article thumbnail

Simple sabotage for software

Erik Bernhardsson

Be worried about the propriety of any decision — raise the question of whether such action as is contemplated lies within the jurisdiction of the group or whether it might conflict with the policy of some higher echelon. You can of course make a series of obviously bad decisions, but you'd get fired quickly.

article thumbnail

The extent Automic’s group CIO goes to reconcile data

CIO

On the IT front, group CIO Marcelo Dantas and his team look after technology across the entire business, which includes product engineering, service, security and infrastructure. Building trust within and among teams and promoting collaboration are integral to success. It’s not always about the money.

Groups 278
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Agile, Stand-ups, TDD and Code Reviews

The Programmer's Paradox

It all has to be very reactive; you keep fiddling with the code until it gets traction. Under those conditions, it doesn’t make sense to cross all the t’s and dot the i’s as the life expectancy of the code is weeks or months. A big problem in development, particularly when a lot of people are introverts, is communication.

article thumbnail

LLMs Demand Observability-Driven Development

Honeycomb

Our industry is in the early days of an explosion in software using LLMs, as well as (separately, but relatedly) a revolution in how engineers write and run code, thanks to generative AI. In theory , all software is debuggable. There is a much longer list of things that make software less than 100% debuggable in practice.

article thumbnail

What you need to know about Okta’s security breach

CIO

Identity attacks use social engineering, prompt-bombing, bribing employees for 2FA codes, and session hijacking (among many techniques) to get privileged access. Traditional security controls are bypassed in such attacks as bad actors assume a user’s identity and their malicious activity is indistinguishable from routine behavior.

article thumbnail

8 data strategy mistakes to avoid

CIO

The proper use of unstructured data will become of increasing importance to IT leaders,” says Kevin Miller, CTO of enterprise software developer IFS. “It When different departments, business units, or groups keep data stored in systems not available to others, it diminishes the value of the data.

Strategy 340
article thumbnail

Calculating The Cost of Software Quality in Your Organization

OverOps

The following is a guest post from Herb Krasner, an Advisory Board Member for the Consortium for IT Software Quality (CISQ) and industry consultant for 5 decades. In a previous post , we looked at the magnitude and impact of the soaring cost of poor software quality in the US and where those hidden costs are typically found.