Related Content
Drafting the Right Software Professional for Your Fantasy Team Teams are systems made up of individuals with different strengths and weaknesses. When people are cooperating on a team—whether in software development or football—sometimes those strengths and weaknesses can be complementary, and other times they can be out of alignment. Be sure to draft the player your team needs. |
||
Continuous Security in Agile Development "Continuous" gets mentioned a lot in agile and DevOps, but one area that often doesn’t get enough attention is how to continuously build, test, and deliver secure applications. Just like for quality, you can’t test security in, so you need to have a plan for how to build it in. Here are some tips on how to do that. |
||
NSA Adds to Open Source Tools and Tech Transfer Program The National Security Agency recently released several of the agency’s software tools as open source and added new technologies to the NSA technology transfer program patent portfolio that are ready for licensing. Could leveraging any of these technologies help your efforts? |
||
Using Contactless Card Technology in Mobile Payments As payment methods have evolved from the traditional cash-based system to mobile systems, contactless cards are becoming more popular for their convenience and flexibility. Here's a primer on how this mobile payment system stores your card information, as well as the near-field communication technology behind it. |
||
Explore Inventions throughout History with Google Arts & Culture’s Collection The latest Google Arts & Culture project, Once Upon a Try, is an interactive experience delving into millennia of human inventions and achievements. With more than four hundred collections from CERN, NASA, and over a hundred museums around the world, it’s the largest online exhibition of discoveries ever created. |
||
Integrating Threat Modeling into Agile Development Threat modeling helps you determine where to focus your security testing efforts when building your app. But people often wonder how it can fit into their existing agile software development process. Here are three things you can do to integrate threat modeling into your agile workflow, either early on or mid-project. |
||
Alleviate Employees’ Stress through One-on-Ones Simply having one-on-ones because they’re expected is not enough to realize their potential. To make one-on-ones effective, as the manager, you’ve got to be available, prepared, and engaged. It has to be more than a one-way status update. Here's how to use these meetings to promote trust, growth, and creativity. |
||
Beware the Bad Apple: 3 Types to Watch for on a Team We all know some obvious personality types that can be less than ideal to work with. However, there are other personality traits you may want to beware of as well. Although these characteristics may seem perfectly harmless on the surface, in excess they can be just as dangerous to a project as the more glaring types. |