PinnedHow to handle Stale element exception in Playwright??The StaleElementReferenceException is a very common exception that we face in our Selenium tests. It could happen because of belwo two…Feb 24, 2023Feb 24, 2023
PinnedHow do you do code review/walkthroughs of automation scripts of your teammates?Code reviews through Pull Requests are part of our day to day activities while working on automation. I have consolidated some of the…Feb 24, 2023A response icon1Feb 24, 2023A response icon1
PinnedRunning/overriding Cucumber Options from maven command lineLast week I have posted running Automation tests from command line which is integrated with TestNG.Jun 26, 2021Jun 26, 2021
PinnedRunning tests from maven command line: Different optionsWhen we work on developing automation scripts ,we may sometime need run based on different conditions. Let us see some here.Jun 18, 2021A response icon2Jun 18, 2021A response icon2
Attention Is All You Need: A Self-Help Perspective Inspired by AI’s Greatest BreakthroughAI paper titled “Attention Is All You Need” introduced a new way for machines to understand language — by learning to focus on what mattersJun 6Jun 6
SolarWinds Unshaded: A Deep Dive into the 2020 Supply Chain Breach — Cyber ThreatBy analyzing the attack lifecycle, detection challenges, and defensive takeaways, this case study aims to offer a practical and technicalMay 5May 5
Information Security Audits in Healthcare: Planning, Activities & Compliance Essentialsthis article to demonstrate how a well-structured security audit plan can help safeguard digital assets and maintain trust.May 4May 4
Comprehensive Analysis of INFORMATION SECURITY Auditing Standards and Models from Academic PapersThis article explores and compares key IT auditing standards — COBIT, ITIL, and ISO/IEC 27001/27002 — along with other relevant frameworks.May 4May 4
Identity and Access Management (IAM) in Cloud Security: Best Practices and solutionsIn cloud security, Identity and Access Management (IAM) plays a critical role in safeguarding resources by controlling who can access what…Mar 20A response icon1Mar 20A response icon1