Blog

, page 13 back to homepage

Where are VCD (Voice Control Devices) used?

Voice control over devices is not the science fiction anymore. The voice-user interface (VUI) gives the possibility to interact with devices via voice/speech platforms. This interaction results in the automation

Read More

VoIP Messengers: Possible Challenges and Their Solutions

Voice over Internet Protocol (VoIP or IP telephony) is a popular and widespread technology of delivering voice and multimedia over IP networks. Everyone used or at least heard of such

Read More

How to Deliver High-Quality Apps for Logistics?

Note: the article was updated in October 2020. Success in the logistics industry nowadays is heavily dependent upon digital transformation. The IoT, AI, blockchain, automation, and cloud storage have been the

Read More

8 Most Famous Internet Viruses

The history of computer worms and malware began in 1983 when an American scientist Fred Cohen first introduced a term “computer virus”. He developed a software able to infect machines,

Read More

Overview of M-Commerce Market

Mobile commerce or m-commerce is not a brand new trend anymore. Some people consider that its era is over and this exhausted market will not offer anything new. I belong

Read More

Types of Localization Bugs with Examples

Localization testing is an important part of a development lifecycle of the application, which is designed for the international market. It checks whether the software is adjusted to meet lingual,

Read More

Mobile market overview: device, OS, apps

Can you image at least one day without your smartphone? It’s quite difficult, isn’t it? Nowadays people cannot imagine their lives without different mobile devices that can fully substitute a

Read More

You don’t need software testing, do you?

Why verify the software quality? Why do you have an in-house QA team or apply for independent testing services? Why are there so many providers of QA and testing services?

Read More

Penetration Testing: zero in on security

Penetration testing or pentesting evaluates security system of a ready software. Its main goal is to detect potential vulnerabilities by simulating malicious attacks. Pentesting helps to improve software security basing

Read More

Performance Testing: how to detect system bottlenecks

The main aim of performance testing is to detect performance bottlenecks that can cause negative user experience and even software fail. The most common system bottlenecks are slow response time,

Read More

Data Breaches: why to watch your back

In 2018, cybersecurity still remains a stumbling rock. Last year showed that hackers’ attacks became more sophisticated. In comparison to 2016, the number of data breaches in 2017 was 44.7%

Read More