Home > Articles > Software Development & Management

Software Development & Management

197 Items

Sort by Date | Title

Software [In]security: Comparing Apples, Oranges, and Aardvarks (or, All Static Analysis Tools Are Not Created Equal)
By Gary McGraw, John Steven
Jan 31, 2011
Security expert Gary McGraw discusses the static analysis tools market, the pitfalls of product comparisons, and provides his recommendation for making the best choice.
How to Grow Structure
By Jurgen Appelo
Jan 27, 2011
This chapter gives you an overview of adaptive principles in organizational design and some ideas on the ways to grow a structure in your own organization.
Leading Agile Developers: The Seven Levels of Authority (Part 1)
By Jurgen Appelo
Jan 26, 2011
For managers to make the best use of self-organization in their business, they need to distribute control and delegate their authority. In this article, Jurgen Appelo, author of Management 3.0: Leading Agile Developers, Developing Agile Leaders, describes the scientific reason to empowering people in the first of his two-part series.
Software Verification and Validation in High Assurance Agile Development: Ground Rules
By Dean Leffingwell
Dec 21, 2010
How do you develop high quality software in regulated (and other high assurance, high economic cost of failure) environments in an agile manner? Dean Leffingwell explores the ground rules.
On Agile Management: An Interview with Jurgen Appelo
By Matthew Heusser, Jurgen Appelo
Nov 29, 2010
Is there a role for management in Agile organizations? Matt Heusser interviewed Jurgen Appelo, author of Management 3.0, to find out.
Software [In]security: Cyber Warmongering and Influence Peddling
By Gary McGraw, Ivan Arce
Nov 24, 2010
Gary McGraw & Ivan Arce explain how the current climate of exaggeration and FUD surrounding cyber attacks does not ultimately serve the best interests of computer security research — or our country.
Prologue: Software Architectures and Documentation
By Paul Clements, Felix Bachmann, Len Bass, David Garlan, James Ivers, Reed Little, Paulo Merson, Robert Nord, Judith Stafford
Nov 11, 2010
This prologue to Documenting Software Architectures: Views and Beyond, 2nd Edition begins with short overviews of software architecture and architecture documentation and then discusses architecture views, architecture styles and rules for sound documentation.
Continuous Delivery: The Value Proposition
By Jez Humble
Oct 26, 2010
Successful web startups have demonstrated that releasing frequently is an essential competitive advantage. Now enterprises that rely on software are adopting a cycle of rapid releases to get fast feedback from customers and reduce waste. In this article, Jez Humble, author of Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation, sets out the technical and organizational practices your organization needs to adopt to reduce cycle time and release new software rapidly and reliably.
Software [In]security: Technology Transfer
By Gary McGraw
Oct 26, 2010
Gary McGraw discusses the evolution of a source code scanning tool from research project to commercial project and details the transfer of technology that made it all happen.
Software [In]security: How to p0wn a Control System with Stuxnet
By Gary McGraw
Sep 23, 2010
Gary McGraw describes the Stuxnet worm and explains some of its potentially dangerous implications.
An Interview with Paul Clements on Documenting Software Architectures
By Paul Clements, John Morley
Sep 21, 2010
John Morley interviews Paul Clements about why he wrote Documenting Software Architectures: Views and Beyond, Second Edition. Paul explains why we need to be able to document an architecture so that others can successfully use it, maintain it, and build a system from it.
Continuous Delivery: Anatomy of the Deployment Pipeline
By Jez Humble, David Farley
Sep 7, 2010
The deployment pipeline is the key pattern that enables continuous delivery. A deployment pipeline implementation provides visibility into the production readiness of your applications by giving feedback on every change to your system. It also enables team members to self-service deployments into their environments. Learn how to create and manage a deployment pipeline, and how to use the crucial information it provides on the bottlenecks in your software delivery process so you can work to continuously improve it.
Software [In]security: Software Security Crosses the Threshold
By Gary McGraw
Aug 16, 2010
The software security space exceeded the $500 million mark in 2009. Software security expert Gary McGraw examines the sales of security tools providers and services firms to find out how quickly the market is growing, and which parts of the market are driving growth.
Software [In]security: Obama Highlights Cyber Security Progress
By Gary McGraw
Jul 16, 2010
Software security expert Gary McGraw went to a White House meeting on cyber security attended by 100 public and private sector security experts. McGraw shares the details of the meeting, including an unannounced visit by President Obama.
Software [In]security: Cyber War - Hype or Consequences?
By Gary McGraw
Jun 17, 2010
Is the threat of cyber war real or imagined? In this article Gary McGraw first defines cyber war and then describes some very real possibilities.
Interview with Fred Brooks on the Publication of The Design of Design
By Frederick P. Brooks, Eóin Woods
Jun 8, 2010
Eoin Woods talks with Fred Brooks, author of The Mythical Man-Month, on what motivated him to write his new book, examples of good and bad programming languages, how to recruit great designers, and the three most important pieces of advice for managing design projects.
Coaching Agile Teams: Expect High Performance
By Lyssa Adkins
Jun 3, 2010
Setting high performance as your baseline expectation and giving teams a way to achieve it play directly into the powerful motivators of autonomy, mastery, and purpose. Thus invigorated, everyone wins. Lyssa Adkins shows you how to create a culture of high performance in your Agile teams.
Software [In]security: BSIMM2
By Gary McGraw, Brian Chess, Sammy Migues, Elizabeth Nichols
May 12, 2010
Gary McGraw and colleagues discuss the latest iteration of the Building Security In Maturity Model, BSIMM2.
How to Build a Strong Virtual Team
By Karen N. Johnson
May 11, 2010
Karen N. Johnson provides valuable advice for establishing and maintaining virtual relationships with team members. Using senses other than just your sight, paying attention to subtle clues, and putting in a little extra effort to be available when needed can help you to build a strong team that works together even when they're physically separated.
The Design of Design: Exemplars in Design
By Frederick P. Brooks
Apr 19, 2010
Few designs are all-new. Usually, even novel designs derive from earlier artifacts intended for similar purposes and built with similar technology. What then is the proper role of exemplars, precedents, in design? How should the designer study and use them? Should each design domain develop an accessible cumulative store of exemplars? Frederick P. Brooks considers these questions in this excerpt from his book, The Design of Design.

<< < Prev Page 2 3 4 5 6 Next >