Project Management

Articles

laptop What Are the Uses for a Vulnerability Scanner?

Today's hyper-connected world calls for extreme vigilance and knowledge of the ever-present threat of cyberattacks. These cyberattacks typically exploit vulnerabilities to breach your networks. What better way to prevent these attacks than to conduct regular vulnerability scans?

Jordan MacAvoy's picture Jordan MacAvoy
Measurement Choosing the Right Testing Metrics

Testing always looks to provide more information in order to have less uncertainty and better control over risk, but that information has to be analyzed carefully.

 

Federico Toledo's picture Federico Toledo
Most Common QA Myths

One of my mentors, whom I admire, once told me, "Quality is not only QA's responsibility; everyone- from development engineers to technical architects, to product managers need to share the responsibilities. In a QA role, if you want to be successful, you have to know the right amount of information from everyone and always ask questions." I took my mentor's advice very seriously. 

Dilruba Malik's picture Dilruba Malik
Person parasailing 5 Steps to Getting Started with Risk-Based Testing

Risk-based testing is an approach to testing that helps us handle our limited resources. It’s also a valid model for years to come because it focuses testing resources where they can have the most impact—regardless of whether limitations are due to budget, tight schedules, or even the uncertainty of an unexpected situation like COVID-19. Here are some practical tips, examples, and steps you can use to adopt risk-based testing.

Shawn Jaques's picture Shawn Jaques

StickyMinds is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.