Prometheus Blogs

Tag List
  • Analysis
  • Automation
  • Business Process
  • Development
  • Effort
  • Productivity
  • Requirements
  • Risk
  • Scope
  • Security
  • Spock framework
  • Standards
  • Testing
  • User interface
  • Software development in the late Cretaceous period

    Is UML is a vestigial holdover from waterfall methods practiced during the age of reptiles?

    09/14/2016
    Arthur Griesser
  • Too Many Models?

    Chaos claims the unwary

    Interpretation of Michael Moorcock's Chaos Flag

    09/08/2016
    Arthur Griesser
  • Configuring Spock integration tests, written in Groovy, with the Maven failsafe plugin

    Configuring Spock tests with Maven failsafe plugin

    07/05/2016
    Sunil Bhaskarla
  • Beyond Vanilla JSON

    Making JSON a lot more useful

    04/02/2016
    Arthur Griesser
  • How Wadler's Law Hurts Us

    One reason behind problematic information transfer standards

    03/31/2016
    Arthur Griesser
  • The Downside of Documents

    Yes, there are plenty

    03/25/2016
    Arthur Griesser
  • A Map of NIST Security Publications

    Finding some of the main trees in the forest

    03/24/2016
    Arthur Griesser
  • How important are interoperability tests?

    Can you get by without them?

    03/17/2016
    Arthur Griesser
  • The difference between semantics and syntax

    Failure to focus on the right one can have serious repercussions

    03/16/2016
    Arthur Griesser
  • Vulnerabilities You Should Ignore

    Yes, sometimes it’s best to bury your head in the sand…

    02/19/2016
    Arthur Griesser
  • The Brain Buffer Overflow Vulnerability

    What does it mean to software developers?

    02/17/2016
    Arthur Griesser
  • A Tale Of Two Classification Systems

    Simpler is often better

    02/15/2016
    Arthur Griesser
  • Threat Intelligence Can Be Foolish

    “Poison is in everything, and no thing is without poison. The dosage makes it either a poison or a remedy” - Paracelsus

    02/12/2016
    Arthur Griesser
  • The NIST Risk Management Framework In One Picture

    Who does what, and which other documents are referenced?

    02/11/2016
    Arthur Griesser
  • Where Are You On The Security Mindset Spectrum?

    Taijitu

    02/10/2016
    Arthur Griesser
  • The NIST Risk Management Framework

    How civilian agencies are supposed to control risk

    02/08/2016
    Arthur Griesser
  • Cut-Rate Nuclear Power Plants

    Do you really need security or safety plans?

    02/04/2016
    Arthur Griesser
  • A Thorn By Any Other Name… Threat Or Threat Agent?

    What exactly does “threat” mean?

    02/03/2016
    Arthur Griesser
  • Blaming The Private Sector

    Do contractors run the federal government?

    02/01/2016
    Arthur Griesser
  • Who Should The CISO Report To?

    Should CISOs report to the CIO or the agency head?

    01/29/2016
    Arthur Griesser
  • Malware Exceeds Meatspace Pathogens

    We’ve created more problems for ourselves than nature has.

    01/28/2016
    Arthur Griesser
  • FISMA In A Sesame Seed

    What is FISMA Anyway?

    01/27/2016
    Arthur Griesser
  • Why Use Cases?

    A quick summary of the advantages and drawbacks of use cases.

    01/26/2016
    Arthur Griesser
  • The Most Expensive Mistake In Software Development

    A very common source of software delays

    02/17/2015
    Arthur Griesser
  • Henry Ford's Secret Weapon

    How a slaughterhouse changed our society

    02/10/2015
    Arthur Griesser