Related Content
Has the Mobile Space Stalled? That little rectangular device sitting in your pocket can already do so much, so it’s not as if there’s some terrible drought of innovation in the mobile space. But according to AppDiff.com’s CEO, Jason Arbon, the white hot excitement stemming from mobile phones has cooled. |
||
Are Any of Yours on the List of Worst Passwords of 2015? Here’s a Top 25 List you do not want to be on: The Worst Passwords of 2015. Password management company SplashData released its annual list of the 25 worst Internet passwords, and what’s truly mindboggling is that for both 2015 and 2014, the same two passwords are at the top of the list. |
||
Lessons Learned from Failed Apps The industry is increasingly emphasizing the need for a longer shelf life for applications, which was under thirty days just a few years back. Why is this number low, and what can we learn from applications that fail to survive in the marketplace, let alone thrive? |
||
How to Better Test and Optimize Mobile Applications There’s no single solution that can guarantee success in the mobile testing space. However, by incorporating virtualization and making use of the cloud, you can test the functionality, performance, and security of an application across a bevy of networks. |
||
Adapt or Fail: Why Mobile Development and Testing Need to Be Agile When it comes to effective and efficient mobile app development and testing, transitioning to agile has almost become a requirement. Agile allows you to make amendments at any stage of the process, both welcoming change and using it as an advantage. |
||
Google’s New Online Cultural Institute Exhibition Brings Art through Technology You now have access to a cultural treasure trove of music, opera, theatre, dance, and performance art from around the world, courtesy of the new virtual Performing Arts exhibition unveiled by the Google Cultural Institute. |
||
The Ethical Responsibility of Defect Severity Classification When dealing with defect classification, it's important to not blindly adhere to the criteria without consideration for real business or human implications. If your software does safety-critical work, do the defect levels reflect that? Or could something go live with potentially disastrous consequences? |
||
Cyber Threat Predictions for 2016 and Privacy Protection Tips The growing proliferation of digital dust is one of the key findings from the 2016 Emerging Cyber Threats Report issued annually by the Georgia Tech Information Security Center and Research Institute. |