If you are a software engineer, you’ve probably been in a job interview where you were asked, “Have you ever used [Insert some awesome technology you may have heard of but certainly never used professionally here]?” You hear the question, and inside you’re basically like “Uh ohhh.” Your mind races for a reasonable response that won’t kill your chances. The best you can come up with is some sheepish variation on these:
Please take a look at my latest column for Government Computing News where I describe how you can program security into your applications from the start and avoid the guaranteed epic fail if you try to bolt security onto your applications later on. Just to give you an idea, here is the unedited introduction. IT security has recently gotten a lot of attention in the mainstream press for all the wrong reasons--like the Target hack that compromised millions of credit card numbers or the Heartbleed bug in OpenSSL that had everyone scrambling.
Vidya is proud to be working with Neustar, a leading telecommunications and cloud platform company. You may not realize it, but every phone call, fax, and computer connection in North America depends on Neustar. Why? In 1998, Neustar saved the 10-digit telephone number system from becoming a 14-digit system with a solution mandated by the FCC, so every telephone company in North America has a physical interface into Neustar’s directory system.
As someone who spends a lot of time thinking about technology and software project management (and the possibility of a Ghostbusters sequel but that’s beside the point), I have been really frustrated by the poor quality of reporting by the media on the failures of HealthCare.gov. The flawed coverage has shifted from the enormous functionality and scalability problems to the blame game–contractors, government officials, the federal contracting process, waterfall software development, and now apparently, agile software development as well.