2020

Never attribute to stupidity that which is adequately explained by opportunity cost

Erik Bernhardsson

Hanlon's razor is a classic aphorism I'm sure you have heard before: Never attribute to malice that which can be adequately explained by stupidity. I've found that neither malice nor stupidity is the most common reason when you don't understand why something is in a certain way.

Secure by Design

Henrik Warne

I really like Secure by Design. The key idea is that there is a big overlap between secure code and good software design. Code that is strict, clear and focused will be easier to reason about, and will have fewer bugs. This in turn makes it less vulnerable to attacks.

Hotels 275

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Why Testing is No Longer Sufficient for Today’s Software Delivery Pipelines

OverOps

The move to innovate at speed and scale is stressing software quality and exposing the limitations of testing. Don’t get me wrong – testing in all its forms is inseparable from the software delivery supply chain.

Branching Pattern: Mainline Integration

Martin Fowler

Developers integrate their work by pulling from mainline, merging, and - if healthy - pushing back into mainline. more…. skip-home-page

From Build to Buy: The Path to Better Analytics for Your Application

Speaker: Ardeshir Ghanbarzadeh, Senior Product Marketing Manager, Logi Analytics

Making the transition from building your analytics in-house to investing in a third-party embedded solution can be complicated.Watch this webinar with Ardeshir Ghanbarzadeh, Senior Product Marketing Manager at Logi Analytics, for tips on making the transition as smooth as possible, and getting on the right path to better analytics for your app!

Jira Kills the Sprint Backlog

Scrum.org

. If you were in my class, you probably remember the exercise, where participants list roles, artifacts and events in Scrum. There is one particular case, that started appearing about 7 years ago.

SCRUM 284

More Trending

How to make your Zoom meetings more secure

The Parallax

Zoom , the video-conferencing app darling of the stay-at-home coronavirus era, is zooming through some cybersecurity growing pains alongside explosive growth.

Tips for Better Remote Meetings

Agile Alliance

As of this week, many people who are accustomed to going to the office are working from home. I myself am mostly staying at home, avoiding face-to-face interaction with colleagues and friends, especially those over 65 or with medical issues.

The Problem with Artificial Intelligence in Security

CTOvision

Read Dr. Leila Powell take a look at the security issues associated with artificial intelligence on Dark Reading: If you believed everything you read, artificial intelligence (AI) is the savior […].

Student Registration Form in HTML with JavaScript Validation

The Crazy Programmer

In this tutorial, I will tell you how to make student registration form in html with javascript validation. Javascript is basically used to validate HTML pages in web application. Validations are basically some rules to follow when inputting values to register on-site.

Mobile 241

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

20 Machine Learning/Artificial Intelligence Influencers To Follow In 2020

Hacker Earth Developers Blog

Machine Learning (ML) is emerging as one of the hottest fields today. It has penetrated into numerous aspects of our everyday life—be it Siri or Alexa, Facebook/Instagram friend suggestions, Gmail spam filters, traffic congestion predictions, customer support chatbots, and much more.

How to hire smarter than the market: a toy model

Erik Bernhardsson

Let’s consider a toy model where you’re hiring for two things and that those are equally valuable. It’s not very important what those are, so let’s just call them “thing A” and “thing B” for now.

Artificial Intelligence – A Guide for Thinking Humans

Henrik Warne

I really enjoyed reading Artificial Intelligence – A Guide for Thinking Humans by Melanie Mitchell. The author is a professor of computer science and an artificial intelligence (AI) researcher.

Debugging Distributed Systems: 3 Common Distributed Tracing Challenges & How to Overcome Them

OverOps

Below we outline common approaches to distributed tracing, the challenges these methods pose and how OverOps can help deliver greater insights when troubleshooting across microservices.

System 172

How to Choose the Best Embedded Analytics Solution to Modernize Your Application

If you are looking to modernize your application to improve competitiveness, then one of the quickest wins you can have is to embed sophisticated analytics that will wow your existing and prospective customers.

Branching Pattern: Mainline

Martin Fowler

The second branching pattern in my article is Mainline: a single, shared, branch that acts as the current state of the product. more…. skip-home-page

248
248

Alternative Scrum Framework Poster

Scrum.org

We have redesigned our Scrum Framework poster and have made some changes. . . . Here is an explanation of the elements we have presented differently compared to the Scrum.org poster [1] and the reasons why: . Scrum Events . The Sprint .

SCRUM 285

Top Trend of Microsoft Dynamic CRM in 2020

OTS Solutions

Here Are Top Seven Trends Of Microsoft Dynamic CRM In 2020. Arguably the most significant tool that a business can use is a customer relationship management tool. Also known as a microsoft dynamic CRM tool.

Trends 163

How to protect your Ring from hackers (and Amazon partners)

The Parallax

The Ring doorbell spent much of 2019 getting buzzed by perceived security and privacy issues, from secret agreements with law enforcement agencies to cybersecurity practices that put its users at risk.

How To 205

Why Smoking Costs Employers More Than They Realize

Your employees are smoking, and at a cost of $7,000 per year for each employee who smokes, that adds up - fast! This free report will show you how an effective cessation program pays for itself.

What the Octopus Teaches Us About Agile Organizational Design

Agile Alliance

This entry was written as part of the Supporting Agile Adoption program, an Agile Alliance initiative dedicated to supporting organizations and their people become more Agile. There are some questions in life that simply do not have good answers. “Why do we dream?”,

Agile 278

5 artificial intelligence (AI) types, defined

CTOvision

Read Stephanie Overby define five types of artificial intelligence on Enterprisers Project : Artificial intelligence (AI) is redefining the enterprise’s notions about extracting insight from data. Indeed, the vast majority […].

Why Are There So Few Women in Computer Science?

The Crazy Programmer

It is widely accepted that women play a key role in our lives. Women are mothers and the modern female entrepreneur is ubiquitous, however women have made vast contributions to the IT field and yet are still underrepresented.

3D 207

20 Machine Learning/Artificial Intelligence Influencers To Follow In 2020

Hacker Earth Developers Blog

Machine Learning (ML) is emerging as one of the hottest fields today. It has penetrated into numerous aspects of our everyday life—be it Siri or Alexa, Facebook/Instagram friend suggestions, Gmail spam filters, traffic congestion predictions, customer support chatbots, and much more.

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

How to set compensation using commonsense principles

Erik Bernhardsson

Compensation has always been one of the most confusing parts of management to me. Getting it right is obviously extremely important.

How To 239

20.5 Years of XP and Agile

Henrik Warne

In the fall of 1999 I got the biggest productivity boost of my entire career as a software developer.

Agile 168

Continuous Reliability: Handling ‘Known Unknowns’ and ‘Unknown Unknowns’

OverOps

Know your unknowns with the help of continuous reliability. Let’s rewind to the year 2002 (this should give you an idea of how long I have been working in software development). Mr Donald Rumsfeld, then United States Secretary of Defense, had this to say in response to a question: .

Patterns for Managing Source Code Branches

Martin Fowler

In my conversations with software developers, a regular topic of controversy is how manage source code branching. Tools like git make it easy to create branches, but managing them to improve coordination and minimize the costs of integration unearths plenty of difficulties.

5 Signs It's Time to Replace Your Homegrown Analytics

If you built your analytics in house, chances are your basic features are no longer enough for your end users. Is it time to move on to a more robust analytics solution with more advanced capabilities? Follow this free guide for tips on making the build to buy transition.