Related Content
Building Security into Apps: How and Why You Need to Detect Threats In a perfect world, developers and testers are constantly asking themselves, “How can I make this more secure?” Security has become both a hot topic and a major priority in most businesses, but actually creating a mobile or web application that’s not porous might be more difficult than ever. |
||
What’s a Tech Lead? Decoding This Developer Role The role of technical lead can be hard to define, and in many cases people accept the role without knowing its definition. Because new tech leads are used to programming, many focus too much on the technical aspects and not enough on the people and the team. Read on to learn what's required of this role. |
||
How and When to Incorporate New Software Tools into Your Team Change isn’t always necessary—or even good, for that matter—but when is it actually the right time to incorporate a new tool, language, or piece of technology that might be taking the market by storm into your business? How do you identify the risks? |
||
Has the Mobile Space Stalled? That little rectangular device sitting in your pocket can already do so much, so it’s not as if there’s some terrible drought of innovation in the mobile space. But according to AppDiff.com’s CEO, Jason Arbon, the white hot excitement stemming from mobile phones has cooled. |
||
Agile outside Software: How All Teams Can Benefit Better collaboration, adaptive planning, early delivery, and constant improvement—do any of these agile pillars sound like something a non-software team would want to avoid? Agile has its place in different companies and teams across a multitude of industries. |
||
The Internet of Things Moves Software Testing into the Physical World The explosion of the Internet of Things means the physical world of things we use and the logical world of software testing are blending. Software testers need to become familiar with hardware, and manufacturing companies have to consider software, maybe for the first time. Everyone has new skills to learn. |
||
Are Any of Yours on the List of Worst Passwords of 2015? Here’s a Top 25 List you do not want to be on: The Worst Passwords of 2015. Password management company SplashData released its annual list of the 25 worst Internet passwords, and what’s truly mindboggling is that for both 2015 and 2014, the same two passwords are at the top of the list. |
||
IoT Devices: Why Accessibility Should Be Your First Priority Just because something is new, shiny, and more fully featured doesn’t mean that everyone is going to want to use it. Even if your IoT-enabled smart grill is voice-activated, it still has to be both consistently functional and as easy to use as a regular grill. |