Related Content
Cybersecurity Consciousness during COVID-19 As we all deal with COVID-19 across the globe—medically, economically, and professionally—there are plenty of lessons to discover. There is also a lot to learn when it comes to cybersecurity. More people moving toward working from home means more opportunities for hackers to strike, so we must be smart and vigilant. |
||
Best Practices of the DevSecOps Elite: A Slack Takeover with DJ Schleen Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. DJ Schleen, a DevSecOps advocate, hosted this Slack takeover and discussed all things DevSecOps, including challenges to integrating security into your practices and getting management support. |
||
Cybersecurity Tips for Project Managers A project manager must be aware of the dangers the software faces if they are to be effective in its defense while managing their project. A lot of the data they're dealing with can be extremely sensitive. Let’s look at some tips that every project manager should pay attention to in order to protect their project. |
||
An Evolutionary Approach to Risk Management Risk management is identifying, analyzing, mitigating, and monitoring risks to a project. Humans do this all the time with life experiences, so there are parts of risk management that come naturally to us. What needs to be learned is recognizing our biases and limits to our visualization. Ask these questions to help. |
||
Exploring Containers: Creating a Dockerfile Docker containers are launched using Docker images, which are built from layers of Dockerfiles. A Dockerfile is a text document that contains all the commands or instructions to create, copy, and run an image. Let’s look at what goes into creating a Dockerfile, which could be used to build a runnable Docker image. |
||
Features of Serverless Cloud Platforms With the advent of serverless computing, several serverless platforms have become available, precluding the requirement to provision and expose the infrastructure needed on a server-based compute environment. Let’s examine some of the features to expect in a serverless platform so you can know what to prioritize. |
||
8 Questions to Ask before Fixing a Defect Some defects require a fix, without a doubt. But not all defects are created equal, so careful thought should be applied before a defect is fixed. The goal isn’t to fix every reported defect; it’s to return value to the customer and profit to the company. These eight questions can help in the decision-making process. |
||
Aging Gracefully in QA Employee churn is inevitable in every industry, and positions are being filled by fresh young faces all the time. Instead of becoming worried or insecure, senior team members should embrace their new status as someone to be looked up to for experience, lessons, and mentoring abilities. Here's how to do that in QA. |