Online networking is easier than ever, but this strength can be a threat if one’s online identity is not managed well. Organizations do their part to protect their users’ identities and privacy, but it is high time the user steps up to be his own tester in validating that he safeguards himself.
Testable requirements, or acceptance criteria, are the communication of an expectation between its originator and potential stakeholders. Many testers struggle with this starting point. But once you succeed, you know the processes that can build and test a system implementing “good” requirements.
Introverts—those who rarely talk to others, seldom engage socially, and answer questions only when asked—can be the strongest contributors on a team, but only if they’re engaged effectively. Here are some tactics that can help leverage the enormous strengths of the quiet ones on your team.
It’s easy for us as software developers and testers to dismiss intrusions on point-of-sale systems as the fault of network security professionals or inadequate network defenses. The reality is that there is a lot we should be doing as well on the software side to prevent these kinds of attacks.
As testers, our role has been described as similar to car headlights. although we illuminate the project and provide advance warning of risks, we’re definitely not in the driver’s seat. For this reason, communication skills are critical to our profession. Read on to become an effective communicator.
How often have you estimated how long it would take to complete a task, only to be off by a whole week? That's because we assume we will begin the task immediately and have a forty-hour week to work on it. There's a better way: prediction based on performance. Just find a batch size for your work.
Certainty is a potentially dangerous mental flaw when we assume we know what others are thinking. It’s in situations of absolute certainty that we’re most likely to be wrong. When you're facing a problem, ask yourself if you’re sure you understand what the problem is—and ask for clarification.
Amazon recently rolled out Zocalo, an enterprise storage service that lets people store and synchronize files. Another popular cloud storage provider, Dropbox, is also built on Amazon's S3 service. Will Amazon's entry into the storage-as-a-service segment spell doom for other providers?
The US government is one of the most prominent participants in the race to the cloud, putting a great deal of capital out there for different services to fight over. But the government might not have as big a piece of its computing pie up in the sky as you’d first expect.
According to the US Department of Justice, approximately 16.6 million people, or 7 percent of all US residents age sixteen or older, were victims of at least one incident of identity theft in 2012. Beth Cohen looks at EMV cards—the next generation of credit card security.