Related Content
Integrating Threat Modeling into Agile Development Threat modeling helps you determine where to focus your security testing efforts when building your app. But people often wonder how it can fit into their existing agile software development process. Here are three things you can do to integrate threat modeling into your agile workflow, either early on or mid-project. |
||
Developing Artificial Intelligence Systems for Dynamic Environments From navigating unfamiliar terrain and dangerous weather conditions to working in risky situations, AI could be of enormous aid to first responders and the military if AI systems could react appropriately when something significant and unexpected occurs, without needing to be retrained on a large data set. |
||
Before Rolling Out Products, Walk a Mile in Their Shoes Beyond focus groups and surveys, different paths lead to uncovering ways to delight your customers. It is important to recognize the problems, challenges, wants, and needs of people. “Before you criticize someone, walk a mile in their shoes” is also good advice for rolling out products. |
||
4 Reasons Your Company Should Hold a Developer Hackathon Hackathons, where developers meet up to do some collaborative programming, are a great venue for problem-solving and creativity. They give employees the potential to get ideas out there that could pay off big, work the bugs out of new technology, and increase morale—and, best of all, they can be held anywhere. |
||
Raspberry Pi's Latest Compute Module: CM3+ They say all good things eventually come to an end. The Raspberry Pi Foundation announced the latest and last iteration of the Raspberry Pi Compute Module series: Compute Module 3+ (CM3+), designed for industrial applications and digital makers. |
||
The Challenges with Open Source Software Using open source software is all the rage these days, and for good reason. Often teams don’t have the budget to purchase commercial tools, and without an open source solution, their productivity suffers. But open source is not a panacea. There are some challenges that can hit you hard if you aren’t careful. |
||
Girl Scout Cookie Sales Help Fund STEM Badges, Including Cybersecurity and Programming It's officially Girl Scout cookie season, and that means you’re doing a good thing when you buy those boxes of cookies. The Girl Scouts offer science- and technology-related badges and journeys to introduce girls to computer science, robotics, mechanical engineering, space exploration, and cybersecurity. |
||
Using Open Source Tools for Security Testing Performing a series of security tests before deployment of your application has become paramount. But that doesn't have to mean a suite of costly tools. Plenty of open source security testing tools have become viable options. Here's why you should consider open source tools for your different types of security testing. |