Skip to main content
dogfooding   rss
(1-4 of 4 items)
Dogfooding: Deployment & Product Influence | TechNet Edge Steven Michalove, from Microsoft Information Security, concludes the dogfooding series where a product is tested on the enterprise, formally known as First Best Program. For more information on the other phases of dogfooding a product in IT see Evaluating Risk and Security Related Features. Steven ... More...

TechNet Edge, Security, risk, Infosec, information security, dogfooding, Videos, English, Jossie, Zune, iPod
Dogfooding Security-Related Features | TechNet Edge Yale Li and Price Oden, from Microsoft Information Security, explain the second phase of dogfooding a product on the enterprise, formally known as First Best Program. This second step consists of doing a security assessment on specific features in the product. For the first phase go here. With this... More...

TechNet Edge, Security, BitLocker To Go, Infosec, information security, dogfooding, Videos, English, Jossie, Zune, iPod
Dogfooding: Evaluating Risk | TechNet Edge Don Nguyen and  Mike Lange, from Microsoft Information Security, explain the first phase of dogfooding a product on the enterprise, formally known as First Best Program. This first step consists of a risk assessment or design review on the product. This phase is important as it allows them to look a... More...

TechNet Edge, Security, SQL Server 2008, Infosec, information security, dogfooding, Videos, English, Jossie, Zune, iPod
Microsoft Information Security & Dogfooding | TechNet Edge Mark Smith, from Microsoft Information Security, provides a glimpse at how Microsoft “dogfoods” its products. When launching a new product naturally there’s a concern about how a product will perform. Ever wonder about the process? This is part of a series of videos around Information Security and D... More...

TechNet Edge, Security, Dogfooding, Infosec, Information Security, Videos, English, Jossie, Zune, iPod