In The Great ScrumMaster Zuzana Šochová explores the ScrumMaster role and provides solutions for dealing with everyday and difficult situations. She describes the #ScrumMasterWay, a concept which defines three levels of operation of ScrumMasters.
Using machine learning to solve real-world problems often presents challenges that weren't initially considered during the development of the machine learning method. This article addresses a few examples of such issues and hopefully provides some suggestions (and inspiration) for how to overcome the challenges using straightforward analyses on the data you already have.
At the Agile 2016 conference, Dominica DeGrandis and Julia Wester of Leankit gave talks on helping middle managers adapt to change and how Kanban can be used to identify problems in workflows, which people need to address.
Yang Bo showcases reasons why React stumbles when used in complicated front-end projects and how his Binding.scala framework improves the experience. 7
In this article, we present an extended “case study” in Python: how can we build a machine learning model to detect credit card fraud?
Crypto-currency remains controversial, and Bitcoin is at the center of this controversy. Here is an update on the state of Bitcoin in particular, and examines the future of crypto-currency in general. 1
Use Akka and Java 8 to create distributed Actor based microservices that can elastically scale to support huge volumes of data.
Differential privacy leapt from research papers to tech news headlines last year when, in the WWDC keynote, Apple VP of Engineering Craig Federighi announced Apple’s use of the concept in iOS.
The book Soul-Centered Leadership provides ideas and exercises for developing skills to lead people while being in touch with your soul, based on emotional intelligence, psychology, and spirituality.
A lot happened in the last year in the .NET ecosystem: cross-platform, cloud, mobile, web apps and universal apps. Developers wonder where all this is going and what will be required to get there. 2
Because code analysis alone is insufficient to prevent attacks in today's typical large-scale deployment, certain mitigations should be done throughout the entire software life cycle.
This article gives a description of what Being Digital is and how it can be achieved. Digital is about putting less emphasis on tech for success and more on your customers. 4