article thumbnail

Technical Review: A Trusted Look Under the Hood

TechEmpower - Product Management

Many CEOs of software-enabled businesses call us with a similar concern: Are we getting the right results from our software team? We hear them explain that their current software development is expensive, deliveries are rarely on time, and random bugs appear. These are classic inflection points for a development team.

article thumbnail

Modus Security: What’s Your Threat Surface?

Modus Create

But one thing technology leaders need to ask themselves is, “what are the threats we face?” The news is filled with tales of hackers breaking into financial institutions, DDoS attacks on credit card companies, and data breaches due to poor software configuration. Phase 1: Due Diligence and Discovery.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Observational Research Best Practices

BrainMates

Whether observing people using a technology or system in the workplace, at home, or out in public, it can provide insights not available in quantitative data. We listened and diligently documented how they created and captured series and episodic metadata, and how it flowed through the ecosystem. Put simply, metadata matters.

article thumbnail

Have a Major Creator or Gaming-related Passion? Don’t Get Distracted by the Surface…

The Product Coalition

If you’re conflicted or dejected on continuing your content creation journey, why not support the underlying platforms and technologies instead? There are a plethora of platforms, databases, systems, teams, and other tools which serve as the key to unlock our world of content. About Me My name is Kasey, AKA J.X.

article thumbnail

Security Assessment: Introduction, Process, and More

Modus Create

Here’s what a comprehensive security assessment looks like: Step 1 – Due Diligence. You document information about the people, processes, and technologies that affect the organization’s overall security framework. SDLC (Software Development Life Cycle) of the organization . The Security Assessment Process.

article thumbnail

Become a Product Visionary with Alternative Futures Analysis

The Product Coalition

Alternative futures analysis is a structured analytic technique that helps teams predict how the future might unfold. With this knowledge in hand, teams can more effectively identify and exploit opportunities and adopt risk strategies. As you assemble your team, take special care to select a diverse group of subject matter experts.

article thumbnail

Run Less Software

Intercom, Inc.

As well as being a critical philosophy behind how we build software, it also represents how I feel about the software industry and technology in general. Basic technology execution is becoming easier too. are making it easier and faster for software developers to develop complex software applications atop this infrastructure.