Trending Articles

Brian Kernighan Biography

The Crazy Programmer

Brian Wilson Kernighan is a computer scientist from Canada. He worked at Nokia Bell labs. This is an American industrial research and scientific development company owned by a multinational company Nokia. He contributed to the development of UNIX with Ken Thomson and Dennis Ritchie.

Clock-Bound Wait

Martin Fowler

Although he's been quiet for a while on here, Unmesh Joshi has been working hard on more of his Patterns of Distributed Systems. In this first of a new batch, he looks at the difficulty of getting consistent reads from servers in the presence of the inevitable drifts between system logs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Talking #BlackLinkedIn and DEI with Patricia Gatlin

Hacker Earth Developers Blog

Hire IQ by HackerEarth is a new initiative in which we speak with recruiters, talent acquisition managers, and hiring managers from across the globe, and ask them pertinent questions on the issues that ail the tech recruiting world.

MLOps Vs. DevOps: What’s the Difference?

DevOps.com

Machine learning operations, or MLOps for short, is a key aspect of machine learning (ML) engineering that focuses on simplifying and accelerating the process of delivering ML models to production and maintaining and monitoring them.

DevOps 104

7 Winning Lead Generation Strategies to Drive Growth

As B2B companies pivot to keep pace with a quickly changing marketplace, a data-centric approach to lead generation can be the difference between remaining competitive or being left behind. Get real-world examples and inspiration from leading B2B businesses in this whitepaper.

Scrum Master vs Project Manager: What’s the Difference?

Scrum.org

. Robb: Greg, let's talk about Scrum Masters and how they're not actually considered Project Managers in Scrum. Scrum done right there is no Project Manager because the team manages the project or manages the work that gets done collectively. So I know that can be a hot button issue.

More Trending

10 Traits of Great Programmers

Coding Dojo

If you’re looking to get into programming, you might be wondering, is programming hard? The short answer is no. But … Read more >>. The post 10 Traits of Great Programmers appeared first on Coding Dojo. All Posts Career Guides

Interview Questions To Ask Cybersecurity Candidates

Hacker Earth Developers Blog

Cybersecurity is among the most critical aspects of building an online business and it goes without saying it needs to have an expert to make sure everything is in place.

We Must Kill ‘Dinosaur’ JavaScript | Microsoft Open Sources 3D Emoji

DevOps.com

In this week’s The Long View: JavaScript is a bloated barrier to progress, and Microsoft’s emoji are on GitHub. The post We Must Kill ‘Dinosaur’ JavaScript | Microsoft Open Sources 3D Emoji appeared first on DevOps.com.

3D 99

“Scrum solves everything” and other Scrum myths

Scrum.org

Since 2020, the adoption of Scrum has increased rapidly. The following graph compares Scrum adoption in 2020 with 2021. In every industry, agile adoption has doubled. .

SCRUM 139

Data Value Scorecard Report

This report examines the quantitative research of data leaders on data value and return on investment.

Looking Ahead at the Top Priorities and Shifts in PK-12 Education

PowerSchool

Hardeep Gulati, CEO of PowerSchool, reflects on the dramatic shifts in education over the last year, and celebrates one year since the company's IPO and 25 years as a company. Cybersecurity School Operations Student Outcomes

Article: Rules of Thumb & Traps When Approaching Tech Stack Decisions

InfoQ Articles

At the MVP stage - do only the stuff you would do in a hackathon. Scalability and processes will become important once we have predictable revenue streams. Where are you generating your unique value proposition?

Liquibase on Kubernetes

Apiumhub

Context, motivation and theory. We have a microservices environment with Kubernetes(k8s) , in which we develop a service that requires a database. We decided to do the migration management of the database using Liquibase. Eventually, we realized that some deploys left the database locked.

What GitHub’s 2FA Mandate Means for Devs Everywhere

DevOps.com

Multifactor authentication (MFA) is becoming increasingly standard within software development organizations, with GitHub recently announcing that two-factor authentication (2FA) will be mandatory for all code contributors by the end of 2023. This is a smart move.

Omnichannel is Multichannel 2.0

Multichannel and omnichannel marketing are not the same. Many organizations are striving for omnichannel, but it can be a daunting journey—unless you have a map. Download your copy of the ultimate omnichannel guide today!

Agile Principles – Simplicity

Scrum.org

This post is the first in an ongoing series revisiting the principles behind the Agile Manifesto. This post is focused on the following important principle – “Simplicity–the art of maximizing the amount of work not done–is essential.”. For knowledge work, the scope for potential work is limitless.

Agile 134

REALITY AND APPEARANCE: LIGHTS AND SHADOWS ON THE HALO EFFECT

CEO Insider

What is the halo effect? How can it affect people? How much is it likely to distort reality? There are many questions arising on this, perhaps, too little considered phenomenon.

How receptive are you to “constructive” feedback that you disagree with?

Thought Leaders LLC

Our reader poll today asks: How receptive are you to “constructive” feedback that you disagree with? Very: It helps me learn about my blind spots 38.37%. Somewhat: I don’t like it and resist but do pay attention to it 54.22%.

CodeSOD: Ordering Off This Menu

The Daily WTF

While browsing one day, Emma clicked a link on a site and nothing happened. That was annoying, but Emma wasn't about to give up. She tried to get the URL out of the link, only to discover that there wasn't a URL. Or a link.

TCO Considerations of Using a Cloud Data Warehouse for BI and Analytics

Enterprises poured $73 billion into data management software in 2020 – but are seeing very little return on their data investments. 22% of data leaders surveyed have fully realized ROI in the past two years, with 56% having no consistent way of measuring it.

Four Secure Coding Best Practices for Mobile Apps

DevOps.com

Mobile apps have become the primary point of innovation for many companies, and skilled mobile developers are in high demand.

Commitments and their meaning in SG 2020

Scrum.org

Commitments: a little new and a little old. In 2020, the Scrum Guide 2020 introduced the concept of commitments, one for each artifact (physical things). They are: the Definition of Done. the Sprint Goal. the Product Goal.

SCRUM 126

Intro to Fileless Malware in Containers

Aqua Security

A fileless attack is a technique that takes incremental steps toward gaining control of your environment while remaining undetected. In a fileless attack, the malware is directly loaded into memory and executed, evading common defenses and static scanning. Aqua Security Malware Attacks

Critical Thinking: Understanding the Real Question

Thought Leaders LLC

When a stakeholder asks you to solve a problem, make sure you understand what’s driving their request. Asking follow-up questions can help you come up with better solutions.

Put Your Data to Work: The Complete Playbook

Turn your data into a competitive advantage. This playbook contains: Exclusive stats, research & insights on how the pandemic affected businesses. A comprehensive “Request For Proposal” (RFP) checklist and an interactive quiz to test your data knowledge.

Training Needs Analysis Template for Commercial Sales Teams

Mike Morrison

Another Training needs analysis template from RapidBI - this time for sales teams. The post Training Needs Analysis Template for Commercial Sales Teams appeared first on RapidBI. Management identify sales needs LNA sales template training needs analysis

Why You Should Rip Up Your Org Chart and Reorganize Around Value Streams 

DevOps.com

To compete in the digital economy, teams must optimize both efficiency and effectiveness–it’s a tough ask. The traditional dominator hierarchy is a problem because organizations that use command and control create silos and handoffs that stifle innovation at the team level.

Inspect And Improve The Performance Of A Scrum Team With “Generative Relationships STAR”

Scrum.org

The purpose of Liberating Structures is to unleash and involve everyone in shaping the next steps. They enable decision-making and strategy-forming, improve collaboration, create shared understanding, spark creativity, and make use of the wisdom of the crowd.

Basics of Linux: Commands for Beginners

Gitprime

Are you new to Linux? Here is an introduction to the basics of Linux administration. In this article you'll learn about the Kernel, the Shell, the Terminal and the filesystem hierarchy as we go over some basic Linux commands

82

12 Considerations When Evaluating Data Lake Engine Vendors for Analytics and BI

Businesses today compete on their ability to turn big data into essential business insights. Modern enterprises leverage cloud data lakes as the platform used to store data. 57% of the enterprises currently using a data lake cite improved business agility as a benefit.

How to Harness the 4 Aspects of Focus

Thought Leaders LLC

Multitasking doesn’t work. It’s only through true focus that you can make meaningful progress on your work. By using the four aspects of focus, you can excel at any task you put your mind to.

APEX: Delivering Customer Choice and Partner Opportunity

Dell EMC

APEX for partners: momentum of enhancements/expansion, optimism for future growth and consistency in delivering on our promises

73

Cycode Expands Scope of AppDev Security Platform

DevOps.com

At the Black Hat USA 2022 conference, Cycode this week announced it has added static application security testing (SAST) and container scanning capabilities to its software composition analysis (SCA) platform that is based on a graph database.