How are enterprise developers handling quality assurance and security? … continue reading
Now that Android device makers can’t imitate the iPad, they’ll be forced to come up with their own designs … continue reading
Change isn’t always for the better, especially when it’s unnecessary … continue reading
Whatever we’re doing for software security, it’s not enough. We need to keep vigilant … continue reading
Microsoft loves Metro, but it’s not so enamored with the name any longer, after it was sued over the use of the term … continue reading
Sous-vide as a stand-in for agile? When it comes to picking the right tools for both, the same considerations must be made … continue reading
Research indicates that the cloud is not being used much for testing … continue reading
It may be tempting to design your own mathematic algorithms, but you should get prepackaged versions instead … continue reading
The more control over mobile OS upgrade paths that hardware manufacturers have, the more consumers lose out … continue reading
Changes to Cisco’s terms of service means the company can cut your router off, or access your computer without your knowledge … continue reading
(Mostly) good news for users of these devices, but are any of them able to separate from the others? … continue reading
Can computers be trained to verify a user’s identity by monitoring their behavior? They just might … continue reading