In this article, we discuss how to capture network calls and resources loaded on a browser to export them as a HAR file using Selenium and BrowserMob-Proxy. Read all
In this article, we discuss how to use the Java EE Security API (Jakarta Security) on Tomcat and the Payara Platform in order to better handle user-authentication. Read all
A software architect discusses the idea of chaos testing, why building a microservices architecture with failure in mind is important, and more. Read all
Immutability means it is difficult to make changes without collusion — not that data is unchangeable. Let's take a closer look at blockchain immutability. Read all
In this post, we take a closer look at the best practices for securely building chatbots, including end-to-end encryption, authentication, and more. Read all
A software developer takes us through the processes fellow application developers need to follow to properly secure mobile applications and their APIs. Read all
In this performance testing tutorial, you'll learn how to reliably perform service stubbing in load testing using JMeter with Docker containers in the cloud. Read all