You've requested...

SOFTWARE TESTING: New software testing technologies bring new challenges

If a new window did not open, click here to view this asset.

Download this next:

Mauritius Commercial Bank's efficiency gains with testing automation

The Mauritius Commercial Bank (MCB), the leading banking institution in Mauritius, embraced digital transformation by creating a testing services unit and using Eggplant's software testing platform for automation.

Key benefits for MCB include:

· Automating 70% of regression testing, reducing testing time from 400 to 120 work days
· Achieving full end-to-end testing across platforms, with testing times cut by over 6x
· Saving 1,480 work days last year by replacing manual testing with Eggplant's approach
· Attracting new talent by showcasing innovative testing practices

Read the full case study to see how Eggplant enhanced MCB's testing efficiency and innovation.

These are also closely related to: "SOFTWARE TESTING: New software testing technologies bring new challenges"

  • Beyond Black Friday Be Ready For Anything, Anytime, Anywhere

    Online retailers face the challenge of unpredictable demand spikes that can overwhelm websites, causing crashes and lost revenue. This eBook explores strategies to help businesses manage these surges.

    Key topics include:

    · The impact of poor website performance, from lost revenue to damaged brand reputation
    · Setting up your site for success using performance testing tools like OpenText LoadRunner Cloud
    · Tips for optimizing application performance and ensuring stability during peak traffic

    By implementing these strategies, organizations can handle any "Black Friday" moment. Read on to learn how to maximize online performance and minimize system failures.

  • Elevate your Software Testing with Generative AI

    Generative AI is revolutionizing software testing, enhancing quality assurance for teams. Concept Reply's testing assistant combines AI with robust QA techniques, optimizing the testing process.

    Its many features include:

    • Intelligent reporting using machine learning for insights
    • Data-driven test modeling for precise requirement analysis
    • Automated test design generation meeting industry standards
    • And more

    This solution aims to set a new standard in QA, leveraging generative AI to advance software testing. Explore the full white paper to learn how this innovative method can benefit your team.

Find more content like what you just read:

  • ALM: Taking a middleware-focused approach

    In this expert e-guide, Tom Nolle discusses how to take a middleware-focused approach to app lifecycle management practices. Uncover helpful advice for selecting middleware tools and managing OS and middleware platforms in the cloud. Plus, learn about the critical relationship between ALM, DevOps, and orchestration.

    Download

  • Discover the key CI/CD metrics for platform engineers

    This eBook explores the most meaningful engineering metrics for platform teams, including velocity, morale, and business metrics. Learn how to use these metrics to improve your team's performance and deliver quality software faster. Download the eBook to discover proven strategies for optimizing your CI/CD pipeline.

    Download

  • Continuous testing: How a bank boosted software quality

    A leading bank was primarily practicing manual testing for its software delivery efforts, which lacked standardization and led to inconsistencies across locations. To alleviate these problems and enhance software quality, the bank decided to integrate continuous testing into its DevOps practices. Read on to learn why.

    Download

  • The Buyer's Guide For AI & Cloud Skills Development

    In this buyer's guide, you'll discover how to find the right technology skills development software to upskill your team for cloud and AI. You'll also learn about key features, the buying process, and how to narrow down your vendor decision. Read on now to uncover the best fit for your organization.

    Download

  • Key questions to set your automation goals

    Read this e-book to learn how to overcome practical barriers to holistic automation adoption within your organization. Coverage includes automation goal setting, common myths, how to unite teams and training, and scaling automation across the business.

    Download

  • Getting started with Azure Red Hat OpenShift - a technical guide

    As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.

    Download

  • Royal Holloway: Rowhammer – From DRAM faults to escalating privileges

    Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them

    Download

  • Automate SAP testing with AI-powered testing: Market insights & more

    Migrating legacy SAP systems to S/4HANA poses testing challenges. Leverage AI-driven automation with OpenText Functional Testing to build resilient, adaptable test assets that reduce maintenance costs and accelerate test development. Read the e-book to learn more.

    Download

  • Using robotics to fuel patient care

    There is a need for more than 1 million workers to care for the elderly and others in need of constant companionship. This Hughes video will introduce you to RIA, a humanoid robot designed to provide around-the-clock companionship and aid healthcare professionals administer the future of patient experiences. Watch now to learn more.

    Download

  • Next-generation DAST: Introducing interactive application security testing (IAST)

    While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.

    Download

  • Application security: More important than ever

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

    Download

  • How Australian organisations are coping with big data storage challenges

    In this e-guide, read about how Australian organisations are coping with the storage challenges of big data, why flash storage is still too expensive for some companies and how NetApp is evolving to keep up with changes in the industry.

    Download

  • Navigating the GDPR

    Today’s businesses encounter not only rising cyberattacks but also regulations with stringent requirements. To help organizations navigate that challenging landscape, this white paper presents best practices for complying with the EU’s GDPR. Keep reading to unlock insights.

    Download

  • Generative AI in the enterprise with AMD Accelerators

    How can you ensure your organization is leveraging GenAI to the best of its abilities. This design guide describes the architecture and design of the Dell Validated Design for Generative AI with AMD accelerators. Read now to learn more. Dell PowerEdge server with AMD Instinct™ Accelerators.

    Download

  • Observability Engineering

    Observability is critical for managing today's software.This O'Reilly e-book presents 321 pages of expert insights on the state of observability engineering, giving you the information you need to understand the most prevalent trends and strategies. Read on to learn more.

    Download

  • IDC TechBrief: Interactive Application Security Testing

    With modern application development operating at break-neck speeds, DevOps teams pressured by deadlines are often forced to compromise security for efficiency’s sake. This white paper examines the benefits of using interactive application security testing to mitigate the security risk and complexities of using DevSecOps. Read on to learn more.

    Download

  • CW Buyer's Guide to Emerging technology

    The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.

    Download

  • Digital Industries Software Digital Execution Manual

    This 21-page e-book breaks down how to transform your application development practice and accelerate digital transformation. Read on to discover the elements of digital execution – and much more.

    Download

  • Computer Weekly – 3 May 2022: A prescription for digital accessibility at Boots

    In this week's Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer's guide examines communications as a service. And we talk to Trainline's CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now.

    Download

  • The role of microservices in agile enterprises

    In this e-guide, we take a closer look at the latest thinking about microservices, from a pros and cons perspective, while also shining a light on the other aspects of agile computing that enterprises need to know about as their digital transformations gather steam.

    Download

  • How to build next-generation intelligent edge solutions with Kubernetes

    In this 57-page Gorilla Guide you'll learn best practices for securing, scaling, and managing edge solutions with open source platforms like Kubernetes. Download now to learn how to build resilient, mission-critical edge applications.

    Download

  • CW ASEAN: SD-WAN helps find best route to cloud

    This year, more enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently support their increasingly cloud-based application mix. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises gearing up for this eventuality.

    Download

  • Essential Guide: APAC women in cyber security

    In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.

    Download

  • Dutch IoT value still not understood

    The Netherlands is a country where tech is being applied to all manner of business challenges and a magnet for tech innovators. So why, according to research, are almost 90% of businesses in the Netherlands barely aware of the competitive advantages the internet of things (IoT) can offer them? Read more about it in this issue.

    Download

  • Top 10 AI skills your team needs to put your cloud to work

    In this white paper, you'll discover the top 10 AI skills your tech team needs to leverage cloud computing. From data analysis to machine learning and ethical AI, this white paper explores the critical capabilities required to successfully implement AI models and drive business value. Read the full white paper to build your team's AI expertise.

    Download

  • Get Started with Red Hat Ansible Automaton Platform

    In this e-book, discover everything you need to get started with Ansible Automation Platform, including key automation concepts, product features and capabilities, use cases for gaining value quickly, and strategies for implementing organization-wide automation.

    Download

  • MicroScope: Grasp the social networking opportunity

    An issue looking at the issues around social media, the growth in unclouding and some security industry predictions for the year ahead.

    Download

  • For Dummies E-book: Data Observability

    This For Dummies e-book explores the evolving landscape of data management and the crucial role that detecting, resolving, and preventing data issues (also known as data observability) plays in this process. Read on to gain a deeper understanding of the value data observability brings to your organization.

    Download

  • Computer Weekly – 8 August 2017: Formula 1 Goes Digital

    In this week's Computer Weekly, we find out how Formula 1 chief Ross Brawn is turning to digitization to enhance the fan experience of Grand Prix racing. We also learn how virtual reality is being used to deliver healthcare services. And our experts examine the ethical concerns around artificial intelligence. Read the issue now.

    Download

  • Covid-19: Three steps to remote working effectiveness

    Staff are going to have to work from home, if they can, for the foreseeable future. We look at steps to ensure they remain fit and productive

    Download

  • Discover 4 key strategies for modernizing drug discovery with AI

    Discover 4 key strategies to modernize drug discovery and the pharmaceutical industry with AI, including overcoming challenges around data, collaboration, reproducibility, and cost control. Learn how a unified AI platform can drive breakthroughs and accelerate time to market. Read the white paper.

    Download

  • Cloud-Based Disaster Recovery: An Essential Guide to DRaaS

    Discover how cloud-based DRaaS solutions can enhance your disaster recovery strategy. Explore the benefits of DRaaS, including improved security, faster recovery, and reduced costs. Download this e-book to learn how to build an effective DRaaS plan and choose the right provider for your organization.

    Download

  • 47-page E-book: Deep Dive on Session Border Controllers

    What are session border controllers (SBCs), and how do they function in a communications strategy? For answers, and for a deep dive on SBCs, tap into this 47-page e-book.

    Download

  • Royal Holloway: Security evaluation of network traffic mirroring in public cloud

    This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.

    Download

  • NFV open source: How service providers are innovating their network

    Learn how to have a successful transition to NFV open source by gaining valuable insight on how open source for NFV applications will require service providers to adopt new ways of designing, deploying and supporting their network infrastructure.

    Download

  • Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?

    In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.

    Download

  • Modernize your customer and technical enablement program blueprints

    Modernize your customer, partner, and sales enablement programs to accelerate time to value and drive revenue. Learn how hands-on learning environments can improve product adoption, utilization, and proficiency. Download the white paper to explore blueprints for modernizing your enablement programs.

    Download

  • The Ultimate Guide to Cyber Hygiene

    It’s critical for organizations to deeply understand their risk posture and have tools in place that provide the endpoint visibility and control needed to detect and remediate security breaches. This white paper provides the benchmarks and security strategies that set IT teams up for success in proactively planning defenses against cyber threats.

    Download

  • Fortinet FortiFlex: Security Licensing at the Speed of Digital Acceleration

    Discover in this product overview how Fortinet FortiFlex can help your organization right-size your security and spend while implementing the comprehensive usage-based security program you need.

    Download

  • How to achieve container security best practice

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

    Download

  • How to achieve container security best practice

    In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.

    Download

  • Enabling tech-smart healthcare from the ground up

    To support their now-largest statewide healthcare organization, Banner Health aimed to centralize employee communication and patient response on a single all-in-one enterprise-class mobile device. In this case study, explore how they found their missing operational puzzle piece in Zebra’s TC52-HC mobile computers.

    Download

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

    Download

  • Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

    In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.

    Download

  • Royal Holloway: Purple team playbook – threat modeling for security testing

    The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams

    Download

  • CNAPP Fortinet Special Edition

    CNAPP solves key cloud security challenges with an integrated and automated approach that combines multiple capabilities in a single platform. Read the eBook to learn the key benefits of CNAPP, why a single-platform approach is best, and what to look for in a CNAPP vendor.

    Download

  • Top 10 software development stories of 2019

    There has never been a better time to be in software development. After years of being regarded as non-core, software development has quickly become a differentiator as businesses embark on digital transformations. Here are Computer Weekly's top 10 software development articles of 2019.

    Download

  • Ensure seamless SAP EWM changes with end-to-end impact analytics

    Ensure every SAP EWM change goes to plan with end-to-end impact analytics from ActiveDiscover. Gain visibility into how changes affect your entire supply chain and make informed decisions to drive successful transformations. Read the full Product Overview to learn more.

    Download