: Elements for Building Cloud Native Applications Greetings from Australia, Ahmed! I wanted to pick your brain about a trend I’m seeing more of here in Australia — and across the broader Asia-Pacific region.

Read More

Health Check Command in Docker

03-Nov-22   |   By Aarthi   |   In Atatus , Containers
Atatus

Development is more reliable and streamlined with Docker. With Docker, developers can design fast, easy, and portable applications - both on desktops and in the cloud - by terminating redundant, mundane configuration tasks. Furthermore, to UIs, CLIs, APIs, and security, Docker's integrated end-to-end platform is built to incorporate across the entire application delivery pipeline. In Docker Containers, the HEALTH CHECK instruction determines their health status. Containers are evaluated in terms of whether they are running normally. In order to maintain its health, it conducts regular checks.

Read More

What is Data Security? - The Role of Analytics in Data Protection

03-Nov-22   |   By Yellowfin Team   |   In Yellowfin , Analytics
Yellowfin

Data security (or data protection) is a term often used in the context of analytics and business intelligence (BI). It encompasses a number of different policies, processes and technologies that protect an company's cyber assets against data breaches and threats. But what does all of that really mean, in relation to BI specifically? With so many different types of data security offered today, it’s naturally a broad topic that requires a deeper dive to gain a proper understanding of its many facets, and the key differences between it and other related terms, like data governance and data privacy.

Read More

What's Happening To Middleware In The Cloud-Native Era?

03-Nov-22   |   By Asanka Abeysinghe   |   In WSO2 , API
WSO2

Spending two decades in the middleware field has given me deep insight into the evolution of this technology domain. I began my career as a software engineer in a platform group, building reusable components using technologies like object linking and embedding (OLE), the distributed component object model (DCOM) and common object request broker architecture (CORBA). Later, I joined WSO2, an open-source and software as a service (SaaS) technology provider with middleware roots, where I’ve held diverse technical leadership roles for over a decade.

Read More

How Big is the Global Accessibility Testing Market and How Fast is it Growing?

03-Nov-22   |   By Snehal Kamble   |   In Testsigma , Mobile
Testsigma

Accessibility testing makes weband mobile applications usable by the broadest possible audience. It makes applications accessible to individuals with vision, hearing, and other physical or cognitive conditions. Globally, corporations are concentrating on enhancing customer engagement and retention to maintain market competition. Customers for accessibility testing include individuals with disabilities, who must be considered when conducting business. Accessibility testing services are used to ensure that all prospective customers are accessible. The market is currently exhibiting several trends and growth factors that could prove advantageous for new project investments.

Read More

End To End Testing vs Regression Testing: A Comprehensive Comparison

03-Nov-22   |   By Dhivya Krishna   |   In Testsigma , Mobile
Testsigma

End-to-end testing is a type of software testing that checks the system as a whole from start to finish. Regression testing is software testing that checks for errors after changes have been made to the code. Both are important for the software development process. However, they are two different types of tests that serve different purposes.

Read More

Acceptance Testing vs System Testing: Why do we need them?

03-Nov-22   |   By Raunak Jain   |   In Testsigma , Mobile
Testsigma

The Software Development Life Cycle (SDLC) has multiple stages, which include some testing phases. System testing and acceptance testing are integral parts of the overall testing lifecycle. In system testing, we test the system as a whole. We integrate all the modules and components and verify if the system meets the expectations or not. Once we have successfully tested the system, the entire application can be handed over to the users to check for its acceptability. We call this acceptance testing.

Read More

How to evaluate alignment for data team managers

03-Nov-22   |   By Yoni Hazan   |   In Fivetran , Analytics
Fivetran

Managers of data teams add value through alignment. Learn the essential criteria for evaluating the success of data team managers.

Read More

Entry and Exit Criteria in Software Testing Life Cycle - STLC [2022 Updated]

02-Nov-22   |   By Adhithi   |   In Testsigma , Mobile
Testsigma

Testing is an essential element of the increasingly competitive technology industry. It is an integral part of any Software Development Life Cycle or SDLC and can impact the result of all aspects of the project, such as time, cost, and quality. STLC, or Software Testing Life Cycle, is a series of operations carried out by the testing team to ensure the quality of the software or product, and it solely addresses the testing phases. Knowing the entry and exit criteria for STLC is essential. This defines testing areas and the activities performed by testers, allowing an accurate estimation of the time required for testing every site.

Read More

What is Defect Leakage in Software Testing?

02-Nov-22   |   By Adhithi   |   In Testsigma , Mobile
Testsigma

Several testing procedures and techniques find flaws throughout the Software Testing Life Cycle, abbreviated STLC. Defect leakage measures the percentage of problems that leak from one testing stage to the next, demonstrating the efficacy of testing. However, because certain defects, faults, and mistakes are present at the most internal level of the program, even the most well-known and efficient testing processes cannot locate and identify them all.

Read More

What's New in Next.js 13

02-Nov-22   |   By Nikola Đuza   |   In AppSignal , Development
AppSignal

Version 13 of Next.js, a well-established React framework from the Vercel company, was released last week. The announcement was made at the Next.js Conf and took the community by storm. Developers worldwide spread the news about the features and goodies announced live on October 25th. Now, as the dust slowly settles, we can go through what's new in Next.js 13.

Read More

4 Ways to Leverage User Metrics in Moesif

02-Nov-22   |   By Matt Tanner   |   In Moesif , API
Moesif

Without users, products mean nothing. So why is it that so many organizations analyze API and user behavior metrics as an afterthought? My theory would be that they just don’t have the right tools in place to actually collect, analyze, and use these usage metrics. With so many products aiming to improve their user experience and customer satisfaction, tools like Moesif are exactly what is needed. With Moesif we can collect meaningful user data, find value in that data, and even action some of that data right within the platform. The impressive part is how easy it is to do.

Read More

How to improve team collaboration among mobile engineers

01-Nov-22   |   By Amy Tom   |   In Bitrise , Collaboration
Bitrise

There’s often too much collaboration going on amongst mobile engineering teams— slowing things down. We discuss 4 ways to go from collaboration overload to effective collaboration.

Read More

Sanitize Strings in Elixir with Pattern Matching and Recursion

01-Nov-22   |   By Sophie DeBenedetto   |   In AppSignal , Development
AppSignal

In this post, we'll use two of Elixir's most powerful features - pattern matching and recursion - to sanitize a string by removing invalid Unicode "Specials" characters. Let's dive straight in!

Read More

How real-time data movement boosts supply chain visibility

01-Nov-22   |   By Andy Ellman   |   In Fivetran , Analytics
Fivetran

Manufacturers are transforming their supply chain with Fivetran's automated and scalable real-time data movement.

Read More

Which software testing staffing model is right for you?

01-Nov-22   |   By Kassidy Kelley   |   In Testlio , Testing
Testlio

If you are reading this, you have likely already identified a high-level need to scale or improve your current approach to testing without the mass hiring of in-house testers, or shifting left to make devs fully responsible for QA. Partnering with a software testing company is a great start, but what if a vendor offers multiple models? How can you define which software testing staffing model is right for you?

Read More

Microservices vs Web Services

31-Oct-22   |   By Jeremy H   |   In DreamFactory , API
DreamFactory

In the early days of web application development, monolithic frontends and backends were perfectly fine. But the emergence of the cloud has changed expectations. Developers want to build applications that exchange information with APIs (Application Programming Interfaces). Business owners want faster development times. End users expect zero downtime. This new paradigm enabled the rise of service-oriented architecture (SOA) and, along with it, microservices and web services.

Read More

An Intro to dry-schema in Ruby

31-Oct-22   |   By Abiodun Olowode   |   In Honeybadger , Development
Honeybadger

Data structure and type validations are so essential in modern Rails apps. You've probably used Active Model validations and strong parameters, but did you know there is a better way? This article introduces the dry-schema gem—a faster alternative to the defaults!

Read More

How to Wrap and Unwrap Errors in Golang

31-Oct-22   |   By Rollbar Editorial Team   |   In Rollbar , Development
Rollbar

In Golang, wrapping errors means adding more contextual information to the error which has been returned. For example, the additional information could be the type of error, the cause of the error, or the name of the function where the error is raised. Wrapping is very useful for debugging since you can precisely and quickly locate the source of the problem. Golang supports wrapping and unwrapping errors as part of the standard library errors by using the errors.Unwrap() and fmt.Errorf() functions with the %w verb.

Read More

How to Handle PDOException in PHP

31-Oct-22   |   By Rollbar Editorial Team   |   In Rollbar , Development
Rollbar

The PHP PDOException is a runtime exception that occurs when something goes wrong while using the PDO (PHP Data Objects) class or its related extensions. For example, this exception can occur while handling database connections or queries.

Read More

Ruby on Rails: 10 Trending Design Patterns

31-Oct-22   |   By Aarthi   |   In Atatus , Development
Atatus

Developers can develop agile applications using these conventions and write less code. Moreover, Ruby on Rails developers' communities can be enhanced in terms of maintainability and understandability. Furthermore, the developers use the Rails conventions and sensitive defaults in their web applications, making them more scalable. Among them are email management, object-database mappings, file structures, code generation, element naming and organization, etc. A design pattern is a recurring way of solving a problem in software design. Especially when working on large legacy applications without good software design principles, Ruby on Rails applications often encounter such issues.

Read More

Creating Tables Using React Table Library

31-Oct-22   |   By Vaishnavi   |   In Atatus , Development
Atatus

Tables are an essential part of front-end development. Be it creating structured data or making data visualization easier for users including tables is almost essential. However, if you’re working with React often creating complex tables might provide you with insufferable stress as the process is quite complex and time-consuming. Hence, instead of using only React to create tables the use of external libraries for table creation is often encouraged for react-developers. There are multiple open-source libraries with active community support that can help you create unique and interactive libraries for your React projects in no time!

Read More

5 Prerequisites to Consider While Building Trustworthy AI

31-Oct-22   |   By Cigniti Technologies   |   In Cigniti , AI
Cigniti

Artificial intelligence (AI) is advancing at a breakneck pace, and it is swiftly emerging as a potential disruptor and vital enabler for almost every business in every sector. At this point, the technology itself is not a barrier to the mainstream use of AI; rather, it a collection of challenges that, unfortunately, are far more human, such as ethics, governance, and human values, are.

Read More

The Importance of Business and IT Alignment to Build Successful Data Pipelines

31-Oct-22   |   By Lyndsay Wise   |   In Integrate , Analytics
Integrate

Okay, I’ll admit, I am pretty biased when it comes to how people within organizations work together to ensure successful data projects. I have been involved in too many projects that failed to take into account the importance of collaboration across departments and functions. They were stuck on data and only the data. They may have thought they knew what they wanted to achieve but didn’t always know the best way to get there or the implications of tactical planning without looking at the bigger picture.

Read More

Functional and Non Functional Software QA Testing

31-Oct-22   |   By TestQuality Team   |   In TestQuality , Testing
TestQuality

When it comes to QA Testing Software, there are two main categories: functional testing and non-functional testing. Both have their advantages and are constrained in their own ways. As we have explained in different occasions, the Quality Assurance Testing is carried out in a manner chosen by the user but remember that by using functional testing, you can see what the process is doing and how the system responds to different inputs.

Read More

Not All MFA is Created Equal, Especially in CIAM

30-Oct-22   |   By Bob Bentley   |   In WSO2 , API
WSO2

Since October is cybersecurity awareness month, it’s a great time to revisit the question of what are the best ways to secure user authentication in CIAM. In many industries (finance and healthcare, to name a few), regulations require the use of multifactor authentication (MFA) to protect access to sensitive data and transactions. Also last year, an important executive order was issued, aimed at improving the cybersecurity posture within the US government by requiring all federal agencies to adopt MFA systems. Regulations and standards like these will continue to spread over more industries and transaction types.

Read More

What is continuous deployment?

28-Oct-22   |   By Alisdair Broshar   |   In Koyeb , CI CD
Koyeb

After working on a new feature or an improvement, it's normal that you want to deliver these changes to your users as fast as possible. Depending on your deployment pipeline, confidently deploying changes to production might include coordinating with whoever is leading on-call, getting their approval, manually deploying your changes, spending hours to monitor how it goes, and performing a rollback in case something goes wrong. Continuous deployment automates the deployment process, which lets you deliver new features and improvements to your applications faster than with continuous delivery and other manual processes.

Read More

Welcome to the decade of data

28-Oct-22   |   By Team ThoughtSpot   |   In ThoughtSpot , Analytics
ThoughtSpot

To quote Hemingway: change happens gradually, then suddenly. We see this in the world around us. Think back to 2019. There’s no denying how much the pandemic reshaped our professional and personal lives, with technology driving this change at massive scale. Yet these changes, despite their ubiquity, are really the culmination of trends like cloud and automation that were well underway. Over the last decade, multiple, paradigm-shifting evolutions in technology have gone from experiment to mainstream. The gig economy, digital content streaming, and working from anywhere, once thought impossible, are part of the fabric of our day to day lives.

Read More

Software Release Checklist For Applications: Things to include

28-Oct-22   |   By Aaron Thomas   |   In Testsigma , Testing
Testsigma

Designing software is no easy feat, so it’s disheartening that the final product is full of bugs. This means that you must redo all the previous work, and everyone on the development and testing teams has to start from scratch. Every piece of software now necessitates updates and enhancements depending on user feedback. However, for optimum functionality, each version should be thoroughly tested.

Read More

Unit Testing vs End-To-End Testing - Key Differences in 2022

28-Oct-22   |   By Raunak Jain   |   In Testsigma , Mobile
Testsigma

Before designing a holistic testing strategy for an application, the first question that comes to mind is which testing strategy to use. The two most important and widely used testing strategies are Unit testing and end-to-end testing. To decide which one to use, it’s important to understand their key differences. Unit testing is a testing strategy where we test individual units of the application code. In end-to-end testing, the tester tests the entire application from the user’s point of view. We can do this by simulating the common tasks performed by the user.

Read More

Web Application Testing Checklist & Template [2022 Updated]

28-Oct-22   |   By Vakul Gotra   |   In Testsigma , Testing
Testsigma

Web app testing is a methodology of software testing & quality assurance process wherein bugs and errors that may lead to web app failure are identified and fixed. Web apps are accessed via a wide range of web browsers, OSs, and network types. There are many benefits for digital businesses leveraging web application testing, which ultimately ensures the end users get the best possible UX.

Read More

38 Best CI/CD tools In 2022

28-Oct-22   |   By Adhithi   |   In Testsigma , CI CD
Testsigma

There has been widespread adoption of CI/CD tools to streamline software development and testing processes in recent years. 47% of DevOps teams say they have fully automated their testing journey in 2022, a feat most significant to enumerate the importance of automation to optimize resource usage. This trend has driven 35% of developers to release codes twice as fast, facilitating higher revenues and better effort utilization.

Read More

Make Your Voice Heard in the State of Quality Report 2023

28-Oct-22   |   By Sairam Vedam   |   In Cigniti , Testing
Cigniti

The inventive and ever-evolving nature of technology creates as many opportunities as obstacles. The fact that software permeates every part of life demonstrates that corporate leaders should closely monitor the level of quality engineering to avoid a halt in ongoing improvement. The software industry and the digital quality assurance are confronted by an unprecedentedly fast-evolving technological macrocosm. Software is becoming more sophisticated than ever because of developments in quantum computing, IoT, big data, 5G, edge computing, etc.

Read More

Deep Cloning in JavaScript

28-Oct-22   |   By Vaishnavi   |   In Atatus , Development
Atatus

Javascript is the basis of today’s modern web technology and plays a pivotal role in providing effective functionalities to websites and web applications. One of the essential elements that power its capability to include complex functionalities is objects in Javascript. From performing as a holy grail that aids developers in creating complex data structures to storing multiple properties an object in JS can serve multiple purposes at once. However, JS objects are stored in the memory and to use the object while working you need the reference to the object that is stored in the memory.

Read More

6 Best Data Extraction Tools for 2022 (Pros, Cons, Best for)

28-Oct-22   |   By Keboola   |   In Keboola , Analytics
Keboola

A data extraction tool can help you speed up one of the most error-prone engineering processes: collecting raw data from different sources. In this article, we are going to analyze the following 6 market leaders in data extraction: Before we dive in, let’s look at all the problems you can avoid by implementing a data extraction tool.

Read More

Data Science Maturity and Understanding Data Architecture/Warehousing

28-Oct-22   |   By Bill Inmon   |   In Integrate , Analytics
Integrate

This is a guest post for Integrate.io written by Bill Inmon, an American computer scientist recognized as the "father of the data warehouse." Inmon wrote the first book and magazine column about data warehousing, held the first conference about this topic, and was the first person to teach data warehousing classes. Data science is immature. This statement is not pejorative; it is simply a statement of historical fact. As such, it is not arguable.

Read More
Copyright © 2022 OpsMatters, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.

Email Marketing Powered by Mailchimp