Search: begin

More Results

Sort by: Relevance | Date
  • DWP begins IT transformational programme

    The Department for Work and Pensions (DWP) is starting to roll out its IT transformational programme.

    The department says it...

  • Google begins complying with European takedown requests

    Google has begun removing search results in response to takedown requests from European citizens.

    In May, the European Court of Justice (ECJ) upheld...

  • beginning of life (BOL)

    Beginning of life (BOL), in the context of manufacturing and product lifecycles, is the first stages of a product’s existence. BOL includes the initial conception of a product, its development, testing and initial marketing. The...

  • FAQ: Software testing in the cloud

    Cloud computing has boomed in recent years, and the world of software development has caught on with the phenomenon. The technology might not be right for every enterprise, but cloud is not just a passing trend. Software testing in the cloud has...

  • MAM tool options abound for developers

    Mobile application management is a critical component of controlling corporate applications and data in today's mobile enterprise. The mobile devices corporate employees use to access corporate applications and data can be tools for huge...

  • PCI SIG supplemental guidance process begins 2015 nominations

    The consortium behind the Payment Card Industry Data Security Standard is preparing to launch two more special interest groups that will add supplemental...

  • Agile retrospective benefits from positivity, insight

    In the Agile retrospective, are negative comments a bad thing? In other words, should we only allow positive comments in the retrospective?

    I remember years ago I worked with an executive who had a "leadership" meeting every two...

  • Electric utility device testing in the smart grid era

    When we think about embedded systems and mobile devices, we immediately think of such industries and devices as communications and cell phones and smartphones, banking and ATMs, and medicine and pacemakers. We think of devices in our home for our...

  • Businesses are beginning to adopt context-based security

    It is more than 10 years since context-aware security was proposed. The idea is simple: build a security system that can use factors such as location, device and the information being accessed to decide the type and rigour of the security...

  • Twitter uses code refactoring to reduce risk and improve testing

    Andrés Ornelas, Web DevOps lead at Twitter, decided to go a step beyond software testing. He took a peek underneath the covers of Twitter's code in order to manage the risks associated with defects, and ultimately, to simplify testing. He found...

Search Again: