security

Cloud storage Managing the Risks of Cloud Storage

When managing and storing information, the cloud is a reasonable place to do that, but you need to realize that, as with a personal computer or any other device, it needs to have a backup (or more than one, for important things). Luckily, there are several ways to make local backup copies of critical data.

Dale Perry's picture
Dale Perry
India Rupee How Software Quality Fits into a Cashless Economy

Amid the chaos and national protests against the demonetization drive that India has been seeing recently, the country is slowly settling into a new framework—the digital payment framework. Mukesh Sharma looks at how software quality fits into a cashless economy.

Mukesh Sharma's picture
Mukesh Sharma
smart home Z-Wave Open Sourced for Smart Home Applications

Interested in adding network-connected thermostats, refrigerators, lighting, or security devices in your home? A portion of the most widely deployed wireless communications protocol in home automation has become available as open source, which may mean broadening availability of smart home technology.

Pamela Rentz's picture
Pamela Rentz
IoT Security Concerns for Quality Assurance Teams

In addition to the typical Internet-related security concerns, applications are being made specifically for IoT devices, all of which bring about additional security concerns that quality assurance teams need to consider.

Sanjay Zalavadia's picture
Sanjay Zalavadia
What’s in the Spring 2016 Issue of Better Software Magazine?

The spring 2016 issue of Better Software magazine includes a number of articles that emphasize state-of-the-art practices in testing, metrics, and controlling technical debt on mobile software development projects. Read on to see how this issue can help you improve your processes and rethink workflows.

Ken Whitaker's picture
Ken Whitaker
The Internet of Things Has Changed the Definition of Good Software

As the Internet of Things takes hold and more common appliances are run by software, people will be increasingly reliant on programmers’ ability to write good code. But how do we define “good code” or “good software”—and how do we get there? Stefano Rizzo explains eight requirements he thinks are essential.

Stefano Rizzo's picture
Stefano Rizzo
Building Security into Apps: How and Why You Need to Detect Threats

In a perfect world, developers and testers are constantly asking themselves, “How can I make this more secure?” Security has become both a hot topic and a major priority in most businesses, but actually creating a mobile or web application that’s not porous might be more difficult than ever.

Josiah Renaudin's picture
Josiah Renaudin
Are Any of Yours on the List of Worst Passwords of 2015?

Here’s a Top 25 List you do not want to be on: The Worst Passwords of 2015. Password management company SplashData released its annual list of the 25 worst Internet passwords, and what’s truly mindboggling is that for both 2015 and 2014, the same two passwords are at the top of the list.

Pamela Rentz's picture
Pamela Rentz