Home » Author Archives: Jim Bird (page 11)

Author Archives: Jim Bird

Jim Bird
Jim is an experienced CTO, software development manager and project manager, who has worked on high-performance, high-reliability mission-critical systems for many years, as well as building software development tools. His current interests include scaling Lean and Agile software development methodologies, software security and software assurance.

Why are some bugs harder to fix than others?

software-development-2-logo

There are a lot of different factors that impact how long it could take to find and fix a bug. Some of them we’ve already gone over. How good the bug report is – can you understand it, does it include steps to reproduce the problem. And how old the report is – how much could have changed since then, ...

Read More »

Fixing a bug is like catching a fish

software-development-2-logo

Manager: So, how long will it take to fix this bug?  Inexperienced Programmer: An hour maybe? Two tops? I’ll get right on it! Experienced Programmer: Well, how long will it take to catch a fish? It’s hard to know how long it’s going to take to fix a bug, especially if you don’t know the code. James Shore points out ...

Read More »

It’s About Confidentiality and Integrity (not so much Availability)

devops-logo

Everyone knows the C-I-A triad for information security: security is about protecting the Confidentiality, Integrity and Availability of systems and data. In a recent post, Warren Axelrod argues that Availability is the most important of these factors for security, more important than Integrity and Confidentiality – that C-I-A should be A-I-C. I don’t agree. Protecting the Confidentiality of customer data ...

Read More »

In Agile development planning, a security framework loses out

agile-logo

In Agile Estimating and Planning, Mike Cohn explains the different factors that go into prioritizing work on a software development project: financial value, cost, knowledge and risk. He then works through a couple of examples to show how these decisions are made. One of these examples is whether or not to build a security framework for an application – an ...

Read More »

Monitoring Sucks. But Monitoring as Testing Sucks a Lot More

devops-logo

At Devopsdays I listened to a lot of smart people saying smart things. And to some people saying things that sounded smart, but really weren’t. It was especially confusing when you heard both of these kinds of things from the same person. Like at Noah Sussman’s presentation on how rapid release cycles alter QA and testing, based on the work ...

Read More »

Does Devops have a Culture Problem?

devops-logo

At the Devopsdays conference in Mountain View, Spike Morelli led an Open Space discussion on the importance of culture. He was concerned that when people think and talk about devops they think and talk too much about tools and practices, and not enough about culture and collaboration and communication, not enough about getting people to work closely together and caring ...

Read More »

Sooner or Later: Deliver Early or Minimize Waste

agile-logo

There’s an obvious but important tension in Lean/Agile development around when to make decisions. Between the fundamental Agile position that we should do the most important and most risky work first, and the Lean argument that we should make decisions at the last possible moment. We need to decide early and try things out, iterate to minimize risk and time ...

Read More »

Agile Estimating: Story Points and Decay

agile-logo

I’m re-reading Mike Cohn’s Agile Estimating and Planning. It’s the best book I’ve found on this and worth reading, even if he gets too Scrummy at times, and even if you don’t agree with everything he says. Which I don’t. For example, I don’t agree with him that Story Points are better for estimation than Ideal Days. When we do ...

Read More »

Where do Security Requirements come from?

software-development-2-logo

One of the problems in building a secure application is that it’s not always clear what the security requirements are and where they are supposed to come from. Are security requirements supposed to come from the customer? Are they specified in the regulatory and compliance environment? Or are they implicit in the type of application that you are building – ...

Read More »

Are Agile plans Better because they are Feature-Based?

agile-logo

In Agile Estimating and Planning, Mike Cohn quotes Jim Highsmith on why Agile projects are better: “One of the things I keep telling people is that agile planning is “better” planning because it utilizes features (stories, etc.) rather than tasks. It is easy to plan an entire project using standard tasks without really understanding the product being built. When planning ...

Read More »

Want to take your Java skills to the next level?

Grab our programming books for FREE!

Here are some of the eBooks you will get:

  • Advanced Java Guide
  • Java Design Patterns
  • JMeter Tutorial
  • Java 8 Features Tutorial
  • JUnit Tutorial
  • JSF Programming Cookbook
  • Java Concurrency Essentials