Related Content
How Software Quality Fits into a Cashless Economy Amid the chaos and national protests against the demonetization drive that India has been seeing recently, the country is slowly settling into a new framework—the digital payment framework. Mukesh Sharma looks at how software quality fits into a cashless economy. |
||
Z-Wave Open Sourced for Smart Home Applications Interested in adding network-connected thermostats, refrigerators, lighting, or security devices in your home? A portion of the most widely deployed wireless communications protocol in home automation has become available as open source, which may mean broadening availability of smart home technology. |
||
Why Is Estimating Software Testing Time So Difficult? Management loves to ask testers to estimate how long their efforts will take. But so many important factors elude measurement that it makes it difficult to predict. If you need to explain why estimation is so tough, here are nine factors that significantly influence our ability to estimate testing time. |
||
IoT Security Concerns for Quality Assurance Teams In addition to the typical Internet-related security concerns, applications are being made specifically for IoT devices, all of which bring about additional security concerns that quality assurance teams need to consider. |
||
What’s in the Spring 2016 Issue of Better Software Magazine? The spring 2016 issue of Better Software magazine includes a number of articles that emphasize state-of-the-art practices in testing, metrics, and controlling technical debt on mobile software development projects. Read on to see how this issue can help you improve your processes and rethink workflows. |
||
The Internet of Things Has Changed the Definition of Good Software As the Internet of Things takes hold and more common appliances are run by software, people will be increasingly reliant on programmers’ ability to write good code. But how do we define “good code” or “good software”—and how do we get there? Stefano Rizzo explains eight requirements he thinks are essential. |
||
Building Security into Apps: How and Why You Need to Detect Threats In a perfect world, developers and testers are constantly asking themselves, “How can I make this more secure?” Security has become both a hot topic and a major priority in most businesses, but actually creating a mobile or web application that’s not porous might be more difficult than ever. |
||
Validate Your Core Business Assumptions Early On Verifying whether a product is being built per specifications is only solving half of the problem. Validation is a very significant activity performed by testers to ensure that the final product is ready for consumption by users and answers an important question. Are we building the right product? |