CTO Tom Stiehm highlights some of the software methodologies that preceded Agile, like Spiral, Rapid Prototyping, and RAD.
Tom is a 20 year veteran of the Information Technology industry. He has spent the past 10 years managing, designing and implementing software products and applications using agile software development methods. Prior to Coveros, Tom held a variety of CTO and architect positions at software development companies. Tom is a member of the northern Virginia BEA users group and the northern Virginia Java users group. Tom holds a B.S. degree in Computer Science from George Mason University.
CTO Tom Stiehm highlights some of the software methodologies that preceded Agile, like Spiral, Rapid Prototyping, and RAD.
Owen Gotimer Hello everyone. My name is Owen Gotimer. I’m the community manager at TechWell. I’m joined today by Tom Stiehm the CTO at Coveros. Tom, thanks for joining me today. Tom Stiehm Thanks for having me. Owen Gotimer So the anti-pattern we’re going to talk about is no retros. Tom Stiehm So what happens […]
Owen Gotimer Hello everyone. My name is Owen Gotimer. I’m the community manager at TechWell. I’m joined today by Tom Stiehm the CTO at Coveros. Tom, thanks for joining me today. Tom Stiehm Thanks for having me. Owen Gotimer Another anti-pattern we can chat about is not having a production-like test environment. What are the […]
Owen Gotimer Hello everyone. My name is Owen Gotimer. I’m the community manager at TechWell. I’m joined today by Tom Stiehm the CTO at Coveros. Tom, thanks for joining me today. Tom Stiehm Thanks for having me. Owen Gotimer Tom, we’re gonna chat about some DevOps and DevSecOps anti-patterns. Do you want to give a […]
Owen Gotimer Hello everyone. My name is Owen Gotimer. I’m the community manager at TechWell. I’m joined today by Tom Stiehm the CTO at Coveros. Tom, thanks for joining me today. Tom Stiehm Thanks for having me. Owen Gotimer Tom, we’re going to chat about some DevOps and DevSecOps anti-patterns, and the first one I […]
RASP stands for Runtime Application Self Protection. Like IAST it’s agent based, so it watches your software run and tries to determine if something is attacking it. The goal of IAST is to try to determine if something’s attacking it by a certain behavior. RASP adds a layer to that by recognizing something’s attacking it […]
IAST stands for Interactive Application Security Testing. The basic idea is that you have software that watches your application running, usually in a Java or .NET world that uses what’s called the profiling API, and it watches everything that happens in your application and tries to determine if that activity is somehow attacking the software. […]
Application security, or AppSec, is hard. For development teams, it often comes into development late in a release cycle and demands changes to the software that seem unreasonable. For the AppSec team, being introduced to a project after the application has been designed and much of the code has been written means there will be […]
As with any business, customers have to be the highest priority when delivering software. It’s not enough to deliver software that simply works; the software must work for and do what the customer needs it to do.
One of my colleagues recently asked me how I interview people who have agile experience listed on their resume. I gave him some pointers, and it got me started thinking, “How do I interview for Agile experience?”. So building on the thoughts I gave him here is what I do. I start by looking at […]