Related Content
Using Feature Flags to Boost Testing and Deployment A feature flag is a configuration setting that lets you turn a given feature on or off. There is no need for a feature to be complete before you can start testing—as soon as the first piece of code is merged, you can turn the flag on in your test environment and begin. This also reduces risk. Do you use feature flags? |
||
Testers, It’s Time to Become Best Friends with Your Developers If you want to create software in the modern era and maximize the skills of your entire team, you can’t do things the way they’ve always been done. And going back to the late-stage testing example, you just can’t do things the traditional way anymore. |
||
Google: How Online Accounts Are Hijacked Hijacking accounts is one of the top online security threats, with billions of usernames and passwords from different platforms available on black markets. To understand how hijackers steal passwords and other sensitive data, Google partnered with UC Berkeley in a study of Google accounts. |
||
The Role of Testers on Agile Teams Some agile teams have so fully embraced the idea of the development team owning quality that they don't hire anyone with a testing background, instead making software engineers responsible for all phases of quality. Still, testers add value to a team in many ways that don’t involve test execution. Where do they fit in? |
||
3 Major Continuous Delivery Hurdles Teams Need to Overcome Teams that leverage continuous delivery and continuous integration are playing an entirely different game than software teams of the past—instead of mapping out this major, ridged timeline, data is being both gathered and used more frequently (and effectively) than before. |
||
4 Cyber-Security Actions to Protect from Attacks With breaches and computer hacks, companies constantly need to keep information safe. If there are loopholes in your security process, you are putting your product—and customers—at risk. Here are four actions every security-conscious company and individual should implement to avoid becoming a victim of cyber attacks. |
||
Insider Threats: What’s the Biggest IT Security Risk in Your Organization? Any modern company should give the line-of-business teams the ability to provision self-service, on-demand resources, but to ensure security, you have to do so in a way that has the necessary monitoring built in via automation. One good way is to use a cloud management platform that helps you keep your app secure. |
||
6 Major Challenges of Cloud Computing Companies of all sizes depend on cloud computing to store important data. However, significant factors such as cost, reliability, and security must not be overlooked. Here are six common challenges you should consider—and develop plans to mitigate—before implementing cloud computing technology. |