TL;DR In the previous post, we discussed how to estimate when team members work on several projects simultaneously. But In a real software project, there is high probability that you…
TL;DR In this week’s reading club, we share penetration testing Linux commands. Penetration Testing With penetration testing, we try to find a misconfiguration on the Linux machine. One penetration attack…
TL;DR In the previous post, we learned about the Elm application state so users could interact with our Picshare application. Today we explain Elm Record Type, an Elm implementation of…
TL;DR In the previous post, we explained the Elixir Immutability concept. This post is part of the functional language series, and it is based on the remarkable book Elixir In…
TL;DR In the previous post, we did an exercise about the specification for a simple function. Let’s comment on our answers to this exercise. We will introduce you to software…
TL;DR Now that we know the structure of exploratory testing sessions in Session-Based Test Management [Bach], let’s explore the exploratory testing session report debriefing between test manager and tester. This…
TL;DR In the previous post, we found out how little instead how much can we estimate. Today we discuss how to estimate when team members work on several projects simultaneously….
TL;DR Apple Platform Security is a dedicated web page that explains how Apple manages security risks for its platforms and services. Apple Platform Security Apple Platform Security is an excellent…
TL;DR We added a function that adds a photo. So far, we have a static Elm application. We need to introduce the Elm application state so users could interact with…
TL;DR In the previous post, we explained the recursion concept in Elixir Lists. Today we discuss Elixir Immutability concept. This post is part of the functional language series, and it…