Home > Articles > Software Development & Management

Software Development & Management

1758 Items

Sort by Date | Title

PKI: Broken, But Fixable
Nov 30, 2011
The public key infrastructure (PKI) used for securing the Web has recently been found to be much less secure than was previously thought. David Chisnall discusses some of the flaws in the design and some potential solutions.
Software [In]security: Third-Party Software and Security
Nov 30, 2011
How do you gauge the security of third-party code? A recent security conference examined that question, and Gary McGraw presents the findings in this article.
Software Systems Architecture: Viewpoints and Views
Nov 10, 2011
Capturing the essence and the detail of the whole architecture in a single model is just not possible for anything other than simple systems. By far the best way of managing this complexity is to produce a number of different representations of all or part of the architecture, each of which focuses on certain aspects of the system, showing how it addresses some of the stakeholder concerns.
Software [In]security: Software Security Training
Oct 31, 2011
Gary McGraw and Sammy Migues describe how training has changed, provide data showing it's importance, and explain why it's important to pick the right training for your organization's needs.
Want to Prove Agile Works? Practice Continuous Delivery!
Oct 31, 2011
Aaron Erickson, author of The Nomadic Developer, explains why Agile development teams must deliver and keep delivering on a regular schedule. The surest proof of your team's practicing Agile methodology correctly is that you continue delivering working product.
System Center Opalis Integration Server 6.3 Unleashed: Architectural Design
Oct 25, 2011
This chapter expands on the basic OIS architecture and explains how the components interact with one another during policy execution. It also discusses the major deployment models and identifies where each model would be most beneficial. In addition to architecture, this chapter reviews how the various security models affect an OIS deployment.
Scrum, Agile Practices, and Visual Studio
Oct 5, 2011
This chapter covers the characteristics of software engineering and management practices, the "situationally specific" contexts to consider, and the examples that you can apply in Visual Studio (VS). In this chapter, you learn about the mechanisms that VS (primarily Team Foundation Server [TFS]) provides to support the team enacting the process.
Software [In]security: BSIMM3
Sep 27, 2011
BSIMM3 is the third iteration of the Building Security In Maturity Model (BSIMM) project, a tool used as a measuring stick for software security initiatives in the corporate world. Gary McGraw describes the BSIMM3 along with Brian Chess and Sammy Migues.
'But I Don't Want the Minimum!' Understanding the Concept of the Minimum Viable Product (MVP)
Sep 22, 2011
Does the word 'minimum' immediately raise your hackles? Aaron Erickson, author of The Nomadic Developer, emphasizes that learning to prioritize, getting to production early, and subsequently delivering in small increments are key disciplines in the practices of Agile and continuous delivery.
Introduction to Design Patterns in C++ with Qt: Models and Views
Sep 13, 2011
In this chapter, you will learn how to use the model classes in Qt to represent many different kinds of data.
Want to be Agile? Learn to Fail!
Sep 12, 2011
Aaron Erickson, author of The Nomadic Developer, asks you to recognize and learn from software project failures. Ending a doomed project before it becomes “too big to fail” is a crucial step in preventing that project from becoming a $100M+ failure that bankrupts the company.
Garbage Collection: Why, When, and How?
Sep 6, 2011
Over the last decade, garbage collection has gone from being a sign of decadence among programmers to a must-have feature for a language. David Chisnall examines how various collectors work, along with their costs and benefits.
Introducing Agile Analytics: A Value-Driven Approach to Business Intelligence and Data Warehousing
Sep 6, 2011
This chapter outlines the tenets of Agile Analytics and establishes the foundational principles behind each of the practices and techniques that are introduced in the successive chapters in this book.
Service Intelligence: Improving Your Bottom Line with the Power of IT Service Management
Aug 31, 2011
In this chapter, Sharon Taylor looks at the basic ingredients of services and service practices. She also covers the basics of ITSM terminology to help shape your understanding of dialogue you need to have with IT Service Providers (ITSPs) to ensure service assets are exploited to the benefit of the business bottom line.
Software [In]security: Balancing All the Breaking with some Building
Aug 30, 2011
Security expert Gary McGraw argues that the software security industry is favoring offense at the expense of defense, and that more proactive defense is needed.
Essential Skills for the Agile Developer: Avoid Over- and Under-Design
Aug 29, 2011
How do you avoid over- or under-designing your code? As Ward Cunningham once said, "Take as much time as you need to make your code quality as high as it can be, but don't spend a second adding functionality that you don't need now!" This chapter covers this "mantra for development: write high-quality code, but don't write extra code.
Prototypes and Object Orientation
Aug 27, 2011
David Chisnall takes a look at the two dominant paradigms in object-oriented languages (classes and prototypes) and discusses the strengths and weaknesses of each.
The Scariest (Disaster) Book I Have Ever Read, Part III
Aug 17, 2011
The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part III of his three-part series, author Leo Wrobel explains exactly which systems would be affected by an electromagnetic pulse, how they would be affected, and to what degree.
MOF, ITIL, and Service Manager
Aug 16, 2011
This chapter discusses the service management processes specified in the Microsoft Operations Framework (MOF) and Information Technology Information Library (ITIL) supported by System Center Service Manager, including Incident, Problem, Change, and Configuration Management.
The Scariest (Disaster) Book I Have Ever Read, Part II
Aug 10, 2011
The most terrifying weapon facing the U.S. may already be in our enemies hands. Are you prepared for the ultimate disaster? In Part II of his three-part series, author Leo Wrobel explains how you can best prepare yourself for an electromagnetic pulse.

<< < Prev Page 7 8 9 10 11 Next >