Mobile Application Testing – 01 Synergy

April 4th, 2012 by Rahul No comments »

01 Synergy offers a complete and comprehensive range of Mobile Application testing services from Unit Testing to User Acceptance Testing. Complexities across handset makers, carriers, locations and operating systems has made building bug-free mobile apps really difficult.

Our areas of expertise include:

  • Requirements Capture and Analysis
  • Test Planning
  • Test case Design
  • Test Execution
  • Defect Tracking & Management
  • Reporting
  • Test Metrics

01 Synergy offers a wide range of Mobile Application testing services, including:

  • Functional Testing
  • Security Testing
  • Load & Performance Testing
  • Localization Testing
  • Usability Testing

Our QA professionals can help you with all your Mobile App testing projects,  including:

  • iOS Application Testing (iPhone, iPad, iPod Touch)
  • Android Application Testing
  • BlackBerry Application Testing
  • Windows Phone 7 Application Testing

01 Synergy is here to help, if you have a need to discuss Mobile application testing, agile testing, do count on us to help. Visit us online at or send us a mail here:

Sonata Software targets at 21-22% EBITA margins

August 21st, 2014 by Amrinder No comments »

In an interview to CNBC-TV18, N Venkatraman, CFO, Sonata Software confirmed that the compnay was serioulsy looking at acquistion plans and was in the process of evaluating targets for the same. “We are seriously looking at acquisition plans in the geographies of US and Europe, as well as India,” said Venkatraman. The company mostly plans to fund these acquisitions via internal accruals based on healthy cash balances on back of consistent growth seen in the past few quarters, he said. The company also plans to bring down the EBITDA margins to 21-22 percent from the current 25 percent, and sustain the number via growth. He said they would also aim to bring down the dependency on the top ten customers from 75 percent to about 50-60 percent over a period of time. Below is the transcript of N Venkatraman’s interview with Sumaira Abidi and Anuj Singhal on CNBC-TV18. Anuj: Religare report says the company plans to double IT services revenues over the next three years and has an option of acquisition to do that. Could you tell us if you have identified any particular company and what is the timeline you are looking at in terms of acquisition? A: As we have been talking about in our conference calls and to investors, we are seriously looking at acquisition plans in the geographies of US and Europe, as well as India. We have got specified areas where we are looking at companies to acquire and right now we are in the process of evaluating targets that are being brought to us by bankers and others. Sumaira: We understand that you have quite a strong cash balance on your books but could you take us through how you plan to fund these acquisitions, what is the thought process on that? A: The way we would fund these is typically through internal accruals and leverage as on the basis required. So, it would essentially be our internal accruals because we have got healthy cash balances and also we get good cash additions every quarter. So, both of them would be put to good use by our board. Anuj: What kind of EPS growth trajectory can your investors expect? A: We don’t give any forward looking guidance but all I can say is we have a healthy plan and we are in a place where we have shown consistent growth in the past few quarters and are confident that we will be able to maintain this trend for some time to come. Our EBITA percentage which is currently at 25 percent this quarter, we would like it to stay at 21-22 percent. We would like to sustain that number as we look forward and invest; we balance in growing the business. Sumaira: You have seen healthy addition in terms of new customers, but at what do you think your dependence on your top 10 customers could come down a bit? A: Our current dependency on the top 10 customers is about 75 percent, which is not alarming for a company of our size but there are efforts that our next ten customers contribute to a larger share of our business. So we would like to bring it down as we progress through a healthy growth of the next ten customers to something like 50-60 percent over a period of time.


US hospital breach biggest yet to exploit Heartbleed bug

August 21st, 2014 by Amrinder No comments »

Hackers who stole the personal data of about 4.5 million patients of hospital group Community Health Systems broke into the company’s computer system by exploiting the “Heartbleed” internet bug, making it the first known large-scale cyber attack using the flaw, according to a security expert.

The hackers, taking advantage of the pernicious vulnerability that surfaced in April, got into the system by using the Heartbleed bug in equipment made by Juniper Networks, David Kennedy, chief executive of TrustedSec, told Reuters on Wednesday.

Kennedy said that multiple sources familiar with the investigation into the attack had confirmed that Heartbleed had given the hackers access to the system.

Community Health Systems said on Monday that the attack had originated in China.

Kennedy, who testified before the US Congress on security flaws in the website that Americans use to sign up for Obamacare health insurance programs, said the hospital operator uses Juniper’s equipment to provide remote access to employees through a virtual private network, or VPN.

The hackers used stolen credentials to log into the network posing as employees, Kennedy said. Once in, they hacked their way into a database and stole millions of social security numbers and other records, he said.

Heartbleed is a major bug in OpenSSL encryption software that is widely used to secure websites and technology products including mobile phones, data center software and telecommunications equipment.

It makes systems vulnerable to data theft by hackers who can attack them without leaving a trace.

Community Health Systems, one of the biggest US hospital groups, said the information stolen included patient names, addresses, birth dates, phone numbers and social security numbers of people who were referred or received services from doctors affiliated with the company over the last five years.

Representatives of Community Health Systems could not be reached for comment. A Juniper spokeswoman said she had no immediate comment.

A spokesman for FireEye’s Mandiant forensics unit, which is leading the investigation into the breach, declined to comment.


Why IBM Has Dumped The PC Hardware Business

August 21st, 2014 by Amrinder No comments »

With the sale of first its desktop PC business and now its server business to Chinese partner Lenovo, IBM has come full circle. By exiting the hardware business IBM leaves behind the low-end market it invented and returns to its roots in high performance computers, software, and a focus on the client.

Computer industry companies have to spot opportunities and ensure they change products to take advantage of shifting markets. It is an industry where leading companies can go from boom to bust in a short time, and there are many examples of those that failed to move quickly enough. The once innovative Sun Microsystems was swallowed by Oracle, the formerly cutting-edge DEC was bought by Compaq, and Compaq, instrumental in breaking open the PC market from IBM’s grip, was itself swallowed by HP. In the 1990s the world’s most popular computer games were written specifically for the 3D graphics chips from 3Dfx; just a few short years later the firm was bankrupt and snapped up by competitor Nvidia. Each had fixated on a certain product range, and failed to see the evolution of the market.

While many companies in the computing industry, especially those such as Dell that focus on selling mass-market desktop systems, try to understand what their existing product range should be and where it needs updating, IBM provides a good example of how a large corporation can at first lead, then detect where it is failing, and find a renewed focus.

For such as large organisation (431,000 employees worldwide), IBM has managed to do this seamlessly, emerging as one of the leaders of the new growth areas of cloud computing and “big data” processing. Having taken a three-decade detour into desktop boxes, IBM returns to the likes of the large, powerful computers such as the System/390 that the firm was famous for.

Microsoft, Intel and Apple have managed to plot successful paths though the industry’s rapid changes, and each has led the market in certain areas: Intel’s inventive microprocessors, Apple’s groundbreaking user interface design, and Microsoft Windows which, love it or hate it, still dominates the industry. The change in approach can be seen as the move away from selling units, towards providing client-focused services. This can be seen in IT security, where the sales of security hardware such as firewalls has remained fairly static but the demand for security consultancy services and support has rapidly increased.

Overall the market for IT hardware remains fairly static, but the provision for cloud computing and big data processing is expanding fast, highlighting the increasing dependence of many market sectors on the provision of web services. IBM’s remarkable volte face is to have transformed from a company built upon defining and protecting its own hardware standards and control the industry, to one built on software and high-performance systems that embrace open standards, as indicated by the company’s wholehearted acceptance of Linux and open source software. It is still one of the most innovative companies in the world, boasting five Nobel Prizes, numerous awards, and a list of inventions that include the cash point (ATM), magnetic stripe cards, barcodes, relational databases, and floppy and hard disks.

IBM’s renewed focus on moving its business has been highlighted recently with its roadmap for the future which for the first time was not focused on hardware systems but instead on cloud computing and big data. And the company is not alone in seeing these changes, as many companies invest in scaling business applications toward providing for cloud infrastructure.

Companies in the past have depended on the individual computers, but increasingly it is their use as part of a cloud and the capacity to collect, store and process data that is their most important asset. The cloud — the combined horsepower of thousands of companies and website software services — will become the most powerful distributed computer ever built.

IBM have shown it is moving towards this vision, which could bring benefits to every citizen, especially in evolving areas such as in health care and education.The Conversation

Bill Buchanan is Head, Centre for Distributed Computing, Networks and Security at Edinburgh Napier University. He does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations.


Get Adobe Flash player