Slices & Articles Get by the slice or add to your own ebook
|Barbee Davis||O'Reilly Media||ePub|
IF THERE IS ONE THING that distinguishes a software development project from other project types, it is how, inevitably, scope changes occur. Not that it never happens in other places, but I can't think of another industry with such a constantly fluctuating scope.
You know projects are governed by the triple constraint: cost, time, and scope:
Cost. If your project is in trouble, throwing in extra money or resources rarely helps. If you double the number of diggers, you'll probably get your trench dug in just slightly more than half the time. But if you double the number of software developers, hoping to get the project back on track, it will probably do more harm than good. You will create huge confusion over who owns what code and how things need to be done. So cost needs to stay the same.
Time. There's always "The Date." It is not the delivery date indicated in your original schedule. Nobody officially mentions it out loud, but if you are developing a big security product that is scheduled to release in November, there is a likely chance you will get to keep your job even if your delivery slips until January. Secretly, the team knows "The Date" is February, for example, "at the time of the international Black Hat security conference where new releases are announced." You have some flexibility surrounding your delivery time, but only a small amount. Time is constrained.See All Chapters
|Elizabeth Jennings||Carcanet Press Ltd.|
The radiance of the star that leans on me
Was shining years ago. The light that now
Glitters up there my eyes may never see,
And so the time lag teases me with how
Love that loves now may not reach me until
Its first desire is spent. The star’s impulse
Must wait for eyes to claim it beautiful
And love arrived may find us somewhere else.
Let us have Winter loving that the heart
May be in peace and ready to partake
Of the slow pleasure Spring would wish to hurry
Or that in Summer harshly would awake,
And let us fall apart, O gladly weary,
The white skin shaken like a white snowflake.
Woman in Love
All familiar thoughts grow strange to her,
One thought insists on opening each door,
Each window on to love, the others stir
And creep as strangers, skulking on the edge
To find an entry by some subterfuge.
But she dismisses them and grows one thought
Whatever hands obey, whatever voice
Speaks of indifference. She is tamed, self-taught.
Peace in a high room now defines the noise
As meaningless and she, beyond the rangeSee All Chapters
|Robin Hemley||Indiana University Press||ePub|
Corrine, our youngest, sparkled in her dance school's performance of Swan Lake. Though she stubbed her toe on one of the stage lights, and broke it (the toe, not the light), she struggled on like the little trouper she is without telling anyone—even after the show was over, she refused to tell anyone. Sam thinks I push her too hard and that she is afraid to admit her failures to me, but I think that, in fact, she has inherited some of Sam's Midwestern stoicism, and thinks that to admit pain is sinful. I personally couldn't care less about my children's failures. All I ask is that they do their best, and then I stand back and beam. For whatever reason, Corrine didn't tell either of us about her broken toe until weeks later when the toe became infected and then gangrenous. By that time, it was too late and the foot had to be amputated.See All Chapters
|Eric Bidelman||O'Reilly Media||ePub|
At the time of writing, Chrome has a limited UI settings page for users to manage the storage space for applications that save data on their behalf. It is accessible via PreferencesUnder the HoodAll Cookies and Site Data (or by opening chrome://settings/cookies). Users can only delete data from this menu. As a result of this limited UI, write operations (such as creating a folder and writing to a file) require an application to ask for the estimated size, in bytes, they expect to use. The same practice is true for other offline storage APIs, like WebSQL DB, where one opens a database with a particular size:See All Chapters
|Diego Zamboni||O'Reilly Media||ePub|
In previous chapters we have seen a number of CFEngine policies to achieve different specific tasks, with the intention of introducing you to a number of basic CFEngine concepts. Now that you know those basic concepts, I would like to introduce you to several generic techniques and patterns that are generally useful when writing CFEngine policies. Mastering these techniques will help you write more concise and efficient CFEngine code.
One of the common uses of CFEngine is to copy files (configuration
files, binaries, libraries, documentation, etc.) into systems. If you
maintain a heterogeneous network consisting of different system types,
operating systems, architectures, and applications, you will at some point
need to copy different sets of files onto different systems. The most
straightforward way of achieving this would be to have different promises
Business & Economics