|
Take a Hike: Death March Projects and the Ice Age Wilderness Trail Dave and his friend Bob hiked Wisconsin’s Ice Age Trail and returned home with more than just sore legs and hiking experience. Learn some of the project management tips Dave picked up while adventuring in the wilderness.
|
|
|
Taking the Risk: Exploration over Documentation The loudest voice in the room might push for a stable, predictable, repeatable test process that defines itself up front, but each build is different. An adaptive, flexible approach could provide better testing in less time with less cost, more coverage, and less waste.
|
|
|
It's All a Matter of Perspective Everyone has a unique perspective on problems at work. Help your problems make it to the top of the queue by expressing them in terms of business value.
|
|
|
Information Obfuscation: Protecting Corporate Data
Slideshow
With corporate data breaches occurring at an ever-alarming rate, all levels of organizations are struggling with ways to protect corporate data assets. Rather than choosing one or two of the many options available, Michael Jay Freer believes that the best approach is a combination of tools and practices to address the specific threats. To get you started, Michael Jay introduces the myriad of information security tools companies are using today: firewalls, virus controls, access and authentication controls, separation of duties, multi-factor authentication, data masking, banning user-developed MS-Access databases, encrypting data (both in-flight and at-rest), encrypting emails and folders, disabling jump drives, limiting web access, and more. Then, he dives deeper into data masking and describes a powerful data-masking language.
|
Michael Jay Freer, Quality Business Intelligence
|
|
Danger! Danger! Your Mobile Applications Are Not Secure
Slideshow
A new breed of mobile devices with sophisticated processors and ample storage has given rise to sophisticated applications that move more and more data and business logic to devices. The result is significant and potentially dangerous security challenges, especially for location-aware mobile applications and those storing sensitive or valuable data on devices. To counter these risks, Johannes Ullrich introduces and demonstrates design strategies you can use to mitigate these risks and make applications safer and less vulnerable. Johannes illustrates design patterns to: co-validate data on both the client and server; authenticate transactions on the server; and store only authenticated and access-controlled data on the client. Learn to apply these solutions without losing access to powerful HTML5 JavaScript APIs such as those required for location-based mobile applications.
|
Johannes Ullrich, SANS Technology Institute
|
|
Surprise! Making the Most Out of Your Most Surprising Moments Lee Copeland explains that surprise is often an indicator that discovery, learning, or even delight may be just around the corner. The surprise itself can be amusing, enlightening, befuddling, disconcerting, or frightening, but surprise should not be the end of the experience; it should be the beginning. Analyze the surprise to learn why you didn't see it coming and what you gain from that.
|
|
|
Dear Customer: The Truth about IT Projects In this personal and direct letter to customers, Allan Kelly pulls no punches and explains why IT projects don't always pan out for all of the parties involved.
|
|
|
Executive Interview: Mughees Minhas, Oracle Mughees Minhas is the senior director of product management for Redwood Shores-based Oracle Corporation where he specializes in application testing, database performance diagnostics, and data center monitoring and optimization. We recently had the opportunity to talk to Mughees about the rise of the cloud, market consolidation, and risk management.
|
|
|
I’ve Got Your Back Having similar motivations and processes may help to establish a team, but you and your coworkers won’t be the best teammates you can be until you also have each other’s back. Here, Johanna Rothman and Gil Broza describe valuable approaches to whole-team support, including banking trust and building shared responsibility.
|
|
|
Thoughts from Mid-Project My team is in the middle of one of the hardest projects—we call them "themes"—we’ve ever tackled. We’re a high-functioning agile team that has helped our company grow and succeed over several years now—we “went agile” in 2003. Here’s one thing I know for sure: No matter how many problems you solve, new challenges will pop up.
|
|