Categories: Uncategorized

by nocodebdd

Share

I had the pleasure of hosting a webinar with two industry experts, Rebecca Stone from IBM.

During the webinar, Rebecca shared her experience in successfully implementing BDD in a large government project, highlighting the benefits of BDD, why and how she used OOPSI and its role in overcoming challenges faced in traditional agile projects.

Jenny Martin, the creator of OOPSI, was also in attendance and provided valuable insights on the benefits of OOPSI and shared her own experiences .

The recording from the webinar is given below. It is a must-watch for anyone interested in implementing BDD or OOPSI.

https://nocodebdd.live/Rebecca-IBM-BDD-Lessons-Learned

 

Rebecca Stone - NoCodeBDD webinar

STAY IN THE LOOP

Subscribe to our free newsletter.

Related Posts

View all
  • Key Considerations for Rolling Out BDD in a Project Key Considerations for Rolling Out BDD in a Project

    Rolling out BDD in a project requires careful planning and a well-structured process. As a tech consultant on a large project, I had to make several changes to their BDD process and automation suite implementation. Some changes were straightforward, while others proved more challenging. If you’re considering implementing BDD in […]

    Continue reading
  • 10 Tips for Writing Effective BDD Scenarios When rolling out BDD having a clear and concise scenario writing is a vital aspect of successful BDD adoption. This blog post will provide you with 10 tips to enhance your BDD scenario writing, making it easy to understand, maintainable, and efficient. 1. […]

    Continue reading
  • It will be difficult to automate testing if you don’t consider it when creating your web application. It will be difficult, regardless of whether you are a code wizard or a no-code ninja. Here are some crucial ideas to have in mind as you develop your app to make testing a […]

    Continue reading
  • Many websites now require two-factor authentication (2FA) as an extra security measure beyond a standard username and password. When a user enables 2FA for their account, they will receive a code (OTP) via their phone or email after successfully logging in with their username and password. This code must be […]

    Continue reading