Meet & Greet and Learn from Jon Hagar on Exploratory Testing for Mobile

Location visible to members


Hi Philadelphia Software Testing Group Members,

We are excited to announce our Second Meet & Greet & Learn themed meetup on 18th June (Thursday - 3 PM). A lot of our meetup group members suggested that we have speaker sessions around Mobile and Agile and here we are..

This time, we have eminent speaker - Jon Hagar, with over 35 Years in the Software Testing Industry. Jon will be speaking on "Five Exploratory Test Attacks for Breaking Mobile Software".

Please RSVP so that we have another exciting meetup to network and learn. We have many new group members since our first meetup. Look forward to meet everyone in person soon.

About Jon Hagar:

Jon Hagar is a systems-software tester consultant and trainer supporting software product integrity, verification, and validation with a specialization in embedded, IoT, and mobile software systems. Jon has worked in software, particularly testing for over thirty five years. Projects he has supported include: control system (avionics and auto), spacecraft, games, security, mobile-smart devices, and ground systems (IT) as well as working attack-based testing in his book: Software Test Attacks to Break Mobile and Embedded Devices. Jon is lead editor/author on numerous international standards including model-based testing, IEEE, and ISO testing. Jon has taught 100s of testers, and published many articles on software.

About 5 Exploratory Test Attacks for Breaking Mobile Software:

In the world of mobile systems and smart apps, developers and testers must do more than just look for feature bugs. To find potential failures and serious errors, their arsenal should include attack-based exploratory testing. In the tradition of James Whittaker’s How to Break Software books, Jon Hagar applies the “attack” concept to five test areas. Jon examines common industry patterns of product failures and shares five of his favorite software test attacks for native, web-based, and hybrid apps. He explains when and how to conduct the attacks, including the pros and cons of the attacks. Take back an arsenal of these attacks that you can employ on your current or next project.