A threat is anything – amalicious external attacker, an internal user, a system instability, etc., that may harm the assets owned by an application (resources of value, such as the…

A threat is anything – amalicious external attacker, an internal user, a system instability, etc., that may harm the assets owned by an application (resources of value, such as the…
The recent security breach of Yahoo user accounts have created ripples globally. Besides being the largest breach in the history of the Internet, (it affected 1 billion accounts), the security…
Bright, When Dark…. Nobody Home?!… These are neither titles of any upcoming Hollywood blockbuster nor are they names of any book. They are names of smart apps (intelligent apps), though!…
Azure App Service In May 2016, Microsoft announced that the Azure Mobile Services suite, its initial solution for building mobile applications on Azure, would be discontinued beginning that December. Launched…
What Is Microsoft Azure? Azure is a cloud computing platform launched by Microsoft in 2010 for building, hosting and scaling applications. Azure provides Platform as a Service (PaaS) capabilities that…
Keyword Driven Testing is one of the simplest yet powerful testing methodologies, available both for manual and automated testing of applications. The concept behind keyword driven testing is to simulate…
Systems and networks get hacked all the time. Even despite being compliant or supposedly “secure”, they do. For one thing, contrary to popular belief, being compliant does not mean that…
Abstract As software development teams and testers diverge for greater speed and efficiency, there has been a increasing need for stable and streamlined test automation frameworks. This brief examines three…
Going digital in business is now the norm of the day with lean (and successful) startups leading the way, and conventional brick-and-mortar stores jumping on the bandwagon. Every decent business…
Enterprise level mobility is now achievable with great Smartphone penetration along with powerful devices and better mobile data connectivity. Organizations that harness mobility get an advantage over competitors in terms…
Data is the most precious asset for most of the businesses and a critical asset for technology driven enterprises. New technological inventions have been significantly affecting the ways by which…