TL;DR In the previous post, we explain three ways how to run the Elixir script. Today we present four ways how to do control flow in Elixir. This post is…
TL;DR In the previous post, we explained the coverage criterion. Today we move on to the problem of Infeasible Test Requirements. We will introduce you to software testing based on…
TL;DR Now that we know a good testing taxonomy’s properties using this excellent paper: Bug Taxonomies: Use Them to Generate Better Tests [Vijayaraghavan, Kaner]. Let’s brainstorm fifteen brainstorming test ideas…
TL;DR Last time we presented Schedule Equals Commitment, eight schedule game. Today we talk about changing project goals, We’ll Know Where We Are When We Get There, ninth project schedule…
TL;DR How I prepared an eight-minute video for this event. The Rules Of Three My video talk about Rules Of Three and why they work will be part of the…
TL;DR A practical step by step security and privacy guide for macOS. Who Several contributors. Why You will learn about security testing for the operating system and how to do…
TL;DR In the previous post, we learned how to use the JSON decoder in Elm REPL. Today we move on to practical usage of Elm pipe operator. This post is…
TL;DR In the previous post, we presented how to run pure Erlang functions from Elixir. Today we explain three ways how to run Elixir script. This post is part of…
TL;DR In the previous post, we explained what the test requirement is? Today we discuss the coverage criterion. We will introduce you to software testing based on the remarkable book, …
TL;DR Now that we know who uses Taxonomies using this excellent paper: Bug Taxonomies: Use Them to Generate Better Tests [Vijayaraghavan, Kaner]. Let’s explore the properties of a good testing…