article thumbnail

Technical Advisors: Every Startup Needs One

TechEmpower

The Tactical Technical Advisor stays on top of the development team to ensure that they’re team is building the right thing in a high-quality, efficient manner. This is especially important with outsourced development teams. Are developers following best practices in their code and life cycle?

article thumbnail

Lead Developer to CTO at a Startup

SoCal CTO

I've previously addressed the role of a CTO in early-stages in my post Startup CTO or Developer. for a Lead Developer: How much will it cost to build what we need to build? for a Lead Developer: How much will it cost to build what we need to build? How can I control costs but effectively get stuff developed? Accounting?

CTO Coach 231
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Human Capital: Moving away from ‘master/slave’ terminology

TechCrunch LA

This probably isn’t news to developers, but it was news to me when I found out many tech companies still use slave-master language. When racism is built into the technical framework of a company, it perpetuates a false idea that white people are superior to Black people. . Human Capital will soon be available as a weekly newsletter.

Capital 316
article thumbnail

Technical Advisors: Every Web/Mobile Startup Must Have One

SoCal CTO

Structure development contracts appropriately or directing the in-house team appropriately. Look at the business and determine what's going to make sense from a development perspective in the short-term, longer-term. Do you really have control of the development? I've talked about this before in Startup CTO or Developer.

article thumbnail

Gaining an Edge: Understanding Cyber Risk Appetite

Xconomy

Everyone’s a potential source: software engineers that ship new releases, HR teams that use human capital management software, and supply chain partners that have access to systems, all of which could be exploited. They can be targeted, malicious attacks, or they can be unintentional.