system testing | TechWell

system testing

Locked padlock on a computer screen Using Open Source Tools for Security Testing

Performing a series of security tests before deployment of your application has become paramount. But that doesn't have to mean a suite of costly tools. Plenty of open source security testing tools have become viable options. Here's why you should consider open source tools for your different types of security testing.

Saurabh Hooda's picture
Saurabh Hooda
Gauge showing low performance Detect Performance Issues in Production with Continuous Delivery

Maybe the most important source of feedback is what happens in production. It’s amazing the information you can get if you properly monitor and analyze the data. Continuous delivery gives more precise feedback from different sources, thanks to observing the impact of every realized change while improving traceability.

Federico Toledo's picture
Federico Toledo
Computer with a "Retired!" sign Think through System Changes to Anticipate Quality Issues

When you replace or significantly modify components of a larger system, too frequently we focus on whether the code we are building functions correctly. This is important, but it’s also short-sighted. It’s easy to introduce errors because we are changing interactions. Coding bugs are only one quality problem.

Payson Hall's picture
Payson Hall
What's in the Winter 2017 Issue of Better Software Magazine?

The first issue of our nineteenth volume of Better Software magazine has a new simplified, modern look. We've been planning this design overhaul for months, and the content keeps getting better. Check out the articles on reducing the risk of failed system updates, scaling agile, and servant leadership.

Ken Whitaker's picture
Ken Whitaker
Test Automation—A Non-Expert’s Perspective

Looking at automating test execution, there are two distinct areas of focus—testing at the technical level (component and technical integration) and testing at the functional level (system or acceptance). Dale Perry offers his view on each's requirements, focus, and the issues that can arise.

Dale Perry's picture
Dale Perry
The Ethical Responsibility of Defect Severity Classification

When dealing with defect classification, it's important to not blindly adhere to the criteria without consideration for real business or human implications. If your software does safety-critical work, do the defect levels reflect that? Or could something go live with potentially disastrous consequences?

Payson Hall's picture
Payson Hall
Software Testing: A Social Responsibility

As businesses and consumers embrace big data and analytics, mobile, cloud, the IoT, and other rapidly emerging technologies, the expectation that software "just works" is rising exponentially. Equipping our technical workforce with the best education and training, tools, and approaches is critical.

Michael Sowers's picture
Michael Sowers
The Gap between User Expectations and Reality in the World of Privacy

Online privacy is a largely discussed and debated topic today. There is a common belief that with the advent of social and mobile computing, user privacy is at stake—and the growth in big data has made it worse. Some even say that, with the arrival of the mobile ecosystem, privacy is endangered.

Mukesh Sharma's picture
Mukesh Sharma