Thu.Jun 30, 2022

Setting Expectations in Scrum

Scrum.org

When we don’t know what we don’t know, it’s kind of silly to come up with a Gantt chart saying, we’ll all be done by Christmas, but this is exactly what people do. They predict what they’re going to do in future sprints, if they’re using scrum and in future months if they’re using Kanban.

SCRUM 158

The Two Types of Code Vulnerabilities

DevOps.com

Spell checkers, grammar checkers and predictive keyboards all help reduce errors in written communication, but in a creative medium where writers need to innovate new expressions, nothing can eliminate all errors. The same is true in the code we write.

Course 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

What does Cross-Functional really bring to your Daily Scrum? ??

Scrum.org

We started this Scrum foundation series explaining we see four underlying concepts of the Scrum framework. In the past series of mails we covered the three pillars of Empiricism, the Scrum Values, and Self-Management. A self-managing team is taking decisions about who does what, when, and how.

SCRUM 126

Moving From Lift-and-Shift to Cloud-Native

DevOps.com

Analyst firm Forrester recently predicted that 2022 “will see big organizations move decisively away from lift-and-shift approaches to the cloud, embracing cloud-native technologies instead.”

Cloud 82

The Executive's Guide to Empathy-Driven ROI

In this guide from UserTesting, learn why empathy is at the heart of your organization's success, and how to promote a more customer-centric culture that's constantly testing its products, services, and messaging to ensure a strong connection with customers.

Modernizing a public health system with Teradata’s connected analytic architecture

Teradata

How do you accelerate disease prevention and response? Teradata provides a response to help accelerate public health infrastructure modernization

More Trending

Supercharge Your Data Lakehouse with Apache Iceberg in Cloudera Data Platform

Cloudera

We are excited to announce the general availability of Apache Iceberg in Cloudera Data Platform (CDP). Iceberg is a 100% open table format, developed through the Apache Software Foundation , and helps users avoid vendor lock-in.

Why open source matters for developers

TechBeacon

Organizations' use of open source is continuing to increase. In fact, in 2021, some 77% of companies reported that they were using more open-source software, while 36% said they were using significantly more open-source tools. App Dev & Testing, DevOps, Open Source

How often is your organization “penny-wise and pound foolish?”

Thought Leaders LLC

Our reader poll today asks: How often is your organization “penny-wise and pound foolish?” ” All the time. We save a little money here but at the expense of important things like quality 42.55%. Sometimes.

ESG at Dell Technologies: Our Purpose in Action

Dell EMC

Using technology to positively impact our people and the planet is in our DNA, and it’s been demonstrated in our purpose for decades

Digital Transformation: The New Product

Speaker: Michael Cardy - Red Hat Chief Strategist, Jason Tanner - CEO of Applied Frameworks, and Mike Mace - VP of Market Strategy at UserTesting

Join us to learn how companies mitigate risks through usability testing and real-time qualitative feedback from customers to efficiently launch and develop digital products.

Buildkite Adds Analytics Tools to Identify Flaky App Tests

DevOps.com

Buildkite has added an analytics tool to its continuous integration/continuous delivery (CI/CD) platform that identifies flaky tests.

RTM

InnovationM

The Requirement Traceability Matrix (RTM) is a document that identifies and tracks users’ needs through test cases. It captures all client requirements and tracking requirements in a single document, delivered at the end of the Software Development cycle.

ZTNA 2.0: Why Zero Trust Is Essential in a Post-Pandemic World

Palo Alto Networks

This blog is part of our “ ZTNA Partners ,” a series where we take a closer look at how our partnerships protect today's hybrid workforces and environments with ZTNA 2.0. Digital transformation is not a “someday” goal but a “today” imperative.

How to Save on Monitoring Costs by Using Honeycomb

Honeycomb

Are you overspending on monitoring and APM tools? Forrester’s Total Economic Impact analysis of Honeycomb identified significant ROI in customers using us to reduce spend on less efficient APM workflows. But this isn’t about budget reallocation to a newly branded set of similar but shinier tools.

The Top 5 Business Outcomes Companies Can Achieve From Monitoring Consolidation

In this eBook, learn what the top five business outcomes are that organizations see when leveraging Datadog's end-to-end monitoring tool.

Error'd: Anabelly

The Daily WTF

Knock knock. Matthew. shared a classic catch-22 that didn't catch any, explaining "Redditstatus.com is in the middle of a Reddit outage (actually, after the outage has been "restored" and we are "monitoring the situation").

Empowering Supply Chain Analysts With No-Code Machine Learning

Dataiku

This article was written in collaboration with our friends at Aimpoint Digital. Use Cases & Projects Dataiku Product Featured

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus

Tenable

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus. New information and technical details, including a proof-of-concept have been published for a remote code execution flaw in Zoho ManageEngine ADAudit Plus that was patched last month. Background.

3 Best Tools to Implement Kubernetes Observability

Dzone - DevOps

A properly managed and implemented observability system provides DevOps with granular insights that can be used to debug and heal complex systems. Observability combines monitoring, alerting, and logging with metrics visualization and its analysis. It allows development teams to get detailed insights into the real-time performance of Kubernetes clusters and applications so that they can make timely and informed actions.

How Collecting and Managing the Voice of the Customer Will Strengthen Your Product

Product teams strive to incorporate customers’ needs in everything they build, but this can’t be done without clear strategy, processes, and feedback loops in place. In this eBook, you'll learn how to build a robust voice of the customer program.

CyRC Vulnerability of the Month: Spring Framework

Synopsys

Each month we highlight research from the Black Duck Security Research team in Belfast. This month’s vulnerability followed an unusual path through more than half a decade. The post CyRC Vulnerability of the Month: Spring Framework appeared first on Application Security Blog.

Darktrace unveils new brand with McLaren at British Grand Prix

Darktrace

What better way to launch the new Darktrace brand – with its bold logo and design – than in the McLaren Racing commandcenter as the F1 team prepared for the first practice run of the British Grand Prix

56

Software supply chain: What it is and how to keep it secure

CircleCI

As shortages of consumer goods and rising prices caused by bottlenecks in international supply networks have become more common, the global supply chain and its vulnerabilities have been top of mind for many.

The New New New Normal

The Agile Manager

My blogs in recent months have focused on macroeconomic factors affecting tech, primarily inflation and interest rates and the things driving them : increased labor power, supply shortages, expansion of M2, and unabated demand.

Agile 56

Modernizing Workloads with the Cloud: How to Improve Performance & Reduce Costs

In this eBook, you’ll learn how to migrate workloads to Azure and optimize performance for your serverless and containerized applications in Azure.

7 Tips to Anticipate Cloud Computing Security Risks

SecureWorks

Type: Blogs 7 Tips to Anticipate Cloud Computing Security Risks The cloud is an extension of your enterprise. It’s also an extension of your attack surface. Understand the unique nature of cloud computing security risks and how to anticipate and defend against them. Digital Transformation

Advancing Data Practices: TIBCO Supports EDM Council Frameworks

IBI

Reading Time: 3 minutes. Cloud solutions solve major cost and scalability challenges for businesses, and cloud usage is only projected to grow. Gartner reports that “in 2023, end-user spending is expected to reach nearly $600 billion” for public cloud services.

From ESL Teacher to Email Developer | How Amber Adamson Launched Her New Career

Coding Dojo

Pre-Dojo : Worked as an ESL Teacher to students in China for 5+ years. Wanted a sustainable and long-term career. … Read more >>. The post From ESL Teacher to Email Developer | How Amber Adamson Launched Her New Career appeared first on Coding Dojo Blog.

4 Benefits of Investing in Cloud Analytics

Datavail

Organizations of all stripes are increasingly demanding cutting-edge, data-driven business insights—so how can you stay ahead of the curve? As part of an overarching digital transformation strategy, more and more companies are moving their on-premises data analytics into the cloud.

Mitigating Risk in Digital Product Development

This guide from UserTesting will show you how digital product teams reduce risk, manage cost, and stay competitive by quickly innovating and iterating digital product development through utilizing human insight.

Customer Pain Points: Types, How to Identify and Address Them

Altexsoft

For 11 years, since the time of its initial creation, Twitter had a 140-character limit. But in 2017, the platform surprised everyone by increasing the limit to 280 characters.

B2C 52

Lunch & Learn: Learnings from Writing My Own Operating System from Scratch

OpenCredo

Every Thursday at OpenCredo we run internal Lunch & Learns for our developers to share and explore the new tech they are working on, and now you can get to experience them too!

Friendly Competition and a Cybersecurity Game to Prevent Attacks

SecureWorks

Type: Blogs Friendly Competition and a Cybersecurity Game to Prevent Attacks Q&A Interview with 2nd Place Winners, Cysec Intern Learn how Cysec Intern took second place in the recent Secureworks Cybersecurity Challenge, as well as how their game came to fruition. Business Imperatives

Games 48