During your Android developer career, you may reach a point where you will have to develop Android libraries or Gradle plugins. In this article, we will discuss the most important aspects and differences of testing these!
Learn how to write your tests for your Android applications! In this series of articles, you will learn how to do testing on your Android app and libraries. We will give you the most valuable and critical knowledge about testing and finding the issues in your app, and showcase how to write your test cases and how to run them in CI.
When we speak to our customers, they tell us that Bugfender is great for capturing application logs and then pinpointing the logs of a specific user. By pulling all the logs from a developer’s mobile and web apps and centralizing them in a single dashboard, Bugfender gives that developer a 360-degree sweep of their entire user base. But what if you want to use this data somewhere else? What if you could provide this data within an Elasticsearch database?
The 5G hype train is generating a lot of buzz about a technology revolution that promises to pump a staggering $12 trillion into the global economy by 2035 and add over 20 million new jobs in the US alone. But behind the buzz, low-code automation is making the 5G hype legit as network operators turn to low-code platforms to deploy new 5G connectivity that’s exponentially faster and more powerful than 4th generation mobile.
They tell us 5G is the future. Where business and consumers are going. But the fierce battle for early adopters is already underway according to Peter Linder, a notable 5G evangelist and Head of 5G Marketing for Ericsson in North America. “Early adopters are getting on board right now,” says Linder. “About 54 million Americans will purchase a 5G phone by the end of 2021. It’s not like ‘build the network and they will come’.
We talked to cybersecurity expert Anastasiia Voitova about all things related to mobile app security: from the first and most important steps teams should take to prevent potential attacks to reaching a high level of DevSecOps maturity.