The Pragmatic Programmer: A Book Review

The Pragmatic Programmer: A Book Review

Why are you here? Well, for now, it’s not a spiritual question as to why we all are ‘here’ (which should be a constant question in your mind…

Read More

Limitations of Search Databases in Medical Literature

Limitations of Search Databases in Medical Literature

Given the exponential growth in medical literature, finding relevant information sooner is critical. Researchers, with more content and less time to analyse it, need systems that are smart and intelligent…

Read More

Meltdown and Spectre CPU Vulnerabilities and its Remediation

Meltdown and Spectre CPU Vulnerabilities and its Remediation

Researchers from Google and the research community have independently discovered one hardware vulnerability each, that focus on a flaw in the CPU. If this flaw is taken advantage of,…

Read More

An Intuitive Way to Search with Natural Language Processing (NLP)

An Intuitive Way to Search with Natural Language Processing (NLP)

We know that computers understand programming languages but how about making them understand human language, the language that you and me speak? Natural Language Processing (NLP) is a field…

Read More

Serverless Architecture Set to Redefine Business Computing

Serverless Architecture Set to Redefine Business Computing

Serverless is a highly trending term in the world of software architecture right now and one can judge this from the many references of the term in journals, products, and…

Read More

9 Reasons Automation Testing is Key to Successful Software Development

9 Reasons Automation Testing is Key to Successful Software Development

How is automation testing different from manual testing? Well, while manual testing involves a person in front of a computer, executing each test step, automation testing involves using a program…

Read More

Web Application Security Guidelines: Protect your Application from Threats and Hacking

Web Application Security Guidelines: Protect your Application from Threats and Hacking

Research estimates that 75% of attacks against Web servers are entering through applications and not at the network level. And when a company makes even minor changes on its websites…

Read More

Gartner Predicts Growth in Investment in Information Security Services

Gartner Predicts Growth in Investment in Information Security Services

Gartner has predicted that worldwide information security spending will witness a growth of 7% in 2017, with the total amount spent reaching close to $93 billion in 2018.


This indicates that…

Read More

Automation Testing: Myths and Solutions

Automation Testing: Myths and Solutions

I have often observed that a lot of QA professionals get confused when it comes to what should be the automation coverage for an application. 

Automation is meant to reduce cycle…

Read More

10 tips that will help protect your system against Ransomware

10 tips that will help protect your system against Ransomware

A massive global ransomware attack has struck hospitals, companies and government offices around the world, seizing control of affected computers until the victims pay a ransom. Majority of the attacks…

Read More

Earned Value Analysis to Know Real Health and Performance of Your Project.

The Project/Program Managers usually evaluate the triple constraints i.e. Time, Scope and Cost. While evaluating this IRON TRIANGLE, they are trying to judge if the ongoing project…

Read More

Risk Based Testing - Know the right time to account it and implement it

Risk Based Testing - Know the right time to account it and implement it

It is real hard to comment at what point the testing should be denoted as enough testing. It’s even more difficult to predict that the product is defect free post…

Read More

4 important tips you will need to handle your new client better

4 important tips you will need to handle your new client better

It’s quite often that we all face a lot of challenges when getting on to the newer assignments and engagements while we work on any business streams. The challenges may…

Read More

Automating tasks using Gulp

Automating tasks using Gulp

Gulp is a tool for task automation. Gulp helps in many automated tasks like parsing, watching files for changes, refreshing, bundling and minification, executing tests before build, checking against jslint,…

Read More

Domain Capability Building on New Service Offering

Domain Capability Building on New Service Offering

Your sales team/management managed to win a project in a domain that is new to the organization. You have the technology resource who can implement and/or test the solution but…

Read More

Top 3 Email Goof Ups to Avoid

Top 3 Email Goof Ups to Avoid

Over an informal morning coffee break with the team, we exchanged anecdotes on how people sometimes goof up simply by sending an email to a wrong recipient. This is what…

Read More

Working with Enterprise Search Relevancy Challenges

When enterprise searches are built from scratch, evaluation of the search quality remains key challenges of organizations implementing it. It always gives a feel of living in the darkness all…

Read More

Building A Testing Center of Excellence

Building A Testing Center of Excellence

Most of the organizations make huge investments in their enterprise product development requirements and over a period of time end up having a huge inventory of scattered applications developed…

Read More

High Speed Ingestion into Solr with Custom Talend Component Developed by T/DG

In this blog I will explain how to use High Speed Talend-Solr Ingestion components, released by T/DG as open source, for ingesting documents into Solr and its benefit. 


T/DG released 3…

Read More

Self-Hosting Web API 2 Using OWIN

OWIN stands for Open Web Interface for .NET . OWIN is an abstraction between .NET web servers and web applications. It decouples the application from the server, making it ideal…

Read More

SOLR Security with ManifoldCF

SOLR Security with ManifoldCF

This article explains how to implement SOLR “document level security” using Manifold Connector Framework. ManifoldCF is an open source framework for pulling content out of a repository and sending it…

Read More

Building Docker image with Solr

Building Docker image with Solr

There are two ways to build docker image:


Running an image, modifying and committing it. This requires to access live container.Using Dockerfile and build it.

Let’s take an example of creating…

Read More

Getting Started With Docker

Getting Started With Docker

According to the docker's website, "Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications."

In simple words, it's one of the methods to…

Read More

Execute JavaScript Using Selenium WebDriver

Execute JavaScript Using Selenium WebDriver

Selenium is one of the most popular and easy automated testing suites. Selenium is designed in a way to support and encourage automation testing of functional aspects of web based…

Read More

Build Operate Transfer Systems and Applications - Lean Style

Build Operate Transfer Models are in existence for many years. With recent trends in Agile and Scrum development, it is observed that there is again a need for resources to…

Read More

Neo Load Performance testing Tool

Overview:  Neo Load Performance testing

Neo Load is a load and stress testing tool to measure the performance of web and mobile applications
A load testing tool by Neotys.
A tool that measures performance and behaviour of the…

Read More

Using Controller-as-a syntax and why it’s important

What is “controller as a” syntax ?

It’s a new way of defining your controller. Instead of using $scope, we can use the ‘this‘ in its place.This helps with the architecture of…

Read More

What is Cloud Computing? Things you Need to Know About the Cloud, Explained

Cloud computing received significant attention recently as it changes the way computation and services to customers. Cloud computing not only brings new business opportunities but also causes some major impacts…

Read More

Understanding and Configuring Solr's PingRequestHandler

In this blog, we'll talk about simple yet very useful Solr handler which is PingRequestHandler. We can use Ping Request Handler…

Read More

Open NLP Name Finder Model Training

Named Entity Recognition The Name Finder is used to detect entities like a person, location, date, money, organization time and date in the text. These entities are detected using trained model.…

Read More

Google Analytics Vs Adobe Analytics

Google Analytics Vs Adobe Analytics

Google Analytics and Adobe Analytics both are web analytics services used in the measurement, collection, analysis and reporting of web data for purposes of understanding and optimizing web usage. However,…

Read More

Testing with Jasmine + Karma

Testing with Jasmine + Karma

The Setup

AngularJS has many testing frameworks that can be used such as qunit, mocha, protractor, and so on. This particular blog post will be using Jasmine. Jasmine is behavior-driven development framework for…

Read More

 Restriction and Transclusion Properties Of AngularJS Directives

Restriction and Transclusion Properties Of AngularJS Directives

Restriction and Transclusion are the properties of AngularJS directives. Restriction property is used to defined the use of directives where as Transclusion property is used to define the place for external…

Read More

Locator Strategies in Selenium WebDriver : CSS selectors

Selenium Locators: Locate element by CSS selector using html tag attributes

This a fall back when all options fail, you can use parent child relation in tags, in case you…

Read More

What's new in C# 6. 0

What's new in C# 6. 0

What’s new in C# 6.0

In this article, I am going to talk about new language feature of C# 6.0. I am personally like these features a lot…

Read More

Understanding Filters in ASP. Net MVC

Filters in ASP.net MVC

Filters are interesting and somewhat unique part of ASP.net MVC. Filters are designed to inject logic in between MVC request life cycle events. Filters provide developers with powerful…

Read More

Introduction to OrientDB

Background


Recently I started looking into OrientDB for one the use case at TDG where we were evaluating which NOSQL database to go for. As I came across OrientDB & learned…

Read More

Locator Strategies in Selenium WebDriver

Introduction

Now a days Selenium is vastly used as web automation tool across industry. It has its own advantages whether it might be an open source tool or freedom…

Read More

Getting started with Apache Cordova

Building cross platform Mobile Applications using Apache Cordova – Part 1

Apache Cordova is an open source platform for building cross platform mobile applications that runs on several mobile devices…

Read More

Stanford Temporal Tagger: SUTime for JAVA

SUTIME, is a temporal tagger for recognizing and normalizing temporal expressions in English text. SUTIME is used to annotate documents with temporal information. It is a deterministic rule-based system.


The extraction…

Read More