Yazılım Mühendisliğinde Mükemmellik
ARCHIVE
Haberler
Software Verification and Validation

Software Verification and Validation

Software Verification and Validation: Examination and determination of requirements, Coding of related software, Testing of encoded software, Maintenance and follow-up of the designed software

World Environment Day

World Environment Day

As ICterra, when we have started our journey with the mission of “Excellence in Software Engineering”, we have decided that the satisfaction of all our stakeholders would be our highest priority and embraced the “environment” as one of our stakeholders.

Enabling Innovation on Legacy Systems

Enabling Innovation on Legacy Systems

Let’s continue to talk about our blog series “Remote Teams in an Era of Agile”.  What I have mentioned in my previous blog post was “Technical Excellence and Agility”. Today, I would like to continue with the time zone challenge within international teams working across different time zones.

How to Overcome Time Zone Challenge in Remote Teams

How to Overcome Time Zone Challenge in Remote Teams

Let’s continue to talk about our blog series “Remote Teams in an Era of Agile”.  What I have mentioned in my previous blog post was “Technical Excellence and Agility”. Today, I would like to continue with the time zone challenge within international teams working across different time zones.

Legacy Software Problems and Maintenance

Legacy Software Problems and Maintenance

A legacy system can be defined as outdated computing software and/or hardware that is still in use. Most legacy systems or setups exist due to some reasons such as long-term ongoing projects, support contracts, the difficulty of replacing modern ones due to cost or any kind of limitations.

App Store Optimization (ASO)

App Store Optimization (ASO)

App Store Optimization on the basis means increasing organic downloads and improving app visibility within the app stores. The optimization is basically done by changing the app’s metadata like app name, title, icons, descriptions and screenshots. These metadata differ from each other in many ways, however, the ultimate goal remains the same.

Secure Coding

Secure Coding

It is hard to withstand ever-expanding attacks with old coding habits. Many attacks on corporate applications come from inside the network, thus rendering such protection mechanisms as firewalls useless. It has become imperative that the application is capable of protecting itself. All security issues are rooted in the code itself. The starting point of the secure coding concept is based on the idea of avoiding security errors in the first place instead of fixing them. So, what should be done to gain secure coding skills?

Navigation