days
0
-66
-1
hours
0
-1
minutes
-5
-7
seconds
-5
-4
search
Great code is documented code

4 reasons to invest in knowledge sharing and documentation

As tedious as it may be, though, knowledge sharing and documentation should be a basic part of the software development cycle. Doing so takes time, but it’s worth it. Why is it so important to have strong knowledge sharing and documentation of code? This article will example four key reasons.

How Scriptless Testing Works

An introduction to scriptless testing

Scriptless testing offers some immediate benefits to three common testing roles in most organisations: business testers, developers and test engineers. Once scriptless is introduced among these three groups, organisations can achieve up to 85 to 90 per cent test automation coverage on each and every regression cycle.

Profile: Jennifer Pankratz, Storywriter, Gamedesigner and PR worker at Piranha Bytes

Women in Tech: “Every change needs pioneers, tolerance, and time”

Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Jennifer Pankratz, Storywriter, Gamedesigner and PR worker at Piranha Bytes.

Interview with Kevin Bocek, Venafi

“The impact of poor machine identity management can be devastating”

Kevin Bocek discussed security with us, including the impact of a successful software supply chain attack, what security best practices we should all follow, and the difference between human and machine identity. Kevin shares his knowledge from over 16 years of experience in IT security.

Achieving high-level security

Enhance your secrets management strategy with Puppet + HashiCorp Vault

Securing sensitive data (called “secrets”) — such as passwords, machine credentials, and API keys — is not always simple to manage manually, especially at an enterprise scale. This article explores the importance of secrets management, and how Puppet and HashiCorp Vault adds an extra layer of protection as you continue to build out your cybersecurity strategy.

Interview with Steve Wilson, Chief Product Officer at Contrast Security

“Contrast Scan revolutionizes static application security testing”

Contrast Security announced Contrast Scan, a new tool that will help teams improve team’s security by quickly finding and identifying vulnerabilities and insecure code. We spoke with Steve Wilson, Chief Product Officer at Contrast Security about the release and security best practices.

Avoid these dozen mistakes

Every Java Junior does it: Common Java mistakes made by newcomers

Everyone makes mistakes, not just beginners, but even professionals. This article goes over a dozen common mistakes that Java newbies and newcomers make and how to avoid them. Have you or your colleagues made any of these common Java mistakes early in your career?

Interview with Eric Cook, Director of EMEA Solutions Consulting at OpsRamp

“The primary use case of AIOps is to ingest multiple monitoring data feeds”

We spoke with Eric Cook, Director of EMEA Solutions Consulting at OpsRamp about a new report from OpsRamp and how UK-based IT operations professionals feel about the tools that they use. Do IT professionals use too many tools and how satisfied are they with their infrastructure?

Profile: Elke Steinegger, Area VP and General Manager Germany at Commvault

Women in Tech: “Qualifications are doubted across the board on the basis of gender”

Women are underrepresented in the tech sector —myth or reality? Two years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Elke Steinegger, Area VP and General Manager Germany at Commvault.