Next Generation of CI/CD

Does it really time to adopt new process of CI/CD? As we all know that today’s in Devops, Jenkins is most widely using in the organization. Basically, it make the entire process like Continuous Integration, Continuous Development, Continuous Deployment automated which help to release the product on target.  It looks like we are good with Read more…

SHARE THIS

Automation framework with Reflection API

Maintaining automation frameworks have always been aiding in maintaining quality software releases. We are quite aware of some of the types of automation frameworks such as Modular Testing Framework and Data-driven Framework. Irrespective of design pattern of our automation framework, maintenance of code has always been a challenge. In any automation framework, several calls to Read more…

SHARE THIS

Handling Large Responses In API

In today’s world there are many API testing clients like postman, restlet etc. in which we can manually verify the response as per its corresponding request. But as we all know each software has its own limitation, and in this article, I will let you know a few of them which I faced and the Read more…

SHARE THIS

Test Environment Management

Test Environment Management can be considered a part of software delivery process whose goal is to provide stable and usable environment where testers can run their scenarios and replicate bugs. It consists of multiple components like hardware, software, databases, middleware, applications and test data managed by tools, procedures and resources effectively. Test bed or test environment is Read more…

SHARE THIS

Robotic Process Automation

Robotic process automation is becoming prominent form of business process automation technology based on the concepts of artificial intelligence (AI) workers or software robots. It is a technology that allows a computer program to perform manual process done by a human being. Just like humans robots can perform the tasks like open an application , Read more…

SHARE THIS

Brute Force Attack

Brute force attack work like as a thought. Suppose if locks not open by single key then we try other different keys. Brute force attack also work on same concept. Brute force attacks are performed with a software which software create thousand’s combination of username passwords of number, alphabets, symbols, or according to parameters of Read more…

SHARE THIS

Kubernetes Elasticity

What is Kubernetes Elasticity? Horizontal Pod scaling UP/Down as well as Nodes scaling UP/Down when pods are requiring nodes at the time when user suddenly increase/decrease accessing your website.  So, nodes of kubernetes dynamically scaling up/down automatically is known as Kubernetes Elasticity. How It happens? It watches the pods continuously and if it finds that Read more…

SHARE THIS

Agile to Devops

Why so many companies are following Agile Model? In the past development companies use to flow waterfall model.  The Major drawback of using this model is you first define the outcome according to customer needs, and then the development process runs until a “finished” product is released. The biggest problem with this approach is that Read more…

SHARE THIS