Related Content
How Blockchain Technology Will Disrupt Business The security factor has made blockchain popular in finance applications—indeed, it's probably known best as the record-keeping technology behind bitcoin. But there’s more to its prospects than finance. Blockchain stands to be a disruptor in the business world because it has potential applications in so many fields. |
||
A Framework for Scaling Continuous Testing across an Enterprise Scaling agile and DevOps across a large enterprise is much more difficult than practicing it in smaller groups. Frameworks can help, but focus tends to be placed on development, so testing teams struggle to figure out how to best support faster development cycles. The ACT Framework puts the focus on continuous testing. |
||
Architecting Your Test Automation Platform With all the pressure to “just automate,” we may not invest enough in architecting our test automation. You wouldn't remodel a house without doing some planning and design; our test automation journey should be treated no differently. A comprehensive architecture plan is crucial for increasing test automation coverage. |
||
Top 10 TechWell Insights Stories of 2019 Career development was on many software practitioners' minds in 2019, as some of our top stories were about having a technical lead on a Scrum team and making the switch from quality assurance to quality engineering. Stories about new ideas such as DevOps and continuous testing also ranked high. Check out the roundup. |
||
How to Make Sure Your Website Is Fully Accessible Ensuring accessibility to websites, applications, tools, platforms, and other forms of technology is not only a legal requirement; it should also be a social responsibility of web developers, testers, and other software professionals. Here are some basic recommendations to keep in mind to make any website accessible. |
||
Security Testing: A Constructive Mindset with a Destructive Approach A typical tester mimics end-users, who are constructive when exploring an application’s functionality. But the role of a security tester is different. Their focus is mainly on mimicking hackers, who are intentionally destructive. A solid security strategy should balance both constructive and destructive efforts. |
||
5 SecOps Challenges and How to Overcome Them SecOps, or security operations, is a collaboration between information security and IT operations to keep a company’s data secure and reduce risk, all while maintaining agile timelines. But it can be difficult to start. Here are five challenges you should address to ensure your SecOps implementation is successful. |
||
2 Ways to Know Your Work Is Actually Done Some people think a good indication that a piece of work is done is if it's been tested. But by whom, and how? Testing alone doesn’t specifically determine whether you are done—especially when we probably don’t mean the same thing when we all talk about testing. Here are two ways to know when your work is truly done. |