Articles

Sign: Change ahead The Lost Art of Change Control

Change control exists to review and approve important modifications, but done wrong, you chance confusion, chaos, failures, and outages. Poorly run change control wastes everyone’s time, but far worse is the missed opportunity to assess and manage risk. Here, Bob Aiello gets you up to speed on the lost art of change control.

Bob Aiello's picture Bob Aiello
APIs Require Integrity SOA Was Built on Trust, but APIs Require Integrity

With SOA, the services you consume are typically developed by your organization or a close business partner, so you can assume they have standards similar to your own. But when you adopt APIs, you usually have no visibility into how solidly the services were built—or when and how they are evolving. How should you properly vet an external API?

Open Source Management Four Risks You Can Avoid by Making Open Source Management Part of Your ALM

With open source components being used in more than 80 percent of commercial software developed today, ALM efforts must be altered to address them. Failing to do so may introduce unnecessary risks. This article outlines the potential risks associated with not managing open source as part of your ALM, and explains how these risks can be easily avoided.

Rami Sass's picture Rami Sass
IT Controls Establishing IT Controls for Consistent, Efficient Delivery

Many high-security institutions have guidelines that must be followed in order to comply with industry regulatory requirements. But these best practices can help any company avoid costly mistakes while enabling teams to work faster and more effectively. This article tells you how to get started establishing your own practical and reliable IT controls.

Bob Aiello's picture Bob Aiello
DevOps Maturity Model Defining What’s Really Important in a DevOps Maturity Model

There is a lot more to DevOps than just single push-button deploys. While a DevOps maturity model can help measure where you are now and indicate where you need to get to as part of the DevOps transformation, it can be more useful to focus on the capabilities you need to measure: timely deployment and secure, reliable systems.

Bob Aiello's picture Bob Aiello
Open Source Code Management Integrating Open Source Code Management Tools in the SDLC

Developers realize that to meet deadlines may require assembling both proprietary and available open source software components. This article talks about exploiting benefits and managing challenges with reusing code for open source projects, open source code management tools and their integration, and leveraging managed open source software.

Hassib Khanafer's picture Hassib Khanafer
Software Data Analytics How to Incorporate Data Analytics into Your Software Process

Big data isn’t just a buzzword; it lives in your software. With millions of possibilities to leverage analytics, how do you pick what’s right for your organization? Robert Cross provides some insight into how to start incorporating data analytics into your software process and management plan.

Rob Cross's picture Rob Cross
Cyber Security Test Warriors Cyber Security Test Warriors: Where Might You Take Your Career?

Do you know the latest in test attacks and testing techniques to become a cyber security test warrior? Becoming one is probably not for everyone, but the need is real, continues to grow, and offers a career opportunity for those brave enough to take the challenge.

Jon Hagar's picture Jon Hagar
Trusted Application Base Why Target Needs a Secure, Trusted Application Base

Target’s well-publicized disclosure that customers’ personally identifiable information (PII) had been compromised is the latest software “glitch” that is getting a fair amount of attention. Read on if you would like to know how to secure your systems without having to rely upon security scans that only detect the presence of a problem after it is already on your server.

Bob Aiello's picture Bob Aiello
Securing the Trusted Application Base Securing the Trusted Application Base

Corporations, government agencies, and other institutions need to embrace industry best practices that have been proven to help develop and implement reliable systems. One of the most important considerations is the need for a secure, trusted application base. This article will help you get started delivering systems that can be verified and supported while continuously being updated as needed.

Bob Aiello's picture Bob Aiello

Pages

CMCrossroads is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.