Related Content
February Coding News Roundup In this roundup of coding news, we learn that the US arm of mobile device maker HTC got in hot water with the Federal Trade Commission, a new study says that software vulnerabilities were up in 2012 after a five-year lull, and a scientist built a programming language based on Arabic scripts. |
||
Why Cultural Differences Matter to Project Stakeholders In a time when many projects span organizations, countries, and time zones, an appreciation of culture—including national culture—is of paramount importance. Adrian Reed explains how cultural guides, comparisons, and observations can be extremely useful for your projects. |
||
Using the Cloud to Build SaaS Applications the Right Way Many traditional applications companies have rushed to roll out SaaS versions of their products without fully thinking through how an application architected to work in a traditional corporate IT environment might need to change to fit far different SaaS implementation requirements. |
||
Cast a Wider Net to Get the Best Software Requirements Stakeholders often have different views about a software project—the scope, what requirements to include and their priority, and possible solutions. To get the best requirements, you need to talk with and understand the worries, fears, challenges, and ideas of as many stakeholders as possbile. |
||
There's No Such Thing as an IT Project Adrian Reed makes the case that there is no such thing as an IT project—there are only business projects that implement, impact, change, or interface with IT. This sounds like a subtle distinction, but it’s deceptively important. |
||
Internal Social Media and the Business Analyst Adrian Reed looks at the use of internal/corporate social media and networks by business analysts for overall process improvement. Key benefits include locating stakeholders, engaging stakeholders, understanding process faults, and finding incremental ways to improve processes. |
||
Ninety Percent of All Cloud Predictions Are Wrong Beth Cohen compares the past predictions for cloud computing and the cloudy forecasts for 2013—covering Year of the Cloud, OpenStack, VCE Vblock, VMware Cloud, and Cloud Tools. |
||
Security Holes in Mobile Apps—and the App Stores that Provide Them After a recent look at a handful of popular mobile apps across multiple platforms, there are some common privacy-invasion practices that should worry users—and especially companies who participate in BYOD. Learn how to better protect personal and corporate data when selecting third-party apps. |