Hacker News new | past | comments | ask | show | jobs | submit | heidibrayer's submissions login
1. What Is Digital Engineering and How Is It Related to DevSecOps? (cmu.edu)
1 point by heidibrayer on Nov 19, 2020 | past
2. 3 Metrics to Incentivize the Right Behavior in Agile Development (cmu.edu)
1 point by heidibrayer on July 27, 2020 | past
3. Commonly Used System Resilience Techniques Annotated with Resilience Function (cmu.edu)
3 points by heidibrayer on Feb 18, 2020 | past
4. Human Factors in Software Engineering (cmu.edu)
1 point by heidibrayer on Nov 15, 2019 | past
5. AI in Humanitarian Assistance and Disaster Response (youtube.com)
1 point by heidibrayer on Oct 15, 2019 | past
6. Managing Technical Debt: 5 Stories from the Field (cmu.edu)
3 points by heidibrayer on May 13, 2019 | past
7. Could cloud security best practices have prevented Operation Cloud Hopper? (cmu.edu)
2 points by heidibrayer on March 4, 2019 | past
8. Evaluating Threat-Modeling Methods for Cyber-Physical Systems (cmu.edu)
2 points by heidibrayer on Feb 4, 2019 | past
9. Deep Learning in Depth: The Good, the Bad, and the Future (cmu.edu)
6 points by heidibrayer on June 21, 2018 | past
10. Implications and Mitigation Strategies When You Lose Your End-Entity PKI (cmu.edu)
3 points by heidibrayer on March 20, 2018 | past
11. Complexity of DDoS Attacks Is Rising (scmagazine.com)
2 points by heidibrayer on Jan 25, 2018 | past
12. Major chip flaws affect billions of devices (cnn.com)
2 points by heidibrayer on Jan 4, 2018 | past
13. Ransomware: Best Practices for Prevention and Response (cmu.edu)
1 point by heidibrayer on June 27, 2017 | past
14. DNS Blocking: A Viable Strategy in Malware Defense (cmu.edu)
2 points by heidibrayer on June 26, 2017 | past | 1 comment
15. Six Things You Need to Know About Data Governance (cmu.edu)
2 points by heidibrayer on June 20, 2017 | past
16. Ransomware: Best Practices for Prevention and Response (cmu.edu)
2 points by heidibrayer on May 31, 2017 | past
17. A Reference Architecture for Big Data Systems (cmu.edu)
2 points by heidibrayer on May 22, 2017 | past
18. Best Practices for Network Border Protection (cmu.edu)
1 point by heidibrayer on May 17, 2017 | past
19. Automating Design Analysis (cmu.edu)
2 points by heidibrayer on May 1, 2017 | past
20. Distributed Artificial Intelligence in Space (cmu.edu)
1 point by heidibrayer on April 28, 2017 | past
21. Software Testing in a Non-Deterministic World (cmu.edu)
2 points by heidibrayer on April 24, 2017 | past
22. CERT C++ Secure Coding Rules (cmu.edu)
3 points by heidibrayer on April 18, 2017 | past
23. Best Practices for Network Time Protocol (cmu.edu)
1 point by heidibrayer on April 3, 2017 | past
24. An Overcommit Tutorial (cmu.edu)
1 point by heidibrayer on March 10, 2017 | past
25. Powered by Mirai (cmu.edu)
1 point by heidibrayer on March 6, 2017 | past
26. Technical Debt as a Core Software Engineering Practice (cmu.edu)
3 points by heidibrayer on March 2, 2017 | past
27. Five Perspectives on Scaling Agile (cmu.edu)
2 points by heidibrayer on Feb 23, 2017 | past
28. Six Best Practices for Securing a Robust DNS Infrastructure (cmu.edu)
2 points by heidibrayer on Feb 6, 2017 | past
29. Automated Code Repair in the C Programming Language (cmu.edu)
1 point by heidibrayer on Jan 17, 2017 | past
30. The Challenges of Testing in a Non-Deterministic World (cmu.edu)
2 points by heidibrayer on Jan 9, 2017 | past

Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: