Systems | Development | Analytics | API | Testing

Building a realtime SMS voting app... In the web.

Allow me to set a scene - You’re a speaker at a conference in a large venue. During your talk you’d like to poll your audience to find out whether they use a Mac, Windows or Linux. You’ve got an interactive chart in your slides which will update as the audience votes on your web app. But there’s a hitch, you — as the speaker, have access to a private WiFi, but your attendees don’t have that.

Bitrise for Indie Developers | A walkthrough by Kevin Toms

If you are an indie developer working on mobile apps, you have plenty of challenges to look out for on top of creating a great app. Bitrise can help with these and other challenges through the Bitrise CI/CD cloud-based platform and its integrations with other systems and tools. Kevin Toms, Developer Advocate is here to guide you through the whole process of using Bitrise if you are an indie developer.

10 Indispensable Software Deployment Tools

Software Deployment Tools (SDTs) help make software systems available to the target endpoints in a network from a central location. They include installation, distribution, configuration, upgrade, and management tools. All software applications need to be upgraded regularly, require new features from time to time, need security reinforcements against new and coming threats, require updates to remove bugs, and so on.

Rollbar Academy: Rollbar Analytics

This session focuses on revealing the operational data that is available for analysis within your Rollbar account and how to utilize it to better understand and improve your development processes. Learn how to take advantage of features like People tracking and RQL to explore error data in-depth and how to further automate these steps using the Rollbar REST API.

A Guide to Data Privacy and Data Protection

Organizations collect and use personal data for a variety of purposes, often without considering the impact on data privacy. Individuals are increasingly more aware of how their data is being used and the lack of say they have over the process. Data privacy and protection regulations are in place around the world to protect consumers and stop their personal information from being misused.

6 Mistakes to Avoid When Handling PII

Personally identifiable information, or PII, is sensitive information that can identify an individual. Industry or data protection laws often regulate this type of data, requiring that organizations handle PII according to specific practices. It’s all too easy to make mistakes when working with PII, so we've highlighted six common scenarios to look out for.

How Your API Ecosystem Can Deliver Benefits to Your Business

When you introduce an API to your technology stack, you must also consider how it will interact with the other moving parts of your business. This is especially true if you have an external-facing API. Consider the end user, software vendors, business partners, third-party developers, and internal stakeholders. It can be complicated to juggle all of these interests, but the benefits to your business pay off immensely. So how does your API ecosystem deliver benefits to your business?

The 4 keys to a successful manufacturing IIOT pilot

If you have read our previous post focusing on the challenges of planning, launching and scaling IIOT use cases, you’ve narrowed down the business problems you’re trying to solve, and you have a plan that is both created by the implementation team and supported by executive management. Here’s a plan to make sure you’ve got it all down. Think of these success factors like the legs of a kitchen table and the results that you desire, a bowl of homemade chicken soup.