What’s new in Dynamics GP 2013?

The primary purpose of this article is to give GP end users, highlights of the key features that GP 2013 has to offer from a user perspective. Though there are many features in the new version, I have tried to come up with the top ten features in Dynamics GP 2013 that will be helpful for the end users and help them plan their migration accordingly.

Top 10 features in Dynamics GP 2013

1. Web Access

The employees had a very complicated experience in accessing and working with Microsoft GP since GP cannot be accessed from everywhere. But since the addition of the new feature Web Access in Microsoft Dynamics GP 2013, employees can connect and contribute from wherever they are by utilizing a PC or any mobile devices with the new Web Client. Continue reading »

Tags: Dynamics GP | Comments Off on What’s new in Dynamics GP 2013?


SQL Injection for Dummies

Being a Security Tester, I have one of the most teasing and innovative jobs in my profession. We, testers, are asked to identify as many major security vulnerabilities in the application, given limited time and resources. We have the constraint to explore the application in lesser time than the developers who build the application. We have to discover all the vulnerabilities present in the application, while the hacker conveniently has all the time and resources to do that. Well, that’s what makes this job interesting and challenging.

As SQL injection continues to be the dominant technique for data fraud, I would like to dedicate this blog to the topic in an effort to eliminate this problem. Let’s get started on the basics of how to identify an injection. Continue reading »

Tags: Testing | Comments Off on SQL Injection for Dummies


What’s the Mantra for detecting your security threats?

Many new applications are emerging out in the market on one-side and new security threats emerging on the other side. Earlier, product owners were not serious about their application security and they did not give much importance to security testing, since hackers were few in existence. However, now-a-days a large number of people have started hacking for fun, money and popularity. They either gain access to confidential information or inject malicious code to crash the system. Now, product owners have begun to understand the importance and criticality of application security and they want their products to be secure.

Testing the application’s security manually is possible but becomes a mammoth task. Well, the right tools should help a tester progress with detecting the security threats in the application. That leads us to the question: “What’s the mantra/right tool for detecting your security threats?” Well, the answer lies in the question itself. It’s the ‘MANTRA” browser. Mantra is an excellent browser-based framework for security testing. Continue reading »

Tags: Testing | Comments Off on What’s the Mantra for detecting your security threats?


Estimation for Software Testing

Do you estimate Testing effort as X% of Coding effort?

Scene 1:

The customer has provided adequate documentation on the requirements for the software to be developed and now requests for a quote. Pre-sales consultants, with a developer background, spend just enough time in analyzing the requirements and have discussions with the developers/architects/project managers on how much effort it would take for the development (analysis, design, coding, project management) in the specific architecture/technology. They would go through a series of refinements with various stakeholders before it is being projected to the customer. However, when it comes to the point of estimating the testing effort, the oft-heard response is: “Oh! Don’t you worry; it is just x% of the coding effort. That has worked for us…..”

Well, that’s a scene I have witnessed many a times.

Now, let’s cut to Scene 2: Continue reading »

Tags: Testing | Comments Off on Estimation for Software Testing


Near Field Communication (NFC)

When they were first introduced, Mobile Phones were meant to be just another means of communicating with people while on-the-go. However, with technological innovations and developments, these are now used for a variety of other purposes, than just keeping in touch with people. Mobile devices have now become an inseparable part of our daily lives and these would make life that much more easier if they could be further used for a host of other activities like making payments at store counters, opening parking barriers, purchasing tickets at public transport counters, etc..

Near Field Communication (NFC) is a technology that makes this possible. NFC belongs to a large family of technologies that enables two devices to communicate over a short distance through radio waves. NFC, in itself, is not a new technology, but its integration with mobile devices opens up a horde of hitherto unseen possibilities. The architecture of most mobile devices, which is inherently secure, makes it possible to develop extremely innovative NFC based services. NFC technology makes life easier and more convenient for consumers around the world by making it simpler to make transactions, exchange digital content, and connect electronic devices at the touch of button. Continue reading »

Tags: Mobile | Comments Off on Near Field Communication (NFC)


Archives

2016
2015
2014
2013
2012
Facebook Twitter Slideshare Congruent