Thu.Jun 30, 2022

Setting Expectations in Scrum

Scrum.org

When we don’t know what we don’t know, it’s kind of silly to come up with a Gantt chart saying, we’ll all be done by Christmas, but this is exactly what people do. They predict what they’re going to do in future sprints, if they’re using scrum and in future months if they’re using Kanban.

SCRUM 156

The Two Types of Code Vulnerabilities

DevOps.com

Spell checkers, grammar checkers and predictive keyboards all help reduce errors in written communication, but in a creative medium where writers need to innovate new expressions, nothing can eliminate all errors. The same is true in the code we write.

Course 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

What does Cross-Functional really bring to your Daily Scrum? ??

Scrum.org

We started this Scrum foundation series explaining we see four underlying concepts of the Scrum framework. In the past series of mails we covered the three pillars of Empiricism, the Scrum Values, and Self-Management. A self-managing team is taking decisions about who does what, when, and how.

SCRUM 124

Moving From Lift-and-Shift to Cloud-Native

DevOps.com

Analyst firm Forrester recently predicted that 2022 “will see big organizations move decisively away from lift-and-shift approaches to the cloud, embracing cloud-native technologies instead.”

Cloud 85

Build Your Open Data Lakehouse on Apache Iceberg

Speaker: Veena Vasudevan and Jason Hughes

In this webinar, Dremio and AWS will discuss the most common challenges in data architecture and how to overcome them with an open data lakehouse architecture on AWS. Sign up now!

Modernizing a public health system with Teradata’s connected analytic architecture

Teradata

How do you accelerate disease prevention and response? Teradata provides a response to help accelerate public health infrastructure modernization

More Trending

Why open source matters for developers

TechBeacon

Organizations' use of open source is continuing to increase. In fact, in 2021, some 77% of companies reported that they were using more open-source software, while 36% said they were using significantly more open-source tools. App Dev & Testing, DevOps, Open Source

Buildkite Adds Analytics Tools to Identify Flaky App Tests

DevOps.com

Buildkite has added an analytics tool to its continuous integration/continuous delivery (CI/CD) platform that identifies flaky tests.

Supercharge Your Data Lakehouse with Apache Iceberg in Cloudera Data Platform

Cloudera

We are excited to announce the general availability of Apache Iceberg in Cloudera Data Platform (CDP). Iceberg is a 100% open table format, developed through the Apache Software Foundation , and helps users avoid vendor lock-in.

How often is your organization “penny-wise and pound foolish?”

Thought Leaders LLC

Our reader poll today asks: How often is your organization “penny-wise and pound foolish?” ” All the time. We save a little money here but at the expense of important things like quality 42.55%. Sometimes.

7 Winning Lead Generation Strategies to Drive Growth

As B2B companies pivot to keep pace with a quickly changing marketplace, a data-centric approach to lead generation can be the difference between remaining competitive or being left behind. Get real-world examples and inspiration from leading B2B businesses in this whitepaper.

ESG at Dell Technologies: Our Purpose in Action

Dell EMC

Using technology to positively impact our people and the planet is in our DNA, and it’s been demonstrated in our purpose for decades

RTM

InnovationM

The Requirement Traceability Matrix (RTM) is a document that identifies and tracks users’ needs through test cases. It captures all client requirements and tracking requirements in a single document, delivered at the end of the Software Development cycle.

ZTNA 2.0: Why Zero Trust Is Essential in a Post-Pandemic World

Palo Alto Networks

This blog is part of our “ ZTNA Partners ,” a series where we take a closer look at how our partnerships protect today's hybrid workforces and environments with ZTNA 2.0. Digital transformation is not a “someday” goal but a “today” imperative.

How to Save on Monitoring Costs by Using Honeycomb

Honeycomb

Are you overspending on monitoring and APM tools? Forrester’s Total Economic Impact analysis of Honeycomb identified significant ROI in customers using us to reduce spend on less efficient APM workflows. But this isn’t about budget reallocation to a newly branded set of similar but shinier tools.

Omnichannel is Multichannel 2.0

Multichannel and omnichannel marketing are not the same. Many organizations are striving for omnichannel, but it can be a daunting journey—unless you have a map. Download your copy of the ultimate omnichannel guide today!

Error'd: Anabelly

The Daily WTF

Knock knock. Matthew. shared a classic catch-22 that didn't catch any, explaining "Redditstatus.com is in the middle of a Reddit outage (actually, after the outage has been "restored" and we are "monitoring the situation").

Empowering Supply Chain Analysts With No-Code Machine Learning

Dataiku

This article was written in collaboration with our friends at Aimpoint Digital. Use Cases & Projects Dataiku Product Featured

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus

Tenable

CVE-2022-28219: Proof-of-Concept Published for Unauthenticated RCE in Zoho ManageEngine ADAudit Plus. New information and technical details, including a proof-of-concept have been published for a remote code execution flaw in Zoho ManageEngine ADAudit Plus that was patched last month. Background.

From ESL Teacher to Email Developer | How Amber Adamson Launched Her New Career

Coding Dojo

Pre-Dojo : Worked as an ESL Teacher to students in China for 5+ years. Wanted a sustainable and long-term career. … Read more >>. The post From ESL Teacher to Email Developer | How Amber Adamson Launched Her New Career appeared first on Coding Dojo Blog.

Data Value Scorecard Report

This report examines the quantitative research of data leaders on data value and return on investment.

CyRC Vulnerability of the Month: Spring Framework

Synopsys

Each month we highlight research from the Black Duck Security Research team in Belfast. This month’s vulnerability followed an unusual path through more than half a decade. The post CyRC Vulnerability of the Month: Spring Framework appeared first on Application Security Blog.

Darktrace unveils new brand with McLaren at British Grand Prix

Darktrace

What better way to launch the new Darktrace brand – with its bold logo and design – than in the McLaren Racing commandcenter as the F1 team prepared for the first practice run of the British Grand Prix

56

Software supply chain: What it is and how to keep it secure

CircleCI

As shortages of consumer goods and rising prices caused by bottlenecks in international supply networks have become more common, the global supply chain and its vulnerabilities have been top of mind for many.

The New New New Normal

The Agile Manager

My blogs in recent months have focused on macroeconomic factors affecting tech, primarily inflation and interest rates and the things driving them : increased labor power, supply shortages, expansion of M2, and unabated demand.

Agile 56

Put Your Data to Work: The Complete Playbook

Turn your data into a competitive advantage. This playbook contains: Exclusive stats, research & insights on how the pandemic affected businesses. A comprehensive “Request For Proposal” (RFP) checklist and an interactive quiz to test your data knowledge.

3 Best Tools to Implement Kubernetes Observability

Dzone - DevOps

A properly managed and implemented observability system provides DevOps with granular insights that can be used to debug and heal complex systems. Observability combines monitoring, alerting, and logging with metrics visualization and its analysis. It allows development teams to get detailed insights into the real-time performance of Kubernetes clusters and applications so that they can make timely and informed actions.

7 Tips to Anticipate Cloud Computing Security Risks

SecureWorks

Type: Blogs 7 Tips to Anticipate Cloud Computing Security Risks The cloud is an extension of your enterprise. It’s also an extension of your attack surface. Understand the unique nature of cloud computing security risks and how to anticipate and defend against them. Digital Transformation

Advancing Data Practices: TIBCO Supports EDM Council Frameworks

IBI

Reading Time: 3 minutes. Cloud solutions solve major cost and scalability challenges for businesses, and cloud usage is only projected to grow. Gartner reports that “in 2023, end-user spending is expected to reach nearly $600 billion” for public cloud services.

4 Benefits of Investing in Cloud Analytics

Datavail

Organizations of all stripes are increasingly demanding cutting-edge, data-driven business insights—so how can you stay ahead of the curve? As part of an overarching digital transformation strategy, more and more companies are moving their on-premises data analytics into the cloud.

TCO Considerations of Using a Cloud Data Warehouse for BI and Analytics

Enterprises poured $73 billion into data management software in 2020 – but are seeing very little return on their data investments. 22% of data leaders surveyed have fully realized ROI in the past two years, with 56% having no consistent way of measuring it.

Customer Pain Points: Types, How to Identify and Address Them

Altexsoft

For 11 years, since the time of its initial creation, Twitter had a 140-character limit. But in 2017, the platform surprised everyone by increasing the limit to 280 characters.

B2C 52

Lunch & Learn: Learnings from Writing My Own Operating System from Scratch

OpenCredo

Every Thursday at OpenCredo we run internal Lunch & Learns for our developers to share and explore the new tech they are working on, and now you can get to experience them too!

Friendly Competition and a Cybersecurity Game to Prevent Attacks

SecureWorks

Type: Blogs Friendly Competition and a Cybersecurity Game to Prevent Attacks Q&A Interview with 2nd Place Winners, Cysec Intern Learn how Cysec Intern took second place in the recent Secureworks Cybersecurity Challenge, as well as how their game came to fruition. Business Imperatives

Games 48