To create means for protecting mobile devices and bulk SMS systems (like this one smsonnet.com) from malicious software and unauthorized access by third parties, it is necessary to formulate requirements for them. In turn, the requirements are formulated based on the intruder model. Continue reading
Today global communication and wholesale a-z voice termination (more about service can be found here portal.voiplatinum.com) is becoming more and more widespread and at the same time more demanded. The borders between the countries are vanishes, people move from a country to a country on business trips, relocate to a new place for new works, start business far from home. So, the necessity to communicate globally is one of the priorities in all spheres of life. Continue reading
Only the neophytes from programming believe the myth that the testing phase can identify and solve all the accumulated problems in the development process. According to the head of the company Software Productivity Research K. Jones, the likelihood of successful completion of the complex project does not exceed 15%. The conclusion is obvious: if the developers expect the testing phase in the hope to correct deficiencies found software chances to survive such a project is very small. Continue reading
Many believe that if there is a standard, to obtain high-quality software, so it is simple enough to follow it precisely. The roots of this myth – the unjustified transfer in software engineering practices developed in traditional industries. In the past 20 years, we have seen a an exponential growth in the number of different standards. Continue reading
This myth asserts the possibility of reasoning, “good” if the software is designed on the basis of digital assessments relating directly to the code, and the process of its development. But is it possible to define exactly what “good” code? Continue reading
This myth can be considered somewhat special case of the previous one. It states that it is formal methods that are able to be a driving force “process improvement”, in particular allowing facilitate the solution of security and reliability problems. In fact, formal methods – is nothing more than a mathematically rigorous demonstration of the presence of some of the developed software in the desired properties of an abstract nature. Formal methods allow draw conclusions about the absence of logically flawed, poorly defined and mismatched behavior, which, in principle, may be present in the specification. Continue reading
The current state of affairs concerning the software quality: is a little is not that new ideas and just enthusiasm. We can only remember those distant times, when to specialize in the field of quality management was very prestigious, and on the business card is often met inscriptions such as: “software safety evangelist”.