One of the basic ingredients of any software is that before you deliver it to the end user you want to make sure that it works properly. The question is how we need to adapt our approach to testing to take account of the cloud-based, highly distributed nature of serverless architecture.
Authentication for web apps is a difficult problem. Anyone who’s ever tried to create their own authentication system will tell you that there are a lot of unexpected edge cases. What’s more, your authentication system is an externally-facing part of your application. This means if someone is trying to hack into your application, your login system’s security will be one of the first places they check.
The release of Nexthink’s Digital Experience Score earlier this year was an important milestone for the company and was the outcome of many conversations we had with our customers over the last few years. It has probably been five years since I first heard a customer talking about the need for metrics to address the challenges they were having in taking a more employee-centric approach to their business.
Justifiably or not, Microsoft’s Windows 10 has gained the reputation as an operating system that doesn’t respect your privacy as much as it should. If you or your organization are Windows 10 users, this guide will assist you in protecting your privacy during day-to-day operations.
Like many startups, Stackery is a small team. For this reason, employees often need to go beyond their official job title to ensure everything gets done. As the Stackery product matures and gains more exposure, we’ve seen an increase in customer support inquiries and decided to further refine our customer support process through the creation of a customer support rotation that rotates amongst the software engineers on a weekly basis.
The VoIP (Voice over Internet Protocol) phone system is not an alien technology in this progressive world. People have left behind the traditional landline telephony system long ago and now enjoy un-interrupted, crystal-clear and almost free calls over the Internet. VoIP technology is increasingly used by everyone whether it is an individual or a business organization. the technology has impressed a lot of audience by its versatility.
Retention is a crucial factor in adopting a log management solution. For most organizations, 30 days is a perfect balance between having to access historical log data and the high cost of storage. However, some organizations need to retain logs for a much longer period of time, whether it’s to comply with regulations, perform frequent audits, or monitor changes to operations over time.
Crash reporting can alter the balance between support and development, and swing it in your favor! Sure "literally" is an overused term. But, I think it’s fair to say that “LITERALLY” nobody likes it when software crashes. Users don’t like it when the software they love using breaks. They’re left wondering what happened and how long will it be until there’s a fix.