Software Testing Articles, Blog Posts, Books, Podcasts and Quotes

Test Automation Framework for Testing Your UI with Java

January 27, 2023 0

Previously, I have written an article about testing API services with Java. I think that it would be a nice idea to write an article about more general test framework, which will contain parts for testing Web UI, be capable to interact with DB and has logging and advanced reporting.

Which Tools Are The Best for API Test Automation?

January 9, 2023 0

Head to any site in which testers and developers are seeking help on their testing, and you’ll see questions on which tools individuals should adopt, learn and use. For example, I recently read a question from one person who wanted to know whether they should learn about Postman or RestAssured for API automation.

How to Prevent Reliably Damages from Cyberattacks

October 31, 2022 0

As soon as your application is linked to a network, it will become the target of cyberattacks by hackers. This article explains how to mitigate the effects of cyberattacks and how to prevent them with security testing practices.

Main Roles and Responsibilities Within the QA Team

September 12, 2022 0

Performing the software testing activities requires different skills and in larger organizations, members of a software quality assurance (QA) teams will be specialists in certain domains. This article discusses the different roles of members of a software QA team.

Spike Testing vs Performance and Load Testing

August 30, 2022 0

If you ask two software testers, you will get three different definitions for each software testing term. This article discusses spike testing and how this type of testing relates to performance and load testing.

How to Test Cloud Database Software

August 15, 2022 0

Database testing is done to check the integrity of a database by finding and fixing its vulnerabilities. Without this process, the system might become unstable. Some or all of the stored information in the Cloud database may be rendered useless or worse, might become accessible by unauthorized personnel.

1 2 3 73