Sat.Feb 22, 2020 - Fri.Feb 28, 2020

4 hybrid cloud obstacles to overcome this year

TechBeacon

With both multicloud and hybrid cloud infrastructure approaches on the rise, many businesses—particularly those handling sensitive information, such as those in healthcare and finance—are pulling back from fully public cloud-borne operations in favor of a hybrid cloud approach.

Product Backlog - Visible or Raises Transparency?

Scrum.org

When we talk about Scrum for complex Product Development, it starts from Vision and Product Backlog. What is the Product Backlog in Scrum? As per the Scrum Guide — “ The Product Backlog is an ordered list of everything that is known to be needed in the product.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Why Data Science is Repairing IT’s Relationship with the Business

Dataiku

This blog post is part of a series of guest publications by Excelion Partners. It’s been growing for years. The rift just keeps getting bigger. There is plenty of blame to go around. Failed projects. Poor requirements. Scope creep. Software product marketing overpromising.

Coping with Covid-19

Martin Fowler

The Covid-19 outbreak is getting more serious. With offices in China, we've already been affected and have taken various measures across our global business. Here's what we've learned so far about what we need to do to handle this crisis.

165
165

Why Smoking Costs Employers More Than They Realize

Your employees are smoking, and at a cost of $7,000 per year for each employee who smokes, that adds up - fast! This free report will show you how an effective cessation program pays for itself.

Harnessing Big Data: Can Our Laws and Policies Keep Up?

CTOvision

Read Tim Molino explain how we can achieve big data revolution if our policies and laws are in order on Information Week : We are just at the beginning of the big data revolution. What was merely a prediction a few years ago is happening today.

More Trending

Reflections of an Undercover Scrum Master

Agile Alliance

Our latest conversation is with Dane Weber. Dane took a two-year break from his job as a Scrum Master to join a development team. His perspectives as both a developer and Scrum Master are insightful.

SCRUM 225

Why Are There So Few Women in Computer Science?

The Crazy Programmer

It is widely accepted that women play a key role in our lives. Women are mothers and the modern female entrepreneur is ubiquitous, however women have made vast contributions to the IT field and yet are still underrepresented.

3D 207

A brief history of artificial intelligence

CTOvision

Read why Steven Nunez says despite huge advances in machine learning models, AI challenges remain much the same today as 60 years ago on InfoWorld : In the early days of artificial intelligence, computer scientists attempted to recreate aspects of the human mind in the computer.

Never serve raw chicken!

Scrum.org

Never serve raw chicken. The Story. A businesswoman enters a restaurant called Amazing Burgers. Amazing Burgers is renowned for its fresh and juicy burgers. It’s a small and popular place where the owner still serves his customers himself.

SCRUM 282

Building Healthy Innovation Ecosystems for Your Projects

Speaker: Nick Noreña, Innovation Coach and Advisor, Kromatic

In this webinar, Nick Noreña will walk through an Innovation Ecosystem Model that he and his team at Kromatic have developed to help investors, heads of product, teachers, and executives understand how they can best support innovation in their own ecosystem. He'll also go over metrics we can use to measure the health of our ecosystems as we build more resources for innovators.

Kr00k Wi-Fi flaw exposes a billion devices to hackers

The Parallax

SAN FRANCISCO—Encryption is great for protecting data in transit, unless that data is encrypted in all zeroes. Unfortunately, that’s exactly what a newly revealed Wi-Fi chip vulnerability does, according to ESET researchers, who disclosed the flaw yesterday at the RSA Conference here.

Predicting How People Will Cope With Change

Change Starts Here

An organization that had undergone years of tremendous growth realized that they had outgrown their purchasing spending rules. Too many people had authority to spend large amounts without approval or coordination.

Healthcare industry at greatest risk of data breach

CTOvision

The healthcare industry has significantly more exposed attack surfaces than any other industry surveyed, according to Censys’s research findings of cloud risks and cloud maturity by industry, revealed at RSA Conference 2020.

My team have nothing to say in our Retrospective!

Scrum.org

One the questions I get asked during almost every Scrum Master training course is "How do I get the team to engage in the Sprint Retrospectives?". Quite often the feeling within Scrum Teams is that once nothing is broken and the team is meeting their forecasts, there's "nothing to talk about".

SCRUM 261

Build vs Buy: 10 Hidden Costs of Building Analytics with UI Components

Many teams, as a logical first step, choose to build their own analytics with the help of UI components. But eventually you’ll find that doing it yourself and at scale has hidden costs. Consider these 10 factors when deciding whether you should build analytics features with UI components.

Don’t Do Agile and DevOps by the Book

DevOps.com

In software development, we talk a lot about the importance of Agile and DevOps. Agile aims for rapid releases, positively encourages involvement from customers and other stakeholders and splits work into smaller iterations, releasing as soon as possible.

Agile 114

Coronavirus Versus Artificial Intelligence

DataRobot

The Coronavirus has infected nearly 80,000 people worldwide, resulting in some 2,500 fatalities. As this deadly contagion continues spreading from its origins in Wuhan, China, policymakers worldwide are scrambling to figure out how to contain it. AI Across Industries

The Security Yearbook by Richard Stiennon

CTOvision

I am so excited to now have an autographed copy of The Security Yearbook by Richard Stiennon. Richard is a prolific writer, a fantastic speaker, and is known the world over as perhaps the most savvy of all analysts in the cybersecurity field.

119
119

My Team has Nothing to Say in our Retrospective!

Scrum.org

One the questions I get asked during almost every Scrum Master training course is "How do I get the team to engage in the Sprint Retrospectives?". Quite often the feeling within Scrum Teams is that once nothing is broken and the team is meeting their forecasts, there's "nothing to talk about".

SCRUM 250

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

How 5G Mobile Networks Will Change IoT Security

DevOps.com

Depending on your location, you might have noticed a new 5G icon on your cell phone recently. The roll-out of the new 5G mobile network is largely a positive change for consumers and businesses.

IoT 109

The Fastest Path to Hybrid Cloud

Dell EMC

We introduced Dell Technologies Cloud at our flagship company event nearly a year ago.

Cloud 105

One in Three SMBs Rely on Free Cybersecurity Tools or Nothing

CTOvision

One in three small businesses with 50 or fewer employees rely on free or consumer-grade cybersecurity tools stated a research commissioned and published by BullGuard. The research also pointed out that one in five companies do not use any endpoint security whatsoever.

Development Team – why your Scrum doesn’t work (2/3)

Scrum.org

Originally posted on www.debooij.training. Many teams and organizations struggle to get the most out of Scrum. In a previous post “Don’t blame “agile” for existing problems” I shared my analysis why agile or Scrum itself often gets the blame.

SCRUM 246

BI Buyers Guide: Embedding Analytics in Your Software

The business intelligence market has exploded. And as the number of vendors grows, it gets harder to make sense of it all. Learn how to decide what features you need and get an evaluation framework for every technical and non-technical requirement you could imagine.

Ten Years Later — What Is Cloud Native?

DevOps.com

Ever since the term cloud native made its debut in 2010, its usage has grown in popularity. Today cloud native is used as a qualifier for innovative, leading edge applications, platforms and systems or cloud-savvy organizations and processes. However, what is cloud native exactly?

Cloud 108

Distributed Teams: How To Mitigate A Significant Business Risk Of The Coronavirus

scruminc

Distributed Teams: How To Mitigate A Significant Business Risk Of The Coronavirus. by JJ Sutherland | Feb 28, 2020 | Blog | 0 comments. NOTE: Register for our FREE webinar on Scrum and Distributed Teams hosted by Jeff Sutherland and JJ Sutherland on March 12, 12 noon EDT. Registration below).

SCRUM 104

The Top Ten Worst Vulnerabilities

CTOvision

Read Dan Raywood list top ten worst vulnerabilities on Infosec Magazine : Vulnerabilities proved to be one of the main security trends of 2019.

Trends 110

Do I Need Domain Knowledge to be an Amazing Scrum Master?

Scrum.org

Responsive Advisors CEO, Robb Pieper discusses the pros and cons of having technical or business knowledge - domain knowledge as a Scrum Master in this short video blog. A must watch for anyone interested in beginning a career as a Scrum Master

SCRUM 230

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.