| 1. | | What Is Digital Engineering and How Is It Related to DevSecOps? (cmu.edu) |
| 1 point by heidibrayer on Nov 19, 2020 | past |
|
| 2. | | 3 Metrics to Incentivize the Right Behavior in Agile Development (cmu.edu) |
| 1 point by heidibrayer on July 27, 2020 | past |
|
| 3. | | Commonly Used System Resilience Techniques Annotated with Resilience Function (cmu.edu) |
| 3 points by heidibrayer on Feb 18, 2020 | past |
|
| 4. | | Human Factors in Software Engineering (cmu.edu) |
| 1 point by heidibrayer on Nov 15, 2019 | past |
|
| 5. | | AI in Humanitarian Assistance and Disaster Response (youtube.com) |
| 1 point by heidibrayer on Oct 15, 2019 | past |
|
| 6. | | Managing Technical Debt: 5 Stories from the Field (cmu.edu) |
| 3 points by heidibrayer on May 13, 2019 | past |
|
| 7. | | Could cloud security best practices have prevented Operation Cloud Hopper? (cmu.edu) |
| 2 points by heidibrayer on March 4, 2019 | past |
|
| 8. | | Evaluating Threat-Modeling Methods for Cyber-Physical Systems (cmu.edu) |
| 2 points by heidibrayer on Feb 4, 2019 | past |
|
| 9. | | Deep Learning in Depth: The Good, the Bad, and the Future (cmu.edu) |
| 6 points by heidibrayer on June 21, 2018 | past |
|
| 10. | | Implications and Mitigation Strategies When You Lose Your End-Entity PKI (cmu.edu) |
| 3 points by heidibrayer on March 20, 2018 | past |
|
| 11. | | Complexity of DDoS Attacks Is Rising (scmagazine.com) |
| 2 points by heidibrayer on Jan 25, 2018 | past |
|
| 12. | | Major chip flaws affect billions of devices (cnn.com) |
| 2 points by heidibrayer on Jan 4, 2018 | past |
|
| 13. | | Ransomware: Best Practices for Prevention and Response (cmu.edu) |
| 1 point by heidibrayer on June 27, 2017 | past |
|
| 14. | | DNS Blocking: A Viable Strategy in Malware Defense (cmu.edu) |
| 2 points by heidibrayer on June 26, 2017 | past | 1 comment |
|
| 15. | | Six Things You Need to Know About Data Governance (cmu.edu) |
| 2 points by heidibrayer on June 20, 2017 | past |
|
| 16. | | Ransomware: Best Practices for Prevention and Response (cmu.edu) |
| 2 points by heidibrayer on May 31, 2017 | past |
|
| 17. | | A Reference Architecture for Big Data Systems (cmu.edu) |
| 2 points by heidibrayer on May 22, 2017 | past |
|
| 18. | | Best Practices for Network Border Protection (cmu.edu) |
| 1 point by heidibrayer on May 17, 2017 | past |
|
| 19. | | Automating Design Analysis (cmu.edu) |
| 2 points by heidibrayer on May 1, 2017 | past |
|
| 20. | | Distributed Artificial Intelligence in Space (cmu.edu) |
| 1 point by heidibrayer on April 28, 2017 | past |
|
| 21. | | Software Testing in a Non-Deterministic World (cmu.edu) |
| 2 points by heidibrayer on April 24, 2017 | past |
|
| 22. | | CERT C++ Secure Coding Rules (cmu.edu) |
| 3 points by heidibrayer on April 18, 2017 | past |
|
| 23. | | Best Practices for Network Time Protocol (cmu.edu) |
| 1 point by heidibrayer on April 3, 2017 | past |
|
| 24. | | An Overcommit Tutorial (cmu.edu) |
| 1 point by heidibrayer on March 10, 2017 | past |
|
| 25. | | Powered by Mirai (cmu.edu) |
| 1 point by heidibrayer on March 6, 2017 | past |
|
| 26. | | Technical Debt as a Core Software Engineering Practice (cmu.edu) |
| 3 points by heidibrayer on March 2, 2017 | past |
|
| 27. | | Five Perspectives on Scaling Agile (cmu.edu) |
| 2 points by heidibrayer on Feb 23, 2017 | past |
|
| 28. | | Six Best Practices for Securing a Robust DNS Infrastructure (cmu.edu) |
| 2 points by heidibrayer on Feb 6, 2017 | past |
|
| 29. | | Automated Code Repair in the C Programming Language (cmu.edu) |
| 1 point by heidibrayer on Jan 17, 2017 | past |
|
| 30. | | The Challenges of Testing in a Non-Deterministic World (cmu.edu) |
| 2 points by heidibrayer on Jan 9, 2017 | past |
|
|
| More |