Posts

Management Sea Change: AI Autonomous Programmers Are Here Now

Image
This past week a seismic shift has taken place in computer science: Cognition AI introduced Devin, the world’s first fully autonomous AI software engineer. From a single prompt, Devin is able to plan, research APIs, design, code, test, remediate, and deploy software solutions independently.  It is able to actively collaborate with users during software development by providing real-time progress updates, accepting feedback, and working together to make design choices. Products that would take human developers many hours to deliver, can be done in mere minutes. [ Video , Forbes , AI Business , Infoworld ] For organizations, the speed and efficiency improvements of employing software engineering AI agents will be critical for maintaining international market competitiveness and accelerating new strategic digital opportunities. And to do so, organizations will need product software engineering managers who are able to effectively leverage and manage new software engineering AI agents....

New Year Resolution: Software Development Application Security Strategic Prioritization, SSDF Top 10

Implementing security and regulatory compliance SSDF practices into an efficient Software Development Life Cycle (SSDL) can be quite daunting due to the scope of practices and tooling required. Just as "Rome wasn't built in a day," security implementation and improvement plans need to be prioritized based on highest business risk, and most cost-effective "bang for the buck" improvement investments.  While it might be tempting to try addressing all of the below at once, or even cherry pick through the list, they each have success dependencies on each other that are need to acheive effective execution: Document, Assess, Improve, Adjust, Repeat. 1. "Be Prepared" for today's advanced ransomware attack threats "Being prepared" is about everyone knowing who is responsible for security risk and incident responses, identifying the actions required by each responsible stakeholder, setting realistic and appropriate response timelines needed to sup...

Terminology: AppSec, DevSecOps, CloudSec, ProdSec … What’s the Diff?

Clarification of commonly used software development security terms Computer Technology is a broad field that easily gets confused through the use of acronyms and new product market positioning terms. Inconsistent understanding and use of these terms amongst practitioners and organizations can cause confusion and inefficiencies when communicating scope and objectives of collaborative efforts. The following is a quick reference to help clarify the most commonly used and confused terminology regarding software development security. Terms Computer Security / Cybersecurity / Digital Security / Information Technology Security (IT Security) The protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. As such, these are the broadest all-encompassing terms having to do with a...

Management Practices for Flexible and Remote Working

SUMMARY To competitively attract & retain talent organizations need to provide staff with work location and schedule flexibility options. To incentify workers into the office, offer 35-hour work week benefit To address remote working timesheet fraud and abuse management concerns, implement computer activity and video supervisory spot-checking capability To address socialization and networking needs, ensure new online and in-person programs for geographically distributed teams. PROBLEM Post-Covid Office Workers  Want improved personal-life/work balance through  Flexible working hours (e.g. childcare after-school activities, 4x10hr weeks, multiple employment, etc.) Remote working from home Eliminating personal commuting time, costs, and environmental impacts Some are  abusing remote working multiple simultaneous employment, side gigs,  quite quitting, unapproved paid absence) fraudulent employment (unauthorized subcontractor work)  Employers unsure how to...