Better Software Magazine Articles

Take a Hike: Death March Projects and the Ice Age Wilderness Trail

Dave and his friend Bob hiked Wisconsin’s Ice Age Trail and returned home with more than just sore legs and hiking experience. Learn some of the project management tips Dave picked up while adventuring in the wilderness.

David Katauskas
Taking the Risk: Exploration over Documentation

The loudest voice in the room might push for a stable, predictable, repeatable test process that defines itself up front, but each build is different. An adaptive, flexible approach could provide better testing in less time with less cost, more coverage, and less waste.

Matthew Heusser's picture Matthew Heusser
It's All a Matter of Perspective

Everyone has a unique perspective on problems at work. Help your problems make it to the top of the queue by expressing them in terms of business value.

Johanna Rothman's picture Johanna Rothman
Information Obfuscation: Protecting Corporate Data
Slideshow

With corporate data breaches occurring at an ever-alarming rate, all levels of organizations are struggling with ways to protect corporate data assets. Rather than choosing one or two of the many options available, Michael Jay Freer believes that the best approach is a combination of tools and practices to address the specific threats. To get you started, Michael Jay introduces the myriad of information security tools companies are using today: firewalls, virus controls, access and authentication controls, separation of duties, multi-factor authentication, data masking, banning user-developed MS-Access databases, encrypting data (both in-flight and at-rest), encrypting emails and folders, disabling jump drives, limiting web access, and more. Then, he dives deeper into data masking and describes a powerful data-masking language.

Michael Jay Freer, Quality Business Intelligence
Danger! Danger! Your Mobile Applications Are Not Secure
Slideshow

A new breed of mobile devices with sophisticated processors and ample storage has given rise to sophisticated applications that move more and more data and business logic to devices. The result is significant and potentially dangerous security challenges, especially for location-aware mobile applications and those storing sensitive or valuable data on devices. To counter these risks, Johannes Ullrich introduces and demonstrates design strategies you can use to mitigate these risks and make applications safer and less vulnerable. Johannes illustrates design patterns to: co-validate data on both the client and server; authenticate transactions on the server; and store only authenticated and access-controlled data on the client. Learn to apply these solutions without losing access to powerful HTML5 JavaScript APIs such as those required for location-based mobile applications.

Johannes Ullrich, SANS Technology Institute
Surprise! Making the Most Out of Your Most Surprising Moments

Lee Copeland explains that surprise is often an indicator that discovery, learning, or even delight may be just around the corner. The surprise itself can be amusing, enlightening, befuddling, disconcerting, or frightening, but surprise should not be the end of the experience; it should be the beginning. Analyze the surprise to learn why you didn't see it coming and what you gain from that.

Lee Copeland's picture Lee Copeland
Secrets About IT Projects Dear Customer: The Truth about IT Projects

In this personal and direct letter to customers, Allan Kelly pulls no punches and explains why IT projects don't always pan out for all of the parties involved.

Allan Kelly's picture Allan Kelly
Executive Interview: Mughees Minhas, Oracle

Mughees Minhas is the senior director of product management for Redwood Shores-based Oracle Corporation where he specializes in application testing, database performance diagnostics, and data center monitoring and optimization. We recently had the opportunity to talk to Mughees about the rise of the cloud, market consolidation, and risk management.

Jonathan Vanian's picture Jonathan Vanian
I’ve Got Your Back

Having similar motivations and processes may help to establish a team, but you and your coworkers won’t be the best teammates you can be until you also have each other’s back. Here, Johanna Rothman and Gil Broza describe valuable approaches to whole-team support, including banking trust and building shared responsibility.

Johanna Rothman's picture Johanna Rothman Gil Broza
Thoughts from Mid-Project

My team is in the middle of one of the hardest projects—we call them "themes"—we’ve ever tackled. We’re a high-functioning agile team that has helped our company grow and succeed over several years now—we “went agile” in 2003. Here’s one thing I know for sure: No matter how many problems you solve, new challenges will pop up.

Lisa Crispin's picture Lisa Crispin

Pages

AgileConnection is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.