BT
  • From a Project to a Product Approach Using LeSS at Agfa Healthcare

    by Jurgen De Smet on  Jul 01, 2015

    By changing the inner workings from a project perspective to a product perspective Agfa Healthcare established a less complicated process using a single backlog for the entire organisation. Main advice is to try to avoid setting up silos where they do not belong. When applying LeSS it is important to stick to its basic rules even though they are, in most organisations, very disruptive.

  • Probabilistic Project Planning Using Little’s Law

    by Dimitar Bakardzhiev on  Jun 21, 2015 4

    When working on projects, it is most of the time necessary to forecast the project delivery time up front. Little’s Law can help any team that uses user stories for planning and tracking project execution no matter what development process it uses. We use a project buffer to manage the inherent uncertainty associated with planning and executing a fixed-bid project and protect its delivery date.

  • High Tech, High Sec.: Security Concerns in Graph Databases

    by George Hurlburt on  May 23, 2015

    Graph NoSQL databases support data models with connected data and relationships. In this article, author discusses the security implications of graph database technology. He talks about the privacy and security concerns in use cases like graph discovery, knowledge management, and prediction.

Sourcing Security Superheroes: Part 1: Battling Retention and Recruitment

Posted by Monzy Merza on  May 15, 2015

Monzy Merza discusses the challenges within organizations to retain and develop top cybersecurity talent, and outline the organizational steps companies can take to keep talent in-house.

Hologram - Finally, AWS Key Distribution that Makes Sense

Posted by Arian Adair on  Mar 31, 2015

Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram. Adair details the process, design and main features.

Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

Posted by Aaron Beuhring and Kyle Salous on  Mar 17, 2015

In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies. 1

Q&A on Conscious Agility

Posted by Ben Linders on  Mar 16, 2015

The book Conscious Agility (Conscious Capitalism + Business Agility = Antifragility) describes a design-thinking approach for business to benefit from uncertainty, disorder, and the unknown.

How to Start With Security

Posted by Rémon (Ray) Sinnema on  Mar 14, 2015

Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it.

Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. 1

Employing Enterprise Architecture for Applications Assurance

Posted by Walter Houser on  Feb 26, 2015

In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.

Evo: The Agile Value Delivery Process, Where ‘Done’ Means Real Value Delivered; Not Code

Posted by Tom Gilb & Kai Gilb on  Jan 26, 2015

This article describes what ‘Evo’ is at core, and how it is different from other Agile practices, and why ‘done’ should mean ‘value delivered to stakeholders’. 1

Getting RID of Risk with Agile

Posted by Jacob Creech on  Jan 21, 2015

One of the largest areas of development waste are poorly formed requirements. This post presents a very simple technique that can be applied to all user stories to improve quality and reduce waste. 3

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT

We notice you’re using an ad blocker

We understand why you use ad blockers. However to keep InfoQ free we need your support. InfoQ will not provide your data to third parties without individual opt-in consent. We only work with advertisers relevant to our readers. Please consider whitelisting us.