Tags » Abuse Cases

Form Follows Function on SPaMCast 403

This week’s episode of Tom Cagley’s Software Process and Measurement (SPaMCast) podcast, number 403, features Tom’s essay on Agile practices at scale, Kim Pries on transformations, and a Form Follows Function installment based on my post… 65 more words

Architectural Practice

When Will We Learn?

We’ve all heard the sayings about history repeating. Did we pay attention? Did we actually hear what was said, or were we just in the room when it was mentioned? 741 more words

Management And Governance

Abuse Cases - What Could Go Wrong?

Last week, in a post titled “The Flaw in All Things”, John Vincent discussed the problem of seeing “the flaw in all things”:

It’s overwhelming.

487 more words
Architectural Practice

MyEG: From permit renewals to insurance agents

On 6 October 2015, the MyCC issued a proposed decision against MyEG for abusing its dominant position as a provider and manager of online foreign worker permit renewals.   834 more words

Abuse

Book review: Software Security: Building Security in - Part II: Seven Touchpoints for Software Security

This is a review of the second part of the Software Security: Building Security in book.

Chapter 3: Introduction to Software Security Touchpoints

This is an introductory chapter for the second part of the book. 1,082 more words

Security

Book review: Software Security: Building Security in - Part I: Software Security Fundamentals

This is a review of the first part of the Software Security: Building Security in book.

Chapter 1: Defining a discipline

This chapter lands out the landscape for the entire book; the author presents his view on the today challenges in having secure holes free software. 739 more words

Security