Analyzing all the stories in a project requires significant time. How can we estimate the size of a project without prior identification and analysis of every single user story? If you don't want to analyze all user stories in your project in order to estimate its size then Randomized Branch Sampling is an approach you can use for portfolio related decisions and quotations on prospect projects.
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services exclusively to Indian banks to address the financial sector's growing demand for secure cloud-based services.
Programmers and business people should invest time and energy to understand each other and work together to fix problems in software delivery. Nic Ferrier talks about deploying agile effectively, the need for managers or Scrum masters in agile, how focusing on architecture can improve collaboration and how technology can help us to avoid some of the organizational problems that teams experience.
The 2015 State of DevOps survey is out. Survey's co-author Gene Kim explains what are the goals for this edition, how the data is analysed and what have we learned so far from past surveys.
Matt Honeycutt introduces SpecsFor, a .NET unit and integration test framework, explaining how to set it up, how to create the first tests, and provides a few hints on advanced usage scenarios. 1
Java is defined by the Java Language Spec, but the resulting bytecode is defined by a completely separate standard. This article looks at the structure of class files and how to create them directly.
This article introduces a recent metaphor mentioned in management literature, a richer one than servant leadership: host leadership. A metaphor that is more useful for a modern agile organisation.
Developers across the globe attend coderetreats to learn from each other and refine their software design skills, but how do they work? What do people say about them? How can we make them even better? 2
This article describes the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures. 5
A mix of existing robust hardware development ideas, plus a few newly taken from Agile software are being used now by real teams, even to get around or through the challenge of doing fast iterations.
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.
The book Conscious Agility (Conscious Capitalism + Business Agility = Antifragility) describes a design-thinking approach for business to benefit from uncertainty, disorder, and the unknown.