March 30th, 2016 by divider

Flash Animation Course:
Click here to subscribe:

Thanks to David Schuttenhelm of for this tutorial!

Full Release notes

Adobe’s Intro video

Articles Used in video:
“Animate CC is HERE!”
Rich Lee, Adobe Team Blog

“Adobe confirms major Flash vulnerability, and the only way to protect yourself is to uninstall Flash”
Zack Epstein, “

Jobs: Why Apple banned Flash from the iPhone”
Stephen Shakland,

“Did Steve Jobs kill Adobe Flash?”
Doug Gross, CNN


Bloop Animation is an animation channel featuring in depth video about animation, weekly animation news and video tutorials.

Don’t forget to subscribe if you liked this video!


Posted in Videos WebSoft Tagged with: , , , , , , , , , ,

March 18th, 2016 by divider

In this video…..
introduction of computer hardware and software
what is hardware
what is programmable hardware
what is non programmable hardware
what is software
software types
what is system software
system software types
operating system software
language processor
utility programs
application software
application software types

and also replete some keyword below

c in hindi
c programming in hindi
cprogramming tutorials
c programming tutorials in hindi
programming in hindi
basic programming
basic programming in hindi
introduction of computer hardware
introduction of computer hardware in hindi
introduction of computer software
introduction of computer software in hindi
computer hardware vs computer software
hardware vs software
wbctutorials on youtube
non programmable hardware
programmable hardware
system software
application software
operating system
operating system software
utility program
language processor
language translator
mohd anwar khan


Posted in Videos WebSoft Tagged with: , , , , , , , , , ,

February 25th, 2016 by divider – Recently when i got my new mac I was pondering on how to uninstall software. Coming from a PC this was usually an easy task but for some unknown reason the mac does not include a feature for easily uninstalling applications. This tutorial will show you how to uninstall applications on your mac with ease. To download the software head on over to


Daniel on Twitter:
Live Tech Australia on Twitter:

Live Tech Australia is Australia’s premiere outlet for technology.
Focusing on consumer electronics, news coverage, reviews, tutorials and more on YouTube.


Posted in Videos WebSoft Tagged with: , , , , , , , , , , , , ,

February 20th, 2016 by divider

What’s up guys and thank you so very much for taking a chance on me, I know I’m not the best or biggest youtuber but I’m a youtuber who loves doing what I do.

Microphone – Audio-Technica ATR2500
Recording software – Open Broadcast Software/Quicktime Player
Computer – Macbook Pro 2.9 GHz Intel Core i7 – 8 GB RAM – Intel HD Graphics 4000 1024 MB /////////// HP Pavilion AMD Elite Quad-Core A8-6500 Accelerated Processor – 8GB RAM – AMD Radeon HD 85700 Graphics


Posted in Videos WebSoft Tagged with: , , , , , , , , , , , , , ,

February 3rd, 2016 by divider

EndNote XI Tutorials – Find Citations


Posted in Videos WebSoft Tagged with: ,

January 24th, 2016 by divider
This Blender 3D video demonstrates how to make an image of a cup with a handle using the cycles render engine. Blender version 2.64 was used for this tutorial. This is a good tutorial for beginners.

Blender website


Posted in Videos WebSoft Tagged with: , , , , , , , , , , , , ,

January 10th, 2016 by divider

Understanding software engineering |

The IEEE defines Software Engineering as “the application of a systematic, disciplined, and quantifiable approach to the development, operation, and maintenance of software; that is, the application of engineering to software.” Software engineering is a discipline applied throughout the entire software lifecycle, spanning the early phases of system specifications all the way to maintenance after system deployment. So why use an engineering approach to software? Quite simply, because the alternative would be to use an ad-hoc or disordered approach. An engineering approach means predictability and quantifiable results through the application of theories, methodologies, frameworks, and tools. When applied efficiently, the result is high-quality software created in a cost-effective manner.

Visit us at:

3,500 courses unlimited and online. Start your 10-day FREE trial now:

What’s software engineering? | Pluralsight


Posted in Videos WebSoft Tagged with: , , , , , , , , ,

December 27th, 2015 by divider
“Visit for FREE Complete Video Training”
Get Software testing Jobs just watching these Videos.Bug life cycle helps you understand the whole process involved in defect reporting.Testers are hired to find bugs & you need to know what happens when a bug in a software application is found.
In software development process, the bug has a life cycle. The bug should go through the life cycle to be closed. A specific life cycle ensures that the process is standardized. The bug attains different states in the life cycle. The life cycle of the bug can be shown diagrammatically as follows:

The different states of a bug can be summarized as follows:
1. New
2. Open
3. Assign
4. Test
5. Verified
6. Deferred
7. Reopened
8. Duplicate
9. Rejected and
10. Closed
Description of Various Stages:

1. New: When the bug is posted for the first time, its state will be “NEW”. This means that the bug is not yet approved.

2. Open: After a tester has posted a bug, the lead of the tester approves that the bug is genuine and he changes the state as “OPEN”.

3. Assign: Once the lead changes the state as “OPEN”, he assigns the bug to corresponding developer or developer team. The state of the bug now is changed to “ASSIGN”.

4. Test: Once the developer fixes the bug, he has to assign the bug to the testing team for next round of testing. Before he releases the software with bug fixed, he changes the state of bug to “TEST”. It specifies that the bug has been fixed and is released to testing team.
5. Deferred: The bug, changed to deferred state means the bug is expected to be fixed in next releases. The reasons for changing the bug to this state have many factors. Some of them are priority of the bug may be low, lack of time for the release or the bug may not have major effect on the software.

6. Rejected: If the developer feels that the bug is not genuine, he rejects the bug. Then the state of the bug is changed to “REJECTED”.

7. Duplicate: If the bug is repeated twice or the two bugs mention the same concept of the bug, then one bug status is changed to “DUPLICATE”.

8. Verified: Once the bug is fixed and the status is changed to “TEST”, the tester tests the bug. If the bug is not present in the software, he approves that the bug is fixed and changes the status to “VERIFIED”.

9. Reopened: If the bug still exists even after the bug is fixed by the developer, the tester changes the status to “REOPENED”. The bug traverses the life cycle once again.

10. Closed: Once the bug is fixed, it is tested by the tester. If the tester feels that the bug no longer exists in the software, he changes the status of the bug to “CLOSED”. This state means that the bug is fixed, tested and approved.

While defect prevention is much more effective and efficient in reducing the number of defects, most organization conducts defect discovery and removal. Discovering and removing defects is an expensive and inefficient process. It is much more efficient for an organization to conduct activities that prevent defects.

Guidelines on deciding the Severity of Bug:
Indicate the impact each defect has on testing efforts or users and administrators of the application under test. This information is used by developers and management as the basis for assigning priority of work on defects.
A sample guideline for assignment of Priority Levels during the product test phase includes:
1. Critical / Show Stopper — An item that prevents further testing of the product or function under test can be classified as Critical Bug. No workaround is possible for such bugs. Examples of this include a missing menu option or security permission required to access a function under test.
2. Major / High — A defect that does not function as expected/designed or cause other functionality to fail to meet requirements can be classified as Major Bug. The workaround can be provided for such bugs. Examples of this include inaccurate calculations; the wrong field being updated, etc.
3. Average / Medium — The defects which do not conform to standards and conventions can be classified as Medium Bugs. Easy workarounds exists to achieve functionality objectives. Examples include matching visual and text links which lead to different end points.
4. Minor / Low — Cosmetic defects which does not affect the functionality of the system can be classified as Minor Bugs.


Posted in Videos WebSoft Tagged with: , , , , , , , , ,