Blog

, page 9 back to homepage

Soak Testing 101: The Basics

Note: the article was updated in July 2020. The last thing you expect from a recently deployed application is its instant crash or an abrupt slowdown in the operational flow.

Read More

What Is WPA (Wi-Fi Protected Access)?

Wireless networking has become very popular and many people were and still are not interested in the way the data is sent through the air and how this information can

Read More

Unit vs Integration vs Functional Testing

There are various types of software testing and the QA specialists should be aware of their specific features and different peculiarities. If the test is engaged in mobile testing, then

Read More

Briefly about System Testing

The procedure of system checking is connected with unit, integration and acceptance testing. System testing is conducted in order to check functional and nonfunctional requirements to the system as a unique

Read More

What Are the Requirements for Video Game Tester?

Nowadays the game industry is very popular. New versions of different games and new innovative games are released rather often. There are a lot of gamers not only among the

Read More

Security Testing Tools

Nowadays, security of personal and corporate data plays an important role. And a huge attention is paid to thorough penetration testing, security testing, access control testing, etc. To check whether

Read More

Types of Regression Testing

Note: this article was updated in December 2019. Regression testing is a type of activity designed to verify changes made to an application or environment, for example: after defect fixing,

Read More

Smoke Testing vs Sanity Testing

Sanity testing is conducted after a build with fixed bugs and modified code is received. Its aim is to make sure that the functionality operates properly. This software testing type

Read More

Security Testing Myths

For various specialists, the notion ‘security’ has different meaning and includes diverse concept. In general, security means the combination of specific means that protect the product from malicious attacks and

Read More

Game Development Roles

The procedure of game creation is rather complex and it requires the participation of various specialists who fulfill certain tasks and perform a specified scope of work. Only effective and

Read More

5 Open-Source Mobile App Security Testing Tools

To secure mobile applications from various attacks is not a simple task. Modern programs and apps pass thorough security testing in order to define the weak point of the system.

Read More