Related Content
The Internet of Things Has Changed the Definition of Good Software As the Internet of Things takes hold and more common appliances are run by software, people will be increasingly reliant on programmers’ ability to write good code. But how do we define “good code” or “good software”—and how do we get there? Stefano Rizzo explains eight requirements he thinks are essential. |
||
The Future of Cloud Connectivity in an IoT World When new technologies are embraced and popularized, they usually fail sooner rather than later. The IoT, new architectures, and cloud systems are developing into perfect storms that will take time to develop and move on to maturity, finally providing calm, consistent conditions. How should you plan to fail? |
||
Building Security into Apps: How and Why You Need to Detect Threats In a perfect world, developers and testers are constantly asking themselves, “How can I make this more secure?” Security has become both a hot topic and a major priority in most businesses, but actually creating a mobile or web application that’s not porous might be more difficult than ever. |
||
Deep Dive: Microsoft Explores Ocean Data Centers Data centers are regarded as energy hogs by many, and the hope is that renewable power sources can become a cost-effective alternative. Microsoft recently launched Project Natick to find out if data centers located under the ocean could be a viable possibility. |
||
Are Any of Yours on the List of Worst Passwords of 2015? Here’s a Top 25 List you do not want to be on: The Worst Passwords of 2015. Password management company SplashData released its annual list of the 25 worst Internet passwords, and what’s truly mindboggling is that for both 2015 and 2014, the same two passwords are at the top of the list. |
||
How to Better Test and Optimize Mobile Applications There’s no single solution that can guarantee success in the mobile testing space. However, by incorporating virtualization and making use of the cloud, you can test the functionality, performance, and security of an application across a bevy of networks. |
||
The Ethical Responsibility of Defect Severity Classification When dealing with defect classification, it's important to not blindly adhere to the criteria without consideration for real business or human implications. If your software does safety-critical work, do the defect levels reflect that? Or could something go live with potentially disastrous consequences? |
||
Cyber Threat Predictions for 2016 and Privacy Protection Tips The growing proliferation of digital dust is one of the key findings from the 2016 Emerging Cyber Threats Report issued annually by the Georgia Tech Information Security Center and Research Institute. |