QA Basics

, page 8 back to homepage

How spammers get your data from health and fitness apps?

Do you have a health and fitness application installed on your smartphone? Do you monitor your sleep cycles, count calories and track your activity using an application? Or do you

Read More

Forget the password? Then scan your finger

How do you unlock your smartphone? Do you enter the password or use fingerprint authentication? How do you confirm a transaction in your banking application? Do you enter a correct

Read More

Agile Testing: Crossing the T’s

In conditions of dynamic markets and fast-changing industries requirements, the release of new or updated software products should be rapid. Otherwise, a product will be presented to the end users

Read More

Cloud Testing: don’t let the cloud turn to ‘thunder’

Generating new traffic, providing new services to be sold, and increasing the profit, the cloud grows fast and requires new business models and coordinated the work of several players. In

Read More

How not to miss the last bug?

After product release, users find a serious bug despite much time and effort spent on coding and testing. How and why does this happen? Now we are going to find

Read More

Shift-right or shift-left? What testing to choose?

Are you sure that shift-left testing is a new approach? Actually, in 1950 IT specialists knew that testing performed at the very beginning of the project was more resultative. And

Read More

Positive UX – how to make wow effect simple

Do you return home if you forget your phone on a table? Can you live at least one day without any gadget or PC? According to the report made by

Read More

Can cyber security culture ensure hacker’s wipeout?

Recent successful cyber attacks force to change the attitude to cyber security culture that is closely connected with the company’s culture as well. Poor corporate culture evokes not only problems

Read More

Security Testing Tools You Need to Know

The statistics of cyber attacks of the recent years shows that hackers broke 1061 blogs and websites in 2015 and 1017 ones in 2016. But when your website is hacked,

Read More

Hacking: Pluses and Minuses

Nowadays hacking is rather popular. Some people are engaged in hacking activity because of personal illegal profit, using confidential or personal information for blackmailing or something like this. For others,

Read More

6 Effective Ways to Perform Regression Testing

After performing software testing, reporting bugs and their fix regression testing should be executed. Its aim is to find defects of the software after code modifications or the product release.

Read More