Sat.Sep 04, 2021 - Fri.Sep 10, 2021

4 Ways to Simplify Cloud Performance Monitoring

Over the past 18 months, technologists across the globe have played a crucial role in the survival of brands and organizations via digital strategies.

Diving Into Digital Transformation With Deloitte Consulting’s Managing Director of Applied AI


As the competitor and consumer spaces shift to adapt to emerging innovations, companies have developed a thirst for machine learning (ML) investment, hoping to apply ML as a prime AI enabler.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to assess your Scrum team - my personal tools.

Every Scrum team is different. Even when two teams seem to have similar challenges, similar products, and similar environment, they would not be actually the same. So your approach will change depending on the situation.

Tools 127

Ship / Show / Ask: A modern branching strategy

Martin Fowler

I've written a fair bit about how using pull requests can encourage a low integration frequency, reducing cycle time and discouraging refactoring.

Build Your Open Data Lakehouse on Apache Iceberg

Speaker: Veena Vasudevan and Jason Hughes

In this webinar, Dremio and AWS will discuss the most common challenges in data architecture and how to overcome them with an open data lakehouse architecture on AWS. Sign up now!

Difference between Entity and Attribute

The Crazy Programmer

In this article, we will have a look at the difference between Entity and Attribute, which form the core principles of the Entity-Relationship Model in Database Management System. We will look at the description of each in detail with examples and compare them for a clear idea. Entity.

More Trending

Three Security Highlights For Terraform on AWS


So, you want to build your infrastructure in AWS and use Terraform for your Infrastructure as Code? And you want to do it securely?

AWS 130

4 Ways to Effectively Reteam your Scrum Teams in Scaled Scrum

The more successful a product becomes, the bigger it gets. . If more customers use the product, more features are requested, more support is needed, and new market opportunities open up. To meet growing demands, additional team members are being added.


Muhstik Takes Aim at Confluence CVE 2021-26084


Key Takeaways In line with USCYBERCOM’s warning, publicly available Confluence exploit scripts are being integrated into opportunistic attackers’ toolkits.

IoT 114

From Collaboration to Solitude and Back: Experiences with Remote Pair Programming during COVID-19

Agile Alliance

Along with the increasing popularity of agile software development, software work has become much more social than ever. Contemporary software teams rely on a variety of collaborative practices, such as pair programming, the topic of our study.

Agile 194

7 Winning Lead Generation Strategies to Drive Growth

As B2B companies pivot to keep pace with a quickly changing marketplace, a data-centric approach to lead generation can be the difference between remaining competitive or being left behind. Get real-world examples and inspiration from leading B2B businesses in this whitepaper.

Three Security Highlights For Terraform on AWS


So, you want to build your infrastructure in AWS and use Terraform for your Infrastructure as Code? And you want to do it securely?

AWS 130

3 Pillars of Autonomous IT Ops

Imagine a future where human IT operators and intelligent systems work together in a virtual operations room; the systems do the heavy lifting while the humans supervise. This may seem like science fiction, but the truth is we are already on the way to that future with AIOps.

C++ Append Vector to Vector

The Crazy Programmer

In this tutorial, we will discuss various methods to append vector to vector in C++. Using insert Function. We use the insert() function to add multiple elements in a vector. It is a built-in function. There are 3 arguments that need to be passed in the insert function the first argument determines where another vector is going to be added, the second argument determines the starting of another vector and the third argument determines the ending of the vector.


Broken promises – how to keep your word and your sanity too

Agile Alliance

How often in your working life do you or your team break your promises? Javascript promises are about committing to a particular action. But asynchronicity demands that they make no assertion about WHEN the promise will be fulfilled.

Agile 167

Omnichannel is Multichannel 2.0

Multichannel and omnichannel marketing are not the same. Many organizations are striving for omnichannel, but it can be a daunting journey—unless you have a map. Download your copy of the ultimate omnichannel guide today!

Article: Technical Debt Isn't Technical: What Companies Can Do to Reduce Technical Debt

InfoQ Articles

3 Building Blocks for Enterprise Digital Transformation

DevOps has gone from a new idea to a buzzword in every boardroom over the last decade.

PYSA Ransomware Gang adds Linux Support


Key Take Aways The first Linux version of ChaChi, a Golang based DNS tunneling backdoor, was recently observed on VirusTotal. The malware is configured to use domains associated with ransomware actors known as PYSA, aka Menipoza Ransomware Gang.

Linux 107

Inspection and the Product Backlog - Back to the foundations of the Scrum framework (17)

Scrum is founded on empirical process control, and inspection is one of the three pillars. Each of the Scrum Artifacts is inspected in one or more Scrum Events to detect undesired variances.


Data Value Scorecard Report

This report examines the quantitative research of data leaders on data value and return on investment.

How to Talk to the Board About Zero Trust


Framing zero trust as a cybersecurity strategy for reducing business risk is a surefire way to get your executive leadership to take notice.

The Next Phase of Pandemic Tech Transformation

Last spring, we were inundated with headlines, tweets and Medium posts applauding the rapid digital transformation that businesses were going through—almost overnight—due to the pandemic and the shift to remote work.

How a Psychologically Safe Working Environment Can Help Your Organization to See More Innovation and Growth

Agile Alliance

This talk covers the following topics: 1) What, why and how and OKR - Psychological Safety check for Agile teams helped our organization 2) Quick tips and best practices to improve the Safety net for your agile organization MEMBER? PLEASE LOG IN. To view the content on this page, you must be a Member of … Continued. The post How a Psychologically Safe Working Environment Can Help Your Organization to See More Innovation and Growth first appeared on Agile Alliance. Mindset People member

Agile 141

The 2 Best Product Owners I Ever Worked With – The Proxy Product Owner

A few years back I wrote 2 popular posts that talked about the best Scrum Masters I ever worked with. This time around I am going to share some stories about the best Product Owners I have encountered. The first Product Owner (Matthew) was successful because he was empowered.


Put Your Data to Work: The Complete Playbook

Turn your data into a competitive advantage. This playbook contains: Exclusive stats, research & insights on how the pandemic affected businesses. A comprehensive “Request For Proposal” (RFP) checklist and an interactive quiz to test your data knowledge.

Luck Is Not a Strategy: The Process of Effectively Securing Grants


I started writing grant proposals when I was in my 20s, working as a fundraiser for a small but dynamic grassroots environmental organization in Alaska.

Looking to the Future: What’s in Store for DevOps World 2021

Here in the U.S., when our calendars turn to September we know that some exciting things are about to happen. Trees change up their wardrobe. Pumpkin spice lattes warm the fingers and hearts of the masses. And the world’s premier DevOps conference opens its doors to thousands of enthusiasts.

How to Build a Better Network of Peer Relationships

Let's Grow Leaders

Don’t Overlook The Importance of Peers in Your Network of Strategic Advisors. When it comes to building a network of strategic advisors, it’s natural to look to people with more position power, access, and influence as your primary go-to’s.

We are hired to give our clients solutions that work. Aren’t we?

Make yourself look good and you'll have a job and an army of ill-wishers; highlight and exploit your client’s brilliance and you’ll have a job and an army of fans. Quoting myself. We are hired to give our clients solutions that work, not to ask endless questions!

TCO Considerations of Using a Cloud Data Warehouse for BI and Analytics

Enterprises poured $73 billion into data management software in 2020 – but are seeing very little return on their data investments. 22% of data leaders surveyed have fully realized ROI in the past two years, with 56% having no consistent way of measuring it.

So You've Built a Fair Model, Now What?


As practitioners of data science, we look at the inputs and outputs of an AI system regularly in order to understand how and why a given decision is made.

Do’s and Don’ts of Phased Rollouts Software Delivery

When it comes to app stability and user experience, the “move fast and break things” approach is a recipe for disaster.

CVE-2021-26084: Atlassian Confluence OGNL Injection Vulnerability Exploited in the Wild


Recently disclosed critical flaw in Atlassian Confluence Server is being exploited in the wild by attackers. Organizations should apply patches immediately. Background.