Related Content
Container-Based Deployments and the Future of IT Operations Container-based deployments have become the preferred approach for managing the build and release of complex applications. Many of the tasks handled by IT operations today may not be necessary in the world of containers. Will Ops continue in its current role, or will it need to evolve with the new challenges? |
||
IoT Security Concerns for Quality Assurance Teams In addition to the typical Internet-related security concerns, applications are being made specifically for IoT devices, all of which bring about additional security concerns that quality assurance teams need to consider. |
||
Creating Effective Processes to Deliver Quality Software Delivering complex systems depends on software processes that guide the work on a daily basis. Much has been written about the evils of verbose waterfall processes, but the truth is that not having enough process also makes it impossible to deliver enterprise software without making many mistakes. |
||
What’s in the Spring 2016 Issue of Better Software Magazine? The spring 2016 issue of Better Software magazine includes a number of articles that emphasize state-of-the-art practices in testing, metrics, and controlling technical debt on mobile software development projects. Read on to see how this issue can help you improve your processes and rethink workflows. |
||
The Internet of Things Has Changed the Definition of Good Software As the Internet of Things takes hold and more common appliances are run by software, people will be increasingly reliant on programmers’ ability to write good code. But how do we define “good code” or “good software”—and how do we get there? Stefano Rizzo explains eight requirements he thinks are essential. |
||
A Strange Story of Version Control and Software Customization As he was doing an inventory of a company’s commercial software and version control, Payson Hall got an odd response from a vendor: Their software has no versions. Each client has a unique, customized edition of the software. How can the vendor possibly support that many products? How would that work? |
||
Building Security into Apps: How and Why You Need to Detect Threats In a perfect world, developers and testers are constantly asking themselves, “How can I make this more secure?” Security has become both a hot topic and a major priority in most businesses, but actually creating a mobile or web application that’s not porous might be more difficult than ever. |
||
Are Any of Yours on the List of Worst Passwords of 2015? Here’s a Top 25 List you do not want to be on: The Worst Passwords of 2015. Password management company SplashData released its annual list of the 25 worst Internet passwords, and what’s truly mindboggling is that for both 2015 and 2014, the same two passwords are at the top of the list. |