Now that 2015 is underway, it’s imperative to consider a mobile strategy framework for a prosperous year and beyond. We will be discussing some key points to consider as you plan your strategy for the year, and how they can help you usher in a successful future. These topics include visual development environments , Bimodal IT, cloud-based mobile development and the HTML5 vs. native debate.
Analyzing all the stories in a project requires significant time. How can we estimate the size of a project without prior identification and analysis of every single user story? If you don't want to analyze all user stories in your project in order to estimate its size then Randomized Branch Sampling is an approach you can use for portfolio related decisions and quotations on prospect projects.
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services exclusively to Indian banks to address the financial sector's growing demand for secure cloud-based services.
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.
Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it.
The book "Agile! The Good, the Hype and the Ugly" provides a review of agile principles, techniques and tools. It explores the agile methods Extreme Programming, Lean Software, Scrum and Crystal. 4
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.
First class money & currency support in Java are almost here. JSR 354 spec lead Credit Suisse's Anatole Tresch discusses previous shortcomings, motivation for the new APIs, & lots of examples. 1
In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.
The three-horizons model explains how companies can work on the right things to ensure sustainable growth. Visual portfolio management can integrate the different types of work into a coherent system. 1
Aaron Kendall of Barnes & Noble discusses an Agile method they have been using that combines the design of the overall architecture and implementation. 1
In this article, Basho Sr. Software Engineer Chris Meiklejohn explores the basic building blocks for crafting deterministic applications that guarantee convergence of data without synchronization. 1