|
Who Needs Standards, Anyway? Many CM experts are familiar with the guidance found in the IEEE, ISO, and ANSI/EIA industry standards. But if you want to really accelerate your agile development, it is wise to learn what is involved with implementing such industry standards. Bob Aiello explains the different types of standards and how organizations go about creating them.
|
|
|
The Lost Art of Change Control Change control exists to review and approve important modifications, but done wrong, you chance confusion, chaos, failures, and outages. Poorly run change control wastes everyone’s time, but far worse is the missed opportunity to assess and manage risk. Here, Bob Aiello gets you up to speed on the lost art of change control.
|
|
|
Are You Ready for Go-Live? 8 Essential Questions As real and daunting as scheduling pressures can be, they have to be balanced with the consequences of a potentially disastrous premature go-live. Don’t let all the reasons a system simply "must" be implemented by a target date overwhelm compelling evidence that it is not ready. Consider these eight questions honestly first.
|
|
|
Managing Risk in an Agile World Most software projects take great pains to identify and mitigate risks. Traditional risk analysis techniques can be subjective, time-consuming, and complicated. All it takes is a simple spreadsheet.
|
|
|
Your Professional Responsibility for Security and Performance It is Johanna Rothman's belief that security and performance are no longer nonfunctional requirements in modern-day software development. Instead, we must prepare to accommodate security and performance needs in all projects.
|
|
|
A Radical View of Software Licensing and Piracy Software vendors are making extraordinary efforts to protect the installation and use of apps, but have they gone too far? Preventing software piracy can have an adverse effect on genuine users. Software licensing technology, according to Steve, needs to strike the best balance of protecting the asset while trusting the customer.
|
|
|
Getting Started with Security Testing: An Interview with Jeff Payne
Video
In this interview, Jeff Payne, the CEO and founder of Coveros, talks about software security. He discusses the Internet of Things and how it relates to safety-critical devices, some useful tools, how testers can test for security, and how DevOps pushes that process earlier in your lifecycle.
|
|
|
A Discussion on Data Encryption: An Interview with Kerry Cox Jr.
Podcast
Kerry Cox Jr. of Simplified Network Solutions talks about his recent work with Project Sierra, data encryption, the risks often overlooked in our ever-connected world, and how working for the government has helped to shape his career and views on the importance of Internet security.
|
|
|
The Internet of Things and the Honda Recall: An Interview with Anders Wallgren
Podcast
In this interview, Anders Wallgren talks about the Internet of Things and how it played a role in the recent Honda recall. Anders also covers how future technology can affect our quality of life, as well as touching on some best practices for continuous delivery.
|
|
|
Security Testing for Muggles: An Interview with Paco Hope
Video
Paco Hope talks STARWEST 2014, his goals to reduce the stigma around security testing, and how you don't have to be a wizard to test the safety of your software. Paco also covers how security testing is like cooking, the future of security, and how he became interested in security testing.
|
|
|
Safety-Critical Software the Quality Agilist’s Way
Slideshow
Delivering hundreds of laser beams to brain tumors with sub-millimeter precision requires accurate, safe, and effective software that is developed and tested carefully and meticulously. But to be competitive in the market and responsive to customer needs you’ve got to be fast.
|
Roy Tuason
|
|
Vulnerabilities and Bugs in Mobile Apps with Quick Tours
Slideshow
As mobile devices, tools, operating systems, and web technologies rapidly evolve, testers in this changing domain must quickly adapt their thinking. Testers often struggle to find critical vulnerabilities and bugs in mobile applications due to lack of guidance, experience, and the right...
|
Raj Subramanian
|
|
A New Approach to IoT Safety, Risk, and Vulnerability Analysis
Slideshow
The ugly truth is that the interconnection of devices with IoT systems can lead to failures which result in physical injury, unacceptable risk, or cybersecurity vulnerabilities. Preventing such accidents requires identifying hazards, risks, and security vulnerabilities during development.
|
Gregory Pope
|
|
Better Software Conference East 2014: Tips and Tricks for Building Secure Mobile Apps
Slideshow
Mobile application development is now a mission-critical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built to be secure from the ground up. However, many application developers and testers do...
|
Jeff Payne, Coveros, Inc.
|
Visit Our Other Communities
CMCrossroads is a TechWell community.
Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.