Lisa Everts, Test Developer, Business Development May 18, 2018
Can a certifying body offer training in addition to sponsoring a certification program? Armed with an understanding of accreditation requirements, certifying bodies can confront the dragon of offering training to benefit their members.
Writing software can be a lot like being an adventurous hero – or at least that’s what this author tells himself. Luckily for us, one such similarity is highlighted in this post discussing the Open / Closed Principle, which states that software should be open for extension while remaining closed for modification. In other words, you shouldn’t have to change things you’ve already written to add or modify behavior in the future.
Lisa Everts, Test Developer, Business Development April 3, 2017
Digital badges are an important way for individuals to display their skill sets or levels of proficiency in specific areas, and they are equally as useful for employers seeking out candidates with those skills. The author of this blog post details the benefits to credentialing programs of implementing a badging system, the importance of badge design, and how to choose a digital badge hosting service.
Doug Hieber, Senior Application Architect March 7, 2017
One never knows where one will find inspiration. Take the author of this blog post, for example. While shopping online, this application architect encountered some less-than-ideal registration processes, which gave him a greater appreciation for the superb user experience of the Reg! exam candidate registration solution in the Strasz Exam Management Suite. Learn more about the features, and what makes a great registration system.
Before computer-based testing became so prevalent, exam content was created on paper and locked in secure file cabinets to prevent it from being compromised. The author of this blog post explains what steps can you take to keep your content secure in the digital age.
James DiEdwardo, Senior Software Developer February 8, 2017
Big Data refers to the collection of information that is so massive that traditional data processing applications are ill-equipped to handle it. And are WE equipped to handle impact it will soon have on our planet? The author of this blog post gives us the 411 (pun intended).vent it from being compromised. The author of this blog post explains what steps can you take to keep your content secure in the digital age.
The author of this blog post gives us a lesson in the concept of ubiquitous language, and the differences between the way programmers speak to each other versus how they communicate with their customers.