As we head into the holiday season, we’ll be taking a little time off from blogging. But don’t worry, we’ll be back in 2020 with more posts!
What we have to say, what you want us to hear.
That’s how our blog works. It’s interactive. Let’s learn together.
In Part 1 of Revisiting Estimations, I explored some challenges and underlying concepts relating to estimates and projections. In Part 2, I more deeply explored Uncertainty, Complexity, and Stakeholder Questions. In Part 3, I explore some guidance for leaders and managers…
Founded in 2014, the charter of ISE's Philanthropy Committee is to unite ISE to give back to the community. Each year the committee plans about one event per quarter focused on different charitable organizations within the community.
Ultimately, there comes a point in almost every application’s life where it needs to either protect resources, or access protected resources. This used to be solved by simple client-server authentication, where a resource owner (an end user who owns specific data hosted on a server) would exchange credentials with a server to gain access to protected resources.