Although inner source offers numerous benefits, many practitioners are unclear about what it is and how to adopt it. When adopting inner source, organizations should consider nine factors pertaining to product, process, and organization.
Francisco Torres shares from experience how users might change how one sees the context of a project and why it is important to define a software’s operating range: the set of quality properties in which a software system can successfully run.
The authors have concluded after analyzing 15 years of Architecture Trade-Off Analysis Method (ATAM) data across 31 projects that modifiability, performance, availability, interoperability, and deployability are key quality attributes for Agile practitioners.
The authors discuss an approach that uses TCP SYN packets for OS ﬁngerprinting to detect the presence of unauthorized OSs in an enterprise. 3
Authors discuss modularity and projectional editing concepts used to design programming languages, using a Language Workbench (LWB) tool like MPS from Jetbrains.
Author discusses how to design an Internet-connected garage door opener ("IoT opener") to be secure and the security infrastructure for IoT devices, like authentication & access policy enforcement. 1
In this article, authors discuss ad hoc anonymous & secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.
This article features highlights from interviews on the state of practice and challenges in release engineering space. Interview questions cover topics like metrics, continuous delivery's benefits. 2
In this article, authors examine architectural languages (ALs) and model-driven engineering (MDE) as means for improving architecture design. They review a framework for AL definition and tools.
In this article, author describes the role of data analytics in healthcare space with emerging wearable technologies like biophysical interfaces, physiological sensors and embedded diagnostic tools.
In this article, based on a research study, author presents big data as service-oriented and evolutionary case of disruptive IT-enabled services (IESs) rather than as datasets.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 4