Infeasible Test Requirements
BBST Foundations, introduction
TL;DR In the previous post, we explained the coverage criterion. Today we move on to the problem of Infeasible Test Requirements. We will introduce you to software testing based on…
BBST Foundations, introduction
TL;DR In the previous post, we explained the coverage criterion. Today we move on to the problem of Infeasible Test Requirements. We will introduce you to software testing based on…
TL;DR Now that we know a good testing taxonomy’s properties using this excellent paper: Bug Taxonomies: Use Them to Generate Better Tests [Vijayaraghavan, Kaner]. Let’s brainstorm fifteen brainstorming test ideas…
TL;DR Last time we presented Schedule Equals Commitment, eight schedule game. Today we talk about changing project goals, We’ll Know Where We Are When We Get There, ninth project schedule…
TL;DR How I prepared an eight-minute video for this event. The Rules Of Three My video talk about Rules Of Three and why they work will be part of the…
reading club, security testing
TL;DR A practical step by step security and privacy guide for macOS. Who Several contributors. Why You will learn about security testing for the operating system and how to do…
TL;DR In the previous post, we learned how to use the JSON decoder in Elm REPL. Today we move on to practical usage of Elm pipe operator. This post is…
elixir, functional programming
TL;DR In the previous post, we presented how to run pure Erlang functions from Elixir. Today we explain three ways how to run Elixir script. This post is part of…
BBST Foundations, introduction
TL;DR In the previous post, we explained what the test requirement is? Today we discuss the coverage criterion. We will introduce you to software testing based on the remarkable book, …
BBST Foundations, introduction
TL;DR Now that we know who uses Taxonomies using this excellent paper: Bug Taxonomies: Use Them to Generate Better Tests [Vijayaraghavan, Kaner]. Let’s explore the properties of a good testing…
TL;DR In my Elixir Phoenix application, I have a JSON API for mobile applications. One endpoint accepts file uploads. In this post, I explain my architectural decision why to implement…