Systems | Development | Analytics | API | Testing

Latest Posts

Tricentis partners with Oracle to offer best-in-class quality assurance tools to Oracle customers

We have great news for Oracle customers. With companies under pressure to increase the pace of innovation while managing costs, the right quality assurance strategy can be a competitive differentiator. To help you achieve this advantage, Tricentis and Oracle are partnering to bring you AI-powered testing solutions that will accelerate and de-risk your entire Oracle modernization journey. Tricentis now supports Oracle Cloud Infrastructure capabilities and is available on Oracle Cloud Marketplace.

Functional and Non Functional Software QA Testing

When it comes to QA Testing Software, there are two main categories: functional testing and non-functional testing. Both have their advantages and are constrained in their own ways. As we have explained in different occasions, the Quality Assurance Testing is carried out in a manner chosen by the user but remember that by using functional testing, you can see what the process is doing and how the system responds to different inputs.

Not All MFA is Created Equal, Especially in CIAM

Since October is cybersecurity awareness month, it’s a great time to revisit the question of what are the best ways to secure user authentication in CIAM. In many industries (finance and healthcare, to name a few), regulations require the use of multifactor authentication (MFA) to protect access to sensitive data and transactions.

Software Release Checklist For Applications: Things to include

Designing software is no easy feat, so it’s disheartening that the final product is full of bugs. This means that you must redo all the previous work, and everyone on the development and testing teams has to start from scratch. Every piece of software now necessitates updates and enhancements depending on user feedback. However, for optimum functionality, each version should be thoroughly tested.

What is continuous deployment?

After working on a new feature or an improvement, it's normal that you want to deliver these changes to your users as fast as possible. Depending on your deployment pipeline, confidently deploying changes to production might include coordinating with whoever is leading on-call, getting their approval, manually deploying your changes, spending hours to monitor how it goes, and performing a rollback in case something goes wrong.

Deep Cloning in JavaScript

Javascript is the basis of today’s modern web technology and plays a pivotal role in providing effective functionalities to websites and web applications. One of the essential elements that power its capability to include complex functionalities is objects in Javascript. From performing as a holy grail that aids developers in creating complex data structures to storing multiple properties an object in JS can serve multiple purposes at once.

6 Best Data Extraction Tools for 2022 (Pros, Cons, Best for)

A data extraction tool can help you speed up one of the most error-prone engineering processes: collecting raw data from different sources. In this article, we are going to analyze the following 6 market leaders in data extraction: Before we dive in, let’s look at all the problems you can avoid by implementing a data extraction tool.

Data Science Maturity and Understanding Data Architecture/Warehousing

This is a guest post for Integrate.io written by Bill Inmon, an American computer scientist recognized as the "father of the data warehouse." Inmon wrote the first book and magazine column about data warehousing, held the first conference about this topic, and was the first person to teach data warehousing classes. Data science is immature. This statement is not pejorative; it is simply a statement of historical fact. As such, it is not arguable.

Protect Your Assets and Your Reputation in the Cloud

A recent headline in Wired magazine read “Uber Hack’s Devastation Is Just Starting to Reveal Itself.” There is no corporation that wants that headline and the reputational damage and financial loss it may cause. In the case of Uber it was a relatively simple attack using an approach called Multi Factor Authentication (MFA) fatigue. This is when an attacker takes advantage of authentication systems that require account owners to approve a log in.