TestComplete Releases Version 14.2

Our aim with each update is to combine UI test automation with innovation. This year we’ve been happy with our progress. We introduced a powerful hybrid object recognition engine that now includes AI-powered OCR techniques. Our range of automated tests has always covered desktop, web, mobile, and Chromium-based applications, but through this OCR update, they can now be more complex.


It Takes a Village

Rancher Rodeos are great events for learning Kubernetes and Rancher beginner-level concepts, with attendees gaining just the right amount of knowledge to get started with provisioning Kubernetes clusters and launching applications. I present frequently at Rodeos, and the scene typically unfolds like this: together with attendees, we are walking through Rancher features, and usually as we’re experimenting with Monitoring, Alerting, and Logging, I see the wheels start turning in their heads.


The Path from Unstructured Logs to Observability

Are you starting out on your journey toward observability? Do you have a mandate from management, or are you a lone warrior in the matrix? From your starting point, how will you make the right decisions about how to implement changes to your logging and aim for the right path through the various choices in front of you?


Head in the Clouds: Integrating Oracle Cloud Infrastructure With VictorOps

In tandem with DevOps adoption, the use of cloud computing and infrastructure continues to grow. Teams are using public cloud, private cloud, on-premises and hybrid cloud applications and infrastructure to improve scalability and speed. In a world of CI/CD and rapid deployment, cloud infrastructure offers more transparency in releasing software and greater flexibility in production.


How to Foil the 6 Stages of a Network Intrusion

The cost of a breach is on the rise. A recent report from IBM revealed that the average cost of a data breach had risen 12 percent over the past five years to $3.92 million per incident on average. Additionally, this publication uncovered that data breaches originating from malicious digital attacks were both the most common and the most expensive types of security incidents.