Better Software Magazine Articles

cyber thief What if Someone Steals Your Code?

Bob Zeidman, an expert in software forensics, provides a great overview of how to protect your software from predators. You'll learn the difference between copyrights, trade secrets, and patents.

Bob Zeidman's picture Bob Zeidman
Pitfalls of Developing for the IoT

The Internet of Things (IoT) enables amazing software-powered devices designed to make our business and personal lives easier. Lev Lesokhin discusses four fundamental practices you'll need when  developing sophisticated software for the IoT.

Lev Lesokhin's picture Lev Lesokhin
Your Professional Responsibility for Security and Performance

It is Johanna Rothman's belief that security and performance are no longer nonfunctional requirements in modern-day software development. Instead, we must prepare to accommodate security and performance needs in all projects.

Johanna Rothman's picture Johanna Rothman
A Radical View of Software Licensing and Piracy

Software vendors are making extraordinary efforts to protect the installation and use of apps, but have they gone too far? Preventing software piracy can have an adverse effect on genuine users. Software licensing  technology, according to Steve, needs to strike the best balance of protecting the asset while trusting the customer.

Steven Cholerton's picture Steven Cholerton

Interviews

Thomas Stiehm Testing with a DevOps Approach: An Interview with Tom Stiehm
Video

In this interview, Tom Stiehm of Coveros explains how you can integrate test automation with DevOps to create a continuous testing environment. In this performance-driven environment, software development, testing, and operations must evolve to meet iteration and release delivery goals.

Jennifer Bonine's picture Jennifer Bonine
Jeffery Payne discusses the fundamentals of agile software development The Fundamentals of Agile: STARWEST 2015 Interview with Jeffery Payne
Video

In this interview, TechWell speaks with Jeff Payne, the CEO and founder of Coveros. At STARWEST, he gave a two-day course titled "Fundamentals of Agile Certification."

Jennifer Bonine's picture Jennifer Bonine
Paco Hope puts a Harry Potter twist on security testing Security Testing for Muggles: An Interview with Paco Hope
Video

Paco Hope talks STARWEST 2014, his goals to reduce the stigma around security testing, and how you don't have to be a wizard to test the safety of your software. Paco also covers how security testing is like cooking, the future of security, and how he became interested in security testing.

Jeffery Payne discusses security testing in the mobile age The Importance of Security Testing in the Mobile Age: An Interview with Jeffery Payne
Video

Coveros CEO Jeff Payne goes into detail about his upcoming STARWEST 2014 tutorial, the importance of software testing in the mobile age, the most common types of breaches, and how he would have handled the recent security issues that Twitter encountered. 

Josiah Renaudin's picture Josiah Renaudin

Conference Presentations

STARCanada Logo Add Security Testing Tools to Your Delivery Pipeline
Slideshow

Developing a delivery pipeline means more than just adding automated deploys to the development cycle. To be successful, quality testing of all types must be incorporated throughout the process to ensure that problems aren’t slipping through. Those checks must include security, or you risk...

Gene Gotimer
Usability vs. Security: Find the Right Balance in Mobile Apps
Slideshow

Successful mobile apps have two key features: a great user experience and the ability to protect users’ data. Balancing user experience and security—a key aspect of product design and engineering—requires a multidisciplinary approach. According to Levent Gurses, a well-balanced app is...

Levent Gurses
How to Find Vulnerabilities and Bugs in Mobile Applications
Slideshow

As mobile devices, tools, operating systems, and web technologies rapidly evolve, testers must quickly adapt their thinking in this changing domain. Testers often struggle to find important vulnerabilities and bugs in mobile applications due to lack of guidance, experience, and the right...

Raj Subramanian
Agile Dev, Better Software & DevOps Conference West 2015: Tips and Tricks for Building Secure Mobile Apps
Slideshow

Mobile application development is now a mission-critical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built—from the ground up—to be secure. However, many application developers and testers do...

Jeffery Payne, Coveros, Inc.

AgileConnection is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.