Related Content
Are Any of Yours on the List of Worst Passwords of 2015? Here’s a Top 25 List you do not want to be on: The Worst Passwords of 2015. Password management company SplashData released its annual list of the 25 worst Internet passwords, and what’s truly mindboggling is that for both 2015 and 2014, the same two passwords are at the top of the list. |
||
IoT Devices: Why Accessibility Should Be Your First Priority Just because something is new, shiny, and more fully featured doesn’t mean that everyone is going to want to use it. Even if your IoT-enabled smart grill is voice-activated, it still has to be both consistently functional and as easy to use as a regular grill. |
||
The Ethical Responsibility of Defect Severity Classification When dealing with defect classification, it's important to not blindly adhere to the criteria without consideration for real business or human implications. If your software does safety-critical work, do the defect levels reflect that? Or could something go live with potentially disastrous consequences? |
||
Cyber Threat Predictions for 2016 and Privacy Protection Tips The growing proliferation of digital dust is one of the key findings from the 2016 Emerging Cyber Threats Report issued annually by the Georgia Tech Information Security Center and Research Institute. |
||
Jelly Beans and Defect Classification: Different Strategies for Success When there’s a bowl of jelly beans, some people grab a few at random, but most of us have favorites. If you're crafty and have flexible standards, you can maximize consumption by adjusting your criteria as colors dwindle. Classifying defects should not be like choosing jelly beans; you need firm standards. |
||
Back to School: Cyber Safety Resources Back to school means back to homework, and more and more kids are likely to receive and submit their homework assignments online. Good or bad, today’s kids and their parents depend on the Internet, so laying down some cyber safety ground rules is important. |
||
Software Testing: A Social Responsibility As businesses and consumers embrace big data and analytics, mobile, cloud, the IoT, and other rapidly emerging technologies, the expectation that software "just works" is rising exponentially. Equipping our technical workforce with the best education and training, tools, and approaches is critical. |
||
Stronger, Faster Quality with Simple, Focused Checks Imagine focusing on prioritized business requirements at the software layer closest to where those business items are implemented. Writing just one check—that is, a programmed verification—per business requirement makes for simple, focused checks, supporting stronger, faster quality around the team. |