Author: Tech Advisors

Writing Effective Test Cases – Part 1

Writing effective test cases is crucial to any software project, because it is the first step in any testing cycle. If anything goes wrong in this step, the impacts are extrapolated as you move forward in the testing cycle. This blog is intended to provide the steps to writing effective test cases. Here are the basics: What’s a test case? Fig – 1: Documenting test cases in a test plan. IEEE Standard 610 (1990) defines a test case: (1): “A set of test inputs, execution conditions, and expected results developed for a particular objective, that exercises a particular program,...

Read More

ASP.Net Web API Walkthrough

Introduction REST (Representational State Transfer Protocol) is an architectural style to develop distributed applications. It uses HTTP protocol to easily perform CRUD (Create, Retrieve, Update, and Delete) operations on the server. It is based on a representation of resources. A resource is an object that can be accessed on the World Wide Web (i.e. a record in database). When a user requests a resource from the server, the server returns the representation of that resource. The Web server responds to client calls by retrieving information from the database and returning a result. In classical WCF service a method like...

Read More

The Importance of Restful Services in Modern Software Development

Before I discuss the importance of restful services, I will briefly review Web services and SOAP based web services. What are Web Services? Web services are web application components that can be published, found, and used on the Web. They help to solve the interoperability problem by giving different applications a way to link their data. They use XML to code and to decode data. By using Web services you can exchange data between different applications and different platforms. What are SOAP based Services? SOAP stands for Simple Object Access Protocol. It is a protocol for exchanging structured information in...

Read More

Authentication of REST APIs while working with web requests

Authentication is the gate pass of any secure information. If we have to access some secure information which is being provided by using REST APIs, then we must be authorized to access that information. In REST APIs, normally two different methods of authentication are implemented. One is when you try to access the web page or API, it opens a dialog to accept the credentials. Whenever someone will open that page he has to provide credentials. If those credentials are authorized then that person will be granted access to that web page. The second option is, to create a...

Read More

Analyzing Artificial Intelligence

This article aims to open a space at AAJ Technologies where we analyze and discuss the different areas of applications, and the various techniques of Artificial Intelligence (AI) currently being investigated and developed in this fascinating field of science and engineering. We will try to define some of the characteristics and fundamentals of artificial intelligence from its formalization in the mid-50s, when John McCarthy coined the term “artificial intelligence” and defined it as “the science and ingenuity making intelligent machines, especially intelligent computer programs.” For thousands of years we have tried to understand how we think. That is, how...

Read More

The Coursera Experience

Coursera (https://www.coursera.org) is a free online training website. It includes great courses from renowned universities around the world In the last years I took some courses there and I would like to share my experience. Great things It is free!!! There are a lot of courses that you can access without paying a dime. You just need to register. The quality is excellent. The courses are provided by top universities. The courses aim to teach theory. This is a big difference from other online learning sites, which are focused on specific technologies, platforms, frameworks, etc. You can access the...

Read More