7 Steps to Introduce Automation Testing in your Organization
Gone are the days when the average turnaround time for software delivery used to be anywhere around a year or even a year and half! Today, when technology is advancing…Read More
5 Crucial Guidelines You Should Always Remember When Scouting For An SEO Company
The current business scenario requires you to have more than just finances for you to be successful. You have probably seen how much money is put into an advertisement…
Read More
Writing an Effective Thank You Email
The Email Etiquette Series is all about writing emails that people love to read. So far, we have covered the common mistakes to avoid as well as the points to…Read More
10 Essential Hints for Python Programming Beginners
I trust that the initial phase of learning any programming language is ensuring that you understand how to learn. Figuring out how to learn is apparently the most basic expertise…Read More
The Benefits of Enterprise Search in Healthcare Industry
A unique search driven approach is what we need to improve the quality of healthcare and business performance of the healthcare industry. By analyzing the unstructured data in the Healthcare…Read More
An Introduction to Automation Testing
Automation testing has become a key part of software development process in most organizations across the globe today. There are several advantages of automation testing and it is experiencing rapid…Read More
TO vs CC vs BCC: How to Use Them Correctly
The Email Etiquette Series is all about writing emails that people love to read. So far, we have covered the common mistakes to avoid when writing professional emails as well…Read More
An App Entrepreneur? Get answers to the questions bugging you!
Even if your app idea is paramount, it really takes a lot more than just putting up your app in the play store to be successful. Though mobile apps…
Read More
Which Points to Focus On Writing a Business Email
The Email Etiquette Series is all about writing emails that people love to read. In the first post of the series, we had looked at the common mistakes to avoid…Read More
Common Mistakes to Avoid When Writing the Perfect Email
The Email Etiquette Series is all about writing emails that people love to read. As promised, we begin with the basics and then gradually move on to tackle emails with…Read More
Major Factors Affecting App Development Cost
With such a demanding and smartphone-centric world, having a business app is now a must. Most of your potential customers are way mobile these days and love to browse websites…Read More
The Email Etiquette Series: An Introduction
The advent and ever growing popularity of social media and messages has overshadowed the email when it comes to communication with your friends and family. However, when it comes…
Read More
What's 2018 Holding for Mobile App Development Market?
Today, the mobile app ecosystem is considered as one of the biggest technology markets. With more than 6 million mobile applications present in the App Store and Google Play…
Read More
GUI vs Usability Testing: Understanding the Difference
When you test your web application for potential bugs and issues, before you make it live, there is a list of testing types that need to be carried out. GUI…Read More
How Usability Tests Play a Crucial Role in Improving User Experience
Usability is one of the key aspects of web design that is often disregarded. Yet, ideally it should be considered way before even deciding which among the various software development…Read More
What makes Python the Most Powerful and Fastest Growing Language
If you look at the rankings of the most popular programming languages, Python is stably at the top positions and surpassed only by languages (Java, C, C ++) that have…
Read More
The Pragmatic Programmer: A Book Review
Why are you here? Well, for now, it’s not a spiritual question as to why we all are ‘here’ (which should be a constant question in your mind…
Read More
Limitations of Search Databases in Medical Literature
Given the exponential growth in medical literature, finding relevant information sooner is critical. Researchers, with more content and less time to analyse it, need systems that are smart and intelligent…
Read More
Meltdown and Spectre CPU Vulnerabilities and its Remediation
Researchers from Google and the research community have independently discovered one hardware vulnerability each, that focus on a flaw in the CPU. If this flaw is taken advantage of,…
Read More
An Intuitive Way to Search with Natural Language Processing (NLP)
We know that computers understand programming languages but how about making them understand human language, the language that you and me speak? Natural Language Processing (NLP) is a field…
Read More
Serverless Architecture Set to Redefine Business Computing
Serverless is a highly trending term in the world of software architecture right now and one can judge this from the many references of the term in journals, products, and…
Read More
9 Reasons Automation Testing is Key to Successful Software Development
How is automation testing different from manual testing? Well, while manual testing involves a person in front of a computer, executing each test step, automation testing involves using a program…
Read More
Web Application Security Guidelines: Protect your Application from Threats and Hacking
Research estimates that 75% of attacks against Web servers are entering through applications and not at the network level. And when a company makes even minor changes on its websites…
Read More
Gartner Predicts Growth in Investment in Information Security Services
Gartner has predicted that worldwide information security spending will witness a growth of 7% in 2017, with the total amount spent reaching close to $93 billion in 2018.
Read More
Automation Testing: Myths and Solutions
I have often observed that a lot of QA professionals get confused when it comes to what should be the automation coverage for an application.
Automation is meant to reduce cycle…Read More
10 tips that will help protect your system against Ransomware
A massive global ransomware attack has struck hospitals, companies and government offices around the world, seizing control of affected computers until the victims pay a ransom. Majority of the attacks…
Read More
Earned Value Analysis to Know Real Health and Performance of Your Project.
The Project/Program Managers usually evaluate the triple constraints i.e. Time, Scope and Cost. While evaluating this IRON TRIANGLE, they are trying to judge if the ongoing project…
Read More
Risk Based Testing - Know the right time to account it and implement it
It is real hard to comment at what point the testing should be denoted as enough testing. It’s even more difficult to predict that the product is defect free post…
Read More
4 important tips you will need to handle your new client better
It’s quite often that we all face a lot of challenges when getting on to the newer assignments and engagements while we work on any business streams. The challenges may…Read More
Automating tasks using Gulp
Gulp is a tool for task automation. Gulp helps in many automated tasks like parsing, watching files for changes, refreshing, bundling and minification, executing tests before build, checking against jslint,…Read More
Domain Capability Building on New Service Offering
Your sales team/management managed to win a project in a domain that is new to the organization. You have the technology resource who can implement and/or test the solution but…
Read More
Top 3 Email Goof Ups to Avoid
Over an informal morning coffee break with the team, we exchanged anecdotes on how people sometimes goof up simply by sending an email to a wrong recipient. This is what…
Read More
Key Features of an Effective Enterprise Search Platform
The unsurmountable amounts of unstructured data that organizations have to deal with today has given rise to the need for an effective enterprise search platform. An enterprise search tool…
Read More
Working with Enterprise Search Relevancy Challenges
When enterprise searches are built from scratch, evaluation of the search quality remains key challenges of organizations implementing it. It always gives a feel of living in the darkness all…
Read More
Building A Testing Center of Excellence
Most of the organizations make huge investments in their enterprise product development requirements and over a period of time end up having a huge inventory of scattered applications developed…
Read More
High Speed Ingestion into Solr with Custom Talend Component Developed by T/DG
In this blog I will explain how to use High Speed Talend-Solr Ingestion components, released by T/DG as open source, for ingesting documents into Solr and its benefit.
T/DG released 3…
Read More
Self-Hosting Web API 2 Using OWIN
OWIN stands for Open Web Interface for .NET . OWIN is an abstraction between .NET web servers and web applications. It decouples the application from the server, making it ideal…
Read More
SOLR Security with ManifoldCF
This article explains how to implement SOLR “document level security” using Manifold Connector Framework. ManifoldCF is an open source framework for pulling content out of a repository and sending it…Read More
Building Docker image with Solr
There are two ways to build docker image:Let’s take an example of creating…
Read More
Getting Started With Docker
According to the docker's website, "Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications."
In simple words, it's one of the methods to…