Sat.May 15, 2021 - Fri.May 21, 2021

6 Negotiation Techniques You Should Add to Your Playbook


Your negotiation strategy can make or break a deal. Learning negotiation tactics is key to becoming a more strategic negotiator. Over the years, I’ve learned some great negotiating techniques and tactics. I’d like to share them now. The Invisible Man The first is called The Invisible Man.

Five ways to Spot Fake Scrum

Fake Scrum is around us everywhere we go. It's unavoidable. Just look on the internet lookup fake Scrum right now and you're going to find all kinds of interesting articles that describe Scrum in very weird ways. There are at least five ways you can tell if you've got fake Scrum going on. .


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

NVIDIA RAPIDS in Cloudera Machine Learning


Introduction. In the previous blog post in this series, we walked through the steps for leveraging Deep Learning in your Cloudera Machine Learning (CML) projects.

Top 5 Outsourcing Web Design and Development Benefits

The Crazy Programmer

Run a startup and need a cool website or have a new project that requires web design & development? Either way, first thing you have to decide: whether to hire the specialists yourself or find a great outsource company to delegate it to them.

A Training Company’s Guide to Selecting an eLearning Platform

Training companies have an opportunity to embrace the change and create meaningful change in their organizations by moving online. Discover the advantages of a digital-first approach, using an eLearning platform.

The US Cyber Games: More Important For Humanity Than The Olympics


I love the Olympics. They are a source of hope for a future when nation’s will spend more time collaborating on how to achieve a more prosperous future where human rights and liberty is universally accepted.

Games 141

More Trending

The Blight of Soul-Crushing Useless Negative Feedback

Let's Grow Leaders

Don’t let useless negative feedback sap your team’s motivation. Negative feedback is destructive and all-too-common. There are three common problems that erode the power of these conversations. . My phone buzzed with a text message from Amena, a junior manager.

Interpolation Search Algorithm – Time Complexity, Implementation in Java

The Crazy Programmer

In this article we will have a look at an interesting Searching Algorithm: Interpolation Search. We will also look at some examples and the implementation. Along with this we look at complexity analysis of the algorithm and its advantage over other searching algorithms.

Elevate Security Launches World’s First Cybersecurity Human Attack Surface Management Platform


-Elevate Security, a leader in human attack surface management, today launched a groundbreaking new platform that addresses one of cybersecurity’s biggest unsolved problems – human error – with an intelligent, customized and automated response to employee risk across an organization.

YDS: What is the Real Cost of Context Switching for a Scrum Team?

On today’s episode of YOUR DAILY SCRUM: What is the Real Cost of Context Switching for a Scrum Team? Today's question explores the real cost of context switching for a Scrum Team. Do you know how much time and money is lost because we do not let teams focus on their work?


Insiders' Guide to Self-Service Analytics

Self-service analytics are vital for how your users interact and engage with your application. As you explore analytics solutions for your application, see why self-service analytics can prove critical to the adoption and stickiness of your application.

Unlimited versions of your site with Netlify


Remember when we used to have a production, acceptance testing, integration and development version of a site? And that we struggled to get an extra environment from IT just so our customers could test our work? Those days are over. Below I’ll show how to set up deploys for every branch. Or every commit. And […]. The post Unlimited versions of your site with Netlify appeared first on Xebia Blog. Continuous Delivery Devops Software Development Uncategorized

Object Pascal – 26 Things You Didn’t Know About

The Crazy Programmer

Nearly all software developers of a certain generation learned to program with a version of the Pascal programming language. Niklaus Wirth designed the Pascal language with the intention of encouraging good programming practices using structured programming and data structuring.

Tesla may have to hold its big hoard of Bitcoin for decades


Read David Fickling explain why EV car maker Tesla, Inc. and its CEO, Elon Musk could end up hoarding Bitcoin for more than 10 years on Live Mint : Shouldn’t the world’s biggest electric-car manufacturer know how a power grid works?


The ‘Developers Code’ Fallacy — Making Your Scrum Work #9

TL; DR: The Developers Code Fallacy — They Should Talk to Customers, Too, Though. There are plenty of failure possibilities with Scrum. Given that Scrum is a framework with a reasonable yet short “manual,” this effect should not surprise anyone.


The History of the Word "Hacker"

According to one of the best English etymological dictionaries available, the word "hacker", with the sense of evil/good and brilliant computer programmer, was born in the halls of MIT. This fact alone reminds us that culture and words begin in actual places. At that time, to hack code, or hack out code, had a negative connotation. Where did this come from? Read this eBook to learn how the word "hacker" has evolved.

HackerEarth and Lever Join Forces To Step Up The Tech Hiring Process

Hacker Earth Developers Blog

HackerEarth proudly announces the newest addition to its ever-growing list of ATS integrations – Lever! The Lever ATS is scalable, intuitive, and has a clean design.

Difference between EPROM and EEPROM

The Crazy Programmer

We all are well aware of Read-Only Memory, abbreviated as ROM, which is actually a memory chip used to store data permanently and retains it even when the system is turned off. In this article, we will take a look at the two modified versions of ROM – EPROM and EEPROM.

The Army Is Testing Arming Its Light Tactical Vehicles With Drones


The U.S. Army is experimenting with launching the Area-I small Agile-Launch Tactically Integrated Unmanned System drone, or ALTIUS, from an ultralight tactical vehicle.

Agile 101

The purpose of being Agile

While many misinterpretations and misunderstandings have spread on the “what” and “how” of Agile, it is perhaps the “why” - the purpose of being Agile - that has become most lost. The one question I always want to ask prospective clients is, “why do you want to adopt Agile?” Responses vary. “To

Agile 155

Realizing the Benefits of Automated Machine Learning

How are organizations using machine learning and artificial intelligence (AI) to derive business value? Renowned author and professor Tom Davenport explains the rise of automated machine learning, its benefits, and success stories from businesses that are already using it.

Hiring The Class Of 2021: A Guide For Recruiters

Hacker Earth Developers Blog

The last time college graduates faced an uncertain job future, it was 2008 and we were staring down at the Great Recession. This time, it’s worse. . Statistics suggest that the pandemic has left us with a worse labor market than 2008.

Spooling in Operating System

The Crazy Programmer

In this article, we will take a look at one of the most intriguing concepts which exist in our computer programming world – Spooling. The word ‘SPOOL’ is derived from the old french word ‘espule’ which means a cylindrical container used to store information or data.

Swimlane and Elastic Partner to Deliver an Extensible Framework for Security Operations Teams


Why Experiment?

People in organizations are often afraid of running experiments. I have observed that approximately 70% of people responsible and accountable for products are reluctant to validate their assumptions by experimenting. There are several reasons for this hesitancy.


Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

CodeSOD: Authentic Mistakes

The Daily WTF

John 's employer needed a small web app built, so someone in management went out and hired a contracting firm to do the work, with the understanding that once it was done, their own internal software teams would do maintenance and support.

ipconfig vs ifconfig – Difference between ipconfig and ifconfig

The Crazy Programmer

In this article, we will have a look at the two network configurations in computer networks – ipconfig and ifconfig. Before diving into the details, let us have a brief understanding of what is configuration and why is it necessary.

Valid Points: MEV on Eth 2.0: The Good, Bad and Ugly


Read Christine Kim take a deep dive into the workings of Maximal or Miner Etractable Value (MEV) in the upcoming Ethereum 2.0 on Coin Desk : The 14th MEV Roast was hosted this past Thursday, May 6, at the Scaling Ethereum Summit.

Powerful and ready to use videos to kick-start every crucial (Scrum?) event

. We spend a big part of our workday either participating in or facilitating workshops. As Scrum Masters , we facilitate the Sprint Events. We facilitate Scrum Team decisions and support collaboration within, between, and external to Scrum Teams.

Video 143

Building Evolvable Architectures

Speaker: Dr. Rebecca Parsons, CTO of ThoughtWorks

The software development ecosystem exists in a state of dynamic equilibrium, where any new tool, framework, or technique leads to disruption and the establishment of a new equilibrium. Predictability is impossible when the foundation architects plan against is constantly changing in unexpected ways. It’s no surprise many CIOs and CTOs are struggling to adapt, in part because their architecture isn’t equipped to evolve. This webinar will discuss what’s at stake if companies continue to use long term architecture plans.

What’s new in CDP Private Cloud 1.2?


CDP (Cloudera Data Platform) Private Cloud 1.2 was recently released and builds on the success of CDP Private Cloud Base (see the 7.1.6 release blog ).

Cloud 85

Stop and Wait Protocol

The Crazy Programmer

In this article, we will take a look at the Stop and Wait protocol of a computer networking system. In order to understand the mechanism of this protocol, we will first have a brief understanding of the error control mechanism.

Data 139

Our tech empowers customers to instantly fight online fraud


While companies in India continue their digital transformation journey, driven by consumer-driven innovation, Aerospike is fast becoming one of the key technology levers that they are using to accelerate this transformation.