Related Content
What the Future Holds for Cloud Computing Thanks to the development of cloud architecture away from a server-client pattern, those in the software industry will be able to embrace heterogenous cloud services that can only run when needed. Consequently, we are due for a cloud renaissance. Here are some predictions for what the future holds for cloud computing. |
||
Why the Burden of Security Should Be Assumed by the Entire Team Quality can be improved over time, and while it’s difficult to change perception, it’s still possible. But poor security can sink your ship before it even leaves the dock. Invest in the security of your application and be sure to spread that responsibility to multiple levels of your software team. |
||
When Buying New Software, Make Sure You're Getting What You Really Need The first step in any significant software procurement is to assure there is a clear definition of the business problem being solved. If you don’t know what you want, you aren’t prepared to negotiate for it, so you'll end up with a system or tool that isn't what you need—and you'll likely be disappointed at delivery. |
||
3 Must-Read Books for a Good Agile Foundation If you are searching for agile knowledge, there are many books outside the current literature that may enlighten you. Some discuss the underpinnings of concepts we consider agile, while others are contemporary business books that present compelling ways to use agile effectively. Here are three Jeff Payne recommends. |
||
Security Testers Should Think like Hackers It is a common belief that testers should think like end-users by going beyond the defined requirements, seeing if the application under test addresses end-user expectations, and evaluating how it fares against competition. But with security testing, testers have to think not only like end-users, but also like hackers. |
||
Security Is Critical, So Why Don’t We Take It Seriously? Once you move into banking applications or anything related to healthcare, it becomes more and more important for developers and testers to guarantee that all the data they’re gathering from their users is locked behind the biggest, most bulletproof safe you’ve ever seen. |
||
The Spectrum of Negotiation: Using the Right Skills for the Context Negotiation occurs on a spectrum, and different tactics apply in different situations. For instance, you’d treat a one-time transaction differently from an ongoing client relationship you want to nurture. Have you developed effective negotiating skills? Are you applying negotiating skills appropriate for the context? |
||
4 Key Factors Driving Digital Transformation There are so many strong reasons why digital transformation has become big, but many organizations are missing a major opportunity by simply running digital projects instead of fully transforming the organization itself—similar to doing some agile things without actually committing to being agile. |