<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-9048033371409598368</id><updated>2024-09-06T19:45:40.897-07:00</updated><category term="An approach for Security Testing of Web Applications"/><category term="Building Products Testing"/><category term="Database Testing – Properties of a Good Test Data and Test Data Preparation Techniques"/><category term="Environmental Analysis"/><category term="Functional Consultant"/><category term="How to Achieve Level 5 Maturity for QA and Testing Process"/><category term="Physical and Thermal Testing"/><category term="Security Testing Techniques:"/><category term="Test data preparation techniques:"/><title type='text'>LABNOL</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/11601759732829690475</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>11</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-6442875248539173595</id><published>2012-04-12T01:54:00.004-07:00</published><updated>2012-04-12T02:22:23.309-07:00</updated><title type='text'>Software Testing</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJYGCfBIpWyz7HRxZqSaL0WSjeK1m4RvlY-iSBWOtg_hxgtA3R_1FfHxb5f-jJTli4csdFAO8dfeoiNyMt0jiOcT0dy4BnF9jTSaKxomwjIZnIkZNqm5N5t3fh3jNbLZjEBf3mH_WEphQ/s1600/iPhone-meets-Note.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc8yfDrAHXA3_-dR9A5gedgZgcojSvB2Lyn4bthXI2oPubaUaT5KInGDx6OJieq4UgxjW2eRYFXALYMXDamdiXPecr2o4Xicuk9Hk3q9JaMA84wM83v8pXQ8OpVrfS4bOt_EscFLltHtoi/s1600/softwaretesting.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc8yfDrAHXA3_-dR9A5gedgZgcojSvB2Lyn4bthXI2oPubaUaT5KInGDx6OJieq4UgxjW2eRYFXALYMXDamdiXPecr2o4Xicuk9Hk3q9JaMA84wM83v8pXQ8OpVrfS4bOt_EscFLltHtoi/s320/softwaretesting.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Software testing life cycle (STLC)&lt;/b&gt; identifies what test activities to carry out and when (what is the best time) to accomplish those test activities. Even though &lt;a href=&quot;http://en.wikipedia.org/wiki/Software_testing&quot; title=&quot;Software testing&quot;&gt;testing&lt;/a&gt; differs between organizations, there is a testing life cycle.&lt;br /&gt;

Software Testing Life Cycle consists of six (generic) phases:&lt;br /&gt;

&lt;ul&gt;
&lt;li&gt;Test Planning&lt;/li&gt;
&lt;li&gt;Test Analysis,&lt;/li&gt;
&lt;li&gt;Test Design,&lt;/li&gt;
&lt;li&gt;Construction and verification,&lt;/li&gt;
&lt;li&gt;Testing Cycles,&lt;/li&gt;
&lt;li&gt;Final Testing and&amp;nbsp; and Implementation&lt;/li&gt;
&lt;li&gt;Post Implementation.&lt;/li&gt;
&lt;/ul&gt;
Software testing has its own life cycle that intersects with every stage of the SDLC. The basic requirements in software testing life cycle is to control/deal with software testing –&amp;nbsp; Manual,Automated and Performance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;span class=&quot;mw-headline&quot; id=&quot;Test_Planning&quot;&gt;Test Planning&lt;/span&gt;&lt;/h2&gt;
This is the phase where Project Manager&amp;nbsp; has to decide what things need to be tested,do I have the appropriate&amp;nbsp; budget etc. Naturally proper planning at this stage would greatly reduce the risk of low quality software. This planning will be an ongoing process with no end point.&lt;br /&gt;

Activities at this stage would include preparation of high level test plan-(according to&amp;nbsp; IEEE test plan template The Software Test Plan (STP) is designed to 
prescribe the scope, approach, resources, and schedule of all testing 
activities. The plan must identify the items to be tested, the features 
to be tested, the types of testing to be performed, the&amp;nbsp; personnel
 responsible for testing, the resources and schedule required to 
complete testing, and the risks associated with the plan.). Almost all 
of the activities done during this stage are included in this software 
test plan and revolve around a test plan.&lt;br /&gt;

In Test Planning following are the major tasks:&lt;br /&gt;
&amp;nbsp;1. Defining scope of 
testing&lt;br /&gt;
&amp;nbsp;2. Identification of approaches&lt;br /&gt;
&amp;nbsp;3. Defining risk&lt;br /&gt;
&amp;nbsp;4. Identifying 
resources&lt;br /&gt;
&amp;nbsp;5. Defining Time Schedule&lt;br /&gt;

&lt;h2&gt;
&lt;span class=&quot;editsection&quot;&gt;&lt;/span&gt; &lt;span class=&quot;mw-headline&quot; id=&quot;Test_Analysis&quot;&gt;Test Analysis&lt;/span&gt;&lt;/h2&gt;
Once test plan is made and decided upon, next step is to deal a little more into the project and decide what types of testing should be carried out at different 
stages of&amp;nbsp; SDLC, do we need or plan to automate, if yes then when the 
appropriate time to automate is, what type of specific&amp;nbsp; documentation. I need for testing,;,&lt;br /&gt;

Proper and regular meetings should be held between testing teams, project managers, development teams,&amp;nbsp; BA&amp;nbsp;
 to check the progress of things which will give a fair idea of the 
movement of the project and ensure the completeness of the test plan 
created in the planning phase, which will further help in enhancing the 
right testing strategy created earlier. We will start creating test case
 formats and test cases&lt;a href=&quot;http://en.wikipedia.org/wiki/Test_case&quot; title=&quot;Test case&quot;&gt;&lt;/a&gt;
 itself. In this stage we need to develop Functional validation matrix 
based on Business Requirements to ensure that all system requirements 
are covered by one or more test cases, identify which test cases to 
automate, begin review of documentation, i.e. Functional Design, 
Business Requirements, Product Specifications, Product Externals etc. We
 also have to define areas for&amp;nbsp; Stress and Performance Testing.&lt;br /&gt;

&lt;h2&gt;
&lt;span class=&quot;editsection&quot;&gt;&lt;/span&gt;&lt;span class=&quot;mw-headline&quot; id=&quot;Test_Design&quot;&gt;Test Design&lt;/span&gt;&lt;/h2&gt;
Test plans and cases which were developed in the&amp;nbsp; analysis&amp;nbsp; phase are revised. Functional validation matrix is also revised and finalized. In this stage risk assessment criteria is developed. If you have thought of automation then you have 
to select which test cases to automate and begin writing scripts for 
them. Test data is prepared. Standards for unit testing and pass / fail 
criteria are defined here. Schedule for testing is revised (if 
necessary) &amp;amp; finalized and test environment is prepared.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/6442875248539173595/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/04/software-testing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/6442875248539173595'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/6442875248539173595'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/04/software-testing.html' title='Software Testing'/><author><name>Sneha</name><uri>http://www.blogger.com/profile/07065103065105062486</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc8yfDrAHXA3_-dR9A5gedgZgcojSvB2Lyn4bthXI2oPubaUaT5KInGDx6OJieq4UgxjW2eRYFXALYMXDamdiXPecr2o4Xicuk9Hk3q9JaMA84wM83v8pXQ8OpVrfS4bOt_EscFLltHtoi/s72-c/softwaretesting.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-5026927112595711107</id><published>2012-04-08T11:30:00.005-07:00</published><updated>2012-04-08T11:42:19.623-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="An approach for Security Testing of Web Applications"/><title type='text'>An approach for Security Testing of Web Applications</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://buildsecurityin.us-cert.gov/bsi/260-BSI/version/default/part/ImageData/data/black-box-tools-1.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 690px; height: 327px;&quot; src=&quot;https://buildsecurityin.us-cert.gov/bsi/260-BSI/version/default/part/ImageData/data/black-box-tools-1.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Introduction&lt;br /&gt;&lt;br /&gt;As more and more vital data is stored in web applications and the number of transactions on the web increases, proper security testing of web applications is becoming very important. Security testing is the process that determines that confidential data stays confidential (i.e. it is not exposed to individuals/ entities for which it is not meant) and users can perform only those tasks that they are authorized to perform (e.g. a user should not be able to deny the functionality of the web site to other users, a user should not be able to change the functionality of the web application in an unintended way etc.).&lt;br /&gt;&lt;br /&gt;Some key terms used in security testing&lt;br /&gt;&lt;br /&gt;Before we go further, it will be useful to be aware of a few terms that are frequently used in web application security testing:&lt;br /&gt;&lt;br /&gt;What is “Vulnerability”?&lt;br /&gt;This is a weakness in the web application. The cause of such a “weakness” can be bugs in the application, an injection (SQL/ script code) or the presence of viruses.&lt;br /&gt;&lt;br /&gt;What is “URL manipulation”?&lt;br /&gt;Some web applications communicate additional information between the client (browser) and the server in the URL. Changing some information in the URL may sometimes lead to unintended behavior by the server.&lt;br /&gt;&lt;br /&gt;What is “SQL injection”?&lt;br /&gt;This is the process of inserting SQL statements through the web application user interface into some query that is then executed by the server.&lt;br /&gt;&lt;br /&gt;What is “XSS (Cross Site Scripting)”?&lt;br /&gt;When a user inserts HTML/ client-side script in the user interface of a web application and this insertion is visible to other users, it is called XSS.&lt;br /&gt;&lt;br /&gt;What is “Spoofing”?&lt;br /&gt;The creation of hoax look-alike websites or emails is called spoofing.&lt;br /&gt;Security testing approach:&lt;br /&gt;&lt;br /&gt;In order to perform a useful security test of a web application, the security tester should have good knowledge of the HTTP protocol. It is important to have an understanding of how the client (browser) and the server communicate using HTTP. Additionally, the tester should at least know the basics of SQL injection and XSS. Hopefully, the number of security defects present in the web application will not be high. However, being able to accurately describe the security defects with all the required details to all concerned will definitely help.</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/5026927112595711107/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/04/approach-for-security-testing-of-web.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/5026927112595711107'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/5026927112595711107'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/04/approach-for-security-testing-of-web.html' title='An approach for Security Testing of Web Applications'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/11601759732829690475</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-1361000238840639368</id><published>2012-04-08T11:22:00.002-07:00</published><updated>2012-04-08T11:28:30.092-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Testing Techniques:"/><title type='text'>Security Testing Techniques:</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.mindtree.com/cms-images/security_big3.jpg&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;h3&gt;1) Access to Application:&lt;strong&gt;&lt;/strong&gt;&lt;/h3&gt; &lt;p&gt;Whether it is a desktop application of website, access security is implemented by &lt;strong&gt;‘Roles and Rights Management’.&lt;/strong&gt;  It is often done implicitly while covering functionality, e.g.in a  Hospital Management System a receptionist is least concerned about the  laboratory tests as his job is to just register the patients and  schedule their appointments with doctors. So, all the menus, forms and  screen related to lab tests will not be available to the Role of  ‘Receptionist’. Hence, the proper implementation of roles and rights  will guarantee the security of access.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;How to Test:&lt;/strong&gt; In order to test this, thorough testing  of all roles and rights should be performed. Tester should create  several user accounts with different as well multiple roles. Then he  should use the application with the help of these accounts and should  verify that every role has access to its own modules, screens, forms and  menus only. If tester finds any conflict, he should log a security  issue with complete confidence.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://www.mindtree.com/cms-images/security_big3.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 624px; height: 392px;&quot; src=&quot;http://www.mindtree.com/cms-images/security_big3.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;h3&gt;2. Data Protection:&lt;/h3&gt; &lt;p&gt;There are further three aspects of data security. First one is that &lt;strong&gt;a user can view or utilize only the data which he is supposed to use&lt;/strong&gt;.  This is also ensured by roles and rights e.g. a TSR (telesales  representative) of a company can view the data of available stock, but  cannot see how much raw material was purchased for production.&lt;/p&gt; &lt;p&gt;So, testing of this aspect is already explained above. The second aspect of data protection is related to &lt;strong&gt;how that data is stored in the DB&lt;/strong&gt;.  All the sensitive data must be encrypted to make it secure. Encryption  should be strong especially for sensitive data like passwords of user  accounts, credit card numbers or other business critical information.  Third and last aspect is extension of this second aspect. Proper  security measures must be adopted when flow of sensitive or business  critical data occurs. Whether this data floats between different modules  of same application, or is transmitted to different applications it  must be encrypted to make it safe.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;How to Test Data Protection:&lt;/strong&gt; The tester should query  the database for ‘passwords’ of user account, billing information of  clients, other business critical and sensitive data and should verify  that all such data is saved in encrypted form in the DB. Similarly (s)he  must verify that between different forms or screens, data is  transmitted after proper encryption. Moreover, tester should ensure that  the encrypted data is properly decrypted at the destination. Special  attention should be paid on different ‘submit’ actions. The tester must  verify that when the information is being transmitted between client and  server, it is not displayed in the address bar of web browser in  understandable format. If any of these verifications fail, the  application definitely has security flaw.&lt;/p&gt; &lt;h3&gt;3. Brute-Force Attack:&lt;/h3&gt; &lt;p&gt;Brute Force Attack is mostly done by some software tools. The concept is that using a valid user ID, s&lt;strong&gt;oftware attempts to guess the associated password by trying to login again and again.&lt;/strong&gt;  A simple example of security against such attack is account suspension  for a short period of time as all the mailing applications like ‘Yahoo’  and ‘Hotmail’ do. If, a specific number of consecutive attempts (mostly  3) fail to login successfully, then that account is blocked for some  time (30 minutes to 24 hrs).&lt;/p&gt; &lt;p&gt;&lt;strong&gt;How to test Brute-Force Attack:&lt;/strong&gt; The tester must  verify that some mechanism of account suspension is available and is  working accurately. (S)He must attempt to login with invalid user IDs  and Passwords alternatively to make sure that software application  blocks the accounts that continuously attempt login with invalid  information. If the application is doing so, it is secure against  brute-force attack. Otherwise, this security vulnerability must be  reported by the tester.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;The above three security aspects should be taken into account  for both web and desktop applications while, the following points are  related with web based applications only.&lt;/strong&gt;&lt;/p&gt; &lt;h3&gt;4. SQL Injection and XSS (cross site scripting):&lt;/h3&gt; &lt;p&gt;Conceptually speaking, the theme of both these hacking attempts is similar, so these are discussed together. In this approach, &lt;strong&gt;malicious script is used by the hackers in order to manipulate a website&lt;/strong&gt;.  There are several ways to immune against such attempts. For all input  fields of the website, field lengths should be defined small enough to  restrict input of any script e.g. Last Name should have field length 30  instead of 255. There may be some input fields where large data input is  necessary, for such fields proper validation of input should be  performed prior to saving that data in the application. Moreover, in  such fields any html tags or script tag input must be prohibited. In  order to provoke XSS attacks, the application should discard script  redirects from unknown or untrusted applications.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;How to test SQL Injection and XSS:&lt;/strong&gt; Tester must  ensure that maximum lengths of all input fields are defined and  implemented. (S)He should also ensure that defined length of input  fields does not accommodate any script input as well as tag input. Both  these can be easily tested e.g. if 20 is the maximum length specified  for ‘Name’ field; and input string  “&lt;/p&gt;&lt;p&gt;thequickbrownfoxjumpsoverthelazydog” can verify both these  constraints. It should also be verified by the tester that application  does not support anonymous access methods. In case any of these  vulnerabilities exists, the application is in danger.&lt;/p&gt; &lt;h3&gt;5. Service Access Points (Sealed and Secure Open)&lt;/h3&gt; &lt;p&gt;Today, businesses depend and collaborate with each other, same holds  good for applications especially websites. In such case, both the  collaborators should define and publish some access points for each  other. So far the scenario seems quite simple and straightforward but,  for some web based product like stock trading, things are not so simple  and easy. When there is large number of target audience, the access  points should be open enough to facilitate all users, accommodating  enough to fulfill all users’ requests and secure enough to cope with any  security-trial.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;How to Test Service Access Points:&lt;/strong&gt; Let me explain it  with the example of stock trading web application; an investor (who  wants to purchase the shares) should have access to current and  historical data of stock prices. User should be given the facility to  download this historical data. This demands that application should be  open enough. By accommodating and secure, I mean that application should  facilitate investors to trade freely (under the legislative  regulations). They may purchase or sale 24/7 and the data of  transactions must be immune to any hacking attack. Moreover, a large  number of users will be interacting with application simultaneously, so  the application should provide enough number access point to entertain  all the users.&lt;/p&gt; &lt;p&gt;In some cases these &lt;strong&gt;access points can be sealed for unwanted applications or people&lt;/strong&gt;.  This depends upon the business domain of application and its users,  e.g. a custom web based Office Management System may recognize its users  on the basis of IP Addresses and denies to establish a connection with  all other systems (applications) that do not lie in the range of valid  IPs for that application.&lt;/p&gt; &lt;p&gt;Tester must ensure that all the&lt;strong&gt; inter-network and intra-network access&lt;/strong&gt;  to the application is from trusted applications, machines (IPs) and  users. In order to verify that an open access point is secure enough,  tester must try to access it from different machines having both trusted  and untrusted IP addresses. Different sort of real-time transactions  should be tried in a bulk to have a good confidence of application’s  performance.  By doing so, the capacity of access points of the  application will also be observed clearly.&lt;/p&gt; &lt;p&gt;Tester must ensure that the application entertains all the  communication requests from trusted IPs and applications only while all  the other request are rejected. Similarly, if the application has some  open access point, then tester should ensure that it allows (if  required) uploading of data by users in secure way. By this secure way I  mean, the file size limit, file type restriction and scanning of  uploaded file for viruses or other security threats. This is all how a  tester can verify the security of an application with respect to its  access points.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/1361000238840639368/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/04/security-testing-techniques.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/1361000238840639368'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/1361000238840639368'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/04/security-testing-techniques.html' title='Security Testing Techniques:'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/11601759732829690475</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-1627063198803332785</id><published>2012-04-08T11:16:00.001-07:00</published><updated>2012-04-08T11:21:34.362-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Test data preparation techniques:"/><title type='text'>Test data preparation techniques:Test data preparation techniques:</title><content type='html'>We have briefly discussed the important properties of test data and  it also elaborates how test data selection is important while database  testing. Now let’s discuss the &lt;strong&gt;‘&lt;/strong&gt;techniques to prepare test data&lt;strong&gt;’&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.invitrogen.com/etc/medialib/en/images/ics_organized/applications/nucleic_acid_purification/data_chart/275_wide.Par.65236.Image.275.266.1.gif.Plasmid_DNA_purified_using_PureLink_gif.gif&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 423px; height: 409px;&quot; src=&quot;http://www.invitrogen.com/etc/medialib/en/images/ics_organized/applications/nucleic_acid_purification/data_chart/275_wide.Par.65236.Image.275.266.1.gif.Plasmid_DNA_purified_using_PureLink_gif.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;There are only two ways to prepare test data:&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Method 1. Insert New Data:&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Get a clean DB and insert all the data as specified in your test  cases. Once, all your required and desired data has been entered, start  executing your test cases and fill ‘Pass/Fail’ columns by comparing the  ‘Actual Output’ with ‘Expected Output’.  Sounds simple, right? But wait,  it’s not that simple.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Few essential and critical concerns are as follows:&lt;/strong&gt;&lt;/p&gt; &lt;ol start=&quot;1&quot;&gt;&lt;li&gt;Empty instance of database may not be available&lt;/li&gt;&lt;li&gt;Inserted test data may be insufficient for testing some cases like performance and load testing.&lt;/li&gt;&lt;li&gt;Inserting the required test data into blank DB is not an easy job  due to the database table dependencies. Because of this inevitable  restriction, data insertion can become difficult task for tester.&lt;/li&gt;&lt;li&gt;Insertion of limited test data (just according to the test cases needs) may hide some issues that could be found only with the&lt;strong&gt; &lt;/strong&gt;large data set.&lt;/li&gt;&lt;li&gt;For data insertion, complex queries and/or procedures may be  required, and for this sufficient assistance or help from the DB  developer(s) would be necessary.&lt;/li&gt;&lt;/ol&gt; &lt;p&gt;Above mentioned five issues are the most important and the most  obvious drawbacks of this technique for test data preparation. But if  there are some advantages as well:&lt;/p&gt; &lt;ol start=&quot;1&quot;&gt;&lt;li&gt;Execution of TCs becomes more efficient as the DB has the required data only.&lt;/li&gt;&lt;li&gt;Bugs isolation requires no time as only the data specified in test cases present in the DB.&lt;/li&gt;&lt;li&gt;Less time required for testing and results comparison.&lt;/li&gt;&lt;li&gt;Clutter-free test process&lt;/li&gt;&lt;/ol&gt; &lt;p&gt;&lt;strong&gt;Method 2. Choose sample data subset from actual DB data:&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;This is the feasible and more practical technique for test data  preparation. However it requires sound technical skills and demands  detailed knowledge of DB Schema and SQL. In this method you need to copy  and use production data by replacing some field values by dummy values.  This is the best data subset for your testing as it represents the  production data.  But this may not be feasible all the time due to data  security and privacy issues.&lt;/p&gt; &lt;p&gt;This strategy deserves one separate post which we’ll discuss in next  article ‘Database gray-box testing’ and precautions to take while  testing database.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/1627063198803332785/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/04/test-data-preparation-techniquestest.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/1627063198803332785'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/1627063198803332785'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/04/test-data-preparation-techniquestest.html' title='Test data preparation techniques:Test data preparation techniques:'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/11601759732829690475</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-17519482329559377</id><published>2012-04-08T11:12:00.001-07:00</published><updated>2012-04-08T11:16:50.096-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Database Testing – Properties of a Good Test Data and Test Data Preparation Techniques"/><title type='text'>Database Testing – Properties of a Good Test Data and Test Data Preparation Techniques</title><content type='html'>&lt;p&gt;A couple of months ago, I wrote about &lt;a title=&quot;Database testing strategies&quot; href=&quot;http://www.softwaretestinghelp.com/database-testing-%E2%80%93-practical-tips-and-insight-on-how-to-test-database/&quot;&gt;database testing strategies&lt;/a&gt;.  It covered the aspect that is entirely related to the execution of test  cases. It was all about black-box testing of a database. There is  another important aspect of DB testing activity which we will cover in  this article.&lt;/p&gt; &lt;p&gt;As a tester, you have to test the ‘Examination Results’ module of the  website of a university. Consider the whole application has been  integrated and it is in ‘Ready for Testing’ state. ‘Examination Module’  is linked with ‘Registration’, ‘Courses’ and ‘Finance’ modules. Assume  that you have adequate information of &lt;span id=&quot;more-925&quot;&gt;&lt;/span&gt;the  application and you created a comprehensive list of test scenarios. Now  you have to design, document and execute these test cases. In  ‘Actions/Steps’ section of the test cases, you must mention the  acceptable data as input for the test. The data mentioned in test cases  must be selected properly. The accuracy of ‘Actual Results’ column of TC  Document is primarily dependent upon the test data. So, step to prepare  the input test data is significantly important. Thus, here is my  rundown on ”DB Testing – Test Data Preparation Strategies”.&lt;/p&gt; &lt;h3&gt;Properties of Test Data:&lt;/h3&gt; &lt;h3&gt;&lt;a href=&quot;http://www.softwaretestinghelp.com/wp-content/qa/uploads/2012/01/DB-testing.jpg&quot;&gt;&lt;img class=&quot;alignnone  wp-image-926&quot; title=&quot;DB testing&quot; src=&quot;http://www.softwaretestinghelp.com/wp-content/qa/uploads/2012/01/DB-testing.jpg&quot; alt=&quot;DB testing&quot; width=&quot;349&quot; height=&quot;217&quot; /&gt;&lt;/a&gt;&lt;/h3&gt; &lt;p&gt;The test data should be selected precisely and it must possess the following four qualities:&lt;/p&gt; &lt;p&gt;&lt;strong&gt;1. Realistic: &lt;/strong&gt;By realistic, it means the data should  be accurate in the context of real life e.g. in order to test ‘Age’  field, all the values should be positive and 18 or above. It is quite  obvious that the candidates for an admission in the university are  usually 18 years old (this might be defined in requirements).&lt;/p&gt; &lt;p&gt;&lt;strong&gt;2. Practically valid:&lt;/strong&gt; This is similar to realistic  but not the same. This property is more related to the business logic of  AUT e.g. value 60 is realistic in age field but practically invalid for  a candidate of Graduation or even Masters Programs. In this case, a  valid range would be 18-25 years (this might be defined in  requirements).&lt;/p&gt; &lt;p&gt;&lt;strong&gt;3. Versatile to cover scenarios:&lt;/strong&gt; There may be  several subsequent conditions in a single scenario, so choose the data  shrewdly to cover maximum aspects of a single scenario with minimum set  of data, e.g. while creating test data for result module, do not only  consider the case of regular students who are smoothly completing their  program. Give attention to the students who are repeating the same  course and belong to different semesters or even different programs. The  data set may look like this:&lt;/p&gt; &lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot;&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;41&quot;&gt;&lt;strong&gt;Sr#&lt;/strong&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;206&quot;&gt;&lt;strong&gt;Student_ID&lt;/strong&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;93&quot;&gt;&lt;strong&gt;Program_ID&lt;/strong&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;83&quot;&gt;&lt;strong&gt;Course_ID&lt;/strong&gt;&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;81&quot;&gt;&lt;strong&gt;Grade&lt;/strong&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;41&quot;&gt;1&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;206&quot;&gt;BCS-Fall2011-Morning-01&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;93&quot;&gt;BCS-F11&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;83&quot;&gt;CS-401&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;81&quot;&gt;A&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;41&quot;&gt;2&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;206&quot;&gt;BCS-Spring2011-Evening-14&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;93&quot;&gt;BCS-S11&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;83&quot;&gt;CS-401&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;81&quot;&gt;B+&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;41&quot;&gt;3&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;206&quot;&gt;MIT-Fall2010-Afternoon-09&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;93&quot;&gt;MIT-F10&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;83&quot;&gt;CS-401&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;81&quot;&gt;A-&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td valign=&quot;top&quot; width=&quot;41&quot;&gt;…&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;206&quot;&gt;…&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;93&quot;&gt;…&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;83&quot;&gt;…&lt;/td&gt; &lt;td valign=&quot;top&quot; width=&quot;81&quot;&gt;…&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;p&gt;There might be several other interesting and tricky sub-conditions.  E.g. the limitation of years to complete a degree program, passing a  prerequisite course for registering a course, maximum no. of courses a  student may enroll in a single semester etc. etc. Make sure to cover all  these scenarios wisely with finite set of data.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;4. Exceptional data&lt;/strong&gt; (if applicable/required): There  may be certain exceptional scenarios that are less frequent but demand  high importance when occur, e.g. disabled students related issues.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/17519482329559377/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/04/database-testing-properties-of-good.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/17519482329559377'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/17519482329559377'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/04/database-testing-properties-of-good.html' title='Database Testing – Properties of a Good Test Data and Test Data Preparation Techniques'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/11601759732829690475</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-6944145636718334618</id><published>2012-04-08T11:09:00.001-07:00</published><updated>2012-04-08T11:12:20.178-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="How to Achieve Level 5 Maturity for QA and Testing Process"/><title type='text'>How to Achieve Level 5 Maturity for QA and Testing Process</title><content type='html'>&lt;strong&gt;This article explains what are CMM levels and how to  achieve these CMM levels for QA processes, explained with best examples.&lt;/strong&gt; &lt;p&gt;For any process whether it is a QA process, development process or  any non-technical process, there are levels of its maturity. By levels  of maturity we mean that the level of formality and processes  improvement, like ad-hoc processes – to formally defined steps – to  managed result metrics – to optimization of the processes.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;CMM (Capability Maturity Model)&lt;/strong&gt; is process based  model which is used to assess the maturity of an organization for  different domains. Although this model is normally termed as the  software development model but eventually it was used for other  processes as well like QA and testing.&lt;/p&gt; &lt;p&gt;&lt;span id=&quot;more-948&quot;&gt;&lt;/span&gt;It has 5 different levels of maturity from  1 to 5. As we go towards level 5 from 1, variability and inconsistency  reduces. Below are the details of 5 levels. Here we will go through the &lt;strong&gt;5 CMM levels with respect to QA process&lt;/strong&gt; and what all output/result is expected for each level to mature a QA/testing process and reach up to level 5.&lt;/p&gt; &lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.softwaretestinghelp.com/wp-content/qa/uploads/2012/02/CMM-Levels.gif&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 559px; height: 345px;&quot; src=&quot;http://www.softwaretestinghelp.com/wp-content/qa/uploads/2012/02/CMM-Levels.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;h3&gt;Level 1 – Ad-Hoc: Unplanned, unsystematic, and inconsistent&lt;/h3&gt; &lt;p&gt;As the word ‘Ad-Hoc’ states: unplanned, unprepared, at this level  significance is not given to planning, following processes, guidelines  and standards. There is no standardized &amp;amp; consistent way of doing  any task. The only thing which is important at this level is meeting the  timelines, irrespective of the quality of the end product and  deliverables.&lt;/p&gt; &lt;p&gt;As there are no pre-defined standards and processes, same task is done in different ways by different people.&lt;/p&gt; &lt;p&gt;And this becomes even more unsystematic and inconsistent if same task is done differently next time.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Example -&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;QA&lt;/strong&gt; – The example would be that in an organization  although QA is 1 of the phases in a product life cycle but there are not  any standard &amp;amp; no process defined, no templates for QA deliverables  like plan, strategy, scenarios, and cases are standardized. Even if  these are documented then all team members have their own way of doing  it and not consistent at all.&lt;/p&gt; &lt;h3&gt;Level 2 – Control: initiate defining processes at high level:&lt;/h3&gt; &lt;p&gt;Solution to the problem which we saw at Level 1 of unavailability of  QA processes, methodology &amp;amp; standards would be to have all these in  place. The standards and processes are not only finalized but also are  well documented, so that those can be re-used by any one for similar  task.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Example -&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;QA&lt;/strong&gt; – Define overall QA process and methodology for  different types of testing like functional, data, performance etc.  Define the role of a QA engineer in project’s life cycle and prepare  templates for deliverables in each phase. Not only define and prepare  rather share within team&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/6944145636718334618/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/04/how-to-achieve-level-5-maturity-for-qa.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/6944145636718334618'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/6944145636718334618'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/04/how-to-achieve-level-5-maturity-for-qa.html' title='How to Achieve Level 5 Maturity for QA and Testing Process'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/11601759732829690475</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-3499044047714645229</id><published>2012-04-08T11:04:00.001-07:00</published><updated>2012-04-08T11:07:15.985-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Physical and Thermal Testing"/><title type='text'>Physical and Thermal Testing</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://ars.sciencedirect.com/content/image/1-s2.0-S0169772299000212-gr1a.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 501px; height: 443px;&quot; src=&quot;http://ars.sciencedirect.com/content/image/1-s2.0-S0169772299000212-gr1a.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Tests to determine a wide range of physical  properties on raw materials, semi-finished or finished products are  available. This may range from UKAS ISO 17025:2005 accredited (UKAS  accredited testing laboratory No. 0013) to documented methods, national  or international standards through to industrial or bespoke procedures.  Whatever the specification, the testing is to the highest standards  using transparent, traceable, calibrated approaches by highly qualified  and experienced technical staff.&lt;/span&gt;&lt;/p&gt;                         &lt;p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Thermal testing can range from measuring expansion at modest  temperatures through to testing at high temperature to show fitness for  purpose in harsh and corrosive environments. Bespoke testing regimes can  be developed to proof test products in a wide range of industrial  applications.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Examples of some of Ceram’s physical tests and thermal tests are shown below.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Physical Properties&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Whilst many of the tests conducted are specific to particular  materials and applications, others are more general in nature. Most of  the tests are conducted to specific testing regimes under ISO, EN, BS,  ASTM and DIN methodologies.&lt;/span&gt;&lt;/p&gt; &lt;h2&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Refractories and Raw Materials&lt;/span&gt;&lt;/h2&gt; &lt;div class=&quot;block&quot;&gt; &lt;ul class=&quot;block_left&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Abrasion resistance &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Carbon monoxide attack &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Crushing strength &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Dimensions &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Fired shrinkage &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Modulus of Rupture &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Permanent Linear Change &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Plasticity &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Porosity &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Refractoriness &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Sieve grading &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Thermal shock &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Density&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;ul class=&quot;block_right&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Change in dimensions &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Creep &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Erosion of fibres &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Flexural strength &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Particle size &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Permeability &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Pore Size Distribution &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Pyrometric Cone Equivalent (PCE) &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Refractoriness-under-load &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Surface area &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Vitrification.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;/div&gt; &lt;h2&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Building Products&lt;/span&gt;&lt;/h2&gt; &lt;div class=&quot;block&quot;&gt; &lt;ul class=&quot;block_left&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Bending strength &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Capillary absorption test &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Density &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Drying shrinkage &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Flexural strength &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Water absorption &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Moisture movement &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Reaction to fire &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Voids &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Thermal properties &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Vapour permeability&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;ul class=&quot;block_right&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Bond strength &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Compressive strength &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Dimensions &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Efflorescence &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Freeze thaw &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Water suction &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Nib support &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Sand grading &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Tensile splitting &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Transverse strength.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;/div&gt; &lt;h2&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Tiles, Adhesives and Grouts&lt;/span&gt;&lt;/h2&gt; &lt;div class=&quot;block&quot;&gt; &lt;ul class=&quot;block_left&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Breaking load &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Colour differences &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Abrasion resistance &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Flexural strength &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Impact resistance &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Moisture expansion &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Rectangularity &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Shear strength &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Slip resistance &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Tensile strength &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Thermal shock &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Water absorption&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;ul class=&quot;block_right&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Chemical resistance &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Crazing resistance &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Dimensions &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Frost resistance &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Modulus of Rupture &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Adhesive open time &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Staining &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Slip &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Surface quality &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Thermal expansion &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Transverse strength.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;/div&gt; &lt;h2&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Testing of Thermal Properties&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Whilst many of the tests conducted are specific to particular  materials and applications, others are more general in nature. Most of  the tests are conducted to specific testing regimes under ISO, EN, BS,  ASTM and DIN methodologies. Some of the available tests are listed  below:&lt;/span&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Specific heat &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Specific heat capacity fibres &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Thermal conductivity &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; Thermal expansion.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/3499044047714645229/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/04/physical-and-thermal-testing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/3499044047714645229'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/3499044047714645229'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/04/physical-and-thermal-testing.html' title='Physical and Thermal Testing'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/11601759732829690475</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-4757677014052910481</id><published>2012-04-08T11:01:00.000-07:00</published><updated>2012-04-08T11:03:55.962-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Environmental Analysis"/><title type='text'>Environmental Analysis</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.knowledgebank.irri.org/extension/images/stories/stratPlan/spimage9.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 500px; height: 375px;&quot; src=&quot;http://www.knowledgebank.irri.org/extension/images/stories/stratPlan/spimage9.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p&gt;As a UKAS accredited testing laboratory (No. 0013) to  ISO 17025:2005, we offer a wide range of environmental tests to  national and international standards. With experience of working with  geotechnical companies, developers and regulators involved in  redeveloping contaminated sites, our knowledge of environmental analysis  is vast. Our services include:&lt;/p&gt;                         &lt;h2&gt;Biogas Analysis&lt;/h2&gt; &lt;p&gt;Once alternative fuels have been produced or sourced, stringent tests  must be carried out, both to satisfy legislative demands and to assure  users that the fuel is both safe to use and is not damaging to their  processes.&lt;/p&gt; &lt;h2&gt;Landfill Gas Analysis&lt;/h2&gt; &lt;p&gt;Offering a broad range of chemical analysis, Ceram is also accredited  to conduct the sampling and testing of gas following the Environment  Agency Technical Guidance Note LFTGN04.&lt;/p&gt; &lt;h2&gt;Alternative and Solid Fuels Analysis&lt;/h2&gt; &lt;p&gt;Whether you need calorific values, legislative advice, or finished  product evaluation, Ceram is well positioned to supply end users of  alternative fuels and waste processors or handlers with all the  essential support and analysis required.&lt;/p&gt; &lt;h2&gt;Air Quality Monitoring&lt;/h2&gt; &lt;p&gt;We offer both monitoring of the quality of both indoor and outdoor  air, for example to test material emissions or occupational exposure  limits in the workplace.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/4757677014052910481/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/04/environmental-analysis.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/4757677014052910481'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/4757677014052910481'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/04/environmental-analysis.html' title='Environmental Analysis'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/11601759732829690475</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-5122706565342700151</id><published>2012-04-08T10:50:00.001-07:00</published><updated>2012-04-08T11:00:57.685-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Building Products Testing"/><title type='text'>Building Products Testing</title><content type='html'>&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 639px; height: 409px;&quot; src=&quot;http://assets.devx.com/articlefigs/10406.png&quot; alt=&quot;&quot; border=&quot;0&quot;&gt;&lt;br /&gt;&lt;p&gt;At our UKAS accredited test facilities (UKAS  accredited testing laboratory No. 0013) we undertake analysis of a wide  range of raw materials and finished products to a variety of national,  European and international standards. Thanks to our industry knowledge  and the close work that we do with many regulatory bodies, we can guide  you through the maze of current regulations and guidelines to ensure  that your products receive certification quickly and cost-effectively.&lt;/p&gt;                         &lt;h2&gt;Materials and Products&lt;/h2&gt; &lt;div class=&quot;block&quot;&gt; &lt;ul class=&quot;block_left&quot;&gt;&lt;li&gt; Adhesives &amp;amp; sealants&lt;/li&gt;&lt;li&gt; Bricks&lt;/li&gt;&lt;li&gt; Blocks&lt;/li&gt;&lt;li&gt; Insulating products&lt;/li&gt;&lt;li&gt; Lintels&lt;/li&gt;&lt;li&gt; Slates&lt;/li&gt;&lt;li&gt; Tiles&lt;/li&gt;&lt;li&gt; Building hardware&lt;/li&gt;&lt;li&gt; Cement&lt;/li&gt;&lt;li&gt; Ceramic&lt;/li&gt;&lt;/ul&gt; &lt;ul class=&quot;block_right&quot;&gt;&lt;li&gt; Concrete, grout &amp;amp; mortar&lt;/li&gt;&lt;li&gt; Construction materials &amp;amp; geological samples&lt;/li&gt;&lt;li&gt; Floors&lt;/li&gt;&lt;li&gt; Masonry - slate &amp;amp; stone&lt;/li&gt;&lt;li&gt; Pavers&lt;/li&gt;&lt;li&gt; Pipes&lt;/li&gt;&lt;li&gt; Rock &amp;amp; natural stone&lt;/li&gt;&lt;li&gt; Soils &amp;amp; stabilised soils.&lt;/li&gt;&lt;/ul&gt; &lt;/div&gt; &lt;p&gt;We offer a full range of physical (durability, strength,  weatherability, load, slip resistance) and chemical (composition,  microstructural) tests. To complement testing results, our experts offer  interpretation together with impartial, independent and practical  advice.&lt;/p&gt; &lt;h2&gt;Why Test?&lt;/h2&gt; &lt;ul&gt;&lt;li&gt; To achieve certification by complying with current guidelines and building regulations &lt;/li&gt;&lt;li&gt; To ensure products are fit for purpose &lt;/li&gt;&lt;li&gt; To find out why products are failing in use or during manufacture &lt;/li&gt;&lt;li&gt; To develop new materials and new products through certification &lt;/li&gt;&lt;li&gt; To solve patent disputes or resolve legal disputes &lt;/li&gt;&lt;li&gt; To benchmark against competitors’ products. &lt;/li&gt;&lt;/ul&gt; &lt;h2&gt;Raw Materials&lt;/h2&gt; &lt;p&gt;Raw materials are the life-blood of any manufacturing process. The  quality and consistency of the raw materials ultimately affect the  finished product and, as such, great care should be given to the  assessment of these materials. Mistakes made at this stage of the  manufacturing process often remain to dog the product throughout its  life, none more so than in the construction sector. We offer a  comprehensive testing service specifically geared to meet the  requirements of the construction sector manufacturers (clay products,  concrete products, mortar, natural and cast stone).&lt;/p&gt; &lt;h2&gt;Finished Products&lt;/h2&gt; &lt;p&gt;In an increasingly regulated industry, finished products need to be  certificated prior to introduction to market. Whether testing the slip  resistance of a tile, measuring the frost resistance  of clay-based products or determining the compressive strength of  precast concrete masonry units, you can rely on our experts to provide  timely and cost-effective analysis to ensure that your products are fit  for purpose, achieve certification and conform to exacting quality  standards.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/5122706565342700151/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/04/building-products-testing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/5122706565342700151'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/5122706565342700151'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/04/building-products-testing.html' title='Building Products Testing'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/11601759732829690475</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-4714306986367635311</id><published>2012-04-08T10:36:00.002-07:00</published><updated>2012-04-08T10:46:16.376-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Functional Consultant"/><title type='text'>Role of a Functional Consultant</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://technet.microsoft.com/en-us/library/Bb497039.ump0202_big%28l=en-us%29.gif&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 440px; height: 329px;&quot; src=&quot;http://technet.microsoft.com/en-us/library/Bb497039.ump0202_big%28l=en-us%29.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p&gt;As I receive a number of calls regarding what are the rolls and  responsibilities of an functional consultant during the Implementation  of an Project or during Post live Application Support. Considering it as  an very important point for freshers I would like to share my  experiences: &lt;/p&gt;&lt;p&gt;Here is a list of rolls and responsibilities of functional  consultant during his assignment to different types of SAP Projects.   Please feel free to add to the list to make it more comprehensive over  time. &lt;/p&gt;&lt;p&gt;Another important consultation feature often overlooked or  neglected is the unconditional guarantee. Some believe that because a  tangible product is not exchanged there is no place for guarantees or  warranties. This is not true- look for a  consultant that stands behind  their advice and intelligence. &lt;/p&gt;  &lt;a name=&quot;Role_of_a_Functional_Consultant_in_an_End_To_End_Implementation&quot;&gt;&lt;/a&gt;&lt;h2&gt; &lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;size15 bold anthracite&quot;&gt;Role of a Functional Consultant in an End To End Implementation&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt; &lt;p&gt;The functional consultant has to understand the modules they are  implementing and the set up and configuration options available, the key  skill is being able to map the requirements of the customer to the  capabilities of the ERP system.  A mistake often made is to try and  configure or customize the ERP system to match exactly an existing  business process, rather than look to improve the processes. &lt;/p&gt; &lt;ol&gt;&lt;li&gt; &quot;A functional consultant is expected to generate knowledge  about the current business process, design current business flows, study  current business processes and its complication - in all we can say  that this is getting through with the current business setup. Flow  diagrams and DFDs are prepared, all this forms the part of the AS IS  document.&quot; &lt;/li&gt;&lt;li&gt; &quot;Everything configured has to be documented according to their  categories in the form of predefined templates; these then have to be  approved by the team leads or who ever the consultant is reporting to.&quot; &lt;/li&gt;&lt;li&gt; &quot;Mapping and GAP analysis is done for each module.&quot; &lt;/li&gt;&lt;li&gt; &quot;Before starting configuring future business processes in SAP,  the DFDs/ERDs are prepared, this documentation is called TO BE, which  can be also said as the result of mapping and gap analysis.&quot; &lt;/li&gt;&lt;li&gt; &quot;Sometimes Functional consultants are also expected to prepare  test scripts for testing the configured scenarios. Testing may also  include Unit testing, System Integration Testing, Performance Testing,  User Acceptance Testing, Regression Testing or any client specific  software testing.&quot; &lt;/li&gt;&lt;li&gt; A configuration document showing all the setting done by the  consultant is also comes under the area of role &amp;amp; responsibilities  of consultant. &lt;/li&gt;&lt;li&gt; &quot;End user manual and user training is also expected from Functional Consultants.&quot; &lt;/li&gt;&lt;li&gt; There will also be interaction with other modules consultants. &lt;/li&gt;&lt;li&gt; Updation of project status to Project Manager &amp;amp; other concerned persons. &lt;/li&gt;&lt;li&gt; Interaction with core team members, end users &amp;amp; other team members (consultants) &lt;/li&gt;&lt;li&gt; A Functional consultant has to be a good communicator he has  to communicate with Customer ERP core team, implementing team, Technical  consultant and his project leader.Written communication skill is to be  demonstrate by a functional consultant to e-mail to different groups,  documentation about the erp, reports generation. Verbal communication is  to understand the requirement , interact with customer,  to explain and  convince the customer. &lt;/li&gt;&lt;/ol&gt;</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/4714306986367635311/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/04/role-of-functional-consultant.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/4714306986367635311'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/4714306986367635311'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/04/role-of-functional-consultant.html' title='Role of a Functional Consultant'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/11601759732829690475</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9048033371409598368.post-3976364690501257259</id><published>2010-05-22T01:03:00.000-07:00</published><updated>2012-05-22T01:05:07.175-07:00</updated><title type='text'>Contact Us Form</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;
 id = 41247; 
&lt;/script&gt;&lt;br /&gt;
&lt;script src=&quot;http://kontactr.com/wp.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://lntatomos.blogspot.com/feeds/3976364690501257259/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://lntatomos.blogspot.com/2012/05/contact-us-form.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/3976364690501257259'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9048033371409598368/posts/default/3976364690501257259'/><link rel='alternate' type='text/html' href='http://lntatomos.blogspot.com/2012/05/contact-us-form.html' title='Contact Us Form'/><author><name>ATOMOS Admin</name><uri>http://www.blogger.com/profile/02079342651520106479</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>