Remove How To Remove Organization Remove Software Review Remove Weak Development Team
article thumbnail

8 questions to answer before your startup faces technical due diligence

TechCrunch

Will your organization and your code pass technical due diligence when it’s your turn? Let’s start with the positives: If an investor is proceeding with technical due diligence (TDD), you’ll likely pass. Here’s the not-so-good news: Companies can pass the business test, but fail TDD.

article thumbnail

The early returns on gen AI for software development

CIO

Generative AI is already having an impact on multiple areas of IT, most notably in software development. Early use cases include code generation and documentation, test case generation and test automation, as well as code optimization and refactoring, among others.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Simple sabotage for software

Erik Bernhardsson

Some of the advice is timeless, for instance the section about “General interference with Organizations and Production”: Insist on doing everything through “channels” Never permit short-cuts to be taken in order to expedite decisions. It laid out various ways for infiltrators to ruin productivity of a company.

article thumbnail

Calculating The Cost of Software Quality in Your Organization

OverOps

The following is a guest post from Herb Krasner, an Advisory Board Member for the Consortium for IT Software Quality (CISQ) and industry consultant for 5 decades. In a previous post , we looked at the magnitude and impact of the soaring cost of poor software quality in the US and where those hidden costs are typically found.

article thumbnail

8 ways to detect (and reject) terrible IT consulting advice

CIO

The problem, of course, is that many experts — even those affiliated with major organizations — are sometimes wrong. Learning how to evaluate expert advice is a skill every IT leader needs to master. You want advice from a team that can get invested enough to challenge your ideas or suggest alternative paths.”

article thumbnail

What you need to know about Okta’s security breach

CIO

Identity attacks use social engineering, prompt-bombing, bribing employees for 2FA codes, and session hijacking (among many techniques) to get privileged access. Traditional security controls are bypassed in such attacks as bad actors assume a user’s identity and their malicious activity is indistinguishable from routine behavior.

article thumbnail

LLMs Demand Observability-Driven Development

Honeycomb

Our industry is in the early days of an explosion in software using LLMs, as well as (separately, but relatedly) a revolution in how engineers write and run code, thanks to generative AI. In theory , all software is debuggable. There is a much longer list of things that make software less than 100% debuggable in practice.