- An Agile Approach to Estimating and Planning
-
By
Mike Cohn
- Aug 20, 2009
- With the four value statements of the Agile Manifesto in mind, Mike Cohn considers what it means to have an agile approach to a project, as well as what it means to have an agile approach to estimating and planning.
|
- Master of Scrum: An Interview with Mike Cohn
-
By
Matthew Heusser, Mike Cohn
- Aug 19, 2009
- Mike Cohn reveals his experiences with Scrum transitions, the challenges of estimating software project duration and scope, Agile project management, and planning in collaborative environments - all while standing on one foot. Or, at least, he tries.
|
- The Purpose of Agile Planning
-
By
Mike Cohn
- Aug 19, 2009
- If estimating and planning are difficult, and if it’s impossible to get an accurate estimate until so late in a project, why do it at all?
|
- Agile Project Management: Adapting over Conforming
-
By
Jim Highsmith
- Aug 17, 2009
- Jim Highsmith explains that developing great products requires exploration, not tracking against a plan. Have the courage to explore into the unknown and the humility to recognize mistakes and adapt to the situation. That's Agile Project Management.
|
- Interview with Jim Highsmith
-
By
Israel Gat, Jim Highsmith
- Aug 17, 2009
- Israel Gat talks with Jim Highsmith, author of Agile Project Management: Creating Innovative Products, Second Edition, about why he wrote a new edition of the book, approaches to Agile development, Agile adoption, risk-mitigation strategies, and more.
|
- Software [In]security: Moving U.S. Cybersecurity Beyond Cyberplatitudes
-
By
Gary McGraw
- Jul 16, 2009
- Gary McGraw discusses how the current U.S. administration needs to make some important progress on cybersecurity rather than simply offering more platitudes.
|
- Software [In]security: Measuring Software Security
-
By
Gary McGraw, Jim Routh
- Jun 18, 2009
- Gary McGraw and Jim Routh describe the value positioning of a successful software security initiative instituted at a large financial services firm.
|
- Software [In]security: Software Security Comes of Age
-
By
Gary McGraw
- Apr 16, 2009
- Gary McGraw details the continued growth of the software security industry, even in the face of worldwide recession.
|
- Characteristics of Event-Driven Architecture
-
By
Angela Yochem, Frank Martinez, Les Phillips, Hugh Taylor
- Mar 2, 2009
- How should the components work together to realize the desired functionality of an Event-Driven Architecture (EDA)?
|
- Robert C. Martin's Clean Code Tip of the Week #6: Avoid Poorly Written Comments
-
By
Robert C. Martin
- Feb 27, 2009
- We join "The Craftsman," Robert C. Martin's series on an interstellar spacecraft where programmers hone their coding skills. In this sixth tip in the series, the crewmen try to interpret a poorly worded comment.
|
- Robert C. Martin's Clean Code Tip of the Week #5: Avoid Redundant Comments
-
By
Robert C. Martin
- Feb 18, 2009
- In this fifth tip in the series, the programmers discuss redundant comments, which describes something that adequately describes itself.
|
- Robert C. Martin's Clean Code Tip of the Week #4: Avoid Obsolete Comments
-
By
Robert C. Martin
- Feb 11, 2009
- A comment that has gotten old, irrelevant, and incorrect is obsolete. Obsolete comments tend to migrate away from the code they once described and become floating islands of irrelevance and misdirection.
|
- Robert C. Martin's Clean Code Tip of the Week #3: Avoid Inappropriate Information
-
By
Robert C. Martin
- Jan 28, 2009
- In this third tip of the series, programmers discuss how to avoid inappropriate information.
|
- Robert C. Martin's Clean Code Tip of the Week #2: The Inverse Scope Law of Function Names
-
By
Robert C. Martin
- Jan 21, 2009
- The longer the scope of a function, the shorter its name should be.
|
- What Is Agile Testing, Anyway?
-
By
Janet Gregory, Lisa Crispin
- Jan 19, 2009
- In this chapter, the authors explain their view of agile, which reflects the Agile Manifesto and general principles and values shared by different agile methods.
|
- Software [In]security: Top 11 Reasons Why Top 10 (or Top 25) Lists Don’t Work
-
By
Gary McGraw
- Jan 13, 2009
- Gary McGraw explains why there’s more to software security than watching the bug parade march by.
|
- Robert C. Martin’s Clean Code Tip of the Week #1: An Accidental Doppelgänger in Ruby
-
By
Robert C. Martin
- Jan 7, 2009
- Robert C. Martin investigates an interesting dilemma: if the implementation of two functions is identical, yet their intent is completely different, is it still duplicate code?
|
- Software [In]security: Software Security Top 10 Surprises
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Dec 15, 2008
- In the course of analyzing real-world data from top software security firms, Gary McGraw, Brian Chess, and Sammy Migues unearthed some surprises.
|
- Software [In]security: A Software Security Framework: Working Towards a Realistic Maturity Model
-
By
Gary McGraw, Brian Chess
- Oct 15, 2008
- Gary McGraw and Brian Chess introduce a software security framework (SSF) to help understand and plan a software security initiative.
|
- What Is Clean Code?
-
By
Robert C. Martin
- Aug 19, 2008
- Robert C. Martin introduces his book, Clean Code, and polls experienced programmers -- including Bjarne Stroustrup, Grady Booch, Dave Thomas, and Ward Cunningham -- on what their definition of "Clean Code" is.
|