Mobile Application Testing – 01 Synergy

April 4th, 2012 by Rahul No comments »

01 Synergy offers a complete and comprehensive range of Mobile Application testing services from Unit Testing to User Acceptance Testing. Complexities across handset makers, carriers, locations and operating systems has made building bug-free mobile apps really difficult.

Our areas of expertise include:

  • Requirements Capture and Analysis
  • Test Planning
  • Test case Design
  • Test Execution
  • Defect Tracking & Management
  • Reporting
  • Test Metrics

01 Synergy offers a wide range of Mobile Application testing services, including:

  • Functional Testing
  • Security Testing
  • Load & Performance Testing
  • Localization Testing
  • Usability Testing

Our QA professionals can help you with all your Mobile App testing projects,  including:

  • iOS Application Testing (iPhone, iPad, iPod Touch)
  • Android Application Testing
  • BlackBerry Application Testing
  • Windows Phone 7 Application Testing

01 Synergy is here to help, if you have a need to discuss Mobile application testing, agile testing, do count on us to help. Visit us online at or send us a mail here:

Protecting Intellectual Property Rights In Software After Alice Corp. v. CLS Bank

November 24th, 2014 by Amrinder No comments »

It is becoming clear that the Supreme Court’s decision in Alice Corp. Pty. Ltd. v. CLS Bank Int’l, 134 S.Ct. 2347 (2014) marks a sea change in the patentability of computer software. The numerous recent decisions invalidating software patents under Alice will force software owners and developers to find other ways to protect their investments in their software products. Chief among these alternatives are non-disclosure and confidentiality agreements and trade secret protections, but software owners should also keep in mind the potential for copyright protection for their intellectual property.

Under the two-step framework set forth in Alice, it can be relatively easy to characterize software patents as directed to an abstract idea because software applications often boil down to abstract steps or computations performed by a computer. Software patent claims are also often written in language that is both general and vague in order to gain a broad claim scope, heightening the abstract nature of the claims. Moreover, mere implementation of such general abstract steps in the form of computer software is not likely to satisfy Alice’s requirement of an “inventive concept” that can transform the idea into a patent eligible invention. This is especially true for software applications that perform business functions or do any sort of manipulation or analysis of data.

Since Alice, the Federal Circuit and District Courts around the country have invalidated all manner of computer software patents, almost uniformly holding that computer-implemented methods are not patent eligible. These post-Alice cases involve patents as complex as software that automatically synchronizes the lips and facial expressions of animated characters, McRO, Inc. v. Activision Publishing, Inc., 2014 U.S. Dist. LEXIS 135152 (C.D. Cal. Sept. 22, 2014), to straightforward methods that computerize the steps in guaranteeing a party’s performance of an online transaction. buySAFE, Inc. v. Google, Inc. 2014 U.S. App. LEXIS 16987 (Fed. Cir. Sept. 3, 2014). Here in the EDVA, Judge Leonie Brinkema recently invalidated, in almost summary fashion, patent claims relating to correlating two network accounting records to enhance the first record. Amdocs (Israel) Ltd. v. Openet Telecom, Inc., 2014 U.S. Dist. LEXIS 152447 (E.D. Va. Oct. 24, 2014).

The trend is clear. Software patents, especially software patents for performing business applications, are subject to serious challenge under Alice. As a result, software developers and owners will need to use other tools to protect their intellectual property. Chief among these tools is the use of non-disclosure and confidentiality agreements with employers, contractors, customers and potential investors. These and other measures to maintain secrecy are necessary to preserve protection under laws protecting trade secrets. Other tools include potential tort claims against competitors and third parties for tortious interference with contract and perhaps business conspiracy.

Using private contractual agreements and trade secret law to protect intellectual property, though, is not easy. It requires vigilance and attention to detail at all levels of a company. Software owners must make sure that they obtain non-disclosure agreements whenever they reveal any confidential information. They must also insist on employment agreements and vendor contracts that make clear their ownership rights and must regularly update and renew these agreements over the course of time. When dealing with potential customers and investors, software owners must be able to discuss the value of their product at a non-trade secret level to avoid inadvertent disclosure of confidential information. Protecting secrecy may also limit the ability to use emerging technologies, such as cloud computing, that can pose threats to the secrecy of software code.

Finally, software owners should consider their rights under copyright law. The Federal Circuit’s recent decision in Oracle America, Inc. v. Google Inc., 750 F.3d 1339 (2014) clarifies how broadly copyright law protects software, but a petition for certiorari is now pending before the Supreme Court (a good summary of the cert. petition can be found here at Patently-O). A copyright claim requires evidence that a defendant had some access to the software that could support a finding of copying, however, and so provides far narrower protection that patent law.

After Alice, the approach software owners must take towards protection of their intellectual property is in many ways the opposite of the strategy for obtaining patent protection. Instead of trading the disclosure of their intellectual property in a patent for exclusivity for a period of time, software owners must focus on using non-disclosure and secrecy to obtain exclusivity. Maintaining such secrecy while exploiting a software product in the marketplace is difficult, but after Alice, the choice between patenting and secrecy for software owners now falls very clearly on the side of secrecy.


SUSE invests in software-defined storage

November 24th, 2014 by Amrinder No comments »

Software-defined storage (SDS), which enables enterprises to make the best use of their storage resources without the blood, sweat, and tears of hand-tuning them, is increasingly becoming an option offered by enterprise Linux companies.

The latest Linux company to make the jump towards an SDS offering is SUSE. The Nürnberg, Germany-headquartered company has begun beta testing SUSE Storage.

SUSE Storage is based on Ceph. This is an open-source distributed object store and file system. SUSE claims that its new program will give companies “a self-healing, self-managing, distributed software-based storage solution for enterprise customers”. Thus, by “using SUSE Storage and commodity off-the-shelf (COTS) disk arrays, customers can cost effectively meet growing demands for object, archival, and bulk storage”.

This new program will be based on Ceph Firefly. SUSE claims that SUSE Storage will deliver a lower total cost of ownership, and that it will be well suited for object, archival, and bulk storage. Its features will include cache tiering, thin provisioning, remote replication, copy-on-write cloning, and erasure coding.

SUSE isn’t the only one that thinks Ceph makes for a great SDS solution. Red Hat has already released its Red Hat Storage Sever 3. Red Hat also has the advantage of owning Inktank, Ceph’s parent company.

Still, SDS is in its early days, and there’s no clear winner yet. Larry Morris, SUSE Storage product manager, is perfectly correct when he said in a statement, “The storage market today is poised for disruptive change, just like the server market was 15 years ago.”

SUSE Storage is scheduled for release in the first half of 2015. Organizations interested in joining the beta program should contact their SUSE sales representative.


Regin: Newly uncovered malicious software snooping since 2008 ‘was developed by a nation state’

November 24th, 2014 by Amrinder No comments »

An advanced malicious software application has been uncovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, antivirus software maker Symantec Corp said in a report on Sunday.

The Mountain View, California-based maker of Norton antivirus products said its research showed that a “nation state” was likely the developer of the malware called Regin, or Backdoor.Regin, but Symantec did not identify any countries or victims.

Symantec said Regin’s design “makes it highly suited for persistent, long-term surveillance operations against targets,” and was withdrawn in 2011 but resurfaced from 2013 onward.

The malware uses several “stealth” features “and even when its presence is detected, it is very difficult to ascertain what it is doing,” according to Symantec. It said “many components of Regin remain undiscovered and additional functionality and versions may exist.”

Almost half of all infections occurred at addresses of Internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 percent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors, Symantec said.

Symantec described the malware as having five stages, each “hidden and encrypted, with the exception of the first stage.” It said “each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.”

Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask), the antivirus company said. Some of its features were also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered the previous year.

Cybersecurity is a sensitive topic for businesses in the United States, where there have been several breaches of major companies and customer information. The US government and private cyber intelligence firms have said they suspect state-backed hackers in China or Russia may be responsible.

Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware and the other countries were Mexico, Ireland, India, Iran, Afghanistan, Belgium, Austria and Pakistan.


Get Adobe Flash player