tools
Configuration Management in the News It’s normal to not hear about configuration management (CM) during the evening news or read about our profession in your local newspaper. However, that doesn’t mean things are not progressing in our field, as this news roundup will detail. |
||
A Look at the Past and Present Worlds of SCM Tools Joe Townsend takes a look at software configuration management (SCM) tools, examines the companies that were once considered market leaders in this space, and notes the rise in popularity of Subversion and Git, which control almost 75 percent of the market share for Eclipse users. |
||
September Hacking News Roundup In this hacking roundup for September, read about two companies that are both specializing in hacking software, albeit from two different angles. One company is selling hacking tools to law enforcement agencies worldwide; the other company is building a software platform that prevents attacks. |
||
Tips for Picking the Right Software Technology When all you have is a hammer, everything looks like a nail. You may have heard this quote before, but it applies well to software technology choices. The key to choosing an appropriate technology for a software solution is to avoid bias and carefully consider the requirements you know. |
||
What ALM Tool Features Best Support Agile Software Development? Joe Farah details the key features necessary in application lifecycle management (ALM) tools to make them practical for agile development. At a minimum, agile-friendly ALM tools must support user stories, prioritization, traceability, continuous integration, and metrics for post-iteration analysis. |
||
Predictive Software Helps Police Stop Crimes Before They Happen Police are attempting to beat suspects to the scene of a crime with a computer program that indicates where criminal activity is most likely to happen. It’s called predictive policing, and the software uses past statistics and continually calibrated data to predict when and where crime will strike. |
||
The Analysis Software That Wrecked J.K. Rowling’s Anonymity The literary world was shocked to find out the nobody author of a new novel was actually super-famous J.K. Rowling. Her secret was uncovered by using software programs and algorithms to analyze her writing—a method that could also reveal hackers and others who might want to be anonymous online. |
||
The Test Automation Hunger Games The life of an automated test, whether it acts like it or not, is a game of survival—à la "The Hunger Games." Thrust into the arena of continuous integration, tests must constantly prove their worth and their usefulness. They must fight for their right to exist and be heard. |