Blog

, page 7 back to homepage

8 Most Famous Internet Viruses

The history of computer worms and malware began in 1983 when an American scientist Fred Cohen first introduced a term “computer virus”. He developed a software able to infect machines,

Read More

Overview of M-Commerce Market

Mobile commerce or m-commerce is not a brand new trend anymore. Some people consider that its era is over and this exhausted market will not offer anything new. I belong

Read More

Types of Localization Bugs with Examples

Localization testing is an important part of a development lifecycle of the application, which is designed for the international market. It checks whether the software is adjusted to meet lingual,

Read More

When say “no” to automated testing?

Despite providing a number of advantages, automation of software testing applied to the “improper” project may cause a failure of software release. To avoid such a scenario, you should know

Read More

Penetration Testing: zero in on security

Penetration testing or pentesting evaluates security system of a ready software. Its main goal is to detect potential vulnerabilities by simulating malicious attacks. Pentesting helps to improve software security basing

Read More

How to automate web testing with manual QA team?

Automation helps to accelerate testing activities, to ensure wider test coverage and to improve quality of the final product. You can apply automation principle to verify mobile and web software.

Read More

Performance Testing: how to detect system bottlenecks

The main aim of performance testing is to detect performance bottlenecks that can cause negative user experience and even software fail. The most common system bottlenecks are slow response time,

Read More

Test Automation in Agile Environment

According to Agile methodology, all processes should be fast and iterative, and test automation solves this problem. The implementation of continuous integration ensures quick turnarounds. The execution of the test

Read More

Data Breaches: why to watch your back

In 2018, cybersecurity still remains a stumbling rock. Last year showed that hackers’ attacks became more sophisticated. In comparison to 2016, the number of data breaches in 2017 was 44.7%

Read More

Top Test Automation Tools to Choose

Note: the article was updated in Noveber 2018. Development of own framework for test automation can be rather a challenging task. But, fortunately, there is a number of tools and

Read More

How spammers get your data from health and fitness apps?

Do you have a health and fitness application installed on your smartphone? Do you monitor your sleep cycles, count calories and track your activity using an application? Or do you

Read More