When on the internet, there's always concerns of security. If you're listening on some services but not others, you need to modify the Linux firewall to allow this. Also, if there's undesirable clients accessing ports and hacking, IPTables is an effective...
Software Development & Release Management
SDLC Basics: The Vision Statement
In the Beginning In the beginning, there was an idea. The idea took shape and became a project. The project became an application and the application got used. Or maybe it didn't get used. Maybe it was completely the wrong application for the business. Or maybe it was...
4 Reasons to Use Static Analysis on Your Codebase
All of us who work in software development want the products that we release to be high quality, and also low cost to maintain in the field. This is no big revelation; it’s common knowledge, and it’s common sense. It’s not clear that there is any silver bullet in...
How Code Reviews Reduce SDLC Costs
Bugs can be introduced anywhere in the software development lifecycle, from the early stages (requirements gathering etc) right up to the final shipping of the project. The most expensive types of bugs to fix are those introduced earliest and fixed latest. For...
Incorporating Accessibility Into Your Software Engineering Projects
Are you missing out on reaching 25% of the US population with your current software engineering project? Maybe the elderly, at 13% of the population, aren't part of your target market, or maybe it's the 12% of the US population who are disabled that you aren't...
Five Steps to Take if Your IT Outsourcing Agreement Goes South
IT outsourcing relationships can be fraught with challenges, ranging from communications breakdowns between client and provider to issues surrounding performance. If an IT outsourcing agreement isn’t meeting your company’s expectations (e.g. SLA targets are missed;...
How to Conduct System Hardening Using the Defense Information Systems Agency’s (DISA) “Gold Disk”
Holes in your IT infrastructure can make for some awkward situations. Whether you're dealing with sensitive customer information, upcoming product designs, or simply just don't want people messing with your stuff, maintaining system integrity can be difficult....
Bad Changeset Management, Release Management Can Be Disastrous for Your Company
The core activities of configuration management (i.e. changeset management and release management) are essential to control the changes made to a system and to administer the release of its different versions. However getting it wrong damages your brand, customer...
Top 5 Reasons to Conduct an IT Outsourcing Re-Evaluation
IT outsourcing contracts, as noted in a recent blog post, should be treated as living documents -- continuously evaluated, refined, and optimized over time. Not only do business conditions continually change, but it’s also important for outsourcing customers to...
Continuous Builds – A Customer Experience
Software Development Lifecycle (SDLC): In our last article we discussed speeding up your build by leveraging tools such as Electric Accelerator. In this article we will discuss the process of Continuous Integration (CI) along with a customer experience utilizing...
The Importance of Tools Integration in the Software Development LifeCycle (SDLC)
This week I’d like to talk in larger conceptual terms about the Software Development LifeCycle (SDLC) process and the benefits of integrating tools associated with this process. To start off, let’s identify the four kinds of tools that are important to a fully...
Accelerating Your Software Build – A Customer Experience
Read about one of our customer experiences in helping to accelerate their software build system.