BT

Version Control, Git, and your Enterprise

Posted by Bob Jenkins on  Aug 18, 2015

This article discusses the key questions to be contemplated by your enterprise in determining whether Git is right for you and what you need to consider in moving to Git.

Author Q&A on Leading without Authority

Posted by Savita Pahuja on  Aug 16, 2015

Tathagat Varma, shares his experience of working as an individual contributor at a deeper leadership level. This post explains how to lead without authority. 2

The Design and Implementation of the FreeBSD Operating System, Review and Q&A with Authors

Posted by Sergio De Simone on  Aug 13, 2015

The Design and Implementation of the FreeBSD Operating System is a long awaited update to a successful and authorative guide to the FreeBSD kernel that covers all major new features up to FreeBSD 11.

An Overview of ANONIZE: A Large-Scale Anonymous Survey System

Posted by Susan Hohenberger, Steven Myers, Rafael Pass, Abhi Shelat on  Jul 26, 2015

In this article, authors discuss ad hoc anonymous & secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.

From a Project to a Product Approach Using LeSS at Agfa Healthcare

Posted by Jurgen De Smet on  Jul 01, 2015

By changing the inner workings from a project perspective to a product perspective Agfa Healthcare established a less complicated process using a single backlog for the entire organisation.

Probabilistic Project Planning Using Little’s Law

Posted by Dimitar Bakardzhiev on  Jun 21, 2015

Little’s Law helps teams that use user stories for planning and tracking project execution, with a project buffer to manage inherent uncertainty of a fixed-bid project and protect its delivery date. 4

High Tech, High Sec.: Security Concerns in Graph Databases

Posted by George Hurlburt on  May 23, 2015

Graph NoSQL databases support data models with connected data. In this article, author discusses security implications of graph databases in use cases like graph discovery and knowledge management.

Sourcing Security Superheroes: Part 1: Battling Retention and Recruitment

Posted by Monzy Merza on  May 15, 2015

Monzy Merza discusses the challenges within organizations to retain and develop top cybersecurity talent, and outline the organizational steps companies can take to keep talent in-house.

Hologram - Finally, AWS Key Distribution that Makes Sense

Posted by Arian Adair on  Mar 31, 2015

Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram. Adair details the process, design and main features.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT