Sat.May 08, 2021 - Fri.May 14, 2021

Four Scrum Master Success Principles

Contrary to popular belief, the Scrum Master success principles are tangible, when we guide the analysis with an outside perspective.


Data Lake vs Data Warehouse

The Crazy Programmer

Companies everywhere are handling more data than ever and all these terabytes of data need to be stored somewhere. Should you store the data in a database, a data warehouse, or a data lake? How do you know what is best for your company?

Data 148

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

An Identity Crisis Averted

Agile Alliance


The Intersection of Change Management and Design Thinking

Change Starts Here

I’ve recently partnered with DesignThinkers Group, USA to explore how the disciplines of Design Thinking and Change Management can expand the impact of both. This Venn diagram highlights some of the similarities and differences between Design Thinking and Change Management.

A Training Company’s Guide to Selecting an eLearning Platform

Training companies have an opportunity to embrace the change and create meaningful change in their organizations by moving online. Discover the advantages of a digital-first approach, using an eLearning platform.

YDS: When Does UAT Happen in Scrum?

On today’s episode of YOUR DAILY SCRUM: When does UAT happen in Scrum? Today's question is all about User Acceptance Testing (UAT). UAT is an anti-pattern in Scrum. There.we said it. It's just a bad idea. You're creating a phase gate that makes your agile practices look a lot like a waterfall.


More Trending

Agile2021: Better Together

Agile Alliance

In this podcast, Howard Sublett and I chat about how Agile Alliance and Scrum Alliance are working together this year to create a one-of-a-kind experience for the Agile community.

Agile 176

Using Attack, Detect and Respond Tools To Mature Cybersecurity


Security can be enhanced and major risks mitigated by realistic threat emulation. This is needed now more than ever. Professionals in the security community except it as a given that we should all raise defenses, but prepare for breach.

Tools 116

Winning Office Politics – 3 tips that Scrum Masters can use

The term Office politics is taboo for many professionals, as it is pervasive at any workplace. To put it simply, workplace politics centres on differences within employees at the workplace, differences in views and opinions, conflicts on various interests and perspectives, etc.


C++ Global Variable with Examples

The Crazy Programmer

Global variables are described at the top of a program, outside of all functions. The value of a global variable remains constant throughout the execution of the program. Every function that is declared in the program, can access the global variable. include<iostream> using namespace std; //global variable. int a = 5; void display() { cout<<a<<endl; }. int main() { display(); a = 10; display(); return 0; }. Output: 5 10.

Insiders' Guide to Self-Service Analytics

Self-service analytics are vital for how your users interact and engage with your application. As you explore analytics solutions for your application, see why self-service analytics can prove critical to the adoption and stickiness of your application.

Why Digital Accessibility Matters for Nonprofits


What is digital accessibility and why is it important to nonprofit organizations and their communities? This post will explore the importance of accessibility in web and other digital communications as it relates to a nonprofit's ability to serve beneficiaries and to communicate with donors.

Dogecoin to Mars? Palantir Co-Founder Joe Lonsdale Thinks So


There’s a good chance Dogecoin (CRYPTO: DOGE) is going to be around for a while, Palantir Technologies Inc (NYSE:PLTR) co-founder Joe Lonsdale said Thursday on CNBC’s “Squawk Box.”

[VLOG] Product Owner Is An Accountability In Scrum. Not A Job Title

Hey hey hey. How was your week awesome people? I hope you had an awesome week and currently enjoying your weekend.


How to Print Hexadecimal in C

The Crazy Programmer

In this article, we will see how can we print a number in hexadecimal format using C language, but before that, we will take a look at what this format is all about. In C language, a value in hexadecimal format is represented by a combination of 16 symbols, out of which 10 symbols are the standard numerical values ranging from 0 to 9 and the rest six are uppercase characters from ‘A’ to ‘F’.

How To 113

The History of the Word "Hacker"

According to one of the best English etymological dictionaries available, the word "hacker", with the sense of evil/good and brilliant computer programmer, was born in the halls of MIT. This fact alone reminds us that culture and words begin in actual places. At that time, to hack code, or hack out code, had a negative connotation. Where did this come from? Read this eBook to learn how the word "hacker" has evolved.

(Part 2) Essential Questions To Ask When Interviewing Developers In 2021

Hacker Earth Developers Blog

The first part of this blog stresses the importance of asking the right technical interview questions to assess a candidate’s coding skills. But that alone is not enough. If you want to hire the crème de la crème of the developer talent out there, you have to look for a well-rounded candidate. .

Hack the Capitol: Doing more for infrastructure security than any other activity out there


Hack the Capitol is the yearly stand-alone event from ICS Village, a touring industrial security education group most often seen bringing hands-on control systems demonstrations to security conferences. The annual event returns on Tuesday for a virtual presentation, including keynotes from Reps.

Gold-Plating Beyond Done — Making Your Scrum Work #7

TL; DR: Gold-Plating Beyond Done. There are plenty of failure possibilities with Scrum. Given that Scrum is a framework with a reasonable yet short “manual,” this effect should not surprise anyone.


fgets() vs scanf() in C

The Crazy Programmer

In this article, we will take a look at two of the most basic functions used in the C language and subsequently, we will compare them on the basis of their usage. Both fgets and scanf functions are used to take basic user inputs in the program. The major difference between these two functions is that the scanf function takes the input of any data type (int, float, char, double, etc.) but falls behind while taking string inputs.

Realizing the Benefits of Automated Machine Learning

How are organizations using machine learning and artificial intelligence (AI) to derive business value? Renowned author and professor Tom Davenport explains the rise of automated machine learning, its benefits, and success stories from businesses that are already using it.

Elon Musk and SNL: Scammers Steal Over $10 Million in Fake Bitcoin, Ethereum and Dogecoin Crypto Giveaways


In the run up to Elon Musk hosting NBC’s Saturday Night Live and the potential mention of Dogecoin on the show, scammers quickly capitalized on his appearance by promoting fake giveaways on Twitter and YouTube. Background. On May 8, Elon Musk hosted NBC’s Saturday Night Live.

Video 96

Zero Trust Software: Polymorphing for Linux White Paper 2021


The goal of zero trust designs is to stop attacks before they occur. Here is a favored approach by a team of experienced professionals we know and trust, LP3. Behind every major hack—OPM, Equifax, BlueCross, WannaCry, Target, Home Depot, Sony, WhatsApp, you name it—is a bug the hackers exploited.

Linux 96

Returning organization back to the present

We’ll go walking out. While others shout. Of war disaster. Oh, we won’t give in. Let’s go living in the past. Jethro Tull – Living in the Past. Does an organization live in the present or in the past? This question was prompted by Samo Burja’s tweet.

Automating CDP Private Cloud Installations with Ansible


The introduction of CDP Public Cloud has dramatically reduced the time in which you can be up and running with Cloudera’s latest technologies, be it with containerised Data Warehouse , Machine Learning , Operational Database or Data Engineering experiences or the multi-purpose VM-based Data Hub style of deployment.

Cloud 96

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Essential Questions To Ask When Recruiting Developers In 2021 – Part 1

Hacker Earth Developers Blog

The minute a developer position opens up, recruiters feel a familiar twinge of fear run down their spines. They recall their previous interview experiences, and how there seems to be a blog post a month that goes viral about bad developer interviews.

Can IBM Chairman and CEO Arvind Krishna make the elephant dance again


Critics of IBM say the American tech icon went the hybrid cloud way because it lost the fight to become a public cloud hyper-scaler to Amazon Web Services and Microsoft. Hybrid clouds are a combination of privately-owned computer servers and networks and machines and services rented off the internet.

Cloud 96

Dangerous Assumptions About Your Customers ??

Your team most likely is making a lot of assumptions. In a complex world, they have to. Whatever we do, we first have to make some assumptions. But there are two key things to take into account: Are you gathering the information from your actual (or future) customers to help you make assumptions?


5 Factors to Consider When Choosing a Stream Processing Engine


Are you using the right stream processing engine for the job at hand? You might think you are—and you very well might be!—but but have you really examined the stream processing engines out there in a side-by-side comparison to make sure?

Building Evolvable Architectures

Speaker: Dr. Rebecca Parsons, CTO of ThoughtWorks

The software development ecosystem exists in a state of dynamic equilibrium, where any new tool, framework, or technique leads to disruption and the establishment of a new equilibrium. Predictability is impossible when the foundation architects plan against is constantly changing in unexpected ways. It’s no surprise many CIOs and CTOs are struggling to adapt, in part because their architecture isn’t equipped to evolve. This webinar will discuss what’s at stake if companies continue to use long term architecture plans.


O'Reilly Media - Ideas

Back in 2019, Ben Lorica and I wrote about deepfakes. Ben and I argued (in agreement with The Grugq and others in the infosec community) that the real danger wasn’t “Deep Fakes.”

Sport 86

Decentralized trading platform integrates Chainlink to deliver real-time prices on Polygon


A DeFi platform says its decentralized approach to leveraged trading offers crucial advantages over centralized rivals.

Cómo obtener tu primer trabajo de Scrum Master o Agile Coach

Últimamente, el alcance del líder del cambio, ya te consideres Scrum Master o Agile Coach ha tocado las alturas, y todas las demás personas quieren poner sus manos en esto. Este artículo te va a ayudar a obtener tu primer trabajo de Scrum Master. Tu primer trabajo de Scrum Master.