Trending Articles

Types of Recursion With Examples

The Crazy Programmer

In this article, we will look into the different types of Recursion generally seen in programming to solve various problems. We will look at description of each type with example through code for better understanding. First of all, let’s have a quick recap of Recursion.

Bill Vass Presents On The Extended Cloud, AWS powers edge-to-cloud applications


Bill Vass is someone I regard as “The CTO’s CTO.” ” He is a business and technology leader who creates visions and marshals resources to turn those visions into reality. He […]. Cloud Computing CTO News Amazon

AWS 85

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How Much Lean is in Today’s “Agile”? – Part I

Agile Alliance

(This is Part I in a five part series.) As the two of us compared notes about clients and their ability to use agile approaches, we realized something that surprised us.

Agile 199

Structured Logging That Makes Everybody Happy


When we run our software, we obviously want to see and understand what is happening and how well our software performs. To achieve this, we need observability as a key characteristic for our software.

The 7 Ways to Source and Attract Diverse Technology Talent

Just talking about diversity and inclusion won’t move the needle. Diversity, equity, and inclusion efforts are at the forefront for organizations looking to recruit and retain top talent, but nowhere does this remain more of a challenge and opportunity than in the tech sector. In this guide, we provide seven strategies organizations can use to source and attract diverse tech talent.

How Aerospike achieves fine-grained global replication


Read explain how Aerospike’s XDR makes use of asynchronous replication to attach two or extra Aerospike clusters situated at a number of geographically distributed websites on Pirate Press : Fashionable […]. News Aerospike

More Trending

Why Cybersecurity Should Be Your Organization’s Top Priority

The Crazy Programmer

Cybersecurity isn’t something new. Businesses are emphasized to protect their data systems from hackers for decades.

Organizational Change

Agile Alliance

This interview is in Spanish. However, you can read a summary in English below.

Agile 164

Use Touch ID for sudo on Mac

David Walsh

The landscape of security is changing quite a bit. We’ve gone from basic username and password to 2FA, facial recognition, fingerprint recognition, and so on. Hell, my Mac unlocks simply when I have my Apple Watch near by. In the end, I probably use the Mac fingerprint key the most.


OK this is huge: Ethereum mining revenue breaks $1 billion for the first time in February


Ethereum mining revenue grew 65.1% between January and February. During that time, transaction fees grew 122.1%. Ethereum mining revenue often features a relatively high ratio of transaction fees to block subsidies. […]. News Ethereum


Deliver Effective Online Education and Events Your Members Will Love

This guide identifies the biggest challenges for associations moving their training online and provides practical solutions so that you can hit the ground running. Download now to keep your members engaged and growing even in times of COVID-19.

Languages and DevOps: Web Development

Web development has changed a lot since DevOps first hit the scene. The languages used have shifted, where languages are used has shifted, the likely back-end hosting environment has changed – but DevOps has folded these issues in and just kept plugging along.

DevOps 107

Difference between Binary Tree and Binary Search Tree

The Crazy Programmer

In this article, we will look at the difference between Binary Tree and Binary Search Tree. These topics are very important because these act as an underlying data structure for various other data structures. So, we will look at the description of each with examples and compare their properties.

Retrospectives Antipatterns

Agile Alliance


A Short Story About a Scrum Team

This is a story about a Scrum Team using Scrum to develop a product, learning early and often how to optimize the value of the product for their users. While the story is about a fictional team, the application of Scrum that is shown here is realistic.


Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

Palantir sees slowing growth in 2021, but upbeat on expanding its enterprise


Palantir Technologies said revenue growth in 2021 is expected to slow to about 30% in 2021 compared to 47% in 2020. The company reported better-than-expected fourth-quarter sales and logged more than […]. News Palantir Palantir Technologies

Report 105

A Common Prayer

The post A Common Prayer appeared first on Blogs ROELBOB humor parody satire search engine optimization

Concurrency vs Parallelism – Difference between Concurrency and Parallelism

The Crazy Programmer

In this article, we dive deep into the core concepts of multithreading. We will have a look at the profound understandings of the terms Concurrency and Parallelism with their description. Then, we compare the major differences between the two terms.

React authentication, simplified

David Walsh

Authentication is one of those things that just always seems to take a lot more effort than we want it to.

Realizing the Benefits of Automated Machine Learning

How are organizations using machine learning and artificial intelligence (AI) to derive business value? Renowned author and professor Tom Davenport explains the rise of automated machine learning, its benefits, and success stories from businesses that are already using it.

Agile Transformation – Success Factors part 1

Part 1. Recently, I have been discussing some reasons why Agile Transformation may fail or go slowly. In this blog, I am presenting some success factors that might help your organization move toward Agility. . As before , we need to emphasize that Agile Transformation is a process that never ends.

Agile 153

Crypto: The Graph Adds Support for Binance Smart Chain


The Graph, the indexing and querying protocol for the Web3 ecosystem, has added support for Binance Smart Chain. Binance announced the move via its blog earlier today. The Binance-owned chain is […]. Blockchain and Cryptocurrency News Graph Protocol The Graph

How To Make a Good Decision

The post How To Make a Good Decision appeared first on Blogs ROELBOB business as usual cya humor parody playing it safe satire

How To 109

Four Amazing Years at Aqua!

Aqua Security

What were you doing four years ago? Perhaps in 2017 you were, like many people, entirely unaware of the way that containers and cloud computing would take the world by storm.

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065: Four Zero-Day Vulnerabilities in Microsoft Exchange Server Exploited in the Wild


Four zero-day vulnerabilities in Microsoft Exchange servers have been used in chained attacks in the wild. Background. On March 2, Microsoft published out-of-band advisories to address four zero-day vulnerabilities in Microsoft Exchange Server that have been exploited in the wild. Vulnerability Type.

What Does It Mean for The Scrum Master to Be a True Leader as Written on Scrum Guide?

So what’s good this week awesome people? On this opportunity I am writing a blog rather than making a video on youtube since my family just moved to Brisbane and I am still waiting for all my gears to be sent across the continent.


Ideas On Bitcoin vs Ethereum: Performance Growth Analysis


Read PM Dev compare the performance and analyze the growth options for Bitcoin and Ethereum on Investing : Bitcoin (BTC) and Ethereum (ETH) are two of the world’s top cryptocurrencies […]. Blockchain and Cryptocurrency News bitcoin Ethereum

Value Stream Management Consortium Makes Debut

A consortium dedicated to advancing the adoption of value stream management best practices is being launched today with backing from, HCL Software, Plutora, ServiceNow and Tasktop.

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

International Women’s Day 2021: Challenging what’s possible


This year’s International Women’s Day (IWD) on March 8th comes at a time when global communities, businesses, and governments find themselves continuing to pirouette, pivot, and adapt in the face of a relentless, global pandemic. . COVID-19 has touched every aspect of our lives.

Tenable Capture the Flag 2021: The Results Are In!


More than 1,500 teams from nearly 140 countries competed in Tenable's first-ever Capture the Flag competition. And the winners are. That’s a wrap on the first Tenable Capture the Flag event! . We’d like to say a huge thank you to everyone who participated.

YDS: How Does a Scrum Team Build Trust?

On today’s episode of YOUR DAILY SCRUM: How Does A Scrum Team Build Trust? Today's question asks us to take a look at how a Scrum Team builds trust with stakeholders, your product owner, and the organization. Todd and Ryan discuss the only way that they have found to build trust: DELIVER!