Related Content
How Blockchain Technology Will Disrupt Business The security factor has made blockchain popular in finance applications—indeed, it's probably known best as the record-keeping technology behind bitcoin. But there’s more to its prospects than finance. Blockchain stands to be a disruptor in the business world because it has potential applications in so many fields. |
||
Why Choose Containerization? Containers have been adopted by many organizations. Docker is the most popular and has become the standard containerization platform, though there are others. But why use containerization? What are the advantages that spurred its adoption? Let’s look at some of the factors that govern the choice of containerization. |
||
A Framework for Scaling Continuous Testing across an Enterprise Scaling agile and DevOps across a large enterprise is much more difficult than practicing it in smaller groups. Frameworks can help, but focus tends to be placed on development, so testing teams struggle to figure out how to best support faster development cycles. The ACT Framework puts the focus on continuous testing. |
||
Top 10 TechWell Insights Stories of 2019 Career development was on many software practitioners' minds in 2019, as some of our top stories were about having a technical lead on a Scrum team and making the switch from quality assurance to quality engineering. Stories about new ideas such as DevOps and continuous testing also ranked high. Check out the roundup. |
||
If Santa Can Be Agile, So Can You To improve his toy development lifecycle, Santa Claus had the North Pole move to an agile and DevOps approach. Santa knows it's important to accept requirements late in the process, work incrementally, deploy on time, and—above all—focus on the customer. Here’s what he found to be more effective with agile and DevOps. |
||
Security Testing: A Constructive Mindset with a Destructive Approach A typical tester mimics end-users, who are constructive when exploring an application’s functionality. But the role of a security tester is different. Their focus is mainly on mimicking hackers, who are intentionally destructive. A solid security strategy should balance both constructive and destructive efforts. |
||
5 SecOps Challenges and How to Overcome Them SecOps, or security operations, is a collaboration between information security and IT operations to keep a company’s data secure and reduce risk, all while maintaining agile timelines. But it can be difficult to start. Here are five challenges you should address to ensure your SecOps implementation is successful. |
||
Continuous Automation, from Source Code to Production Automation is necessary to achieve the benefits of DevOps principles, so teams may use automation at every step of software development. Depending on how frequently and confidently a team deploys code, they can use automation to enable continuous integration, continuous delivery, and, finally, continuous deployment. |