Systems | Development | Analytics | API | Testing

Six Key Predictions for Artificial Intelligence in the Enterprise

As we head into 2024, AI continues to evolve at breakneck speed. The adoption of AI in large organizations is no longer a matter of “if,” but “how fast.” Companies have realized that harnessing the power of AI is not only a competitive advantage but also a necessity for staying relevant in today’s dynamic market. In this blog post, we’ll look at AI within the enterprise and outline six key predictions for the coming year.

Apache Ozone - A Multi-Protocol Aware Storage System

Are you struggling to manage the ever-increasing volume and variety of data in today’s constantly evolving landscape of modern data architectures? The vast tapestry of data types spanning structured, semi-structured, and unstructured data means data professionals need to be proficient with various data formats such as ORC, Parquet, Avro, CSV, and Apache Iceberg tables, to cover the ever growing spectrum of datasets – be they images, videos, sensor data, or other type of media content.

How to use generative AI for exploratory testing? (With examples)

Generative AI is bringing a new era of “convenience” with ChatGPT, from OpenAI, taking center stage in our daily lives. From aiding in solving complex problems to generating content, this large language model has become a helpful companion for various testing-related tasks. As generative AI is becoming increasingly present in our daily lives, we should understand how to use it and account for its limitations.

Validating Data in Elixir: Using Ecto and NimbleOptions

In the previous part of this series about validating data at the boundary of an Elixir application, we covered a few general programming tactics to try and reject invalid and unexpected data in our software. Continuing with that subject, we'll now explore how two libraries, namely Ecto and NimbleOptions, can further assist us. Let's get started!

Snowflake Announces Cyber Essentials Plus Certification

Ensuring a seamless data experience that complies with regulatory frameworks, particularly in the public sector, is crucial. Research from the U.K. government found as many as 32% of businesses and 24% of charities suffered online breaches or cyberattacks in the last 12 months. In this increasingly interconnected world, national stability depends on thoughtful data governance and safeguarding.

Gateway API: From Early Years to GA

In the Kubernetes world, the Ingress API has been the longstanding staple for getting access to your Services from outside your cluster network. Ingress has served us well over the years and can be found present in several dozen different implementations, but as time has passed and Kubernetes has grown it's become clear that there exists a greater need than Ingress is able to deliver.

Get started with security: Vite, React, and Ably Token Requests for API access

SaaS APIs typically require some kind of authentication to allow access. While there are many ways that APIs can implement authentication, one popular choice is using secret keys as the scheme. Exposing secret keys directly to a client application however can create security risks, so how can client applications based on libraries like React securely access SaaS services? Many APIs, including Ably, offer an additional client-oriented token authentication system.