Tips

  • Internationalization and localization testing

    In this tip, SSQ contributor Matt Heusser explains how to test for internationalization and localization, including techniques, tools and quick attacks to weed out hard-to-find bugs.

  • The cloud: Does it fit into your business model?

    In this tip, SSQ contributor David W. Johnson discusses four factors that will help you determine whether investing in cloud computing is appropriate for your business.

  • Continuous integration in embedded software development

    This tip, the first of a two-part series, speaks to the role that continuous integration plays to help you create better releases and reduce the workload in embedded software development.

  • Continuous integration in embedded software development

    In this second part of a two-part series, consultant Howard Deiner talks about the benefits of CI, specifically when used for embedded software development.

  • To simulate, or emulate? That is the question

    Understanding the differences between simulator and emulator embedded software development tools is critical to effectively using them. This article dives into the issue and provides some suggestio...

  • Estimation approaches in Agile development

    In Agile environments, estimating is done using "story points." In this tip, SSQ contributor Chris McMahon describes how story points are used on Agile teams and how story size, velocity and iterat...

  • Agile development for embedded software

    In this tip, Agile consultant Howard Deiner describes how Agile software development can and should be done with the iteration cycles using emulators or virtualized hardware so that the benefits of...

  • Test automation: Three approaches to browser testing

    Test automation when working with Web browsers can present challenges, such as slowly-loading pages, checking for sorted data, and testing static data. In this tip, SSQ contributor Chris McMahon de...

  • Deadly sins of embedded software development & testing

    In "The Divine Comedy," Dante probably wasn't talking about embedded software development, yet developers may be guilty of committing the seven deadly sins. In this tip, consultant Howard Deiner lo...

  • STAREAST: Agile testing and defect tracking

    Defect tracking systems (DTS's) are often used in application lifecycle management (ALM) to keep track of the bugs found during software development. In this tip, Agile expert Lisa Crispin talks ab...

  • Application security that won't weaken performance

    Security is important, but what happens when adding code to address security affects performance or usability? In this tip, SSQ contributor Crystal Bedell gives three best practices experts recomme...

  • Overcoming challenges with cross-site scripting testing

    Cross-site scripting (XSS) is the most common security vulnerability in the Internet today. In this tip, security expert John Overbaugh will explain what XSS is and will show techniques to test for...

  • Application security: Injection vulnerabilities

    A top security vulnerability in Web applications is an injection attack -- one in which the Web application is tricked into treating input as if it were code, allowing a hacker to gain control of a...

  • Eight traction tips to make Agile development stick

    Agile transition isn't easy. The tendency may be to revert back to traditional methods once the going gets tough, though experts encourage organizations to stick with it. In this tip, we learn eigh...

  • Agile development: Lessons for small projects

    In 2003, QA professional Chris McMahon was one of a team of two implementing a small project using Agile techniques. Though the methodology was new, the guidelines of the Agile Manifesto were taken...

  • Tips for application testing on mobile devices

    Mobile and touch screen devices promise new directions of features, and, along with that, new failure modes and risks. How then, should we test? Matt Heusser shares his experience and some reminder...

  • Defining a strategy for testing mobile devices

    Stuck with a requirement to run your app on an iPad when you don't have an iPad? What about the plethora of other mobile devices out there? How can you possibly test? In this tip, Matt Heusser give...

  • Managing change requests to your application

    In this tip, we look at end user requests, and the process to prioritize the requests for IT, so they know where to focus their work efforts.

  • Protecting application availability and integrity

    Network security and application security are both important in keeping your applications safe from hackers. In this tip, security engineer John Overbaugh focuses on application security, which is ...

  • Ways to boost network security

    Which is more important, network or application security? Well, the answer, of course, is both. In this first part of a two-part series, security engineer John Overbaugh starts by describing the di...