Remove Software Review Remove Strategy Remove Systems Review Remove Weak Development Team
article thumbnail

Simple sabotage for software

Erik Bernhardsson

You can of course make a series of obviously bad decisions, but you'd get fired quickly. Technology When joining, require a 6-18 months rewrite of core systems. Split systems along arbitrary boundaries: maximize the number of systems involved in any feature. Encourage communal ownership of systems.

article thumbnail

8 data strategy mistakes to avoid

CIO

Organizations can’t afford to mess up their data strategies, because too much is at stake in the digital economy. Unfortunately, the road to data strategy success is fraught with challenges, so CIOs and other technology leaders need to plan and execute carefully. Here are some data strategy mistakes IT leaders would be wise to avoid.

Strategy 340
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. Once inside the system, the hacker gained access to files uploaded by Okta customers using valid session tokens from recent support cases.

article thumbnail

When your AI chatbots mess up

CIO

Hallucinations occur when the data being used to train LLMs is of poor quality or incomplete. Chatbots may assign service tickets incorrectly, describe a problem inaccurately, or disrupt workflows and lead to significant systemic issues—causing data breaches or misallocation of vital resources—that then require human intervention.

article thumbnail

10 cloud strategy questions every IT leader must answer

CIO

Companies may have had highly detailed migration or execution plans, but many failed to develop a point of view on the role of cloud in the enterprise. Although some continue to leap without looking into cloud deals, the value of developing a comprehensive cloud strategy has become evident. There are other risks, too.

Strategy 363
article thumbnail

Don’t gamble with your identity verification practices

CIO

Earlier this year, I wrote about the importance of organizations reviewing their password management strategies. The firm had seen continuous patterns of activity that showed that bad actors tried to get passwords to privileged user accounts. IBM Security pegged that same number higher, to 95%.

article thumbnail

5 Tips for Successfully Implementing Behavior-Driven Development in Your Team

Gorilla Logic

Have you ever been part of a team where tickets are hard to understand or don’t supply enough detail for the team to properly work? Experiences like these make many developers think about using Behavior-Driven Development (BDD). Know your team members You work with your team every day and know them well.