Using ChatGPT for Rest Endpoint Testing
Oct 18, 2023 | Artificial Intelligence, Testing
Today, UI test automation is one of the most popular topics encountered during test automation discussions. In order to accomplish any UI test automation task effectively, framework usage is strongly suggested. When building up a test automation framework, variety of models and tools can be used.
Running with Clogs in the Space
Dec 17, 2020 | SW Maintenance & Support
Nearly almost all organizations, even which use agile practices, get in a tizzy with legacy applications. As the time went by, based on outmoded architecture, those ones have been expected to do things beyond for what they were originally designed decades ago.
Redefining Perfection with Secure Software Development Approach
Sep 30, 2020 | Security
Making software security a focal point in the process of designing, developing and delivering software applications is crucial for the ultimate success of these applications. Developing party needs to create trust in the user regarding the protection of critical assets and operational reliability. Therefore, software security becomes a fundamental requirement of software applications. Many companies started to meet software security requirements in accordance with the secure software development framework it has developed, which consists of a rule set defined within the software and security teams. This rule set are defined taking into account various international standards and industry best practices.
A Couple of Tips For Software Quality
Sep 2, 2020 | Architecture
Mediocre-quality software is available anywhere and everywhere. We have all encountered it using our desktops, smart phones, running applications from the cloud, and suffered various amounts of pain both as user and developer. Dealing with software, I had done my share of losing and causing loss, and I had done it my way.
Io(M)T: An IoT submarket or harbinger of social injustice?
Jul 29, 2020 | Healthcare and Medical SW, IoT
While AI recently acts as a “silver surfer” in the hype cycles, IoT stands as its closest buddy all along its entourage. Almost every smart and connected mechanism, now, claims to bear the humble crown of an IoT item.
IS THE “SMART HOME” DEAD?
Jun 17, 2020 | IoT
Likely, most people who are interested in subjects within the scope of IoT have an awareness of its applications in Smart Home.
TO ERR IS HUMAN, TO ERR*ERR IS MACHINE
Apr 29, 2020 | IoT
Back in 1770s, when Wolfgang von Kempelen built the Mechanical Turk, he was too confident that it would beat the pit out of Maria Theresa in a chess match.
Operating System Customization for IoT: Yocto Project Overview
Mar 11, 2020 | IoT
Understanding the nature of a software is crucial for all sorts of practitioners in the field.
Wrapping a Solid Shell Around: Avoiding Software Becoming a Nightmare
Jan 22, 2020 | Architecture
Understanding the nature of a software is crucial for all sorts of practitioners in the field.
Ersatzgedankenexperiment: Brainstorming in a Rather Structured Manner
Oct 23, 2019 | General & Managerial
Gedankenexperiment (Gedankenerfahrung or thought experiment) is a way of thinking that maps a theory to possible causes and consequences (to shed light on these), when no clues or indicators are available to validate the theory.
ICT-TH 101: Introduction to Test Hackathon
Oct 17, 2019 | News & Events
We are all aware that, all around the world, to deliver successful projects it is important to have required technical competency, but it is also very important to build strong relationships between the teams.
Make Every Single Hour a Happy One: Tips to Survive Your Tasks
Jul 17, 2019 | General & Managerial
Lost yourself working on your tasks again? Have you just felt that you are having hard time breathing?
Understanding Cyber Kill Chain Model to Stop Advanced Persistent Threats
Jun 26, 2019 | Security
The term “Advanced Persistent Threat” (APT) was used to describe state-sponsored cyberattacks designed to steal data and exploit infrastructures. Today, the term is used to describe the attacks targeted at organizations for monetary gain or espionage.