Whether it is personal banking, completing our tax returns, controlling the heating system in our homes or running our personal lives, we are all dependent on software applications. Consequently the impact of a security breach ranges from the inconvenient to the positively damaging.
Richard
Hold on the ‘out of the box’ thinking and explore the riches within
With headlines like “Apple under Tim Cook: A nicer company, but a better one?”, some people are questioning why 5 years into his tenure Apple has not delivered a breakthrough product. Such is the harsh reality for product companies whose business models are predicated on year-on-year growth.
Innovation a Vendor Management perspective
The Fifth Discipline: The Art and Practice of the Learning Organization by MIT’s Peter Senge was a seminal book on systems thinking, at the core of which was the premise that if you have good people with a bad system, the system will win every time.
Microservices: Revisiting Conway’s Law
Conway’s Law came up in dialogue with a Swiss Investment Bank, who was citing this as a challenge in building software products. The concern was that “a software system whose structure closely matches its organisation’s communication structure works better (defined broadly) than a system whose structure differs from its organization’s communication structure”. “Better” in this context means higher productivity for the people developing and maintaining the system, through more efficient communication and coordination, and higher quality. All of a sudden this was making sense – productivity and quality were both tangible and desirable.
The company isn’t family
Chapeau to DHH at Signals vs Noise for slaying this sacred cow. https://m.signalvnoise.com/the-company-isnt-a-family/ One might assume that I have suffered a troubled childhood, however having been privileged to have been brought up in a small rural location by loving parents this doesn’t ring true. No what gets me about this is the lack of reciprocity, … Read more
Applying concurrent engineering to address web security
Twitter, Pinterest, Reddit, GitHub, Etsy, Tumblr, Spotify, PayPal, Verizon, Comcast, Netflix, Facebook, Twitter, The Guardian, Talk talk, British Airways, Facebook and most recently the UK conservative party have all been recipients of security breaches.
Agile as an enabler of Enterprise Agility
Since the publication of the Agile Manifesto in February 2001, many organisations have adopted some form of Agile Methodology. However, there is still some debate on the application of Agile in distributed offshore teams as it appears counter to Agile principles.
Technical Debt: The good, the bad and the ugly
Technical Debt (TD) is a topic of increased significance in Enterprise circles. But what do we mean by Technical Debt?