This article provides an overview of tools and libraries available for embedded data analytics and statistics, both stand-alone software packages and programming languages with statistical capabilities. The authors also discuss how to combine and integrate these embedded analytics technologies to handle big data.
This third and last article in the series on the Kanban “nine values, three agendas” model explores the survivability agenda. The values associated with this agenda are understanding, agreement, and respect; these say much about the philosophy that underlies Kanban, the humane, start with what you do now approach to change.
Philipp K. Janert explains how to reliably auto-scale systems using a reactive approach based on feedback control which provides a more accurate solution than deterministic or rule-based ones.
The Lean Mindset by Mary and Tom Poppendieck is a collection of research results and case studies from companies applying lean in product development and delivery.
The second edition of Stephen Nelson-Smith's book "Test-Driven Infrastructure with Chef" describes a testing workflow and tools for writing fully tested infrastructure code
In this article we present some of the most common performance analysis antipatterns in the enterprise platform, expressed in terms of their basic causes along with remediation strategies.
Technical Debt only describes the current quality of a system – and gives no advice how to handle it. This article introduces “Quality Investments” that guide improvements to the code base. 4
Do you find it hard to say no when others ask you for help - even when you are already too busy? In this article, we examine the problem of chronic overcommitment, what causes it and some solutions. 1
With the news stories of possible data breaches at enterprises like Target, and companies migrating to cloud environments, CIOs have been asking hard questions about cloud security. 2
In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to process data for security analysis.
A story of an enterprise-wide Kanban implementation, with step-by-step information on how to run Kanban kick-starts and assessments to install a culture of continuous improvements in the enterprise.