In cities all over the world, groups of software developers have been getting together at weekends repeatedly trying to write code for a given problem, but never completing a solution. At coderetreats, developers learn from each other and refine their software design skills. In this article David examines how they work? What do people say about them? How to make them even better?
Microservice architectures and container-based virtualization have taken the software development community by storm in recent months. This article will describe the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures.
“You can’t do 2-week iterations with hardware!” This is the first thing you’ll hear when talk turns to Agile methods in hardware-software product development. A mix of existing robust hardware development ideas, plus a few newly taken from Agile software are being used now by real teams, even to get around - or through - the challenge of doing fast iterations.
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.
The book Conscious Agility (Conscious Capitalism + Business Agility = Antifragility) describes a design-thinking approach for business to benefit from uncertainty, disorder, and the unknown.
Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it.
The book "Agile! The Good, the Hype and the Ugly" provides a review of agile principles, techniques and tools. It explores the agile methods Extreme Programming, Lean Software, Scrum and Crystal. 4
In this article, authors discuss the software engineering practices in startup companies and provide empirical software engineering sources related to their engineering practices. 1
A Technical Leader should demonstrate capability in three main areas which are often overlooked:Team Support, Technical Excellence, and Innovation. Read more about these capabilities in this article. 2
The book Unblock! A Guide to the New Continuous Agile by Andy Singleton provides ideas and practices for doing distributed cloud-based development with continuous delivery.
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.