ContentPosts from @rathour_nitish..
Story Keploy Team
@sancharini shared a post, 2ย weeks, 2ย days ago

Black Box Testing Techniques to Improve Test Coverage

Learn black box testing techniques to improve test coverage. Explore methods like equivalence partitioning, boundary value analysis, and more with practical examples.

black box testing techniques
Story Trending
@laura_garcia shared a post, 2ย weeks, 2ย days ago
Software Developer, RELIANOID

๐—ช๐—ผ๐—ฟ๐—น๐—ฑ ๐—ค๐˜‚๐—ฎ๐—ป๐˜๐˜‚๐—บ ๐——๐—ฎ๐˜†

๐Ÿš€ ๐—ช๐—ผ๐—ฟ๐—น๐—ฑ ๐—ค๐˜‚๐—ฎ๐—ป๐˜๐˜‚๐—บ ๐——๐—ฎ๐˜† ๐—ถ๐˜€ ๐—ต๐—ฒ๐—ฟ๐—ฒโ€ฆ and itโ€™s not just science fiction anymore. Quantum computing is rapidly moving from theory to realityโ€”and with it comes a ๐—บ๐—ฎ๐˜€๐˜€๐—ถ๐˜ƒ๐—ฒ ๐˜€๐—ต๐—ถ๐—ณ๐˜ ๐—ถ๐—ป ๐—ฐ๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† that organizations simply canโ€™t ignore. Hereโ€™s the uncomfortable truth: ๐Ÿ‘‰ The same technology that promises breakthrou..

quantum_computing_relianoid
Link
@hamzmu shared a link, 2ย weeks, 2ย days ago
Fellow, Rootly

Using Graphify to turn Incident Data into a Knowledge Graph

Karpathy said we should build LLM knowledge bases. 48 hours later made Graphify was made: one command, full semantic knowledge graph.

We applied the idea to incident data turning them into a queryable and interactable semantic graph. This lets us see past fixes, predict failures, cluster services, cut alert noise, and reveal team load in seconds.

If youโ€™re using Rootly, here is a small plugin to explore your incident data.

Check it out: github.com/Rootly-AI-Labs/rootly-graphify-importer

Interactive knowledge graph visualization of incident management data showing clustered services, alerts, and responders with connected nodes and relationships in Graphify
Story
@laura_garcia shared a post, 2ย weeks, 3ย days ago
Software Developer, RELIANOID

Strengthen Your MFA with Google Authenticator and RELIANOID

๐Ÿ” Strengthen Your MFA with Google Authenticator and RELIANOID At RELIANOID, we take authentication seriously. We've just published a new technical guide on how to integrate Google Authenticator into the RELIANOID MFA Portal, using Active Directory or LDAP to manage user secrets. โœ… Understand TOTP vs..

2FA with AD_LDAP and Google Authenticator
Story Trending
@habiledata shared a post, 2ย weeks, 6ย days ago
HabileData

5 Product Data Quality Issues in Multi-Channel Retail and How to Address Them

Weaknesses in product data expose themselves quickly in a multi-channel retail environment. Define a master schema, maintain control of your inventory and pricing via rules, continuously monitor for compliance, and connect performance metrics to the precise changes made for each SKU.

fixing-product-data-at-scale-5-issues-that-hurt-retail-listings
Story
@laura_garcia shared a post, 3ย weeks ago
Software Developer, RELIANOID

RELIANOID NIS360 Alignment & Compliance

๐Ÿ” RELIANOID NIS360 Alignment & Compliance At RELIANOID, we align our security strategy with the ENISA NIS360 Cyber Risk frameworkโ€”helping organizations in critical sectors strengthen resilience and improve cybersecurity maturity. From governance and risk management to incident readiness and supply..

enisa nis360 relianoid
Story HitechDigital Solutions Team
@hitechdigital shared a post, 3ย weeks ago
Business Consulting, HitechDigital Solutions

How SolidWorks Sheet Metal CAD Drafting Delivers Shop-Ready Drawings

Fabricating sheet metal requires documentation that describes the designerโ€™s intent of how to manufacture the part. By linking parametric 3D models directly to manufacturing documentation viasheet metal CAD draftingin SolidWorks, each dimension, bend note, and flat pattern is the same as what has be..

How SolidWorks Sheet Metal CAD Drafting Delivers Shop-Ready Drawings
Story Palark Team Trending
@shurup shared a post, 3ย weeks ago
@palark

Kubernetes 1.36 new alpha features

Kubernetes

Kubernetes v1.36 will be released in 2 weeks. What will change? Here are prominent newly introduced alpha features in the v1.36 release: - Workload-aware preemption. Groups of related Pods are now treated as a single entity. - Topology-aware workload scheduling, allowing you to place a group of Pods..

kubernetes-v1.36-release
Story
@laura_garcia shared a post, 3ย weeks, 1ย day ago
Software Developer, RELIANOID

๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐Ÿญ๐Ÿฌ๐Ÿญ: ๐—ช๐—ต๐˜† ๐—•๐—ผ๐˜๐—ป๐—ฒ๐˜๐˜€ ๐—”๐—ฟ๐—ฒ ๐—ฎ ๐— ๐—ฎ๐—ท๐—ผ๐—ฟ ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜

๐Ÿ” ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐Ÿญ๐Ÿฌ๐Ÿญ: ๐—ช๐—ต๐˜† ๐—•๐—ผ๐˜๐—ป๐—ฒ๐˜๐˜€ ๐—”๐—ฟ๐—ฒ ๐—ฎ ๐— ๐—ฎ๐—ท๐—ผ๐—ฟ ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ Cyberattacks are evolving fast. Among the most common: MITM DDoS IP & DNS Spoofing Rootkits Botnets โš ๏ธ ๐—•๐—ผ๐˜๐—ป๐—ฒ๐˜๐˜€ ๐˜€๐˜๐—ฎ๐—ป๐—ฑ ๐—ผ๐˜‚๐˜โ€”networks of infected devices used for DDoS, data theft, and large-scale attacks. ๐Ÿ›ก๏ธ ๐—›๐—ผ๐˜„ ๐—ฅ๐—˜๐—Ÿ๐—œ๐—”๐—ก๐—ข๐—œ๐—— ๐—ฃ๐—ฟ๐—ผ๐˜๐—ฒ๐—ฐ๐˜๐˜€ ๐—ฌ๐—ผ๐˜‚ Traffic filter..

Story
@vaibhavgupta shared a post, 3ย weeks, 1ย day ago

Awesome Shadcn Tooltip Components

Next.js React tailwindcss TypeScript

The blog introduces 7 reusable tooltip components built with shadcn/ui for React apps - focused on accessibility, customization, and real-world UI use cases.

Shadcn Tooltip Components