Video
Video
Video

Articles

Tuyen Nguyen

The Application of IV&V on Agile Projects

Tags: IV&V, Agile

Independent Verification and Validation (IV&V) is recognized as a systematic approach to improve product quality, increase process compliance, and ensure intended use and customer needs.

Read More...
Daniyal Sanusi

The Role of Policies and Procedures in Government IT

Tags: policies, procedures, FAR

On a fateful Friday afternoon, John Doe was given a letter terminating his employment.

Read More...
Abdul Wahab

Selenium Automation: An Efficient and Economical Test Automation Tool

Tags: Selenium, Automation, QTP, UFT, WebDriver

In the software testing world, automation is an extremely popular concept and is often implemented as per capability. Test automation is a technique for running repeatable tests against a software application. It provides the necessary responsiveness for regression testing.

Read More...

Videos

Thursday, December 1, 2016

Interview with Zack Goldstein, CIO of the National Oceanic Atmospheric Administration (NOAA), Part 1

Posted By, jstaples

We sat down with Zack Goldstein who told us of his efforts to modernize technology with the National Oceanic Atmospheric Administration (NOAA).

Archives

The Biggest Cybersecurity Risk Facing IT Managers Today

No matter how secure your IT infrastructure, there will always be one serious vulnerability: the personnel. It is up to every member of an organization to ensure privileged information is kept confidential. As leaders in IT, it is essential that your enterprise makes this a priority.

Frank Muse
Abdul Wahab

Selenium Automation: An Efficient and Economical Test Automation Tool

Tags: Selenium, Automation, QTP, UFT, WebDriver

In the software testing world, automation is an extremely popular concept and is often implemented as per capability. Test automation is a technique for running repeatable tests against a software application.

Read More...
Frank Muse

Security Vulnerabilities in WAP

Tags: security, WAP, WLAN

With the recent advances in wireless communications, Wireless Local Area Network (WLAN) access points (AP) have emerged as one of the most important network vulnerabilities facing IT managers today.

Read More...
Devin Turner

Open-Source Software Anyone?

Tags: open source, Software, Selenium, Quick Test Professional

Many companies and agencies are building projects around open-source software. These companies and users no longer implement closed-source software and tools without sifting through open-source options first.

Read More...
Daniyal Sanusi

The Role of Policies and Procedures in Government IT

Tags: policies, procedures, FAR

On a fateful Friday afternoon, John Doe was given a letter terminating his employment.

Read More...
Reed Racette

Getting to “Green” – The Cost of Compliance

Tags: Conpliance, FITARA, CPIC, FISMA, EA, HUD

Over the past few years there have been numerous developments that have drawn attention to federal IT, such as budget battles, security breaches, and system failures.

Read More...
Daniel Rothman

Don’t Fear “The Agile”: Incorporating the Project Manager into Scrum

Tags: Agile, Scrum, Project Manager, ScrumMaster, PMI

According to a survey conducted by QualSys Solutions, there are three top reasons for adopting Agile in an IT development environment: accelerating time to market, increasing productivity, and allowing for an easily managed priority changes (Korson 2015).

Read More...