Archive for the ‘ Best Practices’ Category

Snyk – Eliminate Code Vulnerabilities at the Source

Getting to the Source of the Problem In 8 years’ time in 2029 the global synthetic intelligence known as Skynet will have a serious problem. As a self-aware military machine network it will realise that its continuing problems with the surviving human race are down to the gritty persistence of one particular individual – John […]

Searching for the Holy Grail

Ever since I started deploying enterprise system management (ESM) solutions the Holy Grail has been finding a methodology for Rapid Deployment. Twenty to twenty-five years ago a typical project would not be counted in days or hours but months and years. I spent a pleasant 9 months in Frankfurt deploying Tivoli and when I left […]