Rule of three (computer programming) [source]
I like three heuristics. Rule of three (“Three strikes and you refactor”) is a code refactoring rule of thumb to decide when similar pieces of code should be refactored to avoid duplication.
Jan #MidsTest: Risk Storming by Louise Gibbs [source]
This is a hands-on report on the Risk Storming session. This report made my to try it on the latest Testival Meetup.
When Can You Grab This Opportunity? by Johanna Rothman [source].
Johanna tells us a story about opportunity that frightens her but anyway she will grab it.
Would Heu-Risk It? Part 23: The Shapeshifter by Lena Wiberg [source]
Lena explains why we should also try to solve our testing problems with new techniques. We should get out of daily routine. Of course, she supports it with a real story.
Unclogging the Bug Pipeline by James Bach [source]
James explains a detailed bug reporting pipeline. Michael Bolton is his idea tester 🙂
A mysterious bug in the firmware of Google’s Titan M chip (CVE-2019–9465) by Alexander Bakker [source]
A story about a hard to reproduce security issue with a hardware chip that is part of Google’s Pixel 3 phone. If you are interested in OTP generators, this is for you.
Originally published at https://blog.tentamen.eu on March 15, 2020.