Boozang
It works: Codeless testing
Give your entire team the ability to create and maintain automated tests. Not just developers.
Meet your testing demands fast. You can get full coverage of your tests in days and not months.
Our natural-language tests are very resistant to code changes. Our AI will quickly repair any test failures.
Continuous Testing is a key component of Agile/DevOps. Push features to production in the same day.
Boozang supports the following test approaches:
- Codeless Record/Replay interface
- BDD / Cucumber
- API testing
- Model-based testing
- HTML Canvas testing
The following features makes your testing a breeze
- In-browser console debugging
- Screenshots to show where test fails
- Integrate to any CI server
- Test with unlimited parallel workers to speed up tests
- Root-cause analysis reports
- Trend reports to track failures and performance over time
- Test management integration (Xray / Jira)
Learn more
RetailEdge
RetailEdge is a simple-to-use and feature-rich point to sale (POS) and inventory software solution for retail businesses. RetailEdge is a product of High Meadow Business Solutions. It offers multi-location support, credit card processing, website integration and mobile POS. Gift card management capabilities are also included in the suite. The solution supports mobile and secure payments such as Apple Pay and EMV. It also integrates with multiple ecommerce platforms for efficient order processing, price updates, and gift card management capabilities.
How are we different?
1. One time-fee for the software.
2. Hybrid software, with all local data, to ensure you have fast real-time access to all your data when the internet is down or, more often, slow.
2. Comes with an hour of free training with real people. This includes making sure your inventory is structured properly and familiarizing you with the many powerful tools that will help you grow your business.
3. Optional on-going support and updates, designed to affordably fit your business needs, not the other way around.
Integrated credit card processing with the most modern features and developed to get you the lowest rates so that you save money.
Learn more
Google OSS-Fuzz
OSS-Fuzz provides ongoing fuzz testing for open source applications, a method renowned for identifying programming flaws. Such flaws, including buffer overflow vulnerabilities, can pose significant security risks. Through the implementation of guided in-process fuzzing on Chrome components, Google has discovered thousands of security weaknesses and stability issues, and now aims to extend this beneficial service to the open source community. The primary objective of OSS-Fuzz is to enhance the security and stability of frequently used open source software by integrating advanced fuzzing methodologies with a scalable and distributed framework. For projects that are ineligible for OSS-Fuzz, there are alternatives available, such as running personal instances of ClusterFuzz or ClusterFuzzLite. At present, OSS-Fuzz is compatible with languages including C/C++, Rust, Go, Python, and Java/JVM, with the possibility of supporting additional languages that are compatible with LLVM. Furthermore, OSS-Fuzz facilitates fuzzing for both x86_64 and i386 architecture builds, ensuring a broad range of applications can benefit from this innovative testing approach. With this initiative, we hope to build a safer software ecosystem for all users.
Learn more
LibFuzzer
LibFuzzer serves as an in-process, coverage-guided engine for evolutionary fuzzing. By being linked directly with the library under examination, it injects fuzzed inputs through a designated entry point, or target function, allowing it to monitor the code paths that are executed while creating variations of the input data to enhance code coverage. The coverage data is obtained through LLVM’s SanitizerCoverage instrumentation, ensuring that users have detailed insights into the testing process. Notably, LibFuzzer continues to receive support, with critical bugs addressed as they arise. To begin utilizing LibFuzzer with a library, one must first create a fuzz target—this function receives a byte array and interacts with the API being tested in a meaningful way. Importantly, this fuzz target operates independently of LibFuzzer, which facilitates its use alongside other fuzzing tools such as AFL or Radamsa, thereby providing versatility in testing strategies. Furthermore, the ability to leverage multiple fuzzing engines can lead to more robust testing outcomes and clearer insights into the library's vulnerabilities.
Learn more