Related Content
Where Does the Burden of Software Security Lie? Security is continuing to skyrocket in importance as we tie more and more aspects of our personal life to the phones we carry. And with the Internet of Things burrowing deeper and deeper into our daily lives, we need to understand who has access to our info and how we can best protect ourselves. |
||
What’s in the Fall 2016 Issue of Better Software Magazine? In the cover feature article of the fall 2016 issue of Better Software magazine, “The Evolution of Software Monetization,” Michael Zunke details how software vendors misfire in an attempt to balance protection of their intellectual property with complicated software licensing schemes that frustrate customers. |
||
Container-Based Deployments and the Future of IT Operations Container-based deployments have become the preferred approach for managing the build and release of complex applications. Many of the tasks handled by IT operations today may not be necessary in the world of containers. Will Ops continue in its current role, or will it need to evolve with the new challenges? |
||
The Internet of Things Has Changed the Definition of Good Software As the Internet of Things takes hold and more common appliances are run by software, people will be increasingly reliant on programmers’ ability to write good code. But how do we define “good code” or “good software”—and how do we get there? Stefano Rizzo explains eight requirements he thinks are essential. |
||
A Strange Story of Version Control and Software Customization As he was doing an inventory of a company’s commercial software and version control, Payson Hall got an odd response from a vendor: Their software has no versions. Each client has a unique, customized edition of the software. How can the vendor possibly support that many products? How would that work? |
||
The Ethical Responsibility of Defect Severity Classification When dealing with defect classification, it's important to not blindly adhere to the criteria without consideration for real business or human implications. If your software does safety-critical work, do the defect levels reflect that? Or could something go live with potentially disastrous consequences? |
||
DevOps or NoOps: Can You Have Too Much Automation? Some DevOps thought leaders have been promoting “NoOps,” which is the notion that IT resources can be provisioned in a fully automated way that does not require operations engineers to manage. There have been notable successes with this approach, but also some challenges. Can you have too much automation? |
||
The Importance of Agile Source Code Management If agile teams do not effectively utilize source code management, they can miss out on key benefits and sometimes even lose essential source code used for application deployment. But done well, a source code management solution can provide the best platform for effective agile practices. Bob Aiello explains. |