InfoQ Homepage Agile Techniques Content on InfoQ
-
Going Through the Scrum Motions as Opposed to Being an Agile Jedi
The force awakens: is it Agile or are we just going through Scrum motions? Michael Nir speaker and Agile coach shares expert best practices; too much Scrum might lead us to the dark side of the force. Being Agile rather than doing Scrum – focus on what we want to achieve; getting the right products that our users want quickly, using fast feedback loops, and employing continuous removal of waste.
-
Unfreezing an Organization
Ahmad Fahmy provides an authentic retrospective of a large scale agile transformation at a large bank, looking at what worked, what didn't and lessons which can be applied at other organizations facing similar challenges.
-
Why Won’t They Pair?
Pair programming is one of the core techniques of eXtreme Programming and has been shown to be effective for knowledge sharing as well as code quality, but it is a practice that is often not used, even in the most agile of organizations. Linda Cook explores why that is and provides some advice on how to encourage teams to try the practice.
-
Article Series: Containers in the Real World - Stepping Off the Hype Curve
This article series explains how containers are actually being used within the enterprise. It dives into the core technology behind containers and how this is currently being used by developers, examines core challenges with deploying containers in the enterprise and the future of containerisation, and discusses the role unikernels are currently playing within leading-edge organisations.
-
Q&A with the Authors on "Requirements: The Masterclass LiveLessons-Traditional, Agile, Outsourcing"
Suzanne and James Robertson, authors of numerous publications in the requirements field, launched a video course called "Requirements: The Masterclass LiveLessons-Traditional, Agile, Outsourcing". InfoQ interviewed them on these video lessons to get further insights into some of the topics addressed.
-
Characteristics of a Great Scrum Team
This article explores 'What makes a great Scrum team?' by offering detailed descriptions of the characteristics and skills needed in the Scrum roles of Product Owner, Scrum Master and Development Team.
-
Continuous Deployment with Containers
Many of us have already experimented with Docker - for example, running one of the pre-built images from Docker Hub. However, a comprehensive build pipeline is required before deploying any containers into a production environment. This article outlines the steps you need to take for a fully automated continuous-deployment pipeline that builds microservices deployed via Docker containers.
-
State of the JavaScript Landscape: A Map for Newcomers
Modern JavaScript development is in constant motion. Build tools that were popular 12 or even six months ago are no longer en vogue. In this article, Bonnie Eisenman gives JavaScript newcomers a map to get started on their JavaScript journey. For more experienced JavaScript developers, Bonnie provides an update on where the community is at and what technologies to use for new projects.
-
Designing Delivery Book Review and Interview
Book review and interview with Jeff Sussna, author of "Designing Delivery", on cybernetics, service exchange, customer-centric brands and a new definition of quality in a service-oriented world.
-
The Way to No-Hotfix Deployment
Hot-fix redeployment is a waste of time and effort at best, and often a source of further regression, Adam discusses some ready-to-use techniques that helped he and his team reduce the frequency of hot-fix deployments to almost zero.
-
Scrum with Trello
Trello, with more than 10M users worldwide, is fast becoming a popular tool for agile teams of all flavours. In this article we look at some of the emerging good practices and patterns people are adopting when using Trello to manage their Scrum process. From basic board setup, to life without child tasks and the most useful plugins you can use to extend Trello to get the most out of it
-
Securing the Modern Software Delivery Lifecycle
Information security practice has evolved to be pretty good at granting and managing access to confidential information - by people. But automation is taking over, requiring a shift in how we think about securing our infrastructure and applications.