- Software [In]security: Comparing Apples, Oranges, and Aardvarks (or, All Static Analysis Tools Are Not Created Equal)
-
By
Gary McGraw, John Steven
- Jan 31, 2011
- Security expert Gary McGraw discusses the static analysis tools market, the pitfalls of product comparisons, and provides his recommendation for making the best choice.
|
- How to Grow Structure
-
By
Jurgen Appelo
- Jan 27, 2011
- This chapter gives you an overview of adaptive principles in organizational design and some ideas on the ways to grow a structure in your own organization.
|
- Leading Agile Developers: The Seven Levels of Authority (Part 1)
-
By
Jurgen Appelo
- Jan 26, 2011
- For managers to make the best use of self-organization in their business, they need to distribute control and delegate their authority. In this article, Jurgen Appelo, author of Management 3.0: Leading Agile Developers, Developing Agile Leaders, describes the scientific reason to empowering people in the first of his two-part series.
|
- Software Verification and Validation in High Assurance Agile Development: Ground Rules
-
By
Dean Leffingwell
- Dec 21, 2010
- How do you develop high quality software in regulated (and other high assurance, high economic cost of failure) environments in an agile manner? Dean Leffingwell explores the ground rules.
|
- On Agile Management: An Interview with Jurgen Appelo
-
By
Matthew Heusser, Jurgen Appelo
- Nov 29, 2010
- Is there a role for management in Agile organizations? Matt Heusser interviewed Jurgen Appelo, author of Management 3.0, to find out.
|
- Software [In]security: Cyber Warmongering and Influence Peddling
-
By
Gary McGraw, Ivan Arce
- Nov 24, 2010
- Gary McGraw & Ivan Arce explain how the current climate of exaggeration and FUD surrounding cyber attacks does not ultimately serve the best interests of computer security research — or our country.
|
- Prologue: Software Architectures and Documentation
-
By
Paul Clements, Felix Bachmann, Len Bass, David Garlan, James Ivers, Reed Little, Paulo Merson, Robert Nord, Judith Stafford
- Nov 11, 2010
- This prologue to Documenting Software Architectures: Views and Beyond, 2nd Edition begins with short overviews of software architecture and architecture documentation and then discusses architecture views, architecture styles and rules for sound documentation.
|
- Continuous Delivery: The Value Proposition
-
By
Jez Humble
- Oct 26, 2010
- Successful web startups have demonstrated that releasing frequently is an essential competitive advantage. Now enterprises that rely on software are adopting a cycle of rapid releases to get fast feedback from customers and reduce waste. In this article, Jez Humble, author of Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation, sets out the technical and organizational practices your organization needs to adopt to reduce cycle time and release new software rapidly and reliably.
|
- Software [In]security: Technology Transfer
-
By
Gary McGraw
- Oct 26, 2010
- Gary McGraw discusses the evolution of a source code scanning tool from research project to commercial project and details the transfer of technology that made it all happen.
|
- Software [In]security: How to p0wn a Control System with Stuxnet
-
By
Gary McGraw
- Sep 23, 2010
- Gary McGraw describes the Stuxnet worm and explains some of its potentially dangerous implications.
|
- An Interview with Paul Clements on Documenting Software Architectures
-
By
Paul Clements, John Morley
- Sep 21, 2010
- John Morley interviews Paul Clements about why he wrote Documenting Software Architectures: Views and Beyond, Second Edition. Paul explains why we need to be able to document an architecture so that others can successfully use it, maintain it, and build a system from it.
|
- Continuous Delivery: Anatomy of the Deployment Pipeline
-
By
Jez Humble, David Farley
- Sep 7, 2010
- The deployment pipeline is the key pattern that enables continuous delivery. A deployment pipeline implementation provides visibility into the production readiness of your applications by giving feedback on every change to your system. It also enables team members to self-service deployments into their environments. Learn how to create and manage a deployment pipeline, and how to use the crucial information it provides on the bottlenecks in your software delivery process so you can work to continuously improve it.
|
- Software [In]security: Software Security Crosses the Threshold
-
By
Gary McGraw
- Aug 16, 2010
- The software security space exceeded the $500 million mark in 2009. Software security expert Gary McGraw examines the sales of security tools providers and services firms to find out how quickly the market is growing, and which parts of the market are driving growth.
|
- Software [In]security: Obama Highlights Cyber Security Progress
-
By
Gary McGraw
- Jul 16, 2010
- Software security expert Gary McGraw went to a White House meeting on cyber security attended by 100 public and private sector security experts. McGraw shares the details of the meeting, including an unannounced visit by President Obama.
|
- Software [In]security: Cyber War - Hype or Consequences?
-
By
Gary McGraw
- Jun 17, 2010
- Is the threat of cyber war real or imagined? In this article Gary McGraw first defines cyber war and then describes some very real possibilities.
|
- Interview with Fred Brooks on the Publication of The Design of Design
-
By
Frederick P. Brooks, Eóin Woods
- Jun 8, 2010
- Eoin Woods talks with Fred Brooks, author of The Mythical Man-Month, on what motivated him to write his new book, examples of good and bad programming languages, how to recruit great designers, and the three most important pieces of advice for managing design projects.
|
- Coaching Agile Teams: Expect High Performance
-
By
Lyssa Adkins
- Jun 3, 2010
- Setting high performance as your baseline expectation and giving teams a way to achieve it play directly into the powerful motivators of autonomy, mastery, and purpose. Thus invigorated, everyone wins. Lyssa Adkins shows you how to create a culture of high performance in your Agile teams.
|
- Software [In]security: BSIMM2
-
By
Gary McGraw, Brian Chess, Sammy Migues, Elizabeth Nichols
- May 12, 2010
- Gary McGraw and colleagues discuss the latest iteration of the Building Security In Maturity Model, BSIMM2.
|
- How to Build a Strong Virtual Team
-
By
Karen N. Johnson
- May 11, 2010
- Karen N. Johnson provides valuable advice for establishing and maintaining virtual relationships with team members. Using senses other than just your sight, paying attention to subtle clues, and putting in a little extra effort to be available when needed can help you to build a strong team that works together even when they're physically separated.
|
- The Design of Design: Exemplars in Design
-
By
Frederick P. Brooks
- Apr 19, 2010
- Few designs are all-new. Usually, even novel designs derive from earlier artifacts intended for similar purposes and built with similar technology. What then is the proper role of exemplars, precedents, in design? How should the designer study and use them? Should each design domain develop an accessible cumulative store of exemplars? Frederick P. Brooks considers these questions in this excerpt from his book, The Design of Design.
|