Any project can be divided into different parts including requirements gathering, design, implementation, documentation and so on. One key aspect of the project lifecycle is quality assurance (QA), but it's often overlooked. Although almost all project managers...
Software Development & Release Management
Outsource Your System Administration to Set Your Engineers Free
The inquisitive nature of engineers, which makes them so good at designing, developing and building products, can also lead them to become distracted by other “interesting things” like managing the very systems and tools that allow them to do their engineering....
Creating a Custom Nagios Plugin
Nagios is an invaluable tool to help monitor a customer's infrastructure. Last year, I explained how easy it was to be able to integrate Network Appliance health checks. In fact, Nagios provides a plethora of out of the box plugins. Additional plugins are available...
How to Obtain Electric Commander Metrics for Use in a GWT Plugin
Developed by Electric Cloud, Electric Commander is an extremely versatile tool for enhancing and automating your organization’s software development build-test-deploy cycle. Commander makes it possible to eliminate unnecessary lag time between phases of the...
Get Insight Into Your Misbehaving Laptop With Three Free Tools
Get insight into your laptop’s status and taking some precautions with CPUID’s Hardware Monitor and CPU-Z and Belarc Advisor It happens to most laptops eventually. After two or more years of heavy (ab)use, most of our laptops are not in the condition they were...
How to Setup License Statistics Free Version
Software asset management tools, particularly license usage and monitoring software are gaining more and more interest among large corporations. It should come as no surprise since by utilizing such tools they stand to gain upwards to 10% in cost reductions and that...
Security basics with IPTables
When on the internet, there's always concerns of security. If you're listening on some services but not others, you need to modify the Linux firewall to allow this. Also, if there's undesirable clients accessing ports and hacking, IPTables is an effective...
SDLC Basics: The Vision Statement
In the Beginning In the beginning, there was an idea. The idea took shape and became a project. The project became an application and the application got used. Or maybe it didn't get used. Maybe it was completely the wrong application for the business. Or maybe it was...
4 Reasons to Use Static Analysis on Your Codebase
All of us who work in software development want the products that we release to be high quality, and also low cost to maintain in the field. This is no big revelation; it’s common knowledge, and it’s common sense. It’s not clear that there is any silver bullet in...
How Code Reviews Reduce SDLC Costs
Bugs can be introduced anywhere in the software development lifecycle, from the early stages (requirements gathering etc) right up to the final shipping of the project. The most expensive types of bugs to fix are those introduced earliest and fixed latest. For...
Incorporating Accessibility Into Your Software Engineering Projects
Are you missing out on reaching 25% of the US population with your current software engineering project? Maybe the elderly, at 13% of the population, aren't part of your target market, or maybe it's the 12% of the US population who are disabled that you aren't...
Five Steps to Take if Your IT Outsourcing Agreement Goes South
IT outsourcing relationships can be fraught with challenges, ranging from communications breakdowns between client and provider to issues surrounding performance. If an IT outsourcing agreement isn’t meeting your company’s expectations (e.g. SLA targets are missed;...