Each week, we collect the posts our authors have written or updated and share them here. Check out our latest weekly digest below.
Test Coverage Techniques: The Top Ones You Need
One of the biggest challenges of testing is knowing when to stop. How much testing is enough? Should we strive to test 100% of our application? Or should we prioritize the areas that are more likely to contain problems? Should we allocate our resources uniformly throughout the application or concentrate our efforts on the most critical modules? Carlos Schults can answer these questions on Testim’s blog.
A Detailed Guide to Cloud Data Security
Cloud platforms have revolutionized the way organizations do business online. Over the years, most organizations have shifted to using cloud platforms for managing and housing their data. The shift from on-premises data storage environments is mainly due to the expenses and the scalability issues that come with on-premises data systems. In addition to that, the Big Data era also contributes to the use of cloud-based environments. However, the adaptation of cloud environments is raising several cloud data security issues. This blog explains the concept of cloud platforms, the risks to cloud data security, and various preventative measures to avoid data security threats. Find out more from Zulaikha Greer on Scalyr’s blog.
What Is Application Performance Monitoring and How Do I Start?
Most software engineers—or IT pros in general—would agree improving an app’s performance is a good thing. Also, most engineers have at least some understanding of best practices or techniques they can use to ensure better performance when writing code. It’s essential to carefully analyze an application both in development and in production and use the knowledge obtained to detect and fix performance problems, before releasing into production or when an error occurs after release. That, in a simplified manner, is what application performance monitoring (APM) is about. In this post, you can learn from Carlos Schults what APM is and how you can get started with it. Check it out on Solarwinds’ blog.
What Is Synthetic Monitoring and Why It’s Important for Your Business
If you’re looking for a way to drive conversion rates up and bounce rates down, attract new customers, and make your existing client base more loyal—and who isn’t?—you’ve got to invest in improving the user experience of your apps and services. Since it’s difficult to improve what you don’t measure, you must adopt strategies to analyze how your application behaves, so you can identify and fix issues as quickly as possible and also obtain insights to help you prevent potential problems in the future. Monitoring is the name of the game, and it comes in many shapes and sizes. This post is about a specific type of monitoring: synthetic monitoring. Learn more from Carlos Schults on Solarwinds’ blog.
New to Microservices: What You Should Know When You Set Up Logging
When you’re designing your microservice architecture, it’s important to consider how you’re going to get information about how the service is working. One of the easiest and most common ways of doing so is ensuring your microservice is logging information about what’s going on. Discover what you should know when to set up logging from Erik Lindblom on Solarwinds’ blog.
Building Secure Applications: Top 10 Application Security Best Practices
We also updated a few posts this week, like this one on 10 application security best practices. This post considers ten best practices that will help you and your team secure the web applications which you develop and maintain. This is really focused on your application, as opposed to best practices across your organization. Find out what they are on Sqreen’s blog.
Test Coverage Techniques: The Top Ones You Need
We also updated a post on test coverage techniques. One of the biggest challenges of testing is knowing when to stop. How much testing is enough? Should we strive to test 100% of our application? Or should we prioritize the areas that are more likely to contain problems? Should we allocate our resources uniformly throughout the application or concentrate our efforts on the most critical modules? You can find the answers on Testim’s blog.
Grep An IP Address From a Log File: A Detailed How-To
Want to know more about how to grep an IP address? You need to see who’s accessing your systems. This often means you have to grep an IP address from a log file. Grep is a command-line tool for searching text in files using regular expression syntax. Let’s take a look at searching for IP addresses in log files using grep and how you can use regular expressions to search for addresses in different situations. Find out more on Scalyr’s blog.
Streaming Data with Amazon Kinesis
Finally, we updated a post on streaming data with Amazon Kinesis. Platforms such as Apache Kafka provide streams that receive data from event sources (producers) and pass them down to consumers, which in turn can forward them to other streams. In essence, they are similar to message queues, but they support multiple consumers that process the same messages in parallel. Learn more on Sqreen’s blog.