ALM and Beyond

Application Lifecycle Management and Beyond.

Browse by Tags

Tagged Content List
  • Blog Post: Building a Release Pipeline with TFS

    Leaders in the world of online businesses have shrunk the timeline for software delivery from months to days or even hours. No matter what size business you have, customers now expect features such as real-time customer service and frequent releases of services. Enter: The patterns & practices...
  • Blog Post: Team Foundation Server 2013 Power Tools

    It seems just yesterday that I mentioned the Power Tools for TFS 2012 and the benefits that it provides. Fast forward to today and the Power Tools for TFS 2013 are now available and have all been updated to work with VS 2013 and TFS 2013. As is the norm, these tools are a set of enhancements, tools,...
  • Blog Post: ALM Summit Content Available On-Demand

    January's ALM Summit on the Microsoft Campus brought together some of the greatest minds in application development, methodologies, and application lifecycle management. All of the sessions were recorded and are now available for on-demand viewing on Channel 9 . Watch these videos to learn about the...
  • Blog Post: Applying the SDL to Windows Azure

    Employing the security development lifecycle (SDL) has grown from desktop based applications to now cloud based applications. While building great software is significant, it’s crucial that the end product is secure and free of exploits (or at best mitigate the risks if unfortunately found). Those...
  • Blog Post: VM + SDL Process Template = Conundrum

    Virtualization technology certainly has changed the game when it comes to software development. Long gone are the days of hoping or guessing that the application developed will work on a disparate number of computer systems. Testing was possible but there was a good percentage of scenario’s that...
  • Blog Post: Security Development Lifecycle

    Building security into a system is difficult especially today as applications are more diverse in nature and span multiple technologies. Never the less, curtailing exploits and vulnerabilities from a development standpoint should be a high priority for any application that is scheduled to be developed...
Page 1 of 1 (6 items)