TechTalk with Zach Naimon from Arctype

TechTalk with Zach Naimon from Arctype

Welcome to another tech talk where we’ll learn about what it’s like to develop a product in an early-stage startup, what it takes to pivot your solution the right way, why investing in software testing and QA is an absolute must these days, and what other experiences in life may help you succeed in your tech career, among other things. This tech talk is devoted to Arctype and the remarkable professionals behind it. Read on to find answers to these questions, tips and inspo!
QAwerk’s Effort in Making Arctype ClickHouse’s Choice

QAwerk’s Effort in Making Arctype ClickHouse’s Choice

Arctype debuted on Product Hunt in December 2021 after two years of building. Fast-forward to October 2022, and Arctype is already acquired by ClickHouse, one of the most promising database companies.
Top QA Events in 2023: Quarter 1 Ultimate Guide

Top QA Events in 2023: Quarter 1 Ultimate Guide

Learn about upcoming QA events in 2023: in-person and virtual options across the world listed!
What is Remote File Inclusion (RFI) Vulnerability?

What is Remote File Inclusion (RFI) Vulnerability?

August 6, 1991. Does the date ring any bells? No, it wasn’t the collapse of the Soviet Union (though you’re close). It was on that otherwise unremarkable summer day that Tim Berners-Lee launched the very first web page. More than thirty years have passed since then, and websites have come a long way, haven’t they?
Broken Access Control Vulnerability: Explanation and Examples

Broken Access Control Vulnerability: Explanation and Examples

The internet is NOT a safe place. Wonderful in its own right, sure, and useful in more ways than one. But the cyberspace is also filled to the brim with malicious agents: thieves, hackers, countless different criminals looking to prey on the weak and the vulnerable. Don’t be alarmed just yet though. As long as
Security Misconfiguration Vulnerability: Explanation, Examples, Prevention

Security Misconfiguration Vulnerability: Explanation, Examples, Prevention

They say that programming is the closest thing to magic that we have today. And you know what? They’re right. A few lines of code that look like nothing but gibberish to the uninitiated – and you can create entire worlds. How is it anything but magic? On the opposite side, a few different lines
What is Local File Inclusion (LFI) Vulnerability?

What is Local File Inclusion (LFI) Vulnerability?

Modern web applications are nothing like what they used to be. The practically limitless bandwidth and indefinite storage space that cloud computing offers. The microservices that run circles around monolith architecture, breaking down layered apps into small independent components. The single-page apps that load most resources (including the primary DOM elements) once per app cycle
Cryptographic Failure Vulnerability: Explanation and Examples

Cryptographic Failure Vulnerability: Explanation and Examples

They say that he who rules the data rules the world. They also say that knowledge is power. Phrase it any way you want, one thing is certain – information is the hottest commodity these days. Have you ever wondered why most services these days, especially online, are technically free? That’s ‘cause we’re not the
Top QA events in 2022: Quarter 4 Ultimate Guide

Top QA events in 2022: Quarter 4 Ultimate Guide

Learn about upcoming tech events for software testers, QA analysts, QA leads, and IT decision makers! In-person, online, and hybrid options listed.
Tech Talk with Jon Pass, COO of Magic Mountain

Tech Talk with Jon Pass, COO of Magic Mountain

We’re thrilled to launch a new blog format – tech talks with remarkable IT professionals, entrepreneurs, and thought leaders across industries who also happen to be QAwerk clients. In this interview, Jonathan Pass, COO of Magic Mountain, will look back on the journey the Magic Mountain team has taken to be where they’re right now.