Skip to main content

Max Saperstone

Coveros

For almost a decade, Max Saperstone has been a test engineer focusing on test automation and the continuous integration/continuous delivery process. Max specializes in open source tools—Selenium, JMeter, AutoIT, Cucumber, and Chef. He has led several testing automation efforts, including developing an automated suite focused on web-based software to operate over several applications. Max also headed a major project developing an automated testing structure to run Cucumber tests over multiple test interfaces and environments, while developing a system to keep test data “ageless.” He is currently developing a new testing architecture for SecureCI to allow testing of multiple interfaces, custom reporting, and minimal test upkeep.

Speaker Presentations
Sunday, May 3, 2015 - 8:30am
Mobile Application Testing (2-Day)

Many testers attempt to apply what they know to mobile testing, and while that may work for some functional testing, it often leaves many critical features untested. Critical errors that go untested can mean a swift end to a mobile application. Learning how to identify common issues in mobile applications and how to test the unique aspects of a mobile application is the only way to be truly successful. This course will cover usability across multiple platforms and resolutions, network and security testing, creating application unit tests, mobile UI automation, and performance testing for various devices over various networks and carriers.

Read more
Thursday, May 7, 2015 - 1:30pm
Mobile Testing
Testing with a Rooted Mobile Device

Traditional applications are tested through the GUI and through all exposed APIs. However, typical mobile app testing is only done through the front-end GUI. In addition, performance and security details are not readily available from the mobile device. Max Saperstone demonstrates some benefits of testing a native mobile application on a rooted device—one with privileged access control. Although Max does not describe how to root a device, he shares how to access back-end processes and test at this detailed level. He discusses the technical controls made available through a rooted device—together with its auditing, logging, and monitoring—and describes the gathering of additional metrics. Max demonstrates tools for penetration testing, sniffing, and network hacking; shares how to access application data directly; and shows how data security is implemented for the application. Learn how to use the admin rights associated with a rooted device to examine device performance and to simulate interrupts and system faults.