Home > Articles > Software Development & Management

Software Development & Management

1758 Items

Sort by Date | Title

Everybody’s Doing Agile--Why Can’t We?
Aug 8, 2011
Aaron Erickson suggests that it would be wise to think, very candidly, whether Agile is really something that your company can achieve.
The Scariest (Disaster) Book I Have Ever Read, Part I
Aug 4, 2011
The most terrifying weapon facing the U.S. may already be in our enemies' hands. Are you prepared for the ultimate disaster? In Part I of his three-part series, author Leo Wrobel explains how an electromagnetic pulse can damage the world as we know it today.
Ten Years Of Agile: An Interview with Brian Marick
Aug 3, 2011
InformIT interviews Brian Marick, one of the original Agile Manifesto signatories, on the ten-year anniversary of its creation.
Ten Years of Agile: An Interview with Jon Kern
Aug 3, 2011
In this interview, Jon Kern discusses his part in the Agile Manifesto, the evolution of Agile, and what he’s up to now.
Ten Years Of Agile: An Interview with Robert C. "Uncle Bob" Martin
Aug 3, 2011
InformIT interviews Uncle Bob Martin, one of the original Agile Manifesto signatories, on the ten-year anniversary of its creation.
Ten Years of Agile: An Interview with Ward Cunningham
Aug 3, 2011
InformIT interviews Ward Cunningham, one of the original Agile Manifesto signatories, on the ten-year anniversary of its creation.
Work Item Management with IBM Rational ClearQuest and Jazz: Managing Agile Projects
Aug 3, 2011
This chapter covers how to realize Agile with Rational Team Concert (RTC) and ClearQuest.
Software [In]security: Software Security Zombies
Jul 21, 2011
Software security expert Gary McGraw reviews some of the most important security concepts — before they eat your (network's) brains.
Bob Zeidman on Intellectual Property Issues, Source Code Correlation, and Testifying in Court
Jul 7, 2011
Michael Barr talks with Bob Zeidman, author of The Software IP Detective's Handbook, about how he started working with intellectual property issues, the development of source code correlation , and what it's like to testify in court.
Barriers to Scrum Adoption
Jun 27, 2011
Scrum sounds great, but it sure seems to go wrong a lot. Matt Heusser discusses obstacles and how to go over them or around them, and sometimes just blow them up.
The Software IP Detective's Handbook: About This Book
Jun 23, 2011
Bob Zeidman describes each of the parts and chapters of The Software IP Detective's Handbook to help you determine which chapters will be useful and appealing for your specific needs and interests with regard to intellectual property.
Scalability Rules: 50 Principles for Scaling Web Sites--Reduce the Equation
Jun 22, 2011
This chapter is all about making big architectural problems smaller and doing less work while still achieving the necessary business results.
Leadership, Teamwork, and Trust: An Interview with James W. Over
Jun 20, 2011
Grady Booch talks to James W. Over, the co-author of Leadership, Teamwork, and Trust: Building a Competitive Software Capability, about the evolution and future of the software development process, a common failure of most startups, and learning about Watts Humphrey's outrageous commitment.
Software [In]security: Partly Cloudy with a Chance of Security
Jun 17, 2011
Security expert Gary McGraw provides some issues to consider when it comes to adoption of cloud services and their impact on security in your organization.
Four Rules for Surviving an Amazon EC2 Outage
Jun 2, 2011
The recent outage of one of Amazon’s availability zones has some technologists claiming the cloud isn’t product ready. The reality is that it isn’t a problem with the cloud—it’s a problem with the architecture of the sites hosted on the cloud. Michael T. Fisher and Martin L. Abbott, co-authors of Scalability Rules: 50 Principles for Scaling Web Sites, cover four simple rules that, if followed, will help your site maintain high availability no matter where it is hosted.
TIBCO Architecture Fundamentals: Basic Interaction Patterns
Jun 2, 2011
In this chapter, Paul C. Brown examines the simplest possible interactions between two parties. He considers four of the most common ActiveMatrix protocol and transport options: SOAP over HTTP, SOAP over JMS, SOAP over ActiveMatrix Virtualization, and XML over JMS.
Software [In]security: Computer Security and International Norms
May 30, 2011
The Obama administration recently released its "International Strategy for Cyberspace" outlining America's ideals and strategies for cyberspace. Security expert Gary McGraw explains why he thinks the document is promising in its effort to make our national goals and policies clear when it comes to cyberspace.
The Japan Quake: Could It Happen Here, and Is Your Organization Prepared?
May 24, 2011
The recent events in Japan have transformed idle thoughts of earthquakes and tsunamis into real-life manifestations of our worst nightmares. If you had strong information of when a disaster would strike, you could make many critical decisions, such as where to locate a home or business or whether escape or evacuation plans are needed. While an insurance company scrutinizes actuarial tables before underwriting a policy, noted author and technical futurist Leo Wrobel explains how these same kinds of tools are available to the contingency planner if one knows where to look.
New Debugging Paradigms for Object-Based Software Development
May 19, 2011
The advent of low-cost multimedia output makes it possible to provide more than one human sensory channel with input to aid the debugging process. Ron Reeves explains why this channel is important, why this would be a significant advance in debugging, why it is well-suited for object-based systems, and suggests that future tooling begin to exploit the full range of the human sensory input system.
Resuming Business Operations After a Virus Infection
May 2, 2011
Even when following cybersecurity best practices, your business very likely will become infected by malware at some point. During the recovery process, someone will have to decide when it's safe to get systems back online. Ajay Gupta, a coauthor of Hack I.T.: Security Through Penetration Testing, describes the issues and steps involved in putting your business back into production after a virus infection.

<< < Prev Page 8 9 10 11 12 Next >