Sep 25, 2012
Deploy vulnerability exploit prevention and mitigation techniques to thwart attacks and manage the arms race. Related Course Malware Analysis Apprenticeship Listen on Apple Podcasts.
Sep 20, 2012
In this episode, Novak discusses misaligned incentives, misaligned people incentives in software acquisition programs, and how the wrong incentives can undermine acquisition programs and produce poor outcomes. Listen on Apple Podcasts.
Sep 4, 2012
Typically, people who believe themselves to be Agile, believe that developers realize the best results when they focus on empowered teams, collaboration with stakeholders, avoiding unnecessary work, and receiving frequent feedback. Agilests hate the term "process" because they use the word somewhat differently than we...
Sep 4, 2012
The SEI is focused on reducing the DoD information technology (IT) development cycle currently as long as 81 months to short, incremental approaches that yield results more quickly. One complicating factor is that DoD acquisition programs (like other highly-regulated commercial environments) have a prescribed vision of...
Sep 4, 2012
Managing technical debt, which refers to the rework and degraded quality resulting from overly hasty delivery of software capabilities to users, is an increasingly critical aspect of producing cost-effective, timely, and high-quality software products. A delicate balance is needed between the desire to release new...