The Latest
Fuzzing: New Tests for Robustness and Security[presentation] Traditional security measures are doomed to fail because they are focused only on defending against known attacks-and studies show that more than 80 percent of software will likely crash when extensive negative testing is employed. |
Ari Takanen, Codenomicon Ltd.
|
|
The Challenges of SOA Security[presentation] Service Oriented Architecture (SOA) has many security challenges. To address these challenges, it is not enough to set up a secure operational infrastructure. |
Jimmy Xu, CGI Inc.
|
|
Deception and Estimation: How We Fool Ourselves[presentation] Cognitive scientists tell us that we are hardwired for deception. It seems we are overly optimistic, and, in fact, we wouldn't have survived without this trait. |
Linda Rising, Independent Consultant
|
|
Test-Driven Analysis: Focus on the User, Not the Code[presentation] Test-driven analysis (TDA) focuses on the system at the user interface level. |
Ken Pugh, Net Objectives
|
|
An Alternative to Consensus: Accelerating Effective Decisions[presentation] Software development teams don't always need, want, or have time to make decisions via group consensus. And project leaders often already feel over-burdened with the multiple decisions they have to make on their own. |
Michele Sliger, Sliger Consulting, Inc.
|
|
Maximizing ROI on New Technology Acquisition[presentation] IT departments and software technologists must invariably navigate many challenges when planning to acquire new tools, invest in new technology, fund new technology projects, and introduce process changes. |
Chris Ronak, Divestco Inc
|
|
Real Software QA[presentation] With the ever-increasing demand for software products, it is imperative for organizations to move away from trying to "test in" software quality and move toward adopting a comprehensive, total-life cycle software quality management approach. |
Linda Westfall, The Westfall Team
|
|
Better Software Conference & EXPO 2008: Automating Security Testing with cUrl and Perl[presentation] Although all teams want to test their applications for security, our plates are already full with functional tests. What if we could automate those security tests? |
Paco Hope, Cigital
|
|
SOA Testing Challenges and Proven Practices[presentation] The best thing about Service Oriented Architecture (SOA) is its flexibility-a heterogeneous computing environment in which different services and service providers can use different technologies; loose coupling of components to allow any appl |
Guruprasad Gopalakrishnan, Wipro Technologies
|
|
Function Point Analysis: A Quick and Easy Primer[presentation] The function point metric is used by many organizations worldwide to more accurately size systems. |
David Garmus, David Consulting Group
|
|
The Impact of Poor Estimating and How to Fix It[presentation] Running Scrum by-the-book for three months, the team was continually failing to meet its delivery commitments. As a result, trust between the business managers and the team degraded almost to a point-of-no-return. |
Mitch Lacey, Ascentium
|
|
The Leadership Imperative: Creating a Culture of Trust[presentation] In our personal and business lives, many of us know leaders who successfully foster environments of incredible creativity, innovation, and ideas-while other leaders try but fail. So, how do the top leaders get it right? |
Pollyanna Pixton, Accelinnova
|
|
Beyond the Mission Statement: How Values Drive Behavior[presentation] Companies often invest a lot of time and money into defining their mission statement, expecting it to drive employee behavior toward the stated purpose. Unfortunately this is a myth. |
Michele Sliger, Sliger Consulting, Inc.
|
|
SOX and HIPPA and RESPA, Oh My! Mastering Software Compliance[presentation] Determining whether legal and contractual issues apply to your development efforts isn't always simple. There may be some obvious factors-industry regulations, service level agreements (SLAs), and state or federal agency oversight. |
Elle Ringham, Cognizant
|
|
Software Security Assessment: The Naked Truth[presentation] With software running our most critical business processes, we need to think about both its utility and the risk it can add to those processes. |
Herbert Thompson, Peoples Security
|