Can I see some ID, please? Access Management with Open ID Connect
We’ve previously addressed how OAuth is a critical component of API Security for modern applications because it provides a means for end users (a.k.a. resource owners) to authorize application access to personal resources. Even though…
Zirous Announces Tealium Partnership
(DES MOINES, IA. May 26, 2020) – Zirous, an IT consulting firm headquartered in Des Moines, today announced it has become a Tealium-certified partner. Tealium is a software as a service (SaaS) platform that helps…
How To Build a Martech Stack and Create Synergy Within Your Marketing Toolkit
The “State” of Stateful Kafka Operations
Apache Kafka has recently released version 2.5, which has brought its share of exciting new changes to the Kafka Streams DSL. A great time to look at our architectures, and determine how they can be…
Utilizing Machine Learning to Get the Best out of 2020
Anyone Can Gain an Advantage Using Machine Learning Machine Learning Among the Big Names As I sit in isolation, I try to find ways to ease my boredom. I check my phone and browse…
Access Management Isn’t Just for Web Applications — It’s for APIs, Too!
As more businesses enrich their user experiences for mobile devices and client-side browser technologies, they are forced to create publicly accessible APIs. So often, those APIs read and modify sensitive customer data, making them just…
End-to-End Testing with Cucumber and Selenium WebDriver
Introduction and Overview In custom software development, it’s not uncommon for companies to deprioritize automated end-to-end (E2E) testing1 in order to get to the desired solution as quickly as possible and for as little cost…
Benefits of Business Intelligence Tools: What You Get For Your Dollar
Return on investment (ROI) is important in any tool, and business intelligence (BI) tools are no exception. If anything, showing the cold hard numbers is even more critical for a visualization tool since the true…