Identify and Overcome your QA Mishaps Before it’s too Late

Aug 26, 2021

The world is in a race to make lives easier. Promising a good experience comes with the added baggage of promising quality. ...

read more
Here’s Why You Need API Management Solutions

Jul 09, 2021

The democratization of the internet has enabled and empowered people and businesses to access the required information from anywhere at any time. ...

read more
Must Have Product Engineering Technologies of 2021

Jan 18, 2021

The COVID-19 pandemic has accelerated the digital transformation of organizations, and ISVs must rise to the occasion by upgrading their technologies and building better solutions. ...

read more
Vagrant: Building stronger workflows in DevOps

Mar 05, 2019

In my previous post, I spoke about DevOps in 2019, and the surge that is expected in DevOps practices across the Software Development LifeCycle (SDLC). From here on, we will be taking different DevOps tools and environments which are expected to contribute the most towards the DevOps tool market in 2019.Servers are moving faster...

read more
DevOps in 2019: Tools & Best Practices

Jan 21, 2019

Improving the Software Development Lifecycle (SDLC) from design through development and production is essential for better applications and even better team performance. DevOps is a software engineering practice to improve the SDLC process from design through the development process to production support that unifies Software De...

read more
Entity Framework – What and Why?

Dec 03, 2018

Entity Framework is an open source object relational model framework for the applications built on .NET. It facilitates the developers to work with data without looking into underlying database tables and columns where the data is stored. With Entity Framework in place, developers can now create and maintain data-oriented applic...

read more
What is Digital in Mortgage?

Apr 24, 2017

Digital or Digitalization is an umbrella term for the services using digital technologies, mainly on the Internet, but also including mobile phones, display advertising, and any other digital medium.This is going to be a series of posts on digital mortgage, in the attempt to discuss and give a clear picture of what is the digita...

read more
How to – Build, Sign and Zipalign the already generated apk with existing key store file.

Mar 02, 2017

Updating an app on Play store is something which is a routine task if you wish to optimize the app and increase usability for the users. When we try to publish an update for an existing app to play store we SHOULD use the existing key store file which we used while initially publishing the app on play store.While trying to achie...

read more
How To: Background jobs in Web Application using Hangfire

Feb 09, 2017

Don’t you not like it one bit when users think that your application is sluggish? And you know that, you really cannot do anything about it, because it is interacting with third party services, tools, vendors, and is just doing way too many tasks and some of them really complex.If you think, the user need not wait for the job to...

read more
Custom Auto Deployment: A Client – Server Model

Jan 22, 2016

Auto deployment is extremely useful when installations need to be carried out at multiple locations in a quick and effective manner.One of our customers, one of the major ISVs in Behavioral health with over a hundred client installations, were handling many such installations manually.  The process in place used deployment via r...

read more
Insecure Direct Object References – Closing the doors

Mar 04, 2015

We have all worked on scenarios where we grant system object access to certain users based on the parameter, provided by them. Sometimes, the user just changes the parameter passed as input intelligently, and she gets access to some restricted documents or db data.For example, you should not be able to see your manager’s review ...

read more
Cross-site Scripting (XSS) – Focus on validation for web applications

Feb 20, 2015

As a part of this security series, I had posted previously about SQL injection, and how this simple concept can manifest itself into a major security concern.  This blog post will focus on validation of input and output in a web application.In web-application it has been noticed that we validate the input most of the time. This ...

read more
SQL Injection – A simple query which can manifest as a security concern

Jan 27, 2015

In my previous blog,  I focused on the security issues associated with broken authentication and session management concerns. Here I shall focus on the security and the vulnerability quotient of an application.I will discuss about the threats and their possible solutions. I will also mention few tools that aid the hacker in outs...

read more
Broken Authentication and Session Management – A security concern

Dec 19, 2014

This blog post showcases the need for protecting user’s password, the password habits that the application should enforce to the end user, and the practices that a developer should follow to secure a user’s information, especially the session information. This blog will also focus on aspects of session management.Some key ...

read more