Zeichick’s Take: Software quality assurance by the numbers

How are enterprise developers handling quality assurance and security? … continue reading

Zeichick’s Take: Apple’s victory over Samsung should drive innovation

Now that Android device makers can’t imitate the iPad, they’ll be forced to come up with their own designs … continue reading

Zeichick’s Take: The new Microsoft logo

Change isn’t always for the better, especially when it’s unnecessary … continue reading

Zeichick’s Take: Preying on the weaknesses

Whatever we’re doing for software security, it’s not enough. We need to keep vigilant … continue reading

Zeichick’s Take: Riding on the Metro, or the Windows 8 style UI

Microsoft loves Metro, but it’s not so enamored with the name any longer, after it was sued over the use of the term … continue reading

Zeichick’s Take: Vacuum cooking as a metaphor for agile development

Sous-vide as a stand-in for agile? When it comes to picking the right tools for both, the same considerations must be made … continue reading

Zeichick’s Take: Software QA focused on developers, and not the cloud

Research indicates that the cloud is not being used much for testing … continue reading

Zeichick’s Take: Don’t roll your own math

It may be tempting to design your own mathematic algorithms, but you should get prepackaged versions instead … continue reading

Zeichick’s Take: With mobile, it’s all about the installed base

The more control over mobile OS upgrade paths that hardware manufacturers have, the more consumers lose out … continue reading

Zeichick’s Take: Undesirable consequences of automatic firmware updates

Changes to Cisco’s terms of service means the company can cut your router off, or access your computer without your knowledge … continue reading

Zeichick’s Take: Android and iOS advance, BlackBerry retreats, Windows Phone re-launches

(Mostly) good news for users of these devices, but are any of them able to separate from the others? … continue reading

Zeichick’s Take: Is that really you, Dave?

Can computers be trained to verify a user’s identity by monitoring their behavior? They just might … continue reading

« Previous PageNext Page »
DMCA.com Protection Status