Wed.Jun 16, 2021

Can the Product Owner also be the Scrum Master?

Can the Product Owner and Scrum Master be the Same Person? Scrum is an agile project management framework that enables teams to deliver value in 30 days or less. The two most notable roles in Scrum are the Scrum Master and Product Owners.


Recruiting the Right People


Recruiting the right people involves creating appropriate role descriptions and knowing where to look. One of the most exciting aspects of building a high-performing team is recruiting people to be members of that team.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scrum - What's in a Name?

I'm slightly uniquely placed in that I am a Scrum Master, Professional Scrum Trainer and Scrum Coach, as well as being a Rugby Coach, and as such I've always been intrigued by the name Scrum.


Harness Employs ML to Streamline DevOps Workflows

How to Empower Your Users So You Can Create a Great Product

Speaker: Johanna Rothman, Management Consultant, Rothman Consulting Group

Join Johanna Rothman, Author and Consultant, for her session that will discuss why instead of designing for the users, CTOs and their teams should collaborate with empowered users to create a great product together.

Integrate and Leverage Your SAP Infrastructure With Dataiku


Organizations continually analyze and enrich the data stored in both SAP and their other data sources, aiming to maintain the highest data accuracy and integrity.

More Trending

A Modern Infrastructure for the Digital Bank


Discover why banks are making an astronomical jump to cloud technologies to integrate their data to form hybrid infrastructures with IDC's Jerry Silva. Industry banking banks cloud cloud infrastructure

WSO2 Applies AI to API Management

WSO2 today unfurled a Choreo cloud platform through which DevOps teams can create and manage application programming interfaces (APIs) more efficiently by leveraging machine learning algorithms and other forms of artificial intelligence (AI).

Article: Enhance Your Testing Strategy with Mind Map-Driven Testing

InfoQ Articles

Mind map-driven testing can enable testers to focus on test idea generation, it exposes you to your thinking and enables you to brainstorm and organize your ideas effectively.

Make your product compliant with privacy laws: A new framework


As public concern over privacy grows, protecting data and complying with a changing regulatory environment can be challenging.

Address the Challenges of Siloed Monitoring Tools

Companies frequently experience monitoring tool sprawl. Find out why monitoring tool sprawl occurs, why it’s a problem for businesses, and the positive business impacts of monitoring tool consolidation.

How To Hire The Right Software Developers – 7 Tactics That Actually Works


The gospel truth is – “Hiring the right resources is nothing less than a pain in the neck of recruiters”. While the Gordian Knot is that the conventional recruiting channels are up to the brink.

#ClouderaLife SpotLight: Katelynn Cusanelli, Senior Premier Support Engineer


This Pride month, we’re excited to introduce Katelynn Cusanelli. She’s a 5-year Clouderan working as a Senior Premier Support Engineer, dedicated to supporting our largest accounts.

AoAD2 Chapter: Into the Future

James Shore

Second Edition cover. This is a pre-release excerpt of The Art of Agile Development, Second Edition , to be published by O’Reilly in 2021. Visit the Second Edition home page for information about the open development process, additional excerpts, and more. Your feedback is appreciated!

Agile 55

Milestones and Certifications

The post Milestones and Certifications appeared first on ROELBOB Certification humor life priorities satire techhumor technical certification


A Training Company’s Guide to Selecting an eLearning Platform

Training companies have an opportunity to embrace the change and create meaningful change in their organizations by moving online. Discover the advantages of a digital-first approach, using an eLearning platform.

CodeSOD: Filter Your Kwargs

The Daily WTF

Mark 's team needed someone to write a pretty straight-forward report for their Python application. It would take a set of keyword arguments, turn those into a filter, apply the filter, and get the results back. This was implemented in two methods.

How to Analyze Your Code for Security Vulnerabilities

Shifting Left 2.0 is a two-day virtual conference taking place from 9 a.m. to 2 p.m. PDT on June 22nd-23rd that dives deep into application security in the modern tech space.

Mobile UX Design -ListView, GridView and Gradient


ListView is the Flutter widget commonly used scrolling widget, It displays children one after another in a scrolling page. children scrolling on the main axis and also it has to fill the cross axis of the listview.

Using Rust to Build Distributed Applications

Rust is an open source programming language that was initially developed at Mozilla Research and became increasingly popular for building distributed applications.

Does Your Company Need Help Solving These 4 Common eLearning Challenges?

If you want to know how to get ahead of the game and avoid the common mishaps in selling your eLearning courses, you’ve come to the right place! Lambda Solutions has identified the most common and costly challenges faced by eLearning providers today.

Tech Leadership books


The transition to tech leadership is a huge challenge. Technical leadership is different. Leading a technical team demands more than just management skills, but also technical prowess, and the ability to navigate the tech world.

What Is Power BI and How Can It Help My Business?

Invid Group

What Is Power BI and How Can It Help My Business? BY: Alberto Lugo Those that have looked at Microsoft’s business intelligence products have likely seen Power BI before. Indeed, the “BI” in the product name stands for “business intelligence.”

Transportation and Logistics Go Places with RPA at the Helm


Tedious, repetitive tasks can put quite a drain on your time, especially when you would rather spend it on more meaningful activities. Take emails, for instance, you cannot do without them, you cannot ignore them, and there will be quite a few that will require you to prioritize and take action.

35+ Of The Best CI/CD Tools: Organized By Category


The last decade saw a steady increase in the popularity of DevOps. Despite its rapid adoption, there is still a lot of confusion surrounding it. Even engineering leaders not fully versed in all its concepts wildly throw the name around. DevOps

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Techniques and Practices for Product Backlog Refinement


Working with requirements is crucial for Agile software development , so teams often use Product Backlog Refinement to ensure that all parties understand what is expected of them.


How to Discover and Continuously Assess Your Entire Attack Surface


To eliminate network blind spots and fully understand your entire attack surface, it's essential to determine which discovery and assessment tools are required for each asset type.

IoT 52

What is Vulnerability Assessment and Penetration Testing (VAPT)?

Daffodil Software

Technology is spreading its wings to provide a profusion of opportunities. We have millions of smart, interconnected devices and complex systems that are enabling us to do much more than human potentiality. But the hard fact is, these systems are not foolproof and highly vulnerable to cyber-attacks.

How to Prepare and Start DevOps Transformation


DevOps is no longer a little-known methodology used by some companies. It is gaining popularity globally because it helps organizations address market needs quickly and effectively, optimize resources, and deliver increased value.

Deliver Effective Online Education and Events Your Members Will Love

This guide identifies the biggest challenges for associations moving their training online and provides practical solutions so that you can hit the ground running. Download now to keep your members engaged and growing even in times of COVID-19.

Cryptomining Attacks on Kubeflow: What You Need to Know


Microsoft recently reported two widespread cryptomining attacks targeting Kubeflow, a popular cloud-native platform for machine learning (ML) workloads on Kubernetes.

Why this cybersecurity executive order is no different than the last EOs


President Biden’s recent “Executive Order on Improving the Nation’s Cybersecurity” has been hailed by many as a significant step forward in protecting the infrastructure of the United States against the serious threats that it faces. This will probably turn out to be false.

A First Glimpse of Production Constraints for Developers

Dzone - DevOps

In most organizations, developers are not allowed to access the production environment for stability, security, or regulatory reasons.