Related Content
Focus on Users' Needs Rather Than on Your Software Product Bonnie Bailey explains that you need to take care of your users’ needs first, and then, just maybe, they will explore the fabulous features of your software. When we focus on our product rather than on what the user is trying to get done, we suffer from marketing myopia. |
||
Stop Blaming Changing Requirements for Your Project's Failure Blaming changing requirements for a project's downfall is about as misguided as it gets. When you start accepting that change is in coming and you start preparing for it by using iterative development, you'll see that dreading or fighting change is the only way to ensure failure. |
||
October Software News Roundup In this software news roundup, learn about the launch of SecureDrop, the online whistle-blowing platform of Internet activist Aaron Swartz; new software that helps the blind practice yoga correctly; and how GE and Boeing are teaming up to create code that prevents ice buildup in airplane engines. |
||
Cyber Attacks on Adobe Jeopardize Customers and US Agencies Bad news hit Adobe Systems earlier this month. Chief security officer Brad Arkin writes that the San Jose-based software company suffered some serious cyber attacks on its network, resulting in “illegal access of customer information as well as source code for numerous Adobe products.” |
||
Yahoo! Ups Bug Bounties after T-Shirt Gate Joining the ranks of Google, Facebook, Microsoft, Mozilla, and others, Yahoo! will now offer payments or so-called bounties to developers and security researchers for finding security vulnerabilities in their software and applications. This move is not without some controversy. |
||
Microsoft Pays Hacking Expert $100,000 for Finding Security Flaw For finding security flaws in its software, Microsoft paid a hacking expert one hundred thousand dollars this week, one of the largest bounties ever awarded by a major company for white-hat work. Bug bounty programs are becoming more and more common as tech companies realize their cost value. |
||
Heart-to-Heart Security Proposed for Implanted Medical Devices Like any wireless device that can be accessed remotely, implanted medical devices are vulnerable to hacking. The FDA acknowledged that embedded medical devices are a potential target for cyber security breaches and issued a warning to device manufacturers. Pamela Rentz looks at a proposed solution. |
||
Mastering the Black Art of Software Project Estimation Estimation at the start of a software development project doesn't have to be done blindly; nor does it have to involve making empty promises. By incorporating agile—or even an estimation center of excellence—both customers and developers can have a much clearer view of the road ahead. |