White Paper
Wi-Fi Hacking via Drones
Drones were invented to render support to military operations. Constant innovation and development have made drone technology more efficient and affordable. With cybersecurity threats looming
Load Testing Tools – Open Source or Commercial – Which One to Choose?
You may wonder if there is a silver bullet answer to this question. Not really. There isn’t a one size fits all. The choice of
Jailbreak Detection Bypass in Mobile Apps
Ethical by passes and hacking become necessary in Security Testing. As an organisation that takes on several security testing projects, we are always invested in
Continuous Performance Testing
We have all heard of Continuous Testing. What about Continuous Performance Testing (CPT) though? Yes indeed – this is certainly possible and immensely valuable when
Is Conscious Quality Achievable in a Collaborative World
Is independent quality assurance is still required and doable and if so how can this be done while still upholding the need to collaborate? The
Reverse Engineering an Android Application
Looking to take up security testing of an Android application? Why not go the full extent and reverse engineer the application, too, in the process?
Priority based execution in TestNG
Here’s a short read on what it takes to implementing priority-based test case execution in TestNG.
Moving to the cloud
Have you planned your test efforts adequately? – While cloud migrations are continuing to rise, the quality of such migrations is still in question. This
ETL Testing Strategies
It is all about data now. However, there is a lot of misconception in terms such as database, data warehouse, business intelligence, big data etc.