Wed.Sep 05, 2018

article thumbnail

How we facilitated an all-hands retrospective for 60 people in three hours

Agile42

This blog post was a co-authored by Anita Siebold , Pam Clavier and Lukas Klose. It is a short version that outlines the facilitation of a retrospective for 60 or more people. The corresponding ‘how to’ guide includes a more detailed step-by-step guide, a planning checklist, and a closer look at lessons learned. Setting the scene Picture six eager DevOps pods, four enthused technical teams, five servant leader program team members, one Agile Coach, three intense hours and lots of coffee.

SCRUM 49
article thumbnail

Learn about data governance with these books, videos, and tutorials

O'Reilly Media - Data

This collection of data governance resources will get you up to speed on the basics and best practices. Whether you’re just getting started with data governance or you have previous experience, you’ll find something useful on this list of data governance resources. The items on this list were curated by O’Reilly’s editorial experts. Continue reading Learn about data governance with these books, videos, and tutorials.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

From waterfall to agile – a SDLC story

Agile Alliance

A well-defined Software Delivery Life Cycle (SDLC) is a requirement for many companies and government institutions. However, the typical SDLC process is very "Waterfallish" by nature of its phase gates and documentation requirements. This talk explains how the SDLC at Fannie Mae evolved as the company transformed from a waterfall to a lean agile organization … Continued.

SDLC 101
article thumbnail

Your “intelligent” office building is one giant, vulnerable IoT device

CTOvision

We have previously provided context on how the rise of smart cities is creating battlegrounds of the future (see: Smart Cities Cybersecurity Challenge and Getting Real About Smart Cities and Open Data and Modern Battle of Manassas). Now read why J.M. Porup says that smart buildings are at bigger risk from hacking on CSO Online : You’re settling […].

IoT 101
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Creating an Agile Organization

Agile Alliance

This lightning talk covers 12 key areas that should be considered for any Agile transformation at scale and incorporate gaming into the process to make it fun.

Agile 101

More Trending

article thumbnail

CodeSOD: Caught Up in the Captcha

The Daily WTF

Gregor needed to download a network driver. Upon clicking the link, a "captcha" appeared, presumably to prevent hotlinking to the driver files. It wasn't a real , image-based captcha, but a simple "here's some characters, type them into the box" The code which popped up was "S i u x q F b j NaN 4" He hit the "new code" button , and got "T o A 0 J V s L NaN a" In fact, "NaN" showed up in the penultimate position in every code.

article thumbnail

Millions of Home Wi-Fi Networks at Risk of Hacking, Cybersecurity Firm Claims

CTOvision

Your home Wi-Fi router may already be hacked or at the risk of hacking. This is what SureCloud researcher Elliott Thompson says. If Thompson’s claim is true, millions of home Wi-Fi networks could be at risk in new ways. Thompson says that hackers can exploit the way saved passwords in the browsers Google Chrome and Opera […].

Network 61
article thumbnail

7 CODING TIPS FOR PARENTS

Coding Dojo

“Education is a means to understand the world we live in and to create a better world for those that … Read more >>. The post 7 CODING TIPS FOR PARENTS appeared first on Coding Dojo Blog.

article thumbnail

Americans are changing their relationship with Facebook

CTOvision

The Cambridge Analytica data breach scandal and the news that Facebook was selling sensitive user information has had its effect on how Americans perceive Facebook (also see: Sometimes it seems every cybersecurity story is a Facebook story and The Ethics Of AI and Big Data: Facebook and Cambridge Analytica Are Writing New Case Studies For Us All, and Help […].

article thumbnail

“Build vs Buy Analytics?” The Question ALL SaaS Leaders Need to Answer in 2024

As a SaaS leader, you know that the more metrics, insights, and analytics you add to your products, the more engagement you’ll have – and the stickier your product will become with customers. At what point do you decide to keep building your analytics in-house or invest in an embedded analytics solution? Read our Build vs. Buy Analytics guide to learn: Top 4 benefits of embedded analytics A quick cost comparison of in-house analytics development vs embedded analytics 10 considerations to help yo

article thumbnail

The Business Woman’s Guide to Smartwatches

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

70
article thumbnail

The Journey to PowerEdge MX

Dell EMC

I love new product launches that showcase the talent, drive and innovation from the Dell EMC server team. The new PowerEdge MX has been a particularly fascinating journey, and the story of how we arrived at the MX is quite interesting. Dell EMC has been shipping the PowerEdge M1000e for more than eight years. The PowerEdge M1000e, for those unaware, is a traditional blade-style modular infrastructure solution.

article thumbnail

Healthcare, Privacy & Cloud Security Risks

Prisma Clud

The threats to healthcare organizations are unique in that the value of what they’re trying to protect is significantly higher than other industries. From a purely monetary perspective, medical records, … Continue reading "Healthcare, Privacy & Cloud Security Risks". The post Healthcare, Privacy & Cloud Security Risks appeared first on RedLock.

article thumbnail

Consent is not enough (part 1): GDPR data security requirements

TechTalk

The EU’s General Data Protection Regulation has been in full force for almost three months as of this writing, but many companies are still struggling with the challenges of attaining and maintaining compliance with its numerous complex requirements. Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent […].

Data 42
article thumbnail

Monetizing Analytics Features

Think your customers will pay more for data visualizations in your application? Five years ago, they may have. But today, dashboards and visualizations have become table stakes. Turning analytics into a source of revenue means integrating advanced features in unique, hard-to-steal ways. Download this white paper to discover which features will differentiate your application and maximize the ROI of your analytics.

article thumbnail

Top 3 Trends from VMworld

Hypergrid

VMworld was an exciting show for HyperGrid this year. We got first-hand experience talking to many VMware users who are looking to optimize and scale their existing infrastructure or see if and how they should be migrating to cloud. Cloud (private & public) was the hot topic. Duh. However, for many attendees, cloud still poses a large question mark.

Trends 40
article thumbnail

Empower Your Customers with Self-Service Analytics

Kentik

For operations teams, delivering a great customer or user experience is paramount. Keeping the network performant and reliable is job number one, and most teams would agree that pervasive, real-time data is essential to accomplishing that task. Service assurance and incident response are just one side of the coin though. What if you could use the very same data to highlight to customers the great value that your service provides?

article thumbnail

How to Perform A/B Testing on Your App Store Page?

Xicom

Demand of smartphones and mobile applications has been increasing at an unprecedented rate. A mobile app user decides about whether he wants to download an app or not in just few seconds. These few seconds are not enough to tell the app’s story and its benefits. A proper research is required before the launch of the mobile app. Without which, you run the risk of wasting lots of your marketing budget if the users see a campaign link but don’t download the app.

Testing 40
article thumbnail

Part 2: API Access Control and Authentication with Kubernetes, Ambassador and ORY Oathkeeper: Q&A…

Daniel Bryant

Part 2: API Access Control and Authentication with Kubernetes, Ambassador and ORY Oathkeeper: Q&A and Tutorial The Datawire and ORY teams have recently been discussing the challenges of API access control in a cloud native environment, the highlights of which I capture below in a Q&A. There are many possible solutions (with associated benefits and tradeoffs), and our friends at ORY have put together a tutorial on how to use their Oathkeeper with Ambassador running on Kubernetes, which I

article thumbnail

Addressing Top Enterprise Challenges in Generative AI with DataRobot

The buzz around generative AI shows no sign of abating in the foreseeable future. Enterprise interest in the technology is high, and the market is expected to gain momentum as organizations move from prototypes to actual project deployments. Ultimately, the market will demand an extensive ecosystem, and tools will need to streamline data and model utilization and management across multiple environments.

article thumbnail

Changes for 2nd Edition of Refactoring

Martin Fowler

Here's summary of the changes in the second edition, including a table showing the fate of the original 68 refactorings and a list of the new ones.

42
article thumbnail

What’s in a Name?

Nutanix

Nutanix continues its journey to develop world-class software solutions that empower our customers to develop, run and scale any application in the cloud of their choice – public or private.

Cloud 20
article thumbnail

Four additions to my list of Eurogames

Martin Fowler

Over the last couple of weeks, I've updated my list of Eurogames to include short reviews for four games I acquired earlier this year: Concordia , Kingdom Builder , Azul , and Glass Road.

Games 37
article thumbnail

An End-to-End Open & Modular Architecture for IoT

Cloudera

While the Internet of Things (IoT) represents a significant opportunity, IoT architectures are often rigid, complex to implement, costly, and create a multitude of challenges for organizations. First of all, in order to effectively pull together an end-to-end architecture for IoT, organizations must manage multiple vendor solutions, validate that they work together, integrate them to ensure the right functionality, and provide for future enhancement compatibility.

IoT 47
article thumbnail

How To Package & Price Embedded Analytics

Just by embedding analytics, app owners can charge 24% more for their product. How much value could you add? This framework from Software Pricing Partners explains how application enhancements can extend your product offerings. You’ll learn: How to take a disciplined approach to pricing The three elements of the Packaging Decision Framework Ways to structure your new embedded analytics offering Download the White Paper to learn about How To Package & Price Embedded Analytics.

article thumbnail

How to Configure Active Directory Auth from iOS and Android

Progress

Learn how to quickly and easily leverage Azure Active Directory in your native iOS and Android mobile apps with Kinvey and NativeScript. Programming authentication and authorization to an Active Directory API has seen many ups and downs over the years, but it has never really been an easy story.NET application developers have always been treated as first class citizens while other app developers, especially iOS and Android developers, were pretty much left to fend for themselves.

Azure 40
article thumbnail

AML: Past, Present and Future – Part II

Cloudera

This is the second installment in a 3 part series. The first installment provides a short background on anti-money laundering. In this installment, we examine common AML problems faced by financial institutions today. The third installment introduces an approach that carries AML into the future. Part II: Current Challenges in AML. There are several key areas in the field of anti-money laundering (AML) that rely heavily on technology.