Foreword
- IWelcome
1Welcome aboard!
2Welcome
3Release Cycles
- 3.1Waterfall Technique
- 3.2Spiral Technique
- 3.3Continuous Release
- IIObserving
4Essential Data
- 4.1Tableau
5Junk Data
6Presenting Data
7Perceptions
- 7.1Look Upstream
- 7.2Look to the Sides
- IIIBasics
8Causes and Effects
9Simplify Systems
10Systems Include People
- IVEstimates
11Estimates
12Sign-off phobia
13Feature creep
14The world economy is a system.
15Know What Game You’re Playing
- 15.1World Events
16Security and Privacy
- 16.1Computer Viruses
- 16.2Ransomware
- 16.3Virtual Private Networks
- 16.4Private and Secure Email
- 16.5Containers
- 16.6A Reasonably Secure OS
17Don’t Be a Pioneer
18Achilles Heels
- 18.1Infrequent backups
- 18.2Dependence on hosting company
- 18.3Dependence on Cloud Provider
- 18.4Dependence on a tool
- 18.5Bank Accounts Vulnerable
- 18.6Unencrypted Internet connection
- 18.7Unencrypted email
- 18.8Spying
- 18.9Politics
- 18.10Facebook spying
- 18.11High crime neighborhood
- 18.12Limited number of customers
- 18.13Cash reserves less than three months operating expenses
- 18.14Cash reserves in one place
- 18.15Breaking changes where an update pf your software tools causes your software to stop working
- 18.16Only one of a necessary item
- 18.17Reliance on a vendor. Consider Open Source,
- 18.18Intermingling systems. Consider Containers such as Docker, Kubernetes, and Qubes OS
19See the Value of What You Have
- Appendix
About Jim Kitzmiller
Jim’s Software Systems
- Business Management System
- Money Status System
- Report Blaster
- HOTS (Hughes Online Tracking System)
- Trucking Company System
- Plating Company System
Jim’s Empowerment Systems
- Intuitive Chi
- MultiDimensional Chi
- Two different meditation systems
- Novel Writing Course
- Bliss Exercises
- Bliss Writing
- Mozart Flow