Welcome to the inaugural edition of SearchSoftwareQuality.com's Software Testing E-Zine. Throughout 2009, our e-zine's...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
writers—all software testing experts—will deliver tactical how-to and in-depth trend and strategy articles on key issues including regression testing, service component architecture, mobile application testing, exploratory testing, SOA, agile development, virtualization, cloud computing and test management.
This first issue covers two new technology areas—virtualization and rich Internet applications (RIAs)— that are changing software testing approaches and presenting new challenges. Our writers, Colleen Frye and Kevin Beaver, each bring over 20 years of software industry experience to play in their analysis of these issues.
Industry veteran Colleen Frye opens the e-zine with a report called "Virtual test labs make most of cloud." The insights and technology updates in this article are timely, as the day when most test and development labs are virtualized is not far off. Already, 44% of software developers are testing in virtual environments and using virtualization technologies as part of their application development process, according to a recent SearchSoftwareQuality .com survey.
Frye explains how virtualization reduces test labs' hardware costs, increases server utilization rates, simplifies systems configuration, speeds setup and teardown of test configurations and more. Users of cloud-based development services can even bypass many traditional software configuration tasks.
In "Testing RIAs for security holes," information security expert Kevin Beaver makes it clear that newWeb 2.0 and Ajax technologies haven't erasedWeb 1.0 security shortcomings. Sure, he writes, "there are many things to exploit with rich Internet applications," but he adds that he's had few security problems with them and explains why. Check out his advice on plugging security holes using automated scanning tools and when to use manual analysis on RIAs.