Software Development & Testing Insights | TechWell
Development Agile Test & Quality Assurance Project Management Requirements
CM & ALM Devops Cloud Mobile People & Teams

By Topic

The Latest Stories

Java 18 Introduces Simple Web Server

Typically, if you want to serve even a simple HTML file you would need to start an HTTP Server. Java 18 adds a minimal out-of-the-box HTTP Server that doesn't require configuration and setup.

Deepak Vohra's picture
New Non-Language Features in Java 17 New Non-Language Features in Java 17

Java 17, the latest Long Term Support (LTS) version, has added new non-language features such as pseudo-random number generators.

Deepak Vohra's picture
Choosing a Data Processing Framework Choosing a Data Processing Framework

With an assortment of open source data processing frameworks available, it may become a developer’s quandary as to which is the most suitable. More often than not, multiple frameworks are used in the same application.

Deepak Vohra's picture
Human Resource Management, Multi-Tasking, and Waves

Some tolerate multi-tasking better than others. Beyond tolerance and even the ability of some people to switch contexts more efficiently than others is an effect of multi-tasking that most of us have experienced but rarely discuss.

Payson Hall's picture
New Language Features in Java 17 New Language Features in Java 17

As Java 17 is the latest Long Term Support (LTS) version after Java 11, it is opportune to go over the new language features it adds, some of which had been Preview features in intermediate versions.

Deepak Vohra's picture
MySQL 8.0.x Offers New JSON Features

MySQL database supports a native JSON data type in addition to several JSON related SQL/JSON functions. In this article, we will discuss some of the new JSON features in MySQL 8.x.

Deepak Vohra's picture
UAT Entrance Criteria: Don’t Negotiate Against Yourself UAT Entrance Criteria: Don’t Negotiate Against Yourself

An important component of any User Acceptance Testing (UAT) plan are the entry criteria. No complex data system will ever be perfect, but starting with lax entrance criteria puts the UAT team in a weak position.

Payson Hall's picture
Why Are Credential Stuffing Attacks On The Rise?

Malicious hackers have an abundance of attack methods at their disposal, ranging from the crude to the highly sophisticated. Credential stuffing is a type of brute force cyber attack that is increasing in popularity, and this article seeks to explain why.

Ronan Mahony's picture