Category Archives: Software testing

[Video 434] Felix Domke & Daniel Lange: The exhaust emissions scandal (“Dieselgate”)

As you might have heard, Volkswagen was recently caught in quite a scandal: Its diesel-powered cars would report one (legal, standard) pollution number when the car was being inspected, but quite another number (illegal and nonstandard) when it was actually being driven and on the road. This scandal, sometimes called “Dieselgate,”  has had many implications for VW as a company, and for the car industry in general, But how did VW manage to fool so many people for so long? What did the car’s software and hardware do (and not do) in order to trick emissions inspectors? In this talk, Felix Domke and Daniel Lange report what they have each found, providing us with a fascinating introduction into the intersection of cars, computers, regulations, and scandals.

Time: 1:05

[Video 248] Jon Rowe: RSpec 3 and why I `expect(you).to care`

RSpec is one of the best-known test frameworks in the Ruby world.   With RSpec 3.0, the framework has made a large number of changes, mostly aimed at making tests cleaner, easier to write and understand, but also making RSpec itself easier to maintain. In this talk, Jon Rowe describes the changes and improvements in RSpec 3.0, and why these are changes that everyday developers (and RSpec users) should notice, care about, and even incorporate into their work.

[Video 220] Dustin Whittle: Performance Testing Crash Course

Can your Web application handle lots of traffic? If so, then how much? The best way to figure out how much traffic your application can take is to load-test it. In this talk, Dustin Whittle describes a number of open-source tools that can help you to test the scalability of your Web application, at a number of different levels and in different ways.

Michael Coates: Understanding, Exploiting and Defending against Top Web Vulnerabilities

Continuing the discussion of Web security from yesterday’s lecture, today’s talk describes many of the vulnerabilities in modern Web applications — and then goes on to discuss how you can defend against them, as well as test your applications for such holes. Michael Coates, an expert in Web security, looks at some of the most common problems that Web applications experience.