Better Software Magazine Articles

Warning: Security Storm Brewing

For too long now, consumers have been bailing, patching, and plugging their software each time a new security hole is discovered. And they've been absorbing the damage done by the leaks. A wave of security-conscious buyers is rising, demanding software that is sound and secure by design. Are you ready to give it to them? Find out why you should be.

Herbert H. Thompson
Source Code, Power Source, and Outsourced

Get the software engineering slant on items from the recent news.
 

Heather Shanholtzer's picture Heather Shanholtzer
Pay No Attention to the Quality Behind the Curtain

To continue our series exploring what it means to care about quality and to build better software, we spoke with Compuware executive David Kapelanski, who says that true quality is invisible.

Pam Young
The Liar's Contest

Politics is a game we're asked to participate in each and every day. But when your project's future is on the line, do you want to play around? The penalties and risks surely outweigh any reward. Discover how to extricate yourself from these losing battles.

(Not So) Trivial Pursuits

How one tester learned the hard way that quality is in the eye of the pocketbook holder.

Geordie Keitt
Security Testing by Steven Splaine

For anyone involved in security testing, or for anyone who is just plain curious about this area of software testing, the following references will provide a good starting point for any effort that you might be asked to undertake. In this issue, Steven Splaine discusses this important aspect of software engineering.

Steven Splaine
Robert Charette on Risk Management

Risk Management can be divided into three general types: risk management and decision-making, the process and mechanics of IT risk management, and the practice of risk management. In this issue's "Reference Point," Bob Charette recommends some useful resources on risk management.

Robert Charette
Knowing the Odds

Want to know what you’re up against before you start? In just one afternoon, you can perform a simple risk analysis for your project. Doing so can ensure that you are better prepared for whatever surprises may lay ahead. Payson Hall teaches you how to do that in this article.

Payson Hall's picture Payson Hall
Security Bugs Exposed

The one thing that is crystal clear with respect to software security is that it isn't done well. Security bugs and design deficiencies that allow digital information to be stolen or tampered with are far too prevalent. As testing professionals, we have a big problem, and a big opportunity, on our hands. Learn ways to find security vulnerabilities in your system.

Usability and Privacy

While most bugs that make headline news are due to careless software implementations exploited by skilled hackers, the problems in KaZaA center around its user interface. This article details KaZaA's application flaws and then suggests ways to prevent such flaws.

Nathaniel Good

Pages

CMCrossroads is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.