1. | | What Is Digital Engineering and How Is It Related to DevSecOps? (cmu.edu) |
|
1 point by heidibrayer on Nov 19, 2020 | past
|
2. | | 3 Metrics to Incentivize the Right Behavior in Agile Development (cmu.edu) |
|
1 point by heidibrayer on July 27, 2020 | past
|
3. | | Commonly Used System Resilience Techniques Annotated with Resilience Function (cmu.edu) |
|
3 points by heidibrayer on Feb 18, 2020 | past
|
4. | | Human Factors in Software Engineering (cmu.edu) |
|
1 point by heidibrayer on Nov 15, 2019 | past
|
5. | | AI in Humanitarian Assistance and Disaster Response (youtube.com) |
|
1 point by heidibrayer on Oct 15, 2019 | past
|
6. | | Managing Technical Debt: 5 Stories from the Field (cmu.edu) |
|
3 points by heidibrayer on May 13, 2019 | past
|
7. | | Could cloud security best practices have prevented Operation Cloud Hopper? (cmu.edu) |
|
2 points by heidibrayer on March 4, 2019 | past
|
8. | | Evaluating Threat-Modeling Methods for Cyber-Physical Systems (cmu.edu) |
|
2 points by heidibrayer on Feb 4, 2019 | past
|
9. | | Deep Learning in Depth: The Good, the Bad, and the Future (cmu.edu) |
|
6 points by heidibrayer on June 21, 2018 | past
|
10. | | Implications and Mitigation Strategies When You Lose Your End-Entity PKI (cmu.edu) |
|
3 points by heidibrayer on March 20, 2018 | past
|
11. | | Complexity of DDoS Attacks Is Rising (scmagazine.com) |
|
2 points by heidibrayer on Jan 25, 2018 | past
|
12. | | Major chip flaws affect billions of devices (cnn.com) |
|
2 points by heidibrayer on Jan 4, 2018 | past
|
13. | | Ransomware: Best Practices for Prevention and Response (cmu.edu) |
|
1 point by heidibrayer on June 27, 2017 | past
|
14. | | DNS Blocking: A Viable Strategy in Malware Defense (cmu.edu) |
|
2 points by heidibrayer on June 26, 2017 | past | 1 comment
|
15. | | Six Things You Need to Know About Data Governance (cmu.edu) |
|
2 points by heidibrayer on June 20, 2017 | past
|
16. | | Ransomware: Best Practices for Prevention and Response (cmu.edu) |
|
2 points by heidibrayer on May 31, 2017 | past
|
17. | | A Reference Architecture for Big Data Systems (cmu.edu) |
|
2 points by heidibrayer on May 22, 2017 | past
|
18. | | Best Practices for Network Border Protection (cmu.edu) |
|
1 point by heidibrayer on May 17, 2017 | past
|
19. | | Automating Design Analysis (cmu.edu) |
|
2 points by heidibrayer on May 1, 2017 | past
|
20. | | Distributed Artificial Intelligence in Space (cmu.edu) |
|
1 point by heidibrayer on April 28, 2017 | past
|
21. | | Software Testing in a Non-Deterministic World (cmu.edu) |
|
2 points by heidibrayer on April 24, 2017 | past
|
22. | | CERT C++ Secure Coding Rules (cmu.edu) |
|
3 points by heidibrayer on April 18, 2017 | past
|
23. | | Best Practices for Network Time Protocol (cmu.edu) |
|
1 point by heidibrayer on April 3, 2017 | past
|
24. | | An Overcommit Tutorial (cmu.edu) |
|
1 point by heidibrayer on March 10, 2017 | past
|
25. | | Powered by Mirai (cmu.edu) |
|
1 point by heidibrayer on March 6, 2017 | past
|
26. | | Technical Debt as a Core Software Engineering Practice (cmu.edu) |
|
3 points by heidibrayer on March 2, 2017 | past
|
27. | | Five Perspectives on Scaling Agile (cmu.edu) |
|
2 points by heidibrayer on Feb 23, 2017 | past
|
28. | | Six Best Practices for Securing a Robust DNS Infrastructure (cmu.edu) |
|
2 points by heidibrayer on Feb 6, 2017 | past
|
29. | | Automated Code Repair in the C Programming Language (cmu.edu) |
|
1 point by heidibrayer on Jan 17, 2017 | past
|
30. | | The Challenges of Testing in a Non-Deterministic World (cmu.edu) |
|
2 points by heidibrayer on Jan 9, 2017 | past
|
|
|
More |