Related Content
Choosing between MySQL and PostgreSQL MySQL and PostgreSQL are the top two open source relational databases, and they have a lot in common. So how can developers choose between them? The application should guide the features that need to be prioritized. Here’s how the two databases compare with regard to the features that most relational databases support. |
||
Why Choose Containerization? Containers have been adopted by many organizations. Docker is the most popular and has become the standard containerization platform, though there are others. But why use containerization? What are the advantages that spurred its adoption? Let’s look at some of the factors that govern the choice of containerization. |
||
Top 10 TechWell Insights Stories of 2019 Career development was on many software practitioners' minds in 2019, as some of our top stories were about having a technical lead on a Scrum team and making the switch from quality assurance to quality engineering. Stories about new ideas such as DevOps and continuous testing also ranked high. Check out the roundup. |
||
Security Testing: A Constructive Mindset with a Destructive Approach A typical tester mimics end-users, who are constructive when exploring an application’s functionality. But the role of a security tester is different. Their focus is mainly on mimicking hackers, who are intentionally destructive. A solid security strategy should balance both constructive and destructive efforts. |
||
Migrating to the Cloud: Which Model Is Right for You? Cloud computing is a relatively recent trend, and several organizations have opted to migrate their services and data to the cloud. Which of the cloud computing models available is right for which situation? Let’s look at the three options—public, private, and hybrid—and discuss when it's a good idea to use each one. |
||
5 SecOps Challenges and How to Overcome Them SecOps, or security operations, is a collaboration between information security and IT operations to keep a company’s data secure and reduce risk, all while maintaining agile timelines. But it can be difficult to start. Here are five challenges you should address to ensure your SecOps implementation is successful. |
||
Migrating a Database? Consider These Factors First Database migration is usually performed with a migration tool or service. Migrating one database to another actually involves migrating the schemas, tables, and data; the software itself is not migrated. Whatever the reason for migration, before you start, explore the options and take these considerations into account. |
||
Security Testing and Assessing Risk: A Slack Takeover with Shachar Schiff Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. Shachar Schiff, founder and principal consultant at BadTesting, hosted this Slack takeover and discussed assessing code coverage like a risk analyst, risk assessments outside security, and more. |