The Latest Stories
Quantifying the Value of Your Testing Can you put a dollar figure on the value of your testing? While it may be difficult for you to do so, Bonnie Bailey maintains it is important to be able to quantify your worth—no matter how squeamish it makes you feel to put a number on your contributions. |
||
Gaining Business Value through Proactive Risk Management An inadequate liftoff can put a shuttle on a trajectory that leads to an unknown destination. Likewise, we can condition our projects for producing business value by improving their “liftoff” through proactive risk management. |
||
Prices Drop as Cloud Storage Wars Heat Up Amazon and Google are racing to grab cloud customers, and headlines, in the great cloud war. By consistently lowering prices and offering advanced services, both giants want nothing more than to be the world's cloud storage leader. But is either of them making a profit? |
||
What Jobs Do Your Stakeholders Want Done? The jobs-to-be-done (JTBD) theory is intended to help stakeholders think about their products and services by considering how their customers like to use them. Kent McDonald delves into the JTBD theory and its benefits to a product delivery team. |
||
How Windows 8 Affects Software Testing The Windows 8 changes that will most affect software testers are the visual updates. Software testers will have to ensure that the program under test works both in the tile system and in the desktop environment, which many people will probably still use. |
||
Learning While Sleeping Napping on the job can recharge a tired mind, boost energy, and increase productivity. Now emerging research shows that people might potentially have the ability to learn new things while sleeping. Naomi Karten writes on the brain's ability to learn while resting. |
||
Mobile Drives Bottom Line Growth for Business There’s a thin line between success and failure in the modern economy. Lately, that difference is increasingly tied to technology and a company’s willingness (and ability) to adopt it. The most obvious example today is that of mobile applications. |
||
Recruiting Special Ops Code Slingers Malware attacks are a growing concern in government circles—so much so that a recent report suggests that the United States Department of Homeland Security is considering establishing a cyber reserve of computer security experts who could be called upon in the event of a crippling cyber attack. |