As we saw in the first part of my two-part interview, Crispin says the Waterfall might work in some circumstances. “If your industry is slow changing and doesn’t require that software-providing new business value be delivered more frequently than every six months or a year, Waterfall could work,” she said.
“However,” she added, “few industries are like that…Continue
Sometimes software problems are a nuisance. Sometimes they cause your brand to lose face – and customers. Occasionally, a software glitch can endanger innocent lives. This edition of The Week in Software Failure includes some issues in the latter category.
If you’re ever tempted to skip a test, delay a test or forego testing altogether to meet a deadline or rush a product out, we urge you to take a breath and read some of these horror stories. Don’t let this be you.
Security firm says iOS vulnerability lets hackers exploit wireless hotspots
Users of Apple’s iOS are fond of thinking their favorite tech gadgets are invulnerable to hacks, adware and other pesky problems long endured by Windows users. Well, it’s not always so.
According to Bloomberg…Continue
The Romans named April from the verb Aperire, which means "to open." Guess they might have been referring to the opening of flowers and trees in the spring season. In the same spirit, let's open up the best tweets of April from your top 5 Service Virtualization players.
As usual, if you want to contribute to this list, add a comment below with your most interesting twitter post; or start twitting with the #ServiceVirtualization hastag.
Wondering what’s in #ServiceVirtualization for you? Here are some SV adopters and their tangible successes: http://bit.ly/SVShorts
Although he is a bona fide enthusiast for agile, Hemant Elhence acknowledges that the software development methodology might not work in every situation.
As we saw in part one of my email interview with the CEO of Dallas-based Synerzip, Elhence believes the waterfall approach may indeed work better if the development team has relative certainty in what the customer wants, and in the technologies involved.
“When both of these factors are the case, then you can put together a good plan up-front for delivering the software,” he told me. “Unfortunately, in most real world situations, this is a…Continue
I am trying to read one xml tag from the XML response of one step, and send that particular value in another web-service request in the next step.The XML tag which i am trying to read occurs more than once, so i have implemented a loop.However i am not able to read the value from that tag in loop.So kindly suggest.Any suggestion will be appreciatedContinue
Hi,Currently we don't have Dataset which can read specific rows from the excel, I have written custom Dataset which reads specif rows from the excel file (Start Row - End Row) . Please drop your id if you need custom jar file.Read Specific rows from excel-custom datasetContinue
Hi All,I am trying to virtualize for IBM MQ request/response pair. What request and response data protocol to be selected when messages are fixed width message.Let me know for any details required.Thanks,AkshayContinue
Hi all, Have virtualized a HTTPS/SOAP service which uses HTTPS basic authentication. but what i need to know is there any way by which we can incorporate the same authentication mechanism in the virtualized service. Is it possible? Please do let me know on any thoughts on this.Thank you for the support..CKContinue