Web Service Testing for the New Digital Age

Size: px
Start display at page:

Download "Web Service Testing for the New Digital Age"

Transcription

1 Web Service Testing for the New Digital Age Harish Auradkar Sr Quality Engineer Deepti Hippargi Sr Software Engineer Allscripts

2 Abstract Most of the companies in the new digital age are adopting the web services to enhance their product value, as web service provides a cost effective and practical solution of exchanging the data in a distributed application irrespective of the operating system, platform and language barriers. This evolution brings with it the challenge of testing the web services completely to provide the optimum quality and customer satisfaction. This paper provides the essential approaches of web service testing to be incorporated at the different stages of software development to have a stable and quality assured product to the customers as per the business demands and also covers the Web service advantage in the new Digital age, Web service attributes in the Shift left approach, testing approaches related to web services and finally the overview of the Web service testing tools.

3 Web service advantage- why it s being used most in this new Digital era With the emerging digital age the method of storing the information on a collection of mainframes and minicomputers speaking different protocols has become merely a memory. Now is the time for the major companies adopting the web services, as web services provides the inherent interoperability by using platform and language independent technology. The platform and language independent aspects of web services is a major advantage in the new age digital world. This is mainly achieved by using different protocols like SOAP, REST, WSDL, XML, HTTP. Web service are majorly re-usable, in the sense the code can be reused in a condition where one service can be used by different clients in term enabling the fulfilment of different business objectives of each client. A section of the service can be simply re used instead of creating a custom service for each client request. Web services are also adaptable, this makes them so versatile in nature. A client can use multiple services to complete a process even though the underlying business layers are in compatible with each other. For example, a client can an application which uses multiple web services to update a sales, shipping and ERP systems but with a single interface.

4 Web service Testing Importance and the challenges With the versatility of the web services, its usage is increasing in the new age digital world, with this comes the challenges to do a comprehensive web service testing and the stage at which the testing needs to be incorporated in the development life cycle to assure a more reliable and cost effective product. One of the main solution here is -Early Testing Adaptation- A shift left approach As it goes with any other form of testing, the web service testing should also be a part of development life cycle from the beginning. With the shift left approach in web service testing, the tester will be able to test and provide the inputs to the development team as and when the web service is deployed. This will immensely help is building a more stable web service environment. This approach not only holds good for functional tests, but for the performance and security testing of the web services as well. As the web services are tested as and when they are deployed, this will help is Finding and fixing the bugs at an early stage To incorporate the integration testing of different environments and to get an accurate detail of the stability To test the security of the web services thoroughly at an early stage will help rule out any breaches at the end To get the scalability of each web service at an early stage helps improve its coding enhancements in terms of design and in turn time taken for its execution later in the production And finally, it also reduces the cost and Time effort, which may incur at the later stage if the issues persist due to lack of testing early

5 As an Example, in our product the web services layer has been introduced newly. As per the shift left approach we started the web service testing right from the time the services were deployed in the test environment. This helped us in a great deal to find the bugs at the early stage and to get them fixed on time and also to do the performance test of each services and to fine tune the code to get the optimized response times. As part of functional/ performance /security testing that we conducted using this approach, advantages we found are: Total User stories User stories 200 Total Functional Bug found in early stage 110 Total Bugs converted to User stories 21 Design Modified / Newly implemented 12 Total Security /Performance Bug found in early stage 15 Code optimizations 12 Major challenges faced for the Web service testing: 1. Lack of User Interface Web services don t have a user interface as compared to other web application testing. So the testing needs the knowledge of programming skills, that the tester will use to write the test cases and use different tools like postman to test the different services and the response from the same. 2. Vast test coverage in terms of distributed environments Web services may be distributed over the network and maybe hosted on different operating systems and deployed in different environments. Hence a through black box testing should be covered. 3. Ensuring the security, scalability and stability A complete testing around the security aspects of the services should be done, and to have a knowledge of how the services will behave with n sudden increase in load, a proper performance tests for the scalability and stability over the time should be incorporated.

6 Web service Testing Different Approaches Functional In general, the best approach to normal functional testing is the same for web services (except for the fact that unlike most other applications, web services don t have GUI user interfaces). Apply the same functional testing techniques which you applied in the GUI testing. Simply think of a web service as a business process without a UI, and write your test case accordingly. Because web services can be used by many different clients and used in multiple ways, a through functional testing and negative testing do become more critical. In Web service testing make sure following points are covered: Does the service respond with the correct values? To check whether the web server under test works correctly, verify and compares the received response codes against response codes specified in the scenario. If your tested web server communicates with your client through a socket connection, messages the server sends are not HTTP responses and do not contain response codes. To check whether your tested server responses correctly, use validation rules. Validation rules are comparison criteria that you add to scenarios in your tests and that compare the response data against expected values. You can also create a validation rule if your tested server returns incorrect data (check the response data in the Response Body panel of the test log). After the issue is fixed, the validation rule will help you to check that the error does not occur anymore. Advantages we found with this approach: In the initial stage, we were able to catch the issues and we made sure that receiving the proper response from server (compares the actual (extracted) data with the expected data. ) Implemented the new user stories Can the service handle invalid values and exceptions have caused due to bad data? Verified the service response when we passed the bad request exceptions Advantages we found with this approach: One of the example was When we passed the wrong request we were expecting the 404 error message in the status code but request has succeeded and returns the status code with 200 Ok and entire Data has been returned in the response body, It was immediately fixed

7 Performance As much as functional testing is important for the web services, the performance testing also plays a major role in the stability and scalability of the web services. With the early adaptation of performance testing, we can conclude on how much load each web service can sustain, what impact is on the app server with the increase in the web service load, how is the whole system behaving will the system capacity is enough for the stated load or it should be increased. This approach of early performance testing of web services really help for our product where the web services are being introduced newly. Steps we followed for our product testing: Single web service test-once a web service is deployed and is functionally tested, it was taken for the load testing. We started with a small load of 2 requests per second and increased the load to get the level at which the services break in terms of response time SLA. When an code enhancements are done to handle more load, the tests were repeated and the threshold for each service was captured and a baseline value was concluded for each services. Multiple web services -A test with the specified/ agreed upon user load with different group of services depending on the modules in which they fall was done and the results included not only the response times but also the utilizations of App server in terms of memory, queuing time etc and also the overall impact of the web services changes at the system utilizations levels like memory, Processor etc. Advantages we found with this approach: With a single web service load test, we could make code level changes in terms of timeout parameter settings, memory allocation settings etc, which greatly helped in the web service performance With the multi web services load tests, we could see how our App server load is impacting the overall product performance, the changes to the Ram allocation to the app server were made (if the DB and App server are in one server) and also a new app server implementation other than client and DB servers was also introduced.

8 Security Why security testing? In modern web-based applications, the usage of web services is inevitable and they are prone for attacks as well. Since the web services request fetch from multiple websites developers have to take few additional measures in order to avoid any kind of penetration by hackers. Most common Vulnerabilities Preventive Mechanisms Since SOAP messages are XML-based, all passed credentials have to be converted to text format. Hence one has to be very careful in passing the sensitive information which has to be always encrypted. Protecting message integrity by implementing the mechanisms like checksum applied to ensure packet's integrity. Protecting message confidentiality - Asymmetric encryption is applied to protect the symmetric session keys, which in many implementations are valid for one communication only and are discarded subsequently. OWSP standards :

9 Tools- For easing the effort of web service Testing 1. Postman 2. Fiddler 3. Jmeter 4. SilkPerformer 5. SoapUI 6. TestingWhiz 7. SOAPSonar 8. SOAPtest 9. TestMaker 10. vrest 11. HttpMaster 12. Runscope 13. Rapise 14. WebInject 15. Storm

10 References & Appendix

11 Author Biography Harish Auradkar 10+ years of experience in Performance testing and engineering Certified Scrum Master Senior Quality Allscripts Harish Auradkar is having 10+ years of experience in Manual testing currently working as Senior Quality Engineer at Allscripts. Earlier He worked for Excel soft, Telelogic Rational and Mphasis He has an expertise in different tools like IBM DOORS, Synergy, Change,RQM, HP SIM. He holds a Master in Computer Application degree and is an Certified Scrum Master tester. Co-Author Biography 10+ years of experience in Performance testing and engineering ISTQB certified Deepti Hippargi Senior Software Allscripts Deepti Hippargi is having 10+ years of experience in performance testing and engineering and currently working as Senior Software Engineer at Allscripts. Earlier she worked for Wipro technologies, Sapient India Ltd and Tech Mahindra. She also worked at client places at United Kingdom. She has an expertise in different tools like Loadrunner, Rational performance tester, Webload, Jmeter. She holds a Bachelor of Engineering degree in computer science and is an ISTQB certified tester.

12 THANK YOU!

Integrated Functional and Non -Functional Testing for Agile

Integrated Functional and Non -Functional Testing for Agile Integrated Functional and Non-Functional Testing for Agile P a g e 1 Integrated Functional and Non -Functional Testing for Agile STC 2013 Arush Gupta Umesh Kanade Harbinger Systems Pvt. Ltd 139, "Siddhant",

More information

Tutorial to Building Automation Frameworksfor Web Services Testing

Tutorial to Building Automation Frameworksfor Web Services Testing STC 2013 Tutorial to Building Automation Frameworksfor Web Services Testing By: Tushar Sharad Archana Shenoy Deloitte Consulting India Ltd Plot No #14,15 RMZ Futura Deloitte Drive, Hitech City Hyderabad

More information

Types of Software Testing: Different Testing Types with Details

Types of Software Testing: Different Testing Types with Details Types of Software Testing: Different Testing Types with Details What are the different Types of Software Testing? We, as testers are aware of the various types of Software Testing such as Functional Testing,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AUTOMATION TESTING IN SOFTWARE DEVELOPEMENT KALPESH PARMAR Persistent Systems Limited,

More information

CONFERENCE PROCEEDINGS QUALITY CONFERENCE. Conference Paper Excerpt from the 28TH ANNUAL SOFTWARE. October 18th 19th, 2010

CONFERENCE PROCEEDINGS QUALITY CONFERENCE. Conference Paper Excerpt from the 28TH ANNUAL SOFTWARE. October 18th 19th, 2010 PACIFIC NW 28TH ANNUAL SOFTWARE QUALITY CONFERENCE October 18th 19th, 2010 Conference Paper Excerpt from the CONFERENCE PROCEEDINGS Permission to copy, without fee, all or part of this material, except

More information

HP TruClient technology: Accelerating the path to testing modern applications. Business white paper

HP TruClient technology: Accelerating the path to testing modern applications. Business white paper HP TruClient technology: Accelerating the path to testing modern applications Business white paper Table of contents Executive summary...3 Introduction...3 The challenges of 2.0 applications...4 Why traditional

More information

OPEN SOURCE TESTING IN SAUDI ARABIA 1

OPEN SOURCE TESTING IN SAUDI ARABIA 1 OPEN SOURCE TESTING IN SAUDI ARABIA 1 Open Source Testing In Saudi Arabia by:husam Al-Swueiti INTRODUCTION / HISTORY Open source is a term used to describe the free use of software. Before the 60s, very

More information

Testing with Soap UI. Tomaš Maconko

Testing with Soap UI. Tomaš Maconko Testing with Soap UI Tomaš Maconko 1 Content What is Soap UI? What features does the Soap UI have? Usage in project context Pros and cons Soap UI alternatives 2 What is Soap UI? Open Source Testing Tool

More information

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun Reading This lecture [McGraw]: Ch. 7-9 2 Seven Touchpoints 1. Code review 2. Architectural

More information

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints Reading This lecture [McGraw]: Ch. 7-9 CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun 2 Seven Touchpoints Application of Touchpoints

More information

Short Test Cycles for Performance Testing with TruClient Technology

Short Test Cycles for Performance Testing with TruClient Technology White Paper Application Development, Test & Delivery Short Test Cycles for Performance Testing with TruClient Technology Table of Contents page Keeping Up in a Complex Era... 1 Riding the Web 2.0 Wave...

More information

QMS ISO 9001:2015 CERTIFIED COMPANY Software Testing TRAINING.

QMS ISO 9001:2015 CERTIFIED COMPANY Software Testing TRAINING. QMS ISO 9001:2015 CERTIFIED COMPANY Software Testing TRAINING www.webliquidinfotech.com What you Learn: What is Software Testing? Why Testing is Important? Scope of Software Testing Objectives of Software

More information

Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED

Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED Copyright ECSC Group plc 2017 ECSC - UNRESTRICTED ECSC - UNRESTRICTED Introduction A Web Application Firewall (WAF) is, in our experience, the most important layer of defence against a wide range of attacks

More information

Continuous Security. Improve Web Application Security by using Continuous Security Scans

Continuous Security. Improve Web Application Security by using Continuous Security Scans Continuous Security Improve Web Application Security by using Continuous Security Scans 1 The world of software development has changed. Nowadays around 65% of software projects use agile development 1.

More information

HP APPs v.12 Solutions for Dev-Ops

HP APPs v.12 Solutions for Dev-Ops HP APPs v.12 Solutions for Dev-Ops Kimberly Fort HP Software July 2014 Kimberly Fort Software Solutions Architect *5 Months with HP *17 Years experience using HP Tools & products *20 Years experience in

More information

2/18/2009. Introducing Interactive Systems Design and Evaluation: Usability and Users First. Outlines. What is an interactive system

2/18/2009. Introducing Interactive Systems Design and Evaluation: Usability and Users First. Outlines. What is an interactive system Introducing Interactive Systems Design and Evaluation: Usability and Users First Ahmed Seffah Human-Centered Software Engineering Group Department of Computer Science and Software Engineering Concordia

More information

Basic Concepts of System Testing - A Beginners Guide.

Basic Concepts of System Testing - A Beginners Guide. Basic Concepts of System Testing - A Beginners Guide https://www.softwaretestingclass.com/basic-concepts-ofsystem-testing-a-beginners-guide/ 2 Overview We all agree to the fact that any system that we

More information

AN ISO 9001:2008 CERTIFIED COMPANY. Software Testing TRAINING.

AN ISO 9001:2008 CERTIFIED COMPANY. Software Testing TRAINING. AN ISO 9001:2008 CERTIFIED COMPANY Software Testing TRAINING www.webliquids.com ABOUT US Who we are: WebLiquids is an ISO (9001:2008), Google, Microsoft Certified Advanced Web Educational Training Organisation.

More information

Agile Accessibility. Presenters: Ensuring accessibility throughout the Agile development process

Agile Accessibility. Presenters: Ensuring accessibility throughout the Agile development process Agile Accessibility Ensuring accessibility throughout the Agile development process Presenters: Andrew Nielson, CSM, PMP, MPA Ann Marie Davis, CSM, PMP, M. Ed. Cammie Truesdell, M. Ed. Overview What is

More information

PERSPECTIVE. End-to-end test automation A behaviordriven and tool-agnostic approach. Abstract

PERSPECTIVE. End-to-end test automation A behaviordriven and tool-agnostic approach. Abstract PERSPECTIVE End-to-end test automation A behaviordriven and tool-agnostic approach Anand Avinash Tambey Product Technical Architect, Infosys Abstract In today s fast changing world, IT is under constant

More information

Performance Testing: A Comparative Study and Analysis of Web Service Testing Tools

Performance Testing: A Comparative Study and Analysis of Web Service Testing Tools Performance Testing: A Comparative Study and Analysis of Web Service Testing Tools Dr.V.Asha 1, Divyabindu M C 2, Asha V 3 1,2,3 Department of Master of Computer Applications, New Horizon College of Engineering,

More information

Practical Guide to Securing the SDLC

Practical Guide to Securing the SDLC Practical Guide to Securing the SDLC Branko Ninkovic Dragonfly Technologies Founder Agenda Understanding the Threats Software versus Security Goals Secure Coding and Testing A Proactive Approach to Secure

More information

A NEW GENERATION SOFTWARE TEST AUTOMATION FRAMEWORK CIVIM

A NEW GENERATION SOFTWARE TEST AUTOMATION FRAMEWORK CIVIM 1 A NEW GENERATION SOFTWARE TEST AUTOMATION FRAMEWORK CIVIM Balamurali L (Senior SQA Manger), Pradeep P P (Senior Lead Engineer- Testing), Rathish M M (Lead Engineer- Testing) and Sreepooja Anilkumar (Engineer

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

Business white paper. Setting the pace. Testing performance on modern applications

Business white paper. Setting the pace. Testing performance on modern applications Business white paper Setting the pace Testing performance on modern applications Table of contents 3 Keeping up in a complex era 3 Riding the 2.0 wave 4 Adjusting for modern methods 4 Out with the old:

More information

Master Every Stage of Your Mobile App Lifecycle: Micro Focus Mobile Center. Brochure. Application Development, Test & Delivery

Master Every Stage of Your Mobile App Lifecycle: Micro Focus Mobile Center. Brochure. Application Development, Test & Delivery Master Every Stage of Your Mobile App Lifecycle: Micro Focus Mobile Center Brochure Application Development, Test & Delivery Brochure Master Every Stage of Your Mobile App Lifecycle: Center Master the

More information

CATCH ERRORS BEFORE THEY HAPPEN. Lessons for a mature data governance practice

CATCH ERRORS BEFORE THEY HAPPEN. Lessons for a mature data governance practice CATCH ERRORS BEFORE THEY HAPPEN Lessons for a mature data governance practice A guide to working with cross-departmental teams to establish proactive data governance for your website or mobile app. 2 Robust

More information

Adam Hodges CPSC481/CyberTiger Project Proposal 1/31/12. Motivations

Adam Hodges CPSC481/CyberTiger Project Proposal 1/31/12. Motivations Adam Hodges CPSC481/CyberTiger Project Proposal 1/31/12 Motivations It is my goal to continue my work from the summer and fall semesters in order to learn more about wireless networks and their characteristics

More information

GUI Development in TDD Model Case Study

GUI Development in TDD Model Case Study GUI Development in TDD Model Case Study Sowmya Dhandapani* Broadcom Limited, Bangalore, India. * Corresponding author. Email: sowmya.dhandapani.1979@ieee.org Manuscript submitted May 17, 2016; accepted

More information

WHITESTEIN. Agents in a J2EE World. Technologies. Stefan Brantschen. All rights reserved.

WHITESTEIN. Agents in a J2EE World. Technologies. Stefan Brantschen. All rights reserved. WHITESTEIN Technologies 1 Agents in a J2EE World Stefan Brantschen ttt.info.j2ee v1.6 2002-02-10 SBR Copyright 2002 by Whitestein Technologies AG, Switzerland Goal and Outline Goal Present how J2EE EJB

More information

Bridge Course On Software Testing

Bridge Course On Software Testing G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Accredited by NAAC with A Grade of UGC, Approved by AICTE, New Delhi Permanently Affiliated to JNTUA, Ananthapuramu (Recognized by UGC under 2(f) and 12(B)

More information

Chapter 8 Software Testing. Chapter 8 Software testing

Chapter 8 Software Testing. Chapter 8 Software testing Chapter 8 Software Testing 1 Topics covered Introduction to testing Stages for testing software system are: Development testing Release testing User testing Test-driven development as interleave approach.

More information

Activities of Performance Testing. Fig 1.0 Performance Testing Activities. 2017, IJARCSSE All Rights Reserved Page 140

Activities of Performance Testing. Fig 1.0 Performance Testing Activities. 2017, IJARCSSE All Rights Reserved Page 140 Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Research on End

More information

The Z-Files: Field reports from the world of business critical PHP applications

The Z-Files: Field reports from the world of business critical PHP applications The Z-Files: Field reports from the world of business critical PHP applications By Axel Schinke Senior Manager of Global Operations for Global Services About this webinar Field reports from Zend Consulting

More information

A Passage to Penetration Testing!

A Passage to Penetration Testing! A Passage to Penetration Testing! EC-Council Cyber Research This paper is from EC-Council s site. Reposting is not permitted without express written permission. What Is Penetration Testing? A penetration

More information

Meetu Arora Sr V.P. Quality Assurance Naukri.com Testing Team Journey @Naukri.com Automation WATIR 2008 2007 2006 Agile testing team 2010 2015 2012 Automation QTP Inception of Testing Team Automation Selenium

More information

WHITE PAPER. Leveraging Database Virtualization for Test Data Management. Abstract. Vikas Dewangan, Senior Technology Architect, Infosys

WHITE PAPER. Leveraging Database Virtualization for Test Data Management. Abstract. Vikas Dewangan, Senior Technology Architect, Infosys WHITE PAPER Leveraging ization for Test Data Management Vikas Dewangan, Senior Technology Architect, Infosys Abstract virtualization is an emerging trend in test data management (TDM) and is all set to

More information

ShiftLeft. Real-World Runtime Protection Benchmarking

ShiftLeft. Real-World Runtime Protection Benchmarking ShiftLeft Real-World Runtime Protection Benchmarking Table of Contents Executive Summary... 02 Testing Approach... 02 ShiftLeft Technology... 04 Test Application... 06 Results... 07 SQL injection exploits

More information

Software Testing and Maintenance

Software Testing and Maintenance Software Testing and Maintenance Testing Strategies Black Box Testing, also known as Behavioral Testing, is a software testing method in which the internal structure/ design/ implementation of the item

More information

WEB SERVICES TESTING CHALLENGES AND APPROACHES

WEB SERVICES TESTING CHALLENGES AND APPROACHES WEB SERVICES TESTING CHALLENGES AND APPROACHES Sana Azzam CIS department, IT faculty Yarmouk University Irbid, Jordan sana_azzam@yahoo.com Mohammed Naji Al-Kabi CIS department, IT faculty Yarmouk University

More information

Quality - The Key to Successful SOA. Charitha Kankanamge WSO2 February 2011

Quality - The Key to Successful SOA. Charitha Kankanamge WSO2 February 2011 Quality - The Key to Successful SOA Charitha Kankanamge WSO2 February 2011 WSO2 Founded in 2005 by acknowledged leaders in XML, Web Services Technologies & Standards and Open Source Producing entire middleware

More information

Certeon s acelera Virtual Appliance for Acceleration

Certeon s acelera Virtual Appliance for Acceleration Certeon s acelera Virtual Appliance for Acceleration Product Brief Dr. Jim Metzler Ashton, Metzler & Associates Rolf McClellan McClellan Consulting June 2008 Certeon s acelera Virtual Appliance for Acceleration

More information

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web

More information

TESTING SOFTWARE QUALITY CHARACTERISTICS

TESTING SOFTWARE QUALITY CHARACTERISTICS TESTING SOFTWARE QUALITY CHARACTERISTICS Zigmars Gailans TAPOST 2017 Agenda Introduction Quality Functionality Usability Accessibility https://kahoot.it Kahoot app 2 3 What is Quality? The standard of

More information

TEST AUTOMATION. Excel Global Solutions Inc. All Rights Reserved.

TEST AUTOMATION. Excel Global Solutions Inc. All Rights Reserved. TEST AUTOMATION Table of Contents Introduction... 3 Automation Frameworks:... 3 Uses for a framework:... 3 Advantages of Test Automation over Manual Testing:... 3 Principles of Test Automation:... 4 Choosing

More information

Mainframe and Mobile: Perfect Together 16036

Mainframe and Mobile: Perfect Together 16036 Mainframe and Mobile: Perfect Together 16036 Monday, March 2, 2015: 3:15PM-4:15PM Ron Piracci, Jason Fournier Verizon Insert Custom Session QR if Desired. Why is the Mainframe & Mobile Perfect together?

More information

WR2QTP: Semantic Translator of WinRunner Scripts to QTP

WR2QTP: Semantic Translator of WinRunner Scripts to QTP WR2QTP: Semantic Translator of WinRunner Scripts to QTP BACKGROUND Automatic testing of Graphical User Interfaces (GUI) is critical, as software is increasingly becoming web-based and operated through

More information

Checklist for Testing of Web Application

Checklist for Testing of Web Application Checklist for Testing of Web Application Web Testing in simple terms is checking your web application for potential bugs before its made live or before code is moved into the production environment. During

More information

Shift Left, Automation, and Other Smart Strategies for Getting Ahead in QA

Shift Left, Automation, and Other Smart Strategies for Getting Ahead in QA Welcome! Test Early, Test Often Shift Left, Automation, and Other Smart Strategies for Getting Ahead in QA A little bit about us Jeff Van Fleet President and CEO Lighthouse Technologies 30+ years software/qa

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

Are You Avoiding These Top 10 File Transfer Risks?

Are You Avoiding These Top 10 File Transfer Risks? Are You Avoiding These Top 10 File Transfer Risks? 1. 2. 3. 4. Today s Agenda Introduction 10 Common File Transfer Risks Brief GoAnywhere MFT Overview Question & Answer HelpSystems Corporate Overview.

More information

SECURITY TESTING PROCESS IN SDLC

SECURITY TESTING PROCESS IN SDLC Khaja Shariff Page 1 7/20/2009 SECURITY TESTING PROCESS IN SDLC Khaja Shariff Page 2 7/20/2009 Table of Contents 1. Introduction... 3 1.1 Description... 3 1.2. Purpose... 3 2. Security Testing process...

More information

Test Automation. Fundamentals. Mikó Szilárd

Test Automation. Fundamentals. Mikó Szilárd Test Automation Fundamentals Mikó Szilárd 2016 EPAM 2 Blue-chip clients rely on EPAM 3 SCHEDULE 9.12 Intro 9.19 Unit testing 1 9.26 Unit testing 2 10.03 Continuous integration 1 10.10 Continuous integration

More information

n Explain penetration testing concepts n Explain vulnerability scanning concepts n Reconnaissance is the first step of performing a pen test

n Explain penetration testing concepts n Explain vulnerability scanning concepts n Reconnaissance is the first step of performing a pen test Chapter Objectives n Explain penetration testing concepts n Explain vulnerability scanning concepts Chapter #4: Threats, Attacks, and Vulnerabilities Vulnerability Scanning and Penetration Testing 2 Penetration

More information

Enabling Mainframe Assets to Services for SOA

Enabling Mainframe Assets to Services for SOA 246 Latha Sadanandam Education and Research Dept. Infosys Tech Ltd. Bangalore, India Latha_Sadanandam@infosys.com Abstract- Service-oriented architecture (SOA) is a mechanism for achieving interoperability

More information

Comparison Study of Software Testing Methods and Levels- A Review

Comparison Study of Software Testing Methods and Levels- A Review Comparison Study of Software Testing Methods and Levels- A Review Deepti Kapila Grover M.Tech, Dept. of Computer Science, Assistant professor in LCET, Katani Kalan, India ABSTRACT: Software is an activity

More information

Topic 01. Software Engineering, Web Engineering, agile methodologies.

Topic 01. Software Engineering, Web Engineering, agile methodologies. Topic 01 Software Engineering, Web Engineering, agile methodologies. 1 What is Software Engineering? 2 1 Classic Software Engineering The IEEE definition: Software Engineering is the application of a disciplined,

More information

TestComplete 3.0 Overview for Non-developers

TestComplete 3.0 Overview for Non-developers TestComplete 3.0 Overview for Non-developers Copyright 2003 by Robert K. Leahey and AutomatedQA, Corp. All rights reserved. Part : Table of Contents Introduction 1 About TestComplete 1 Basics 2 Types of

More information

Title DC Automation: It s a MARVEL!

Title DC Automation: It s a MARVEL! Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights

More information

Instavc White Paper. Future of Enterprise Communication

Instavc White Paper. Future of Enterprise Communication Future of Enterprise Communication InstaVC is a futuristic Video Collaboration platform for the organizations to achieve client-less and plugin free, real-time communication which enables peer-to-peer

More information

What protocol to choose

What protocol to choose Performance of SOAP/HTTP vs. SOAP/JMS What protocol to choose Today SOA is most prevalent enterprise architecture style. In most cases services (S in SOA) are realized using web services specification(s).

More information

9 th CA 2E/CA Plex Worldwide Developer Conference 1

9 th CA 2E/CA Plex Worldwide Developer Conference 1 1 Introduction/Welcome Message Organizations that are making major changes to or replatforming an application need to dedicate considerable resources ot the QA effort. In this session we will show best

More information

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

National Pooling Administration Contract #FCC13C nd Revised Change Order Proposal #3B

National Pooling Administration Contract #FCC13C nd Revised Change Order Proposal #3B National Pooling Administration Contract #FCC13C0007 2 nd Revised Change Order Proposal #3B (Development and Support of the PAS NPAC API) March 8, 2017 Neustar, Inc. 21575 Ridgetop Circle Sterling VA,

More information

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney. Overview of SSL/TLS Luke Anderson luke@lukeanderson.com.au 12 th May 2017 University Of Sydney Overview 1. Introduction 1.1 Raw HTTP 1.2 Introducing SSL/TLS 2. Certificates 3. Attacks Introduction Raw

More information

xiii A. Hayden Lindsey IBM Distinguished Engineer and Director, Studio Tools Foreword

xiii A. Hayden Lindsey IBM Distinguished Engineer and Director, Studio Tools Foreword Foreword Business applications are increasingly leveraging Web technologies. Naturally this is true for Internet applications, but it is also true for intranet and extranet applications applications that

More information

Part 2: How to Detect Insider Threats

Part 2: How to Detect Insider Threats Part 2: How to Detect Insider Threats Amichai Shulman Chief Technology Officer Imperva Amichai Shulman CTO, Imperva Speaker at Industry Events RSA, Appsec, Info Security UK, Black Hat Lecturer on information

More information

Certified Tester Foundation Level Performance Testing Sample Exam Questions

Certified Tester Foundation Level Performance Testing Sample Exam Questions International Software Testing Qualifications Board Certified Tester Foundation Level Performance Testing Sample Exam Questions Version 2018 Provided by American Software Testing Qualifications Board and

More information

Introduction 2 Load Testing

Introduction 2 Load Testing Introduction 2 Load Testing Gus Björklund, Progress Software Exchange Australia, October 18, 20, 22, 2010 Melbourne, Brisbane, Sydney Abstract Load testing your application is well worth the time and effort.

More information

Alternatives to Patching for more Secure and Reliable Control Systems

Alternatives to Patching for more Secure and Reliable Control Systems Alternatives to Patching for more Secure and Reliable Control Systems Eric Byres, P.Eng., ISA Fellow Chief Technology Officer Tofino Security, a Belden Brand The New World of Security For the past 30 years,

More information

Going SOA with CA Plex and Websydian

Going SOA with CA Plex and Websydian Going SOA with CA Plex and Websydian TransacXML Speakers e Søren Madsen Chief Consultant, Soft Design A/S Anne-Marie Arnvig Communications Manager, Websydian A/S Agenda SOA vs. Web Services What is a service?

More information

Identity-Enabled Web Services

Identity-Enabled Web Services Identity-Enabled s Standards-based identity for 2.0 today Overview s are emerging as the preeminent method for program-toprogram communication across corporate networks as well as the Internet. Securing

More information

USTGlobal INNOVATION INFORMATION TECHNOLOGY. Using a Test Design Tool to become a Digital Organization

USTGlobal INNOVATION INFORMATION TECHNOLOGY. Using a Test Design Tool to become a Digital Organization USTGlobal INNOVATION INFORMATION TECHNOLOGY Using a Test Design Tool to become a Digital Organization Overview: Automating test design reduces efforts and increases quality Automated testing resolves most

More information

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015 THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT 2 EXECUTIVE SUMMARY The growth of enterprise-developed applications has made it easier for businesses to use technology to work more efficiently and productively.

More information

1. I NEED TO HAVE MULTIPLE VERSIONS OF VISUAL STUDIO INSTALLED IF I M MAINTAINING APPLICATIONS THAT RUN ON MORE THAN ONE VERSION OF THE.

1. I NEED TO HAVE MULTIPLE VERSIONS OF VISUAL STUDIO INSTALLED IF I M MAINTAINING APPLICATIONS THAT RUN ON MORE THAN ONE VERSION OF THE. CUSTOMER PAIN POINTS 1. I NEED TO HAVE MULTIPLE VERSIONS OF VISUAL STUDIO INSTALLED IF I M MAINTAINING APPLICATIONS THAT RUN ON MORE THAN ONE VERSION OF THE.NET FRAMEORK. THAT S TAKING UP SPACE ON MY HARDDRIVE

More information

Cybersecurity Today Avoid Becoming a News Headline

Cybersecurity Today Avoid Becoming a News Headline Cybersecurity Today 2017 Avoid Becoming a News Headline Topics Making News Notable Incidents Current State of Affairs Common Points of Failure Three Quick Wins How to Prepare for and Respond to Cybersecurity

More information

Getting started now with Rational Performance Tester 9.1.0

Getting started now with Rational Performance Tester 9.1.0 Getting started now with Rational Performance Tester 9.1.0 Rational Performance Tester Contents iii Contents Chapter 1: Start with Rational Performance Tester...5 Start now... 6 Chapter 2: Performance

More information

ACT476 Professional Project II Test Case Development Team Name Project Tester

ACT476 Professional Project II Test Case Development Team Name Project Tester unique-test-case-id: User-Login and Permissions Check Purpose: Short sentence or two about the aspect of the system is being tested. If this gets too long, break the test case up or put more information

More information

Converged Infrastructure Matures And Proves Its Value

Converged Infrastructure Matures And Proves Its Value A Custom Technology Adoption Profile Commissioned By Hewlett-Packard May 2013 Introduction Converged infrastructure (CI) solutions have been widely adopted by a range of enterprises, and they offer significant

More information

Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not.

Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. i About the Tutorial Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. Testing is executing a system in order

More information

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018 Perry Correll Aerohive, Wi-Fi Alliance member October 2018 1 Value of Wi-F1 The value Wi-Fi provides to the global economy rivals the combined market value of Apple Inc. and Amazon. The fact that Wi-Fi

More information

Diploma in Software Testing 2.0 (HP)

Diploma in Software Testing 2.0 (HP) SEED Infotech Ltd. : ' Panchasheel', 42/16, Erandawana`, SEED Infotech Lane, Off Karve Road Pune - 411004. India www.seedinfotech.com Course Name : Duration : Class room: 108 Hrs. Diploma in Software Testing

More information

Taking White Hats to the Laundry: How to Strengthen Testing in Common Criteria

Taking White Hats to the Laundry: How to Strengthen Testing in Common Criteria Taking White Hats to the Laundry: How to Strengthen Testing in Common Criteria Apostol Vassilev, Principal Consultant September 23,2009. Product Testing in Common Criteria Product Testing in Common Criteria

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Mobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar.

Mobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar. Mobile Payment Application Security Security steps to take while developing Mobile Application s About SISA Payment Security Specialists PCI Certification Body (PCI Qualified Security Assessor) Payment

More information

Cement Manufacturer Gains High Availability, Improves Business Performance with Real Time Reports

Cement Manufacturer Gains High Availability, Improves Business Performance with Real Time Reports Microsoft SQL Server Customer Solution Case Study Cement Manufacturer Gains High Availability, Improves Business Performance with Real Time Reports Overview Country or Region: India Industry: Manufacturing

More information

The SD-WAN security guide

The SD-WAN security guide The SD-WAN security guide How a flexible, software-defined WAN can help protect your network, people and data SD-WAN security: Separating fact from fiction For many companies, the benefits of SD-WAN are

More information

Cryptography ThreeB. Ed Crowley. Fall 08

Cryptography ThreeB. Ed Crowley. Fall 08 Cryptography ThreeB Ed Crowley Fall 08 Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types Cryptanalysis. Science of cracking ciphers and codes, decoding secrets,

More information

Requirements and User-Centered Design in an Agile Context

Requirements and User-Centered Design in an Agile Context Requirements and User-Centered Design in an Agile Context The Volvo Group Business Areas AB Volvo Volvo Trucks Renault Trucks Mack Trucks Nissan Diesel Buses Construction Equipment Volvo Penta Volvo Aero

More information

Read & Download (PDF Kindle) Java: An Introduction To Problem Solving And Programming (4th Edition)

Read & Download (PDF Kindle) Java: An Introduction To Problem Solving And Programming (4th Edition) Read & Download (PDF Kindle) Java: An Introduction To Problem Solving And Programming (4th Edition) In a conversational style, best-selling author Walter Savitch teaches programmers problem solving and

More information

Application Design and Development: October 30

Application Design and Development: October 30 M149: Database Systems Winter 2018 Lecturer: Panagiotis Liakos Application Design and Development: October 30 1 Applications Programs and User Interfaces very few people use a query language to interact

More information

WHITEPAPER. Is Single Automation Framework possible for all Application Layers?

WHITEPAPER. Is Single Automation Framework possible for all Application Layers? WHITEPAPER Is Single Automation Framework possible for all Application Layers? A White Paper by: R. Ashok Kumar / Hitesh Malhotra / Naveen Agarwal / Ranjit Kumar September, 2013 1 Table of Contents Why

More information

csc444h: so(ware engineering I matt medland

csc444h: so(ware engineering I matt medland csc444h: so(ware engineering I matt medland matt@cs.utoronto.ca http://www.cs.utoronto.ca/~matt/csc444 tes2ng top- 10 infrastructure source code control including other types of testing reproducible builds

More information

Testing System Qualities

Testing System Qualities Testing System Qualities Rebecca Wirfs-Brock Joseph Yoder Copyright 2012 Rebecca Wirfs-Brock, Joseph Yoder, Wirfs-Brock Associates and The Refactory, Inc. Introducing Rebecca President, Wirfs-Brock Associates

More information

DBMS (FYCS) Unit - 1. A database management system stores data in such a way that it becomes easier to retrieve, manipulate, and produce information.

DBMS (FYCS) Unit - 1. A database management system stores data in such a way that it becomes easier to retrieve, manipulate, and produce information. Prof- Neeta Bonde DBMS (FYCS) Unit - 1 DBMS: - Database is a collection of related data and data is a collection of facts and figures that can be processed to produce information. Mostly data represents

More information

User Registry Configuration in WebSphere Application Server(WAS)

User Registry Configuration in WebSphere Application Server(WAS) 2012 User Registry Configuration in WebSphere Application Server(WAS) By Geetha Kanra, Sanjay Singh, and Yogendra Srivastava [Abstract: This article provides step by step procedure to configure various

More information

Nicman Group Test Data Management 2.0 Leveraging Copy Data Virtualization Technology in QA for SQuAD. November 2016

Nicman Group Test Data Management 2.0 Leveraging Copy Data Virtualization Technology in QA for SQuAD. November 2016 Nicman Group Test Data Management 2.0 Leveraging Copy Data Virtualization Technology in QA for SQuAD November 2016 Agenda Test Data Management 2.0 Leveraging Copy Data Virtualization Technology in QA Copy

More information

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,

More information

[DOC] MANUAL AND FUNCTIONAL TESTING

[DOC] MANUAL AND FUNCTIONAL TESTING 20 November, 2017 [DOC] MANUAL AND FUNCTIONAL TESTING Document Filetype: PDF 446.67 KB 0 [DOC] MANUAL AND FUNCTIONAL TESTING We will work with a desktop. Functional testing is a quality assurance (QA)

More information

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products Converged security Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products Increased risk and wasted resources Gartner estimates more than $1B in

More information