Articles

Standards checkmark Who Needs Standards, Anyway?

Many CM experts are familiar with the guidance found in the IEEE, ISO, and ANSI/EIA industry standards. But if you want to really accelerate your agile development, it is wise to learn what is involved with implementing such industry standards. Bob Aiello explains the different types of standards and how organizations go about creating them.

Bob Aiello's picture Bob Aiello
Sign: Change ahead The Lost Art of Change Control

Change control exists to review and approve important modifications, but done wrong, you chance confusion, chaos, failures, and outages. Poorly run change control wastes everyone’s time, but far worse is the missed opportunity to assess and manage risk. Here, Bob Aiello gets you up to speed on the lost art of change control.

Bob Aiello's picture Bob Aiello
Clock: ready for go-live Are You Ready for Go-Live? Eight Essential Questions

As real and daunting as scheduling pressures can be, they have to be balanced with the consequences of a potentially disastrous premature go-live. Don’t let all the reasons a system simply "must" be implemented by a target date overwhelm compelling evidence that it is not ready. Consider these eight questions honestly first.

Payson Hall's picture Payson Hall

Better Software Magazine Articles

managing risk Managing Risk in an Agile World

Most software projects take great pains to identify and mitigate risks. Traditional risk analysis techniques can be subjective, time-consuming, and complicated. All it takes is a simple spreadsheet.

Jeremy Jarrell's picture Jeremy Jarrell
Your Professional Responsibility for Security and Performance

It is Johanna Rothman's belief that security and performance are no longer nonfunctional requirements in modern-day software development. Instead, we must prepare to accommodate security and performance needs in all projects.

Johanna Rothman's picture Johanna Rothman
A Radical View of Software Licensing and Piracy

Software vendors are making extraordinary efforts to protect the installation and use of apps, but have they gone too far? Preventing software piracy can have an adverse effect on genuine users. Software licensing  technology, according to Steve, needs to strike the best balance of protecting the asset while trusting the customer.

Steven Cholerton's picture Steven Cholerton

Interviews

Jeff Payne Getting Started with Security Testing: An Interview with Jeff Payne
Video

In this interview, Jeff Payne, the CEO and founder of Coveros, talks about software security. He discusses the Internet of Things and how it relates to safety-critical devices, some useful tools, how testers can test for security, and how DevOps pushes that process earlier in your lifecycle.

Jennifer Bonine's picture Jennifer Bonine
Kerry Cox Jr. discusses risk and the importance of data encryption A Discussion on Data Encryption: An Interview with Kerry Cox Jr.
Podcast

Kerry Cox Jr. of Simplified Network Solutions talks about his recent work with Project Sierra, data encryption, the risks often overlooked in our ever-connected world, and how working for the government has helped to shape his career and views on the importance of Internet security.

Cameron Philipp-Edmonds's picture Cameron Philipp-Edmonds
Anders Wallgren discusses the Internet of Things and continuous delivery The Internet of Things and the Honda Recall: An Interview with Anders Wallgren
Podcast

In this interview, Anders Wallgren talks about the Internet of Things and how it played a role in the recent Honda recall. Anders also covers how future technology can affect our quality of life, as well as touching on some best practices for continuous delivery.

Cameron Philipp-Edmonds's picture Cameron Philipp-Edmonds
Paco Hope puts a Harry Potter twist on security testing Security Testing for Muggles: An Interview with Paco Hope
Video

Paco Hope talks STARWEST 2014, his goals to reduce the stigma around security testing, and how you don't have to be a wizard to test the safety of your software. Paco also covers how security testing is like cooking, the future of security, and how he became interested in security testing.

Conference Presentations

Mobile Dev Test A New Approach to IoT Safety, Risk, and Vulnerability Analysis
Slideshow

The ugly truth is that the interconnection of devices with IoT systems can lead to failures which result in physical injury, unacceptable risk, or cybersecurity vulnerabilities. Preventing such accidents requires identifying hazards, risks, and security vulnerabilities during development.

Gregory Pope
Mobile Dev Test Vulnerabilities and Bugs in Mobile Apps with Quick Tours
Slideshow

As mobile devices, tools, operating systems, and web technologies rapidly evolve, testers in this changing domain must quickly adapt their thinking. Testers often struggle to find critical vulnerabilities and bugs in mobile applications due to lack of guidance, experience, and the right...

Raj Subramanian
Better Software Conference East 2014: Tips and Tricks for Building Secure Mobile Apps
Slideshow

Mobile application development is now a mission-critical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built to be secure from the ground up. However, many application developers and testers do...

Jeff Payne, Coveros, Inc.
Privacy and Data Security: Minimizing Reputational and Legal Risks
Slideshow

Privacy and data security are hot topics among US state and federal regulators as well as plaintiffs’ lawyers. Companies experiencing data breaches have been fined millions of dollars, paid out millions in settlements, and spent just as much on breach remediation efforts. In the past...

Tatiana Melnik, Melnik Legal, PLCC

CMCrossroads is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.