Systems | Development | Analytics | API | Testing

Backtrace Acquisition Adds Error Monitoring; Enables Customers to Receive Quality Signals Throughout Entire Software Development Lifecycle

Today is a great day at Sauce Labs! We just announced that we’ve acquired Backtrace, a provider of best-in-class error monitoring solutions for software developers and engineers. Backtrace enables organizations to mitigate application risk and improve digital quality by empowering development teams to rapidly deploy code with confidence knowing that they can quickly identify and remediate bugs once in production.

Is Selenium the Best Test Automation Framework?

As far as web test automation goes, Selenium is certainly the most popular toolset. That popularity is uncontested. A survey on test automation finding that 54% of the respondents were using Selenium might be surprising only in that the number is so low. Many of the alternatives to Selenium, Software-as-a-Service products that record and re-run entirely in the browser, still use the Selenium as the core driving technology.

Configuring a Kubernetes Application on Kong Konnect

Hello, everyone! Viktor Gamov, a developer advocate with Kong here. In this article, I would like to show you how to set up service connectivity using Kong Konnect and Kubernetes. I will deploy an application in Kubernetes, configure a runtime through Konnect and demonstrate some management capabilities like enabling plugins. Let’s dive right in!

JWT Authentication: When and How To Use It

JWT stands for JSON Web Token, is a famous technology that comes with its own controversy. Few people find it quite beneficial, while others feel one must never use it. Nonetheless, in this article, we shall discuss the reason behind this controversy, understand JWT in detail, and when and why one must use it. We'll cover the following section in this blog. JWT (JSON Web Token) authentication is a process or method used to verify the owner of JSON data.

BigQuery admin reference guide: Tables & routines

Last week in our BigQuery Reference Guide series, we spoke about the BigQuery resource hierarchy - specifically digging into project and dataset structures. This week, we’re going one level deeper and talking through some of the resources within datasets. In this post, we’ll talk through the different types of tables available inside of BigQuery, and how to leverage routines for data transformation.

Interview With Cybersecurity Expert Tom Kirkham

For our latest expert interview on our blog, we’ve welcomed cybersecurity specialist Tom Kirkham to share his wealth of experience on the topic of cybersecurity. Tom is the founder and CEO of IronTech Security, a managed security service provider (MSSP) that focuses on educating and encouraging law firms, court systems, water utilities, and financial firms to establish a security-first environment with cybersecurity training programs for all workers to prevent successful attacks.