Related Content
Cybersecurity Tips for Project Managers A project manager must be aware of the dangers the software faces if they are to be effective in its defense while managing their project. A lot of the data they're dealing with can be extremely sensitive. Let’s look at some tips that every project manager should pay attention to in order to protect their project. |
||
Google's Android App Bundle Is a Win for Developers and Users Google’s new Android App Bundle is a publishing format that offers a more efficient way for developers to build and release apps. It creates lean application APKs that are optimized for each device configuration, without refactoring. This means engineers need to code less, and users are happy to get a smaller download. |
||
Building Levels of Testing in Software Development Quality is now considered everyone's responsibility, and many developers are acquiring testing skills to validate their code before it gets to dedicated quality engineers. But where should you start? Consider beginning with unit tests that help you write better code, then building to integration tests and E2E testing. |
||
Why UX Is More Important Than Coding When it comes to your project succeeding, the quality of the code is secondary to user experience. That's because software is all about making users' jobs easier. If you start coding in a vacuum without understanding what your users need to do, you can't be sure you’re making the right thing. You need UX research. |
||
What’s New in Apache Cassandra 4.0 Apache Cassandra is an open source, distributed NoSQL database based on the wide column model. The highly scalable, highly available database is great for handling large amounts of data. There is no set release date yet for the next version, Cassandra 4.0, but we do already know about several new features. |
||
Figuring Out Your Regression Testing Strategy When your application is scheduled to go to production, the development team may be asked what their regression testing strategy is. This is a perfectly reasonable question, but a lot of people have a hard time answering it. Don't overcomplicate it. Analyze your process, look at the other testing, and put it together. |
||
Continuous Risk Management in Cybersecurity Traditional cybersecurity is reactive. It responds to threats as they surface while trying to minimize the chance they will ever be an issue. Yet in an environment of constant change and evolution, this is insufficient. What your business needs to do is approach cybersecurity from the perspective of continuous risk. |
||
DevOps in the Trenches: Get Started with Metrics DevOps initiatives often start with one silo seeking to be more collaborative with others. This "DevOps in the trenches" isn't ideal, but it is a way to get DevOps bootstrapped and begin seeing benefits. Here are some tips for how to get started doing DevOps based on what role you're in, with key metrics to help. |