Demystifying the Software Testing 1️⃣ 𝗙𝘂𝗻𝗰𝘁𝗶𝗼𝗻𝗮𝗹 𝗧𝗲𝘀𝘁𝗶𝗻𝗴: 𝗧𝗵𝗲 𝗕𝗮𝘀𝗶𝗰𝘀: Unit Testing: Isolating individual code units to ensure they work as expected. Think of it as testing each brick before building a wall. Integration Testing: Verifying how different modules work together. Imagine testing how the bricks fit into the wall. System Testing: Putting it all together, ensuring the entire system functions as designed. Now, test the whole building for stability and functionality. Acceptance Testing: The final hurdle! Here, users or stakeholders confirm the software meets their needs. Think of it as the grand opening ceremony for your building. 2️⃣ 𝗡𝗼𝗻-𝗙𝘂𝗻𝗰𝘁𝗶𝗼𝗻𝗮𝗹 𝗧𝗲𝘀𝘁𝗶𝗻𝗴: 𝗕𝗲𝘆𝗼𝗻𝗱 𝘁𝗵𝗲 𝗕𝗮𝘀𝗶𝗰𝘀: ️ Performance Testing: Assessing speed, responsiveness, and scalability under different loads. Imagine testing how many people your building can safely accommodate. Security Testing: Identifying and mitigating vulnerabilities to protect against cyberattacks. Think of it as installing security systems and testing their effectiveness. Usability Testing: Evaluating how easy and intuitive the software is to use. Imagine testing how user-friendly your building is for navigation and accessibility. 3️⃣ 𝗢𝘁𝗵𝗲𝗿 𝗧𝗲𝘀𝘁𝗶𝗻𝗴 𝗔𝘃𝗲𝗻𝘂𝗲𝘀: 𝗧𝗵𝗲 𝗦𝗽𝗲𝗰𝗶𝗮𝗹𝗶𝘇𝗲𝗱 𝗖𝗿𝗲𝘄: Regression Testing: Ensuring new changes haven't broken existing functionality. Imagine checking your building for cracks after renovations. Smoke Testing: A quick sanity check to ensure basic functionality before further testing. Think of turning on the lights and checking for basic systems functionality before a deeper inspection. Exploratory Testing: Unstructured, creative testing to uncover unexpected issues. Imagine a detective searching for hidden clues in your building. Have I overlooked anything? Please share your thoughts—your insights are priceless to me.
Technology
Explore top LinkedIn content from expert professionals.
-
-
The threat actor behind the MGM Resorts attack had something to say yesterday...and they weren't short on their words. In a 1,100 word statement, the threat actor gave their…unique…perspective on the situation. I parsed through it all to pull out a possible timeline of activity. 🕜 Friday 9/8 - Saturday 9/9 🕜 - The threat actor gained initial access to MGM resorts by socially engineering the IT help desk into resetting a user account. - The threat actor gained privileges to access domain controllers and dumped credentials, which they then cracked. They also claim to have intercepted passwords syncing between Okta and presumably Active Directory - The threat actor also obtained Okta super user access and Azure Global Admin access. This would have given near complete control of the environment. - The threat actor stole data at some point, though it’s unclear the extent of that data theft. - MGM Resorts appears to have taken initial containment steps, though they were not effective. 🕜 Sunday 9/10 🕜 - MGM Resorts implemented additional containment measures and attempted to kick the attacker out of the environment. This unfortunately was unsuccessful. 🕜 Monday 9/11 🕜 - The threat actor purportedly encrypted over 100 ESXi hypervisors (these run virtual machines, so the impacted number of servers is much higher). - The threat actor provided a link to download (presumably) a sample of stolen data. 🕜 Tuesday 9/12 - Wednesday 9/13 🕜 - MGM continued their incident response and recovery efforts with the help of outside experts. - The threat actor monitored user(s) lurking in their negotiation portal and presumably were upset that no one wanted to chit chat. 🕜 Thursday 9/14 🕜 - The threat actor posted a 1,101 word statement to “set the record straight” on the attack. - The threat actor claims to still have access to the environment and is threatening to carry out additional attacks if MGM does not make contact with them. /end timeline Continued #hugops to the MGM team. Navigating an active attacker situation is never a straightforward affair, regardless of what people may say. And given the sophistication of this threat actor compared to your typical ransomware group, well their job is such that much harder. For the rest of us, as we watch and learn more about what happened, it's important to remember why this information is helpful. Understanding the techniques these groups use helps you update your security program to defend against them. A perfect security program only exists in rhetoric. A motivated attacker will find a way regardless of your defenses. Stay knowledgeable, stay kind. ------------------------------ 🤓 Hi, I’m Jason, the “TeachMeCyber” guy 💡I simplify cyber security to help you learn faster 🔔 Follow me for daily cyber security posts #teachmecyber #cybersecurity #ransomware #mgm
-
I used to be awful at networking. Then I discovered creative ways to add value that allowed me to connect with influencers, CEOs, and entrepreneurs. Here are 10 of my favorites: 1. Share a piece of their advice with your team, friends, or class (then tell them what you did). 2. Ask them for advice, then take action on it and follow up with your results. 3. Share recommendations for a common personal interest. 4. Consistently engage with their content on social media. 5. Offer to have them come speak to your team or class. 6. Write a valuable comment or post and tag them in it. 7. Ask to interview them for a blog post or podcast. 8. Write a recommendation for them on LinkedIn. 9. Make a mutually beneficial introduction. 10. Compliment them on a career change. The best part? Anyone can use these. No experience required.
-
Biomimicry in Wound Care: The Fish Scale Bandage 🐟🩹 In healthcare, innovations inspired by nature are gaining traction. One such example is the fish scale bandage, which mimics the protective and regenerative properties of fish scales to promote wound healing. The fish scale bandage offers several potential benefits: ✅ Enhanced healing through improved tissue regeneration and reduced infection risk ✅ Versatility in application, from minor cuts to post-operative care ✅ Usability in both human and veterinary medicine However, as with any medical innovation, the fish scale bandage faces challenges: ❗ Ensuring biocompatibility and sustainable, cost-effective production ❗ Undergoing rigorous clinical trials and obtaining regulatory approval ❗ Achieving widespread adoption through education and awareness Compared to traditional bandages, which primarily protect wounds, the fish scale bandage actively promotes healing by creating an environment that mimics natural healing processes. I'm curious to hear your thoughts: 1. Can you envision the fish scale bandage being used in your healthcare setting? 2. What potential benefits or challenges do you foresee with this innovation? 3. How do you think biomimetic solutions like this could transform wound care and other healthcare practices? Share your insights in the comments below! #Biomimicry #WoundCare #HealthcareInnovation #FishScaleBandage #MedTwitter #SurgeryTwitter #AiInHealthcare
-
Some of the largest #carboncredit standards of the #VCM - Verra, Gold Standard, and Climate Action Reserve - failed to get approved for #CORSIA Phase 1 This is unfortunate for the market, for the standards themselves and for project developers who have registered their carbon mitigation outcomes via these standards. 🗯 What bothers me the most however, is that there is a readily available solution to this problem 🔗 Blockchain. Let me explain. 👩🏻🔧 First, what is CORSIA Phase 1? [background in comments - I ran out of space] ✅ Carbon standards must get approved by UN's International Civil Aviation Organization for their credits to count towards CORSIA targets. 2️⃣ Only ACR at Winrock International and Architecture for REDD+ Transactions (ART) have been approved so far. ❌ Three major standards just failed the test. Their credits can no longer be used to offset airline emissions. 🤼 OK, where do we go from here? 🛠 Here is what they need to fix according to IACO: 🔢 mitigating risk for double-counting emission reductions ⚖ setting up a fail-safe system for handling reversals and baseline emissions 📜 demonstrate compliance and approval from host countries for credit adjustments Enter #blockchain 🔗 Lets be clear - its not a silver bullet to solve ALL our transparency and accountability issues (and make everyone rich out of thin air) - but its really really good solution to fix some of our current market weaknesses. 👯♂️ Tell me more? At its core, blockchain provides an immutable, transparent, and secure ledger—essential for accurate tracking and verification of environmental data and transactions. A glorified database perhaps. 👯♀️ How would blockchain address CORSIA's quality concerns? With a blockchain based registry for carbon credits, double-counting wouldn't be an issue anymore. Credits would be given a unique identifier that is tamper-proof and anyone can follow verification, trade or retirement of that asset transparently. We'd move from a piece of paper (that can be copied and edited) to a digital asset with integrity. The same system would be used for reversals and baseline emissions data. In fact, when a project developer first uploads the project information, baseline data, verification reports and evidence, it would all be tagged to that same tamper proof digital carbon credit - versus stuck in current 'early-2000's pdf-database' nightmare. 👭🏻 So why the frustration? ⛏ We're still trying to solve upgraded market (and media) demands on quality and integrity with old tools. We have the tech for cabron markets 2.0 (and 3.0!) and its frustrating to see the slow pace of adoption by the standards. ⏳ Verra and GS have hosted digital working groups and done tests for how blockchain could be integrated over the last 2.5 years. Can the CORSIA approval be a catalyst? IETA - where is your digital WG when we need it the most? Rich Gilmore Dirk Forrister Hugh Salway Alasdair Were Svenja Telle
-
This is my face finishing the last pieces of my documentation after my #ER shift. It's a face of frustration after spending way too much time documenting in a less-than-intuitive, inefficient EMR. It's the face of frustration from endless clicks, digital pop-up blockades, and seek-and-find missions for clicking the correct checkbox in an electronic health record to simply discharge a patient. The ultimate price of this inefficiency: compromised patient care, delays, errors, skyrocketing stress for healthcare professionals, and an overall decline in the system's effectiveness. It's time to streamline our processes for the sake of our clinicians and, most importantly, our patients. The problem: EMRs were made as billing platforms with patient care and clinical workflows as secondary considerations. The solution: 1. Put frontline clinicians back in the boardroom to fix these inefficiencies. 2. Reduce and eliminate unnecessary administrative tasks. 3. Utilize trainers to perform frequent check-ins with clinicians to ensure clinicians use the best and most efficient documentation methods. 4. Leverage new technologies (like AI, dictation software, ambient listening software) to reduce screen and keyboard time for clinicians. 5. Create standardized workflows for documentation. The more ways to do the same thing, the more challenging it is to teach and build efficiencies across a team. 6. EMR companies should use practicing, specialty-specific clinicians to guide design decisions. #HealthcareSystem #ClinicianBurnout #TimeForChange Cerner Corporation Epic MEDITECH #EMR ABIG Health #frontlineclinicians #nurses #physicians #hospitals
-
🚨CISA & NSA release Crucial Guide on Network Segmentation and Encryption in Cloud Environments🚨 In response to the evolving requirements of cloud security, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a comprehensive Cybersecurity Information Sheet (CSI): "Implement Network Segmentation and Encryption in Cloud Environments." This document provides detailed recommendations to enhance the security posture of organizations operating within cloud infrastructures (that probably means you). Key Takeaways Include: 🔐 Network Encryption: The document underscores the importance of encrypting data in transit as a defense mechanism against unauthorized data access. 🌐 Secure Client Connections: Establishing secure connections to cloud services is fundamental. 🔎 Caution on Traffic Mirroring: While recognizing the benefits of traffic mirroring for network analysis and threat detection, the guidance cautions against potential misuse that could lead to data exfiltration and advises careful monitoring of this feature. 🛡️ Network Segmentation: Stressed as a foundational security principle, network segmentation is recommended to isolate and contain malicious activities, thereby reducing the impact of any breach. This collaboration between NSA and CISA provides actionable recommendations for organizations to strengthen their cloud security practices. The emphasis is on strategically implementing network segmentation and end-to-end encryption to secure cloud environments effectively. Information security leaders are encouraged to review this guidance to understand better the measures necessary to protect cloud-based assets. Implementing these recommendations will contribute to a more secure, resilient, and compliant cloud infrastructure. Access the complete guidance provided by the NSA and CISA to fully understand these recommendations and their application to your organization’s cloud security strategy. 📚 Read CISA & NSA's complete guidance here: https://lnkd.in/eeVXqMSv #cloudcomputing #technology #informationsecurity #innovation #cybersecurity
-
Founders - planning to raise VC money every 18 months is planning to fail. Although if you're an AI-native company, maybe it's a little more realistic. Every quarter we track the time between venture rounds. In order to strip away noise, we remove all extensions / bridges / other "creative" financings. So the data below only looks at primary rounds for software companies in the US. And we did a lot of digging on which companies are AI and which are not. The definition seems to always be changing, pls don't throw tomatoes if ours doesn't match yours completely. 𝗙𝗶𝗻𝗱𝗶𝗻𝗴𝘀 • Time between rounds has gotten considerably longer in the past two years. • The median time from Seed to Series A in 2025 is 2.2 years. For AI companies that drops to 1.9 years. • The median time from Series A to Series B in 2025 is 2.7 years. For AI companies that drops to 2.2 years. • Lots and lots of companies are raising bridge capital. Is this a good thing? ...😬 Our current VC hype cycle around AI impacts all sorts of round dynamics. AI companies tend to raise more capital, at faster rates, and higher valuations then non-AI software companies. In fact, I'd bet that in 2 years or so we stop making this distinction and assume if you're building software you're using AI. BTW seeing the time between rounds rise is not 𝗻𝗲𝗰𝗲𝘀𝘀𝗮𝗿𝗶𝗹𝘆 a bad thing. Many companies are probably being more judicious about approaching VCs and are building well with the capital they have. Of course many are still desperate for cash and feeling anxious about the next capital infusion. Good luck out there #startups #founders #VC #Seed #SeriesA
-
Bridging the Digital Divide: A New Role for Hospitals in the 21st Century In today’s world, where technology is inextricably linked to every aspect of our lives, the stark reality of the digital divide has never been more pronounced. This divide does not merely separate the tech-savvy from the technophobes; it delineates a chasm between those who have access to critical online health resources and services and those who do not. As we navigate the complexities of healthcare in the digital age, it's clear that hospitals have a unique and potent role to play in bridging this gap. For too long, the digital divide has been a pervasive barrier to equitable healthcare access. It's a divide that disproportionately affects the most vulnerable among us—low-income families, the elderly, and communities of color. These are the same communities that are often hardest hit by health disparities and systemic inequities. The COVID-19 pandemic has only magnified these issues, making it abundantly clear that internet access is not a luxury; it's a lifeline. Hospitals stand at the crossroads of healthcare and technology. They are not just institutions for healing but pivotal community resources with the potential to lead transformative change. Imagine a hospital where every patient, regardless of their socio-economic status, leaves not just with a care plan but with the tools and knowledge to access telehealth services, manage their health records online, and utilize digital platforms for follow-up care. This vision is not only achievable; it's essential. Initiatives to get patients connected can take various forms, from simple measures like providing Wi-Fi access in hospital waiting rooms to more comprehensive strategies like deploying digital navigators—staff members trained to assist patients in setting up and using online health tools. Hospitals can partner with community organizations and leverage existing programs to offer internet access subsidies and distribute devices to those in need. These efforts, while seemingly straightforward, can dramatically alter the healthcare landscape for millions. Moreover, by integrating digital access into patient care, hospitals can also enhance patient engagement, improve adherence to treatment plans, and reduce readmissions. It's a win-win situation where improved patient outcomes go hand in hand with the democratization of healthcare information. While some argue hospitals are overwhelmed, our duty as healthcare providers extends beyond the exam room. Closing the digital divide is part of ensuring patient welfare. From ER to policy advising, one truth stands: healthcare innovation must be inclusive. The digital future of healthcare isn't just an opportunity. Hospitals should be more than healing centers—they're pathways to a connected, empowered society. Access to health services shouldn't depend on zip codes or income. Let's bridge the gap and ensure health is a right for all. #healthcare
-
This Kenyan startup is literally sucking CO₂ from the air and selling it Kenyan startup Octavia Carbon is building a Direct Air Carbon Capture (DAC) plant in Gilgil the first of its kind on the continent. It’s a serious engineering play -Uses geothermal energy -Captures 1,000 tonnes of CO₂ from the air annually -Stores it underground in volcanic rock -Sells carbon credits to global buyers This isn’t just another climate headline it’s infrastructure. Quietly being built, tested, and scaled right here. No noise. Just execution.The part that stands out to me? They’re using Kenya’s natural geology and energy mix as a competitive edge. Not trying to clone models from elsewhere they’re making something that fits where they are. I like this kind of work. It’s honest. Capital-intensive, science-heavy, long-term. Not the easiest path for a startup but arguably one of the most impactful. You don’t see many climate-tech teams going this deep into engineering. But maybe we’ll start seeing more. Props to the Octavia Carbon team. #climatetech #carbonremoval #hardtech #directaircapture #kenyatech #deeptech #startups #founderenergy #africa