development

No Image

The Twelve Principles of Agile Software

The Twelve Principles of Agile Software of the Agile Alliance: Our highest priority is to satisfy the customer through early and continuous delivery of valuable software. Welcome changing requirements, even late in development. Agile processes harness change for the customer’s competitive advantage. Deliver working software frequently, from a couple of weeks to a couple of months, with a preference to the shorter timescale. Business people and developers must work together daily throughout the project. Build projects around motivated individuals. Give them the environment and support they need, and trust them to get the job done. The most efficient and effective method of conveying information to and within a development team is face-to-face conversation. Working software is the primary measure of progress. Agile processes promote sustainable development. The sponsors, developers, and users should be able to maintain a constant pace indefinitely. Continuous attention to technical excellence and good design enhances agility. Simplicity–the art of maximizing the amount of work not done–is essential. The best architectures, requirements, and designs emerge from self-organizing teams. At regular intervals, the team reflects on how to become more effective, then tunes and adjusts its behavior accordingly.  


No Image

Quoted in the IT Business Edge

http://www.itbusinessedge.com/cm/blogs/poremba/trustworthy-ssl-certificates/?cs=42832 As Sorin Mustaca, manager of international software development at Avira, explained to me: A Certificate Authority is, by common understanding, an entity having a trust level beyond any doubt. This means that in the case of digital certificates, a CA can generate certificates which are trusted by all parties involved in a communication. Any entity, private or corporate, is allowed to request such a digital certificate, the only proof required is an official identification document. This means that such a certificate can only guarantee that the entity you are communicating with is who she pretends to be. It doesn’t guarantee that the owner of the certificate can be trusted.


No Image

Quoted by softpedia.com

Softpedia took again one of my posts in the Avira Techblog and wrote an article based on it: “In the recent past we saw emails looking like phishing mails, which were spam though actually. The spammers tried to make them look as much as possible as official mails from the entity they were faking: Amazon, Twitter, Facebook, and so on,” Sorin Mustaca, manager of international software development at Avira, warns. “[Full name] has sent you a message” the rogue communication, which appears to originate from Facebook, reads. However, instead of the actual message, the recipient is presented with an image promoting various male enhancement pills. “We checked about 100 different emails in this category and all of them use the same domain. We were curious and investigated who owns the domain – the domain is registered in China by a single registrar who owns 14 thousands other domains,” Mr. Mustaca notes.


No Image

Quoted in USA Today

http://www.usatoday.com/tech/products/software/2010-08-09-apple09_ST_N.htm?loc=interstitialskip Somewhere in the middle of the article: Apple’s problem is singular. The company has made a big deal about hiding technical details of iOS, allowing only approved Web apps to tie in. This tight control initially made it easier to keep iOS secure. But now Apple may have to share iOS coding with anti-virus firms, says Sorin Mustaca, development manager for anti-virus firm Avira. Windows, Google, Nokia and RIM share such coding to help anti-virus firms develop protections. “Apple does not allow this, making it challenging for anti-virus vendors to create third-party protection for iPhones and iPads,” Mustaca says.


%d bloggers like this:

By continuing to use the site, you agree to the use of cookies and to its Privacy Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close