NashTech Insights

Quality Assurance

Posts by categories

Posts by tags

Performance Engineering for Web Applications: Enhancing User Satisfaction

Introduction In today’s digital age, user satisfaction is paramount for the success of any web application. Users have high expectations when it comes to the performance of web applications, and even a minor delay or glitch can lead to frustration and abandonment. This is where performance engineering comes into play – a holistic approach to …

Performance Engineering for Web Applications: Enhancing User Satisfaction Read More »

INTRODUCTION TO GREAT EXPECTATIONS

Hi folks,In this blog, we will learn about Great Expectations, the benefits & limitations of Great Expectations, and its key features. What is Great Expectations? Great Expectations (GX) is a helpful tool that is used for documenting, validating, and profiling the data to maintain quality and improve communication between teams. It is an open-source tool …

INTRODUCTION TO GREAT EXPECTATIONS Read More »

Measuring Performance Metrics in Distributed Testing: Key Indicators to Track

Hello Folks,Distributed testing is an integral part of software development and quality assurance processes. As applications and systems become complex day by day, ensuring they can withstand the load and perform optimally under various conditions is of paramount importance. Distributed testing facilitates the simulation of real-world scenarios by distributing the testing load across multiple machines …

Measuring Performance Metrics in Distributed Testing: Key Indicators to Track Read More »

Cross-Site Scripting (XSS): What Is It And How To Prevent It

In today’s digital landscape, safeguarding sensitive data is paramount as its mishandling can result in disastrous consequences. As technology continues to advance, preventing such calamities becomes increasingly crucial. Conducting security assessments on your web application can help identify vulnerabilities, ensuring the protection of your data against potential attackers when it’s in production. One of the …

Cross-Site Scripting (XSS): What Is It And How To Prevent It Read More »

Getting Started with Visual AI Test Automation: Implementing a Plug and Play Framework

Nowadays, a remarkable technology is gaining traction in the field of test automation. In this blog, we are going to explore this skyrocketing technology known as Visual AI. We are going to delve deep into its impact and why it is going mainstream in the current scenario. Why Visual AI and What Is Its Purpose? …

Getting Started with Visual AI Test Automation: Implementing a Plug and Play Framework Read More »

Great Expectations – Profile your data and check your data quality

Great Expectations (GX) is a powerful open-source tool for data validation and profiling, offering engineers a framework to maintain data quality. Setting expectations or rules helps to spot issues and ensure that your data meets predefined criteria. With its flexibility and integration capabilities, Great Expectations is a valuable asset for enhancing data reliability and decision-making …

Great Expectations – Profile your data and check your data quality Read More »

How To Test Web Applications Against SQL Injection

Every application nowadays has some form of sensitive data that needs to be protected. Such data in the wrong hands can lead to catastrophic failures. Avoiding such failures is extremely important with the advancement in technology. Security testing can be performed on your web application to find security gaps so that your data is safe in production …

How To Test Web Applications Against SQL Injection Read More »

artificial intelligence, hand, brain-8116655.jpg

Chaos Engineering

We used to ask each other: “What happen if somebody just went and kicked over a rack or unplugged something or somebody didn’t update assert, how would our application respond?” when we deployed an application on the Internet and could not get a concise answer. We just hoped that everything would be fine, there would …

Chaos Engineering Read More »

Designing testcases for security testing

Introduction Security testing, which aims to find flaws and vulnerabilities in an application’s infrastructure, codebase, and interactions, is an essential step in the software development process. Designing testcases for security testing is a crucial aspect of this process. This involves creating test cases that simulate various attack scenarios and vulnerabilities, allowing for a comprehensive assessment …

Designing testcases for security testing Read More »

Common Security Vulnerabilities And How To Detect Them

Every application nowadays has some form of sensitive data that needs to be protected. Such data in the wrong hands can lead to catastrophic failures. Avoiding such failures is extremely important with the advancement in technology. Security testing can be performed on your web application to find security gaps so that your data is safe …

Common Security Vulnerabilities And How To Detect Them Read More »

SELENIUM GRID WITH CONTINUOUS INTEGRATION

Hello readers, today we will learn about how to integrate a selenium grid with continuous integration for this blog we are going to take Jenkins in our scope. What is Continuous Integration Continuous Integration (CI) is a software development practice that involves automatically and regularly integrating code changes from multiple developers into a shared repository. …

SELENIUM GRID WITH CONTINUOUS INTEGRATION Read More »

OWASP Top 10 Vulnerabilities : What You Need To Know

Security testing is becoming increasingly important nowadays with the advancement in technology. It is imperative to protect sensitive data so that it does not fall into the wrong hands. However, to safeguard such data, an application must have robust system and security measures. If security for your application is weak, an attacker can breach and …

OWASP Top 10 Vulnerabilities : What You Need To Know Read More »