Since the millennium bug there has been an explosion in test automation. The expansion of automated tools from vendors such as Mercury Interactive, IBM Rational, Segue and others has really delivered automated testing into the heart of just about every major organisation in the western world. And this can be seen to continue with new development methodologies such as eXtreme programming which has test automation at the heart of its design.So why Automate? Well, the major benefits are:SpeedAutomated tests can run much faster than the manual equivalent, so more testing can be achieved in a smaller time frame. It is not unusual to see regression suites that take two weeks manually reduced to 24 hours with test tools!Consistency/repeatabilityAutomated tests can be repeated over and over and will always perform the test exactly as recorded. Manual testers can easily make mistakes or perform the same test slightly differently when repeated.Unattended reduce costOnce developed, the automated testing can be executed unattended overnight, so repeating the testing requires very little resource or cost.Audit trailThe tests are stored as automated scripts and the test results are stored for every execution of the tests providing a full audit trail of all testing performed.Improved Test CoverageAs the test pack develops, more & more tests can be added and as the execution time is much faster than manual testing and less resource intensive, more testing can be completed, ensuring greater coverage of the application under test.Free up testers to perform other tasksIf the structured testing is automated, testers will hopefully have more time to perform other types of testing (accessibility, usability, ad-hoc/random testing) which commonly get pushed aside.Some testing may only be possible with automationFor example how do you manually simulate 5000 concurrent customers performing transactions on your on-line web site?What types of tools are available?Functional/regression automated toolsThese tools capture user interaction with the application under test and can then be replayed. However they go beyond this and allow you to data-drive tests, to capture the state of your application whilst performing business processes and provide fully-featured development environments allowing you to manipulate applications in almost any kind of way. Tools such as Mercurys WinRunner or QuickTest Professional demonstrate the pinnacle of what these kinds of tools are capable of.Load/Performance toolsThese are used to emulate multiple (concurrent) users performing tasks against your application, for example if your business has an on-line banking system how many users can it support? What kind of performance will it deliver under load? Where are the bottlenecks? All of these kinds of questions can be answered using automated load testing tools such as Mercurys LoadRunner.Test ManagementTools such as Mercurys TestDirector or Quality Center offer Test Management facilities; a central repository to store test requirements, test scripts, execution results and defect tracking, integrating seamlessly with the automated tools such as WinRunner, LoadRunner and QuickTest Pro.So what are the pitfalls to test automation?It is easy for these tools to become shelfware as purchasers do not consider the complexity and power of some of these tools.They all share a steep learning curve, so some time and money need to be invested into getting your team up to scratch with the tools.Some solutions to good automation implementation:Technical Testers. Ensure your testers have a reasonable grasp of technology, some programming experience would be ideal.Training, Training, Training. Good training programs are offered for these tools and are well worth the investment. The trainers usually have good project background experience and can demonstrate how the tools should be used and explain the pitfalls.Hand-holding for the basic infrastructure. Following the training it is well worth getting a consultant in for a few days or weeks to build the basic automated infrastructure, provide on-site training against your application and to develop templates for your team to expand the test automation out from. They can achieve in weeks what could take you months to learn.Tools such as LoadRunner, WinRunner, QuickTest Pro, TestDirector, Quality Center can provide a great return on investment in the longer term, but to make them effective do invest in training and assistance at the beginning.
One of the hazards of using a computer online today is the danger of infestation with a variety of malware, viruses, trojan horses, spyware, zombieware, worms, loggers, dialers - no matter what you're infected with, it carries the dangers of: - Reduced performance - Unwanted emailing - Damage to your data, or even to your bios (which means your computer is toast) - Theft of your data, up to and including all your personal information When malware is released in a large network, the results can be even worse, with mass infections causing shutdowns of entire systems, theft of corporate data, and revenue loss that can rise into the millions. Fortunately, a few free programs and sensible use of your computer can prevent these nasty things from happening to your computer. Virus ProtectionInstall a decent virus protection software. You can download AVG Anti-Virus Free edition which is free for personal use, and ensure it's constantly updated. AVG is easy to use, takes very few system resources, provides rapid virus database updates, and other great features like Automatic updates, E-mail Scanner etc. And has excellent technical help available which other free antivirus software's lack.Firewall ProtectionIf your OS is Windows XP, a default firewall comes with it, but you may be better off downloading another free firewall and using it since the Windows firewall has been shown to have some of the same security holes as IE and Windows. That doesn't mean the Windows firewall is bad, it just means that using software developed by different teams of developers will protect you better. ZoneAlarm is a great free software for home users. It has got all the features a home user needs. Has simple interface, is easy to use and customize, works with little or no configuration. Spyware ProtectionYou should also keep good anti-spyware software on your computer. Spybot - Search and Destroy is one of many good examples of these, and it's free. Be wary of anti-spyware programs that advertise via pop-ups; these "anti-spyware" programs sometimes contain some of the same problems they supposedly protect you from! Spybot S&D is one of the best free Anti-Spyware software, I have been using it for last couple of years. Spybot is great at keeping spyware out of the systems. The program has an easy to use interface, very user friendly system. The program takes out cookies, spyware, ads, and many other things you do not want it. Apart from Spyware removal Spybot has other Advanced tools like:- Secure Shredder Securely remove files you no longer want from your hard disk.- BHOs Show and manage the Browser Helper Objects from your Internet Explorer- IE tweaks Modify some hidden Internet Explorer settings.- Hosts File Take a look at your hosts list.- System Internals Search for registry inconsistencies- System Startup Show and manage the applications that your machine will run on System Startup.- Uninstall info Show all registered software uninstall entries Sensible Personal PrecautionsMost viruses come from your email. This cannot be overemphasized. Never open an email attachment that you weren't expecting; always check with the person who emailed it to you, through a phone call or just via email or chat, to make certain it is a real attachment that's safe to open. Other viruses come from illegal and legal downloads. If you're downloading illegal software or data, you can expect to find viruses in a pretty high percentage of it. What's tragic is that a lot of illegal viruses creep into legal download sites. This is why you need to maintain your virus protection program in an up-to-date manner, even when you're careful about downloads. A few viruses are attached to web pages. Though their servers generally shut them down as soon as they're found, or your server blocks the sites to protect you, you'll find a few viruses that download to your computer simply by visiting a site. You can protect yourself by maintaining the Internet Explorer security settings at a medium level or higher, or by using alternate browsers like Firefox with good security. Spyware often comes from "free" programs. You've seen those cool screen-savers for free? Spyware. Try to download free programs from places that vet their software carefully. With these three software's (available for download at syschat.com) installed and some personal precautions your computer should be spyware and virus free.
Free spyware stoppers are programs capable of stopping harmful software programs known as Spyware from infecting your computer. If your computer becomes infected with a Spyware program, the Spyware will send information about you and your computer habits back to the Spyware owner, without you knowledge or consent. Information sent back to the Spyware owner can often include very private data, such as lists of all your visited websites, details about online purchases, credit card information etcetera. Information gathered by Spyware is usually used for commercial gain, but has been used for much more malicious schemes as well, such as credit card frauds and identity theft. To avoid this from happening to you, you can install one of the many free Spyware stoppers that are available online. Take your time and compare several free Spyware stoppers, since their quality and reliability can vary considerably. Some free Spyware stoppers are available in a more advanced version for a fee. Unlike computer virus programs and common worms, Spyware programs usually refrain from self-replication. Instead, the computer user is lured into accepting a download of the Spyware program from the web. Spyware can be included in a popular software program, such as game. If you download music from the web without a using any of the Spyware stoppers, you will most likely infect your computer with Spyware sooner or later. Spyware can however download it self to your computer even if you refrain completely from downloading music and programs from the Internet which is one the reasons why it so important to use free spyware stoppers.. A simple click on a fake X when you try to close a pop-up window is enough for a download to begin, without you even noticing it. As of 2005, computer users that are running Microsoft Windows operating systems are most exposed to Spyware, and will benefit most from installing free Spyware stoppers. There are however a few new Spyware programs and worms out there today that can infect Linux and other UNIX platforms. If you are a UNIX user you should therefore also check out the free Spyware programs, to be on the safe side. Unlike Virus program, Spyware programs will often make an effort not to disturb you. By not interfering with the computers normal tasks, kidnapping your mailbox or deleting any information - typical Virus actions - the Spyware can stay unnoticed inside your computer and continue to send out more and more information about you. This is why you should take advantage of the many free Spyware stoppers that are available online. By simply downloading one of the free Spyware stoppers from a reputable site you can put an end to the Spyware problem and protect your privacy. When you choose between the various free Spyware stoppers, you should ideally pick one that will not only stop all attempts to install Spyware on your computer. Instead, choose one of the free Spyware stoppers that are also capable of scanning your entire computer and removing any existing Spyware from it. Good free Spyware stoppers should also be easy to download and install and hassle free to manage. If you experience problems with your free Spyware stoppers, you should take advantage of the fact that they are free and simply choose a new one among the many free Spyware stoppers that are available today. Since all computer users have their own personal preferences and needs, free Spyware stoppers that are right for your friends might not be right for you.
Serial Monitor allows intercepting, monitoring and logging of all serial (COM) port traffic in real-time
Monitor Serial Port ActivitiesIf you are developing or debugging serial-port based hardware, analyzing or reverse-engineering protocols employed by a certain serial device, or are developing software that communicates with such devices, sooner or later you'll need to see what data comes through the COM ports.Serial Monitor allows intercepting, monitoring and logging of all serial (COM) port traffic in real-time. It captures data transmitted through all RS232 ports on your computer simultaneously, and provides access to the COM port data in an easily readable format.Serial (COM) ports have been around in all PCs since IBM first released a personal computer. While today more and more computers are coming without RS232 connections and are being replaced with USB, computers equipped with serial ports and RS232 hardware are still widely available on the market. These devices are usually inexpensive thanks to the simplicity of development, and provide great value to the consumers.While developing communication software that works with devices connected through "serial port" s is relatively easy, it is still quite impossible to do without seeing what is being transmitted through the COM ports from the device to your software product. It is also quite impossible to develop a stable application without taking care of the various aspects of serial port programming such as different port speeds, synchronization issues, buffering, and port states.Developing or debugging communication hardware can be even harder as hardware developers have special needs in logging and analyzing data sent or received through the COM ports. There aren't that many development tools that help with debugging devices for COM ports.To make things even more complicated, there aren't many tools at all that provide any meaningful output besides the raw data. A proper tool should allow you to analyze the performance of the device, play back serial port activities in real-time or in slow motion, and transmit captured or new data to the COM port.Serial Monitor by HHD Software is fully capable of intercepting, logging and analyzing data transferred between a Windows PC and any number of COM port devices in real-time. Sure you'll have access to the raw COM port data, but for easy debugging and reverse-engineering a more convenient presentation of the data transmitted through the COM ports is readily available. Serial Monitor can decompose the data and provide output in the convenient MODBUS and PPP (Point-to-Point Protocol) formats, allowing you to create your own MODBUS packets and transmit them to the device.Are you using separate tools for analyzing device logs? Serial Monitor supports exporting data to several popular formats for easy analysis. Not using third-party tools? Serial Monitor has a built-in statistics analyzer offering a graphical Statistic View.If you are used to the look of console-based serial terminals of the ancient days, you'll be pleasantly surprised by the modern sleek look and convenient views provided by Serial Monitor. HHD Software recognizes the needs of today's developers using big-screen hi-resolution monitors, and provides a scalable, adjustable and fully customizable user interface with vector icons that look smooth at any resolution.Serial Monitor is part of the Device Monitoring Studio family that offers USB and COM port monitoring to software and hardware developers. Serial Monitor comes in four editions and six license types, powerful enough for the most demanding user while remaining well within reach of corporate and individual developers. Download your free evaluation copy now: http://www.hhdsoftware.com/
Seclore: Information Rights management (IRM) Company, ERM Solutions providerSeclore Information rights management provides information security for securing and tracking usage of sensitive information stored in distributed documents or shared with vendors for outsourced processing. Seclore controls usage of your data, wherever it is. Seclore recognizes the importance of securing intellectual property and provides effective solutions to address all information "rights management" needs of an enterprise. Seclore has expertise in following areas1.Information usage control2.Information rights management3.Enterprise DRMIt protects data that is contained in files, folders or provided to a vendor for outsourced processes. Seclore offers IRM solutions namely:-1.Seclore InfoSourceSeclore InfoSource helps to protect sensitive information outsourced to business partners for further processing. Seclore InfoSource protects the data to be shared with the service provider upon its creation, by encrypting it and applying pre-defined usage policies. The usage policies ensure that that the information is used only for the specific purpose defined at the service provider's location by a specific application on a specific set of computers within a specific time period. 2.Seclore FileSecureSeclore FileSecure empowers individual users to be in full control of the documents' usage for documents owned by them. After creating the document, the owner can set specific usage rights for specific users and distribute the document with full confidence that the usage rights will be applied on the document every time it is accessed, regardless of where the document or its copy is physically present.3. Seclore WebProtectSensitive information is available on the web, which if downloaded or distributed outside a closed group could result in huge losses. Seclore WebProtect addresses this by providing end-to-end protection for web content. Seclore Information Rights Management uses encryption to widen the information management beyond the boundaries to every document of an organization containing sensitive information which is stored and accessed everywhere - on end user desktops and laptops or outsourced business partner.Seclore "Information Rights Management" enables enterprises to be in full control of usage of its sensitive information regardless of how it is shared / distributed and where it physically exists.For further information you can log on to http://www.seclore.com