One of the subtler challenges of security is actually knowing the scope of your job. And it’s made trickier by this “cyber” hype disease we’ve collectively caught as an industry over the last few years. I think it’s actually sort of a function of the crisis of definition over the roles in a security program […]
Unlocking the “Mega Powers” of stakeholder interviewing
When I was in High School, there wasn’t Netflix, or Amazon Prime or even Cable TV the 5 miles outside of the nearest town in East-Central Illinois where I grew up. And this was the late ‘80s, so the options were limited to the 5 broadcast options we had: ABC, NBC, CBS, PBS and one […]
Whaddya mean, “You don’t know what you want??!!”
One of the biggest complaints I hear over and over again about talking to stakeholders as part of a requirements gathering exercise is: “They’re just lazy! They won’t just tell us what they want!” Which is… ridiculous. Now, if it’s around lunchtime, and your belly is grumbling and the smell wafting through the open window […]
That time Ken Thompson made me coffee
I got my Computer Science degree from what was then called the University of Missouri-Rolla a long time ago. Now it’s called the Missouri University of Science and Technology for reasons I don’t remember other than it’s more correct and obvious since Rolla is a tiny, tiny little town in the middle of the state […]
Just give me 5 minutes…
Now, I know you’ve heard that opener more than a few times, and you’ve probably heard it both in personal and professional conversations. In fact, you might have even been tempted to use it yourself when you were trying to get some critical information about a project or a program. If you have used it, […]
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- Next Page »