Ask the Experts
Ask the Experts
-
Scaling Agile development calls for defined practices, consultant says
Agile consultant Mike Bonamassa discusses best practices for scaling Agile development. Continue Reading
-
An approach to test metrics that stands up to scrutiny
Matt Heusser offers advice on test case tracking that's reliable and when to deem a number untrustworthy. Continue Reading
-
FitNesse testing vs. Selenium testing: Which to use and when
SearchSoftwareQuality expert Matt Heusser compares FitNesse testing with Selenium testing and explains the advantages of each. Continue Reading
-
Managing software vulnerabilities that threaten security
Are tools enough to thwart software vulnerabilities? Dan Cornell gives advice on how to identify which weaknesses are serious and how to manage them. Continue Reading
-
Mobile app security testing: Combining tools to take on threat models
Dan Cornell discusses the three major types of security testing tools required for mobile app security testing: static, dynamic and forensic. Continue Reading
-
The risks of Agile software development: Overcoming feature creep
Ellen Gottesdiener, founder of EBG Consulting offers insights on managing feature creep, the biggest pitfall of Agile software development. Continue Reading
-
Guiding principles for an automated software test
An expert in automated software testing offers guiding principles for succeeding at this most challenging of QA projects. Continue Reading
-
How do software quality pros navigate cloud computing security issues?
Cloud computing security issues pop up when software QA pros play it fast and loose. Learn how to navigate threats and keep from getting burned. Continue Reading
-
Can software quality pros shore up network security threats?
Kevin Beaver explains how to handle the security threats that may lurk in the network infrastructure and pop up in application security testing. Continue Reading
-
What are the hidden mobile app security threats to look out for?
Mobile app security is a newer field than even Web security. But there are similar gotchas and some common threats that we're already managing. Continue Reading
-
Application portfolio management: How to get started
Scott Sehlhorst offers strategic guidance on how to approach application portfolio management with a focused vision. Continue Reading
-
How to know when legacy products have reached end-of-life
It's hard to know when to retire an aging legacy product. Scott Sehlhorst offers some strategic advice for application portfolio managers. Continue Reading
-
Comparing proprietary tools and open source tools
Learn the two major differences between proprietary tools and open source tools for software security testing. Continue Reading
-
How to ensure secure applications on cloud platforms
Learn what concerns to look for in ensuring secure applications in cloud platforms and infrastructures. Continue Reading
-
How does Lean process improvement work with Agile project management?
Guest expert Michael Hackett explains why picking and choosing your Lean processes might be worse than leaving Lean on the shelf. Continue Reading