- Exploring the Mythical Weekend Coding Project
-
By
Dhanji R. Prasanna
- Jan 24, 2012
- Did you ever spend a weekend working through some kooky idea for coding an app you'd had in mind for years? Like many of us, Dhanji R. Prasanna has carried concepts around in his mental pockets, and one day he decided to go ahead and try it. The goal was a working app in two days. Would he succeed or fail miserably? Some things he learned were to be expected, but others he could never have predicted.
|
- Software [In]security: BSIMM versus SAFECode and Other Kaiju Cinema
-
By
Gary McGraw, Sammy Migues
- Dec 26, 2011
- Gary McGraw and Sammy Migues clarify the intended use of the Building Security In Maturity Model (BSIMM) and compare it to the SAFECode Practices methodology.
|
- An Academy for Software Craftsmen? An Interview with Founder Ken Auer
-
By
Matthew Heusser, Ken Auer
- Dec 20, 2011
- For all the talk of craftsmanship and apprentices, there is only one commercial school in the world offering a journeyman rating: The RoleModel Software Craftsmanship Academy in Holly Springs, North Carolina. We interviewed Ken Auer to find out where the idea came from, how the program works, and why it's necessary today.
|
- Software [In]security: Third-Party Software and Security
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Nov 30, 2011
- How do you gauge the security of third-party code? A recent security conference examined that question, and Gary McGraw presents the findings in this article.
|
- Software Systems Architecture: Viewpoints and Views
-
By
Nick Rozanski, Eóin Woods
- Nov 10, 2011
- Capturing the essence and the detail of the whole architecture in a single model is just not possible for anything other than simple systems. By far the best way of managing this complexity is to produce a number of different representations of all or part of the architecture, each of which focuses on certain aspects of the system, showing how it addresses some of the stakeholder concerns.
|
- Software [In]security: Software Security Training
-
By
Gary McGraw, Sammy Migues
- Oct 31, 2011
- Gary McGraw and Sammy Migues describe how training has changed, provide data showing it's importance, and explain why it's important to pick the right training for your organization's needs.
|
- Want to Prove Agile Works? Practice Continuous Delivery!
-
By
Aaron Erickson
- Oct 31, 2011
- Aaron Erickson, author of The Nomadic Developer, explains why Agile development teams must deliver and keep delivering on a regular schedule. The surest proof of your team's practicing Agile methodology correctly is that you continue delivering working product.
|
- Software [In]security: BSIMM3
-
By
Gary McGraw, Brian Chess, Sammy Migues
- Sep 27, 2011
- BSIMM3 is the third iteration of the Building Security In Maturity Model (BSIMM) project, a tool used as a measuring stick for software security initiatives in the corporate world. Gary McGraw describes the BSIMM3 along with Brian Chess and Sammy Migues.
|
- Software [In]security: Balancing All the Breaking with some Building
-
By
Gary McGraw
- Aug 30, 2011
- Security expert Gary McGraw argues that the software security industry is favoring offense at the expense of defense, and that more proactive defense is needed.
|
- Essential Skills for the Agile Developer: Avoid Over- and Under-Design
-
By
Alan Shalloway, Scott Bain, Amir Kolsky, Ken Pugh
- Aug 29, 2011
- How do you avoid over- or under-designing your code? As Ward Cunningham once said, "Take as much time as you need to make your code quality as high as it can be, but don't spend a second adding functionality that you don't need now!" This chapter covers this "mantra for development: write high-quality code, but don't write extra code.
|
- Ten Years Of Agile: An Interview with Robert C. "Uncle Bob" Martin
-
By
InformIT Editorial Team, Robert C. Martin
- Aug 3, 2011
- InformIT interviews Uncle Bob Martin, one of the original Agile Manifesto signatories, on the ten-year anniversary of its creation.
|
- Software [In]security: Software Security Zombies
-
By
Gary McGraw
- Jul 21, 2011
- Software security expert Gary McGraw reviews some of the most important security concepts — before they eat your (network's) brains.
|
- Barriers to Scrum Adoption
-
By
Matthew Heusser
- Jun 27, 2011
- Scrum sounds great, but it sure seems to go wrong a lot. Matt Heusser discusses obstacles and how to go over them or around them, and sometimes just blow them up.
|
- Software [In]security: Partly Cloudy with a Chance of Security
-
By
Gary McGraw
- Jun 17, 2011
- Security expert Gary McGraw provides some issues to consider when it comes to adoption of cloud services and their impact on security in your organization.
|
- Software [In]security: Computer Security and International Norms
-
By
Gary McGraw
- May 30, 2011
- The Obama administration recently released its "International Strategy for Cyberspace" outlining America's ideals and strategies for cyberspace. Security expert Gary McGraw explains why he thinks the document is promising in its effort to make our national goals and policies clear when it comes to cyberspace.
|
- Software [In]security: vBSIMM (BSIMM for Vendors)
-
By
Gary McGraw, Sammy Migues
- Apr 12, 2011
- How do you ensure that your third-party software vendors practice good software security? Software security expert Gary McGraw explains how the Building Security In Maturity Model can play a central role in this effort.
|
- Software [In]security: Modern Malware
-
By
Gary McGraw
- Mar 22, 2011
- Software security expert and author Gary McGraw looks at where malware is heading — and what we should do about it.
|
- Software [In]security: Software Patents and Fault Injection
-
By
Gary McGraw
- Feb 28, 2011
- Gary McGraw explains how another party may get a patent on a technique he had a hand in inventing.
|
- The Big Picture of Agile Requirements
-
By
Dean Leffingwell
- Feb 9, 2011
- We are now at the point in time where a number of organizations have made the transition before us and some common patterns for lean and agile software process success have started to emerge -- a Big Picture. In this chapter, Dean Leffingwell offers a quick gestalt of this new, agile, leaner, and yet fully scalable software requirements model.
|
- Leading Agile Developers: The Seven Levels of Authority (Part 2)
-
By
Jurgen Appelo
- Feb 3, 2011
- For managers to make the best use of self-organization in their business, they need to distribute control and delegate their authority. In this article, Jurgen Appelo, author of Management 3.0: Leading Agile Developers, Developing Agile Leaders, describes the seven levels of authority and the “authority board” managers can use to delegate control to self-organizing teams.
|