Frankenstein is a monster. IT can harm the people who created it. Ergo, IT is a monster. Taking a software tool from this vendor, hardware from another vendor, using a cloud-based storage and network system, can often lead to problems not foreseen by those who approved that approach. “There’s a new philosophy of how IT … continue reading
Buying and implementing a new piece of software is no easy task. There are so many different factors that contribute to whether or not a software implementation is successful, that it is important to do your research before investing in something new. Craig Flynn, founder and EVP engineering at relationship management software provider Impartner, offered … continue reading
Stop me if you’ve heard this one. To deliver more customer value, a software team decides to upgrade the database. They talk to their operations people, who say, “Sorry, we can’t upgrade to the latest version because another team shares the database, and their application won’t support it.” Resigned to their fate, they put the … continue reading
Software tools are not a silver bullet for achieving software goals, but they can help programmers deliver safer software faster. That is why organizations often bring developers in on its software purchasing process. According to a new survey from Evans Data Corporation, 43 percent of respondents are often involved in evaluating software while 50 percent … continue reading
Software development can no longer stand still if it wants to compete in a modern, digital world. Organizations have to be constantly adopting new approaches and developing new technology to keep their customers happy. Over the past couple of years, the software development industry has gone through tremendous changes with agile, DevOps, microservices, and low … continue reading
Interactive software needs users to guide it through a process. But many steps have been or can be automated. The promise of machine learning is to automate any remaining un-automated steps. How should a software architect find the limits of automation and the right role for people in a system? In the early days of … continue reading
As Marc Andreessen so aptly predicted, software is eating the world. A growing number of companies that developed physical products are adding software capabilities to their offerings. This means a growing need for companies to add software development expertise, software product engineering, embedded software engineering, ecosystem platform engineering, and new software-based application programming interfaces. The … continue reading
Value Stream Integration. Digital Twinning. Events as API strategy. These topics are the ones we’ve been hearing about this summer, and a trip through this editor’s notebook will share some thoughts on these matters. According to Tasktop’s Mik Kersten, Agile and DevOps are local optimizations of your value stream, with DevOps leading a digital transformation … continue reading
Software developers are about to discover a new, unified brand message across the GrapeCity Developer Solutions product family, which includes ComponentOne, ActiveReports, Spread, and Wijmo. A company-wide strategy to refine branding includes a new website design, product marks and brand guide, and new releases of all products, said Joseph Lininger, Head of Global Marketing for … continue reading
The benefits of data monetization that result from embedding analytics into applications are well known. Solutions with analytics built in let end-users efficiently and effectively use the valuable data sitting idly in systems for critical business decision making. However, few data product owners have mastered unlocking the data analytics treasure trove to create new revenue … continue reading
Traditional processes for buying and managing software require a customer to “prove” to a vendor what they are entitled to use in case they are audited. Often times this is dysfunctional, and leads to disagreements between the supplier and buyer as to how much software has been used, and how much is owed. There needs … continue reading
There are potential zero day exploits in the open source protocols and common file formats across six specific industries, according to Synopsys’ State of Fuzzing 2017 report. This includes the automotive, finance, industrial control systems, Internet of Things (IoT), government, and medical fields. The report stems from more than 4.8 billion fuzz tests conducted by Synopsys’ customers … continue reading