BT
Older rss
  • Employing Enterprise Architecture for Applications Assurance

    by Walter Houser on  Feb 26, 2015

    In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls. They also talk about other security model components like threat modeling, attack trees, secure design patterns, and misuse cases.

  • Evo: The Agile Value Delivery Process, Where ‘Done’ Means Real Value Delivered; Not Code

    by Tom Gilb & Kai Gilb on  Jan 26, 2015 1

    Current agile practices are far too narrowly focused on delivering code to users and customers. There is no systems-wide view of other stakeholders, of databases, and anything else except the code. This article describes what ‘Evo’ is at core, and how it is different from other Agile practices, and why ‘done’ should mean ‘value delivered to stakeholders’.

  • Getting RID of Risk with Agile

    by Jacob Creech on  Jan 21, 2015

    One of the largest areas of waste in development are poorly formed requirements. This post presents a very simple technique that can be applied to all user stories to improve quality and reduce waste, as well as examining how this can fit into your current planning and estimation workflow via the underused ‘definition of ready’. It’s a very actionable concept that you can apply immediately.

How Well Do You Know Your Personae Non Gratae?

Posted by Jane Cleland-Huang on  Nov 27, 2014

In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.

The Resurrection of Product Risk Analysis

Posted by Chris Schotanus on  Nov 19, 2014

Product risk analysis (PRA) can be done during the various phases of sequential or agile system development. This article shows how to apply PRA to elevate it from project level to domain level.

Testing the Internet of Things: The Human Experience

Posted by Gerie Owen on  Nov 09, 2014

This article discusses “human experience” testing and uses concepts from human computer interaction design theory to establish a framework for developing “human experience” test scenarios.

Shadow IT Risk and Reward

Posted by Chris Haddad on  Oct 08, 2014

Chris Haddad explains in this article what Shadow IT is, what role it plays in the enterprise and why Enterprise IT needs to embrace it, adapt and address Shadow IT requirements, autonomy, and goals.

Q&A with Barry Boehm and Richard Turner on The Incremental Commitment Spiral Model

Posted by Ben Linders on  Aug 27, 2014

The Incremental Commitment Spiral Model: Principles and Practices for Successful Systems and Software describes a process model generator. InfoQ interviewed the authors Barry Boehm and Richard Turner.

Project Inception - How to Use a Single Meeting to Achieve Alignment

Posted by James Bayer on  Aug 12, 2014

Before you start a project, achieving team alignment is essential for efficacy and efficiency. This article describes how to do a single full-day inception meeting to get the extended team aligned.

Article Series: Automation in the Cloud and Management at Scale

Posted by Richard Seroter on  Jun 23, 2014

This InfoQ article series focuses on automation tools and ideas for maintaining dynamic pools of compute resources.

A Pragmatic Approach to Scaling Security in the Cloud

Posted by Mark Nunnikhoven on  Jun 06, 2014

Security. Cloud. Two words that are almost always together but rarely happily. Learn why that isn’t the case and what you need to known about securing your critical infrastructure in the cloud. 3

From MDM to MDM: From Managing Devices to Apps to Data

Posted by Jesus Rodriguez on  May 22, 2014

Mobile operations management is one of the top priorities of modern enterprise and after establishing solutions for device management, the next challenge is to manage and secure mobile business data.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2015 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT