Systems | Development | Analytics | API | Testing

May 2024

Exploring Cypress And Keploy: Streamlining Test Automation

As an Automation Enthusiats exploring in the realm of software testing, I’ve traversed a various tools and frameworks aimed at enhancing test automation processes. Because as the landscape of software testing continues to evolve, the demand for efficient and reliable test automation solutions has never been higher. Among these, Cypress and Keploy emerge as standout solutions, each offering distinctive features and capabilities tailored to different situations of test automation.

Chat with Devs | Episode - 4 | Isitio Ambient Mesh

Istio Ambient Mesh is a massive overhaul of Istio's data plane architecture. The goal is to simplify operations and make it more cost effective to run a service mesh like Istio in production. In this video we will look at: 1] What are the challenges of a traditional service mesh sidecar approach? 2] Take a look at how Istio Ambient Mesh Solves that problem.

Testing Bunjs Web Application With Cucumber Js And Keploy

In our previous blog, we explored how to build a modern web server using BunJs and Prisma, integrating robust authentication mechanisms with JWT tokens. Now, it’s time to ensure our application is reliable and error-free through thorough testing. In this blog, we’ll dive into testing methodologies using Cucumber JS and Keploy, both are a powerful tools that streamline the testing process and enhance the quality of our application.

Understanding The Different Levels Of The Software Testing Pyramid

We all know what a "software" is, but then what is software testing or why is it even important? Let me answer your doubts- Software Testing is a process that involves evaluating software components to ensure they meet specified requirements and are defect-free. The main goal of software testing is to verify that the actual software matches the expected requirements, enhancing the product quality and customer satisfaction.

Introducing Keploy | Your Automated API Testing Platform: AI-Driven Edge Cases, No Hallucinations

Looking for an automated test solution that offers unparalleled accuracy? Meet Keploy, your AI-driven API test engineer. Here's a description for "Introducing Keploy | Your Automated API Test Engineer: AI-Driven Edge Cases & No Hallucinations ".

Introducing Keploy | Your automated API Test Engineer: AI-Driven Edge Cases & No Hallucinations

Looking for an automated test solution that offers unparalleled accuracy? Meet Keploy, your AI-driven API test engineer. Here's a description for "Introducing Keploy | Your Automated API Test Engineer: AI-Driven Edge Cases & No Hallucinations ".

GitTogether | GenAI & Open Source | Kunal Deo

The resurgence of Artificial Intelligence (AI) in recent years owes much to a pivotal moment: the publication of a groundbreaking paper by Google. This event underscores the significant role of Open Source in advancing AI technologies. In this presentation, we delve into how Open Source is not just influencing but also shaping the landscape of Generative AI (GenAI). However, our focus extends beyond the traditional dichotomy of Open Source versus proprietary technologies. Instead, we explore the complementary nature of both realms in fostering the development of the AI ecosystem.

Decoding Network Traffic: Telemetry With Network Activity

Network Telemetry, in simple terms, is like having a conversation with machines or systems located far away. It’s about collecting data from these distant sources to better understand how they’re performing. Think of it as a health check-up, but for machines or systems instead of people. This technology plays a crucial role in a variety of fields.

Create Stunning Parallax Animations On Your Website

Have you ever come across a website that made you scroll over it again just to see the motions and transitions and made you GASP, thinking how hard it must be to create these amazing animations, One such animation I saw on keploy website, the parallax effect which made me go through there Developer section twice!

GitTogether | GitOps Dynamics: Navigating the new era of DevOps! | Megha Kaur

GitOps enhances the DevOps experience/process. My talk is based on GitOps. I will be explaining GitOps workflow, its use cases and how companies can incorporate GitOps in their organization. I will share my experience on how I started using GitOps and what problems it is solving. I will be giving a small demo on GitOps concept to show how deployment can be done with the use of GitOps in Kubernetes. This will help developers, organization and each individual.

Using Tc-Bpf Program To Redirect Dns Traffic In Docker Containers

The adoption of eBPF (Extended Berkeley Packet Filter) has revolutionized high-performance applications, tracing, security, and packet filtering within the Linux kernel. Specifically, TC-BPF, a type of eBPF program attached to the Traffic Control (TC) layer, has emerged as a powerful tool for packet manipulation in both ingress and egress. This blog delves into the practical application of TC-BPF to redirect DNS queries in a Docker environment.

Adding Colour To The Log Output Of Logging Libraries In Go

Logging is an integral part of software development, providing developers with valuable insights into the behaviour and performance of their applications. In the Go programming language, various logging libraries, such as the standard library’s log package or third-party options like logrus , zap and zerolog, facilitate the generation of log output.

GitTogether | Combine and Rule | Gunesh Patil

Combinatorial testing is a crucial technique for ensuring software reliability by efficiently testing various combinations of input parameters. However, manual creation and execution of test cases for all possible combinations can be time-consuming and impractical. To address this challenge, this talk introduces an open-source tool designed to streamline combinatorial testing processes, maximizing test coverage while minimizing effort.

Scram Authentication: Overcoming Mock Testing Challenges

In the vast landscape of cybersecurity, authentication stands as the guardian of digital fortresses, ensuring that only the right individuals gain access to sensitive information and services. Imagine you’re at the entrance of a top-secret facility, and you need to prove your identity to the security personnel. In the digital realm, this is precisely what authentication mechanisms do – they verify your identity before granting access.