Our insightful blogs

  • Published On: 8 March 2021By

    What is Ansible ? Ansible is a simple open source IT engine which automates application deployment, intra-service orchestration,configuration management and many other IT needs. Ansible is easy to deploy because

    • Performance and Security
  • Published On: 4 March 2021By

    Hello Folks, If you are new to AWS lambda and don't have any idea about what are lambda functions, this article is especially for you.  There is no prerequisite for

    • Cloud
  • Published On: 24 February 2021By

    GraphQL A Query Language for APIs GraphQL is a new API standard that provides a more efficient, powerful, and flexible alternative to REST. It was developed and open-sourced by Facebook

    • Digital Engineering
    • General
  • Published On: 24 February 2021By

    Dealing with timezones using moment.js This document covers common use cases one may have to deal with while handling timezones in applications. The local time within a time zone is

    • General
  • Published On: 11 February 2021By

    Appium:-  Appium is an open source, cross-platform mobile application testing tool. Support Json Support automation test on physical device as well as Similar or emulator both. It no dependency on

    • Quality Engineering
  • Published On: 11 February 2021By

    Load Testing:- Load Testing is a non-functional testing process in which performance of software is tested under a specific load. It determines how the software application behaves being accessed by multiple

    • Quality Engineering
  • Published On: 22 January 2021By

    Description- Learn to push and pull code on bitbucket Definition of Bitbucket- Bitbucket Cloud is a Git based code hosting and collaboration tool, built for teams. It provide one place

    • Quality Engineering
  • Published On: 22 January 2021By

    What is Penetration Testing ? Penetration testing, also called pen testing , is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.

    • Quality Engineering