Related Content
![]() |
Testers, It’s Time to Become Best Friends with Your Developers If you want to create software in the modern era and maximize the skills of your entire team, you can’t do things the way they’ve always been done. And going back to the late-stage testing example, you just can’t do things the traditional way anymore. |
|
![]() |
Google: How Online Accounts Are Hijacked Hijacking accounts is one of the top online security threats, with billions of usernames and passwords from different platforms available on black markets. To understand how hijackers steal passwords and other sensitive data, Google partnered with UC Berkeley in a study of Google accounts. |
|
![]() |
What We Talk about When We Talk about Test Automation Testers talking about test automation often mean browser automation. Developers are probably talking about unit testing or something at the service layer. And operations people are most likely thinking of monitoring and the guts that control continuous integration. But the practices are more important than terminology. |
|
![]() |
The Role of Testers on Agile Teams Some agile teams have so fully embraced the idea of the development team owning quality that they don't hire anyone with a testing background, instead making software engineers responsible for all phases of quality. Still, testers add value to a team in many ways that don’t involve test execution. Where do they fit in? |
|
![]() |
3 Major Continuous Delivery Hurdles Teams Need to Overcome Teams that leverage continuous delivery and continuous integration are playing an entirely different game than software teams of the past—instead of mapping out this major, ridged timeline, data is being both gathered and used more frequently (and effectively) than before. |
|
![]() |
4 Cyber-Security Actions to Protect from Attacks With breaches and computer hacks, companies constantly need to keep information safe. If there are loopholes in your security process, you are putting your product—and customers—at risk. Here are four actions every security-conscious company and individual should implement to avoid becoming a victim of cyber attacks. |
|
![]() |
Insider Threats: What’s the Biggest IT Security Risk in Your Organization? Any modern company should give the line-of-business teams the ability to provision self-service, on-demand resources, but to ensure security, you have to do so in a way that has the necessary monitoring built in via automation. One good way is to use a cloud management platform that helps you keep your app secure. |
|
![]() |
Test Automation Cannot Be an Afterthought In software testing, automation can be viewed as an editor, of sorts. Previously, manual testers had to be extremely thorough to guarantee quality since they were the final check before products got into the hands of users. Now, testers can lean on automation tools to catch any bugs that might have been missed. |