Skip to main content

Questions tagged [risk]

2 votes
2 answers
1k views

Had an interesting discussion with our architect. It was related to replacing a plain DLL reference with a NuGet package. His worry was "If it is possible for single NuGet package to add multiple DLL ...
Euphoric's user avatar
  • 38.2k
5 votes
5 answers
444 views

I was arguing this point with my boss the other day. He claims that the larger the code base the riskier the deployment. I argued that this is not true, though I see why he might think that. In my ...
John S's user avatar
  • 159
7 votes
4 answers
14k views

I have worked with public API's in only one small project, but I recently learned that if one were to distribute a project with API keys inside this is a security risk. So I have two questions: What ...
Ethan's user avatar
  • 105
11 votes
7 answers
3k views

It's well known that end-to-end and integration tests are costly. Of course if we develop applications where people might die if things go wrong it's a worthwhile investment. However in applications ...
Marc's user avatar
  • 223
0 votes
1 answer
111 views

I'm looking for perspectives on how risk analysis is performed when there's not precisely a "dollar value" associated with the risk, as in an Open Source project. Traditionally, risk analysis takes ...
Purpose CyberSpace's user avatar
2 votes
1 answer
150 views

I think it is well understood that the risk in a software engineering project increases with the size of the project, and the slope of the scale exceeds linear. As the number of features increase, ...
John Wu's user avatar
  • 27k
27 votes
7 answers
11k views

Bugs happen and sometimes data has to be fixed in production. What is the safest way to go about this from a big company standpoint? Are there tools that can help? Here are some considerations driving ...
Andrew White's user avatar
3 votes
5 answers
906 views

I am looking to quantify the cost or problems of bad software development practices. Specifically can software that has been developed resulting in an anemic domain model be quantifiable in terms of ...
Kane's user avatar
  • 789
24 votes
3 answers
975 views

Is there a set of industry-approved rules to avoid vendor lock-in? I mean, something one can show to a manager, or other decision maker, that is easy to understand and easily verifiable. Are there ...
Tulains Córdova's user avatar
13 votes
4 answers
889 views

Where I work, we have a lot of developers and an awful lot of code running our proprietary applications used by staff & customers alike. We also have a lot of smart support staff that like to ...
Mark McDonald's user avatar
13 votes
8 answers
1k views

I'm thinking about limiting the rights of users who choose insecure passwords (insecurity of a password being determined by length, how many types of characters (upper/lower case, numbers, symbols, ...
Carson Myers's user avatar
  • 2,480
7 votes
3 answers
2k views

My manager asked me to write a estimation of work hours and a risk estimation of source code changes for a defined task. While the first is no problem for me and there are many resources on the web, ...
Bertolt's user avatar
  • 173
23 votes
8 answers
1k views

The last couple of years I've been observing an exponential growth in the news related IT companies and individuals taking their cases to court, on one side, and the questions concerning legal matters ...
user avatar