Serverless Architecture Set to Redefine Business Computing
Serverless is a highly trending term in the world of software architecture right now and one can judge this from the many references of the term in journals, products, and…
Read More
9 Reasons Automation Testing is Key to Successful Software Development
How is automation testing different from manual testing? Well, while manual testing involves a person in front of a computer, executing each test step, automation testing involves using a program…
Read More
Web Application Security Guidelines: Protect your Application from Threats and Hacking
Research estimates that 75% of attacks against Web servers are entering through applications and not at the network level. And when a company makes even minor changes on its websites…
Read More
Gartner Predicts Growth in Investment in Information Security Services
Gartner has predicted that worldwide information security spending will witness a growth of 7% in 2017, with the total amount spent reaching close to $93 billion in 2018.
Read More
Automation Testing: Myths and Solutions
I have often observed that a lot of QA professionals get confused when it comes to what should be the automation coverage for an application.
Automation is meant to reduce cycle…Read More
10 tips that will help protect your system against Ransomware
A massive global ransomware attack has struck hospitals, companies and government offices around the world, seizing control of affected computers until the victims pay a ransom. Majority of the attacks…
Read More
Earned Value Analysis to Know Real Health and Performance of Your Project.
The Project/Program Managers usually evaluate the triple constraints i.e. Time, Scope and Cost. While evaluating this IRON TRIANGLE, they are trying to judge if the ongoing project…
Read More
Risk Based Testing - Know the right time to account it and implement it
It is real hard to comment at what point the testing should be denoted as enough testing. It’s even more difficult to predict that the product is defect free post…
Read More
4 important tips you will need to handle your new client better
It’s quite often that we all face a lot of challenges when getting on to the newer assignments and engagements while we work on any business streams. The challenges may…Read More
Automating tasks using Gulp
Gulp is a tool for task automation. Gulp helps in many automated tasks like parsing, watching files for changes, refreshing, bundling and minification, executing tests before build, checking against jslint,…Read More
Domain Capability Building on New Service Offering
Your sales team/management managed to win a project in a domain that is new to the organization. You have the technology resource who can implement and/or test the solution but…
Read More
Top 3 Email Goof Ups to Avoid
Over an informal morning coffee break with the team, we exchanged anecdotes on how people sometimes goof up simply by sending an email to a wrong recipient. This is what…
Read More
Key Features of an Effective Enterprise Search Platform
The unsurmountable amounts of unstructured data that organizations have to deal with today has given rise to the need for an effective enterprise search platform. An enterprise search tool…
Read More
Working with Enterprise Search Relevancy Challenges
When enterprise searches are built from scratch, evaluation of the search quality remains key challenges of organizations implementing it. It always gives a feel of living in the darkness all…
Read More
Building A Testing Center of Excellence
Most of the organizations make huge investments in their enterprise product development requirements and over a period of time end up having a huge inventory of scattered applications developed…
Read More
High Speed Ingestion into Solr with Custom Talend Component Developed by T/DG
In this blog I will explain how to use High Speed Talend-Solr Ingestion components, released by T/DG as open source, for ingesting documents into Solr and its benefit.
T/DG released 3…
Read More
Self-Hosting Web API 2 Using OWIN
OWIN stands for Open Web Interface for .NET . OWIN is an abstraction between .NET web servers and web applications. It decouples the application from the server, making it ideal…
Read More
SOLR Security with ManifoldCF
This article explains how to implement SOLR “document level security” using Manifold Connector Framework. ManifoldCF is an open source framework for pulling content out of a repository and sending it…Read More
Building Docker image with Solr
There are two ways to build docker image:Let’s take an example of creating…
Read More
Getting Started With Docker
According to the docker's website, "Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications."
In simple words, it's one of the methods to…
Read More
Execute JavaScript Using Selenium WebDriver
Selenium is one of the most popular and easy automated testing suites. Selenium is designed in a way to support and encourage automation testing of functional aspects of web based…
Read More
Build Operate Transfer Systems and Applications - Lean Style
Build Operate Transfer Models are in existence for many years. With recent trends in Agile and Scrum development, it is observed that there is again a need for resources to…
Read More
Neo Load Performance testing Tool
Overview: Neo Load Performance testingNeo Load is a load and stress testing tool to measure the performance of web and mobile applications
A load testing tool by Neotys.
A tool that measures performance and behaviour of the…
Read More
Using Controller-as-a syntax and why it’s important
What is “controller as a” syntax ?
It’s a new way of defining your controller. Instead of using $scope, we can use the ‘this‘ in its place.This helps with the architecture of…
Read More
What is Cloud Computing? Things you Need to Know About the Cloud, Explained
Cloud computing received significant attention recently as it changes the way computation and services to customers. Cloud computing not only brings new business opportunities but also causes some major impacts…
Read More
Understanding and Configuring Solr's PingRequestHandler
In this blog, we'll talk about simple yet very useful Solr handler which is PingRequestHandler. We can use Ping Request Handler…
Read More
Open NLP Name Finder Model Training
Named Entity Recognition The Name Finder is used to detect entities like a person, location, date, money, organization time and date in the text. These entities are detected using trained model.…Read More
Google Analytics Vs Adobe Analytics
Google Analytics and Adobe Analytics both are web analytics services used in the measurement, collection, analysis and reporting of web data for purposes of understanding and optimizing web usage. However,…
Read More
Testing with Jasmine + Karma
The Setup
AngularJS has many testing frameworks that can be used such as qunit, mocha, protractor, and so on. This particular blog post will be using Jasmine. Jasmine is behavior-driven development framework for…
Read More
Restriction and Transclusion Properties Of AngularJS Directives
Restriction and Transclusion are the properties of AngularJS directives. Restriction property is used to defined the use of directives where as Transclusion property is used to define the place for external…Read More
Locator Strategies in Selenium WebDriver : CSS selectors
Selenium Locators: Locate element by CSS selector using html tag attributes
This a fall back when all options fail, you can use parent child relation in tags, in case you…
Read More
What's new in C# 6. 0
What’s new in C# 6.0
In this article, I am going to talk about new language feature of C# 6.0. I am personally like these features a lot…
Read More
Understanding Filters in ASP. Net MVC
Filters in ASP.net MVC
Filters are interesting and somewhat unique part of ASP.net MVC. Filters are designed to inject logic in between MVC request life cycle events. Filters provide developers with powerful…
Read More
Introduction to OrientDB
Background
Recently I started looking into OrientDB for one the use case at TDG where we were evaluating which NOSQL database to go for. As I came across OrientDB & learned…
Read More
Locator Strategies in Selenium WebDriver
Introduction
Now a days Selenium is vastly used as web automation tool across industry. It has its own advantages whether it might be an open source tool or freedom…
Read More
Getting started with Apache Cordova
Building cross platform Mobile Applications using Apache Cordova – Part 1
Apache Cordova is an open source platform for building cross platform mobile applications that runs on several mobile devices…
Read More
Stanford Temporal Tagger: SUTime for JAVA
SUTIME, is a temporal tagger for recognizing and normalizing temporal expressions in English text. SUTIME is used to annotate documents with temporal information. It is a deterministic rule-based system.
The extraction…
Read More
Overloading Packages, Functions & Procedures
Introduction:
One of the most powerful aspects of the package is the ability to overload program units. When you overload, you define more than one program with the same name.…
Read More
Introduction to Solr Analytics
Introduction:
The Analytics topic has been so popular these days, that its capabilities are being expected from every other Big Data / Search platforms such as Hadoop, Spark, Cassandra, Elastic, Solr. Solr a…
Read More
Solr LocalParams and Security
Local Parameters are often called as LocalParams. Using this we can “localize” information about an argument that is being sent to Solr through Solr query. its another way of adding…