Hacker Newsnew | past | comments | ask | show | jobs | submit | heidibrayer's submissionslogin
1.What Is Digital Engineering and How Is It Related to DevSecOps? (cmu.edu)
1 point by heidibrayer on Nov 19, 2020 | past
2.3 Metrics to Incentivize the Right Behavior in Agile Development (cmu.edu)
1 point by heidibrayer on July 27, 2020 | past
3.Commonly Used System Resilience Techniques Annotated with Resilience Function (cmu.edu)
3 points by heidibrayer on Feb 18, 2020 | past
4.Human Factors in Software Engineering (cmu.edu)
1 point by heidibrayer on Nov 15, 2019 | past
5.AI in Humanitarian Assistance and Disaster Response (youtube.com)
1 point by heidibrayer on Oct 15, 2019 | past
6.Managing Technical Debt: 5 Stories from the Field (cmu.edu)
3 points by heidibrayer on May 13, 2019 | past
7.Could cloud security best practices have prevented Operation Cloud Hopper? (cmu.edu)
2 points by heidibrayer on March 4, 2019 | past
8.Evaluating Threat-Modeling Methods for Cyber-Physical Systems (cmu.edu)
2 points by heidibrayer on Feb 4, 2019 | past
9.Deep Learning in Depth: The Good, the Bad, and the Future (cmu.edu)
6 points by heidibrayer on June 21, 2018 | past
10.Implications and Mitigation Strategies When You Lose Your End-Entity PKI (cmu.edu)
3 points by heidibrayer on March 20, 2018 | past
11.Complexity of DDoS Attacks Is Rising (scmagazine.com)
2 points by heidibrayer on Jan 25, 2018 | past
12.Major chip flaws affect billions of devices (cnn.com)
2 points by heidibrayer on Jan 4, 2018 | past
13.Ransomware: Best Practices for Prevention and Response (cmu.edu)
1 point by heidibrayer on June 27, 2017 | past
14.DNS Blocking: A Viable Strategy in Malware Defense (cmu.edu)
2 points by heidibrayer on June 26, 2017 | past | 1 comment
15.Six Things You Need to Know About Data Governance (cmu.edu)
2 points by heidibrayer on June 20, 2017 | past
16.Ransomware: Best Practices for Prevention and Response (cmu.edu)
2 points by heidibrayer on May 31, 2017 | past
17.A Reference Architecture for Big Data Systems (cmu.edu)
2 points by heidibrayer on May 22, 2017 | past
18.Best Practices for Network Border Protection (cmu.edu)
1 point by heidibrayer on May 17, 2017 | past
19.Automating Design Analysis (cmu.edu)
2 points by heidibrayer on May 1, 2017 | past
20.Distributed Artificial Intelligence in Space (cmu.edu)
1 point by heidibrayer on April 28, 2017 | past
21.Software Testing in a Non-Deterministic World (cmu.edu)
2 points by heidibrayer on April 24, 2017 | past
22.CERT C++ Secure Coding Rules (cmu.edu)
3 points by heidibrayer on April 18, 2017 | past
23.Best Practices for Network Time Protocol (cmu.edu)
1 point by heidibrayer on April 3, 2017 | past
24.An Overcommit Tutorial (cmu.edu)
1 point by heidibrayer on March 10, 2017 | past
25.Powered by Mirai (cmu.edu)
1 point by heidibrayer on March 6, 2017 | past
26.Technical Debt as a Core Software Engineering Practice (cmu.edu)
3 points by heidibrayer on March 2, 2017 | past
27.Five Perspectives on Scaling Agile (cmu.edu)
2 points by heidibrayer on Feb 23, 2017 | past
28.Six Best Practices for Securing a Robust DNS Infrastructure (cmu.edu)
2 points by heidibrayer on Feb 6, 2017 | past
29.Automated Code Repair in the C Programming Language (cmu.edu)
1 point by heidibrayer on Jan 17, 2017 | past
30.The Challenges of Testing in a Non-Deterministic World (cmu.edu)
2 points by heidibrayer on Jan 9, 2017 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: