Systems | Development | Analytics | API | Testing

Why we bet on Anthropic, part 2: Comparing different computer using agents for testing

In the prior blog, we previewed some of the reasons that we settled on using Anthropic’s Computer Using Agent (CUA) over other alternatives and promised to provide more information as to what and why, with facts and figures. If you haven’t read that blog, check it out here. In this blog, I hope we can bring to light some of the “why” behind our decisions, and what makes our agentic AI so powerful.

Using Proxymock with AWS Services

Amazon Web Services, or AWS, offers a variety of cloud services ranging from AWS resources such as CDNs and data lakes to cloud computing and transformation services such as compute resources, virtual servers, and dynamic availability zones. For this reason, AWS cloud is one of the most broadly adopted cloud solutions, offering a global network of solutions at generally lower costs compared to on-premises solutions.

4 Microservices Examples: Amazon, Netflix, Uber, and Etsy

In this article, we’ll explore the microservices journeys of these wildly successful enterprises. We’ll also examine why microservices have become a cornerstone for modern IT strategies and how they continue to evolve. But first, let’s look at the general circumstances that inspire enterprises to use microservices in the first place.

Jetpack Compose Fragments: How to Migrate and Integrate in Android Apps

Imagine you’re a toolmaker. You’ve got an old-school toolshed with loads of ancient equipment: hammers, pickaxes, all the stuff people used hundreds of years ago. And then one day you walk into your toolshed to find laser cutters, 3D printers and loads of other digital tools at your disposal. Life would suddenly seem a lot simpler, right?

Simplifying Cyber Resilience for Modern Enterprise Infrastructure - at Any Scale

Achieving cyber resilience is a constant challenge for even the largest and most experienced organizations and IT leadership teams. Studies, including one from our partner Veeam, show +75% of organizations experienced a ransomware attack in the past year. Those that didn’t are well-aware they may be next.

Protocol Parsing Guide: From Packets To Structured Data

In this blog, I’ll walk you through the essential steps and guidance for parsing network protocols. We’ll assume that you’re already running a Layer 4 (L4) proxy to capture packets into a buffer, and you have both the client and destination connection objects readily available. This guide will focus on helping you convert raw network data into meaningful, structured information.