Category: technology

  • Revolutionising Unit Test Generation with LLMs

    Revolutionising Unit Test Generation with LLMs

    “Discovering the unexpected is more important than confirming the known.” – George E. P. Box As software systems grow in complexity, the importance of comprehensive testing cannot be overstated. However, writing unit tests is often a time-consuming and repetitive task leading to developer fatigue. In this blog we will over come the manual unit test…

    by

    in
  • How to Use covdata for Better Go Code Coverage

    How to Use covdata for Better Go Code Coverage

    When you run your Go programs or integration tests, numbers of raw coverage files are typically generated and dumped into a directory specified by the GOCOVERDIR environment variable. These files contain valuable data about which parts of your code were executed during tests, offering a glimpse into your code’s effectiveness and robustness. However, sifting through…

    by

    in
  • My Testing Journey with Jasmine and Mocha

    My Testing Journey with Jasmine and Mocha

    We all know the why it’s important to write clean, reliable code. But let’s face it, catching bugs before they wreak havoc on our applications can feel like chasing after a greased weasel. That’s where testing frameworks come in, acting as our trusty bug-hunting companions. In this blog, we’ll be putting two popular frameworks –…

    by

    in
  • Why Traditional API Testing Fails? Comparing Shadow, Production, Replay Techniques

    Why Traditional API Testing Fails? Comparing Shadow, Production, Replay Techniques

    I want to share the story of how our team at a fast-paced startup tackled the challenge of API testing without any dedicated QA team, the roadblocks that we encountered, and how we ultimately addressed these issues. Baseline Challenge We had 15-day sprints including mandatory unit and API testing. Initially, we relied on automated testing.…

    by

    in
  • Decoding Network Traffic: Telemetry with Network Activity

    Decoding Network Traffic: Telemetry with Network Activity

    Network Telemetry, in simple terms, is like having a conversation with machines or systems located far away. It’s about collecting data from these distant sources to better understand how they’re performing. Think of it as a health check-up, but for machines or systems instead of people. This technology plays a crucial role in a variety…

    by

    in
  • Create Stunning Parallax Animations on Your Website

    Create Stunning Parallax Animations on Your Website

    Have you ever come across a website that made you scroll over it again just to see the motions and transitions and made you GASP, thinking how hard it must be to create these amazing animations, One such animation I saw on keploy website, the parallax effect which made me go through there Developer section…

    by

    in
  • Using TC-BPF program to redirect DNS traffic in docker containers

    Using TC-BPF program to redirect DNS traffic in docker containers

    The adoption of eBPF (Extended Berkeley Packet Filter) has revolutionized high-performance applications, tracing, security, and packet filtering within the Linux kernel. Specifically, TC-BPF, a type of eBPF program attached to the Traffic Control (TC) layer, has emerged as a powerful tool for packet manipulation in both ingress and egress. This blog delves into the practical…

    by

    in
  • Adding colour to the log output of logging libraries in Go

    Adding colour to the log output of logging libraries in Go

    Logging is an integral part of software development, providing developers with valuable insights into the behaviour and performance of their applications. In the Go programming language, various logging libraries, such as the standard library’s log package or third-party options like logrus , zap and zerolog, facilitate the generation of log output. While the primary goal…

    by

    in
  • SCRAM Authentication: Overcoming Mock Testing Challenges

    SCRAM Authentication: Overcoming Mock Testing Challenges

    In the vast landscape of cybersecurity, authentication stands as the guardian of digital fortresses, ensuring that only the right individuals gain access to sensitive information and services. Imagine you’re at the entrance of a top-secret facility, and you need to prove your identity to the security personnel. In the digital realm, this is precisely what…

    by

    in
  • Choosing the Perfect Message Queue: Factors to Consider

    Choosing the Perfect Message Queue: Factors to Consider

    Not long ago, I was handed a problem that’s no stranger to the world of programming: making asynchronous threads communicate effectively within the same process. Given the widespread nature of this issue, I expected to find an existing solution to resolve it. My search led me to the concept of message queue, which seemed promising…

    by

    in