Related Content
Lower Risk of Downtime by Testing with Production Traffic Teams need a means of identifying potential bugs and security concerns prior to release—with speed and precision, and without the need to roll back or stage. By simultaneously running live user traffic against the current software version and the proposed upgrade, you can detect bugs while reducing risk and downtime. |
||
The Importance of Data Encryption in Cybersecurity Encryption protects private data with unique codes that scramble the data and make it impossible for intruders to read. Despite a data breach, encryption ensures that an institution’s private data is safe, even when attackers get past the firewall. Here are four reasons to use data encryption cybersecurity measures. |
||
Designing Data Models for Self-Documented Tests When testing applications, documenting and interpreting test results can be a challenge. Data models enable us to collect and process test data more dynamically and uniformly. To design effective data models for self-documented tests, there are three important things to consider: what to document, collect, and report. |
||
Change Is Hard, but BDD Is Worth It Behavior-driven development is a methodology change that impacts the whole team, and unfortunately, it’s not as easy as writing scenarios in a specific format. What is the added value of BDD? Why should the team throw their current process out the window and try to incorporate a new methodology? Here are some reasons. |
||
Making the Product and Development Partnership Thrive The product manager and the development lead partnering well together is a cornerstone of great product teams. The behavior they exhibit sets the standard for how the team cooperates, connects, and thrives. One great way to do this is getting closer to your customer. Here’s how this advice works with both protagonists. |
||
Building Culturally Inclusive AI Models For us to build the most effective technology, we need to learn from our past and build our future with more comprehensive data sets with cultural intelligence. This means AI that recognizes your story, chatbots that speak to you more authentically, and smart assistants that have inclusive data about your ancestry. |
||
Explaining Hardware Virtualization and Containerization Virtualization is the abstraction of a computer resource—such as hardware, memory, storage, an operating system, a desktop machine, or a network—built on top of the physical resource. There are many types of virtualization, and here, we look at virtualization of hardware and of an operating system, or containerization. |
||
Building Maintainable Software: A Slack Takeover with Steve Smith Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. Software architect and trainer Steve Smith, founder of Ardalis Services, hosted this Slack takeover and discussed producing testable code, writing maintainable tests, and boosting employability. |