Related Content
How Can I Create Good Definitions? It is vital that everyone communicates properly if we are to build software applications that meet the needs of our organizations. However, creating clear and unambiguous requirements necessitates good definitions, which can sometimes be difficult. Conrad Fujimoto shares his starting technique. |
||
Internet Explorer Updates Help Attract Developers and Consumers Competitors have continued to show initiative to innovate, but a fresh update for Internet Explorer 11 has patched twenty-five of the browser’s key vulnerabilities and even added new tools to entice additional developers. Microsoft is making big moves in the browser game. |
||
Finger Vein Biometric Authentication Comes to Banking Barclays, a global banking company based in London, has announced that next year the bank will begin offering its corporate banking customers a new biometric security technology that uses finger vein authentication, eliminating the need for PINs and passcodes. |
||
Who Should Be Testing? New Considerations after Security Breaches Debates arise when people start talking about where a particular IT function should be performed. Executives can act as if testing is a necessary evil and cost is the only important factor. But due to recent security breaches, companies should be more concerned with comprehensive testing than cost. |
||
China Challenging Google and Microsoft in OS War Thanks to a lack of trust in the United States' surveillance policies, China hopes to replace massively popular properties such as Windows and Android as the leading OS in the country, both on mobile and desktop devices. The current target date for release is October. |
||
Creating Testable Requirements and Acceptance Criteria Testable requirements, or acceptance criteria, are the communication of an expectation between its originator and potential stakeholders. Many testers struggle with this starting point. But once you succeed, you know the processes that can build and test a system implementing “good” requirements. |
||
Doing Our Part to Contain Point-of-Sale Data Theft It’s easy for us as software developers and testers to dismiss intrusions on point-of-sale systems as the fault of network security professionals or inadequate network defenses. The reality is that there is a lot we should be doing as well on the software side to prevent these kinds of attacks. |
||
EMV—The Next Generation of Credit Card Security According to the US Department of Justice, approximately 16.6 million people, or 7 percent of all US residents age sixteen or older, were victims of at least one incident of identity theft in 2012. Beth Cohen looks at EMV cards—the next generation of credit card security. |