Our client, a leading content delivery network services provider, was in the midst of a large number of changes in a major application portfolio that covered a suite of products. Their key brief was to extend the coverage of testing within their short 3 week sprint cycles.

We at Last Mile, helped them with the choice of the right product to undertake test automation, that integrated well their ALM toolsets and also fitted in seamlessly into their Agile delivery cycles – with the necessary extensibility capabilities to implement in-sprint automation. We built a robust test automation framework that allowed test specification in an easy manner and could be used by both technical and non-technical persons alike.

We provided a pragmatic automation approach, that strategized their automation through a risk based approach to automation, looking at their key business scenarios and creating reusable objects and modules across their different functions of Concept To Market, Lead To Cash, and Problem To Repair. We ensured that these scripts were automated early, and could run across different environments, thus saving them large chunks of time, and dramatically increasing the RoI quotients.

Get in touch with us, to help you with your test automation, across technologies, across domains, across test types.

Our client, a pioneer and innovator in digital marketing, was in the process of reengineering its back end process to cater to increased volumes of traffic. It hoped to move all its customers in phases to the new platform, which could help it manage its data, distribution and customers in an integrated way.

As a part of this reengineering work, they needed early warning signs on the ability of the platform to handle the web service volumes that they anticipated. Last Mile, performed two rounds of performance tests, where we simulated different requests / response patterns, simulating a load of upto 1000 users.

We also helped our client analyse the existing load pattern, and helped them baseline acceptable response times.

We simulated the load from multiple geographical locations, and created the right set of monitors to monitor all aspects of the webservers, application servers and databases.

Our reports highlighting critical issues in memory management, and in the way the index searches were set up, helped their development and environments team gear up with the right capacity hardware and the necessary tweaks before going live.

The threats to security are huge and its consequences humungous – from loss of revenue to issues with credibility, and also liability and loss of customer trust. Breaches can happen through network penetration or vulnerabilities in software applications.

Our security services encompass :

  • OWASP Top 10 Coverage
  • Assisting you with Secure Design
  • Threat Modeling
  • Vulnerability Analysis