H2K Infosys Forum

Recent Posts
 
Notifications
Clear all

Recent Posts

Page 8 / 14
  Post Title Forum
How do I schedule and run TOSCA tests automatically?  

By vinay, 2 weeks ago

TOSCA Automation Testing
  Scheduling and running TOSCA tests automatically can be done using Tricentis Continuous Integration features. You can integrate TOSCA with Jenkins, Azure DevOps, or other CI/CD tools to trigger test e...
How do I use SonarQube in a DevSecOps workflow?  

By vinay, 2 weeks ago

AWS DevSecOps
  Using SonarQube in a DevSecOps workflow helps you integrate continuous code quality and security scanning into your CI/CD pipeline. Start by installing and configuring a SonarQube server, then connect...
How can you handle exceptions in Python?  

By kerina, 2 weeks ago

PYTHON
  Python uses try, except, else, and finally blocks to handle exceptions, which is a fundamental concept you'll learn in a Python programming training course. try: Code that may raise an exception is ...
Why Every Cloud Engineer Should Learn DevSecOps Now!  

By Liza Gloria, 2 weeks ago

AWS DevSecOps
  Cloud adoption has exploded, and with it comes the urgent need for built-in security across CI/CD workflows. DevSecOps empowers cloud engineers to automate threat detection, enforce compliance, and st...
Is Salesforce the Fastest-Growing Tech Skill for 2026?  

By Liza Gloria, 2 weeks ago

SALESFORCE
  Tech professionals are increasingly shifting toward no-code and low-code platforms, and Salesforce sits at the heart of this movement. With AI-driven Salesforce Einstein and industry cloud expansion, ...
lily What Are the Most In-Demand Data Analyst Skills?  

By lily, 2 weeks ago

DATA ANALYTICS
  The most in-demand data analyst skills include Python, SQL, data visualization, statistical analysis, problem-solving, and strong business understanding. With hands-on Data analytics training, learner...
lily What Is Zero Trust, and Why Is Everyone Talking About It?  

By lily, 2 weeks ago

Cyber security
  Zero Trust is a modern security approach that assumes no user or device is trustworthy by default, even inside the network. It verifies every access request with strict authentication, reducing breach...
Troubleshooting Python IntelliSense Issues in Visual Studio  

By carlmax, 2 weeks ago

Artificial intelligence
  If you’ve spent any time working with Visual Studio Python development, you’ve probably run into the occasional IntelliSense hiccup—missing suggestions, slow autocompletion, or errors that don’t seem ...
How do cross-functional teams work in Scrum?  

By Aliva, 2 weeks ago

Agile
  Cross-functional teams in Scrum bring together members with diverse skills—development, testing, design, analysis to deliver a working product each sprint. They collaborate closely, share responsibili...
What Are the Most Common Mistakes New Business Analysts Make?  

By Aliva, 2 weeks ago

BA-BUSINESS ANALYSIS
  New Business Analysts often make common mistakes like gathering incomplete requirements, relying too much on assumptions, and not engaging stakeholders effectively. Many also overlook proper documenta...
How to improve object recognition in TOSCA?  

By vinay, 2 weeks ago

TOSCA Automation Testing
  Improving object recognition in TOSCA starts with optimizing your automation framework and ensuring your modules are designed with clean, stable attributes. Use XScan to compare multiple recognition s...
How does dependency checking work in DevSecOps?  

By vinay, 2 weeks ago

AWS DevSecOps
  Dependency checking in DevSecOps ensures that every library, package, and third-party component used in an application is continuously scanned for known vulnerabilities. Tools like OWASP Dependency-Ch...
Rose Britney What kind of companies hire QA Testers after training?  

By Rose Britney, 2 weeks ago

SOFTWARE QA TESTING
  QA Testers are in high demand across multiple industries, making it one of the most versatile career paths in IT. After completing QA training, you can find opportunities in software development compa...
Stella caroline How Does Tableau Help You Get Real-Time Insights Faster?  

By Stella caroline, 2 weeks ago

DATA ANALYTICS
  Tableau helps you get real-time insights faster by connecting directly to live data sources and updating dashboards instantly as new data flows in. Its powerful in-memory engine processes large datase...
Stella caroline Why Choose Selenium with Java for Web Testing?  

By Stella caroline, 2 weeks ago

SELENIUM TESTING
  Selenium with Java is one of the most powerful and widely preferred combinations for web testing because of its stability, flexibility, and strong community support. Java is easy to learn, integrates ...
What are embeddings in AI/NLP?  

By kerina, 2 weeks ago

Artificial intelligence
  In many AI Learning Courses, embeddings are introduced as one of the most powerful concepts in modern Natural Language Processing. Embeddings are dense vector representations of text, words, or items....
What are Python generators and why are they useful?  

By kerina, 2 weeks ago

PYTHON
  In python programming online, generators are widely used because they allow you to iterate over large datasets without storing everything in memory. This makes them extremely efficient for real-world ...
What is overfitting in machine learning, and how do you prevent it?  

By kerina, 3 weeks ago

Artificial intelligence
  Overfitting occurs when a model learns noise instead of patterns and performs poorly on new data. This is one of the most important concepts covered in AI Training Courses, especially when dealing wit...
What is the difference between append() and extend()?  

By kerina, 3 weeks ago

PYTHON
  In Python, understanding the difference between append() and extend() is essential—especially when preparing for the Best Python Certification programs, where list operations are frequently tested. ...
Unlocking DevSecOps: The Future of Secure Software Development  

By Liza Gloria, 3 weeks ago

AWS DevSecOps
  Welcome to the ultimate DevSecOps discussion hub! This forum is designed for professionals, learners, and tech enthusiasts who want to explore the powerful intersection of development, security, and o...
Page 8 / 14

 

 

 

Share: