The 31st issue of the reading recommendation contains again 7 posts. This time I collected different kind of topics for you. There are mobile and wearbale testing topics, hiring, blogging and conference related topics. My favorite this week is the post from Katrina Clokie. Katrina wrote the post “Mobile Testing Pathway” where she collected very useful mobile testing topics. Furthermore, she provided some really nice exercises for people to start with mobile testing.
There is another post with the topic “What is Mobile First?” and a interesting one about “The Apple Watch won’t change Testing”.
Then there is a post about naughty strings and how they can be used during testing. Other posts are dealing with the topics “How to write a great talk proposal for a tech conference”, “9 Habits of Bloggers Who Have Huge Audiences” and “Differences Between Hiring a Contractor or Consultant”.
Enjoy reading the posts and send me posts that are worth reading and I will mention you and link to your social links or blog.
QA Hates You » Blog Archive » Extra Naughty Strings
9 Habits of Bloggers Who Have Huge Audiences – @ProBloggerThis is a guest contribution from Jeff Foster. If you’re just starting out as a blogger, you’re probably wondering how to grow your audience. The good news is that there’s a lot you can learn from bloggers who have already built an enormous following – no matter what they blog about, gre…This is a guest contribution from Jeff Foster. If you’re just starting out as a blogger, you’re probably wondering how …
Differences Between Hiring a Contractor or Consultant | Johanna Rothman, Management ConsultantIn my session at Agile 2015, (Agile Hiring: It’s a Team Sport) one participant asked me if I hire contractors the same way I hire employees. I do. I use the
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.