Welcome to the inaugural edition of SearchSoftwareQuality.com's Software Testing E-Zine. Throughout 2009, our e-zine's...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
writers—all software testing experts—will deliver tactical how-to and in-depth trend and strategy articles on key issues including regression testing, service component architecture, mobile application testing, exploratory testing, SOA, agile development, virtualization, cloud computing and test management.
This first issue covers two new technology areas—virtualization and rich Internet applications (RIAs)— that are changing software testing approaches and presenting new challenges. Our writers, Colleen Frye and Kevin Beaver, each bring over 20 years of software industry experience to play in their analysis of these issues.
Industry veteran Colleen Frye opens the e-zine with a report called "Virtual test labs make most of cloud." The insights and technology updates in this article are timely, as the day when most test and development labs are virtualized is not far off. Already, 44% of software developers are testing in virtual environments and using virtualization technologies as part of their application development process, according to a recent SearchSoftwareQuality .com survey.
Frye explains how virtualization reduces test labs' hardware costs, increases server utilization rates, simplifies systems configuration, speeds setup and teardown of test configurations and more. Users of cloud-based development services can even bypass many traditional software configuration tasks.
In "Testing RIAs for security holes," information security expert Kevin Beaver makes it clear that newWeb 2.0 and Ajax technologies haven't erasedWeb 1.0 security shortcomings. Sure, he writes, "there are many things to exploit with rich Internet applications," but he adds that he's had few security problems with them and explains why. Check out his advice on plugging security holes using automated scanning tools and when to use manual analysis on RIAs.