Articles

Please enter an article title, author, or keyword
7 Strategies to Build High-Performing Teams

As leaders, we need to consider the structure of the team and the alignment and purpose of the work the team does. This is to ensure that we have clarity on the value the team creates. In my opinion, a high-performing team flourishes in an environment where they know exactly how they contribute to the organization's purpose.

Venkat Edagottu's picture Venkat Edagottu
A Data Center Agile Data Modeling with MySQL Document Store

Agile data modeling involves a collaborative, iterative, and incremental approach to data modeling. In this article, we discuss how MySQL Document Store could be used for agile data modeling.

Deepak Vohra's picture Deepak Vohra
Agile Leadership: Your Key to Business Success Agile Leadership: Your Key to Business Success

In the article, we will discuss why Agile transformation cannot solely be effective without a truly Agile Leader in the organization. We will cover what essentially is meant by Agile leadership and why there is so much talk about it. Finally, we will figure out how to embrace the Agile leader role and what effective tips and practices can help on this path.

Andrew Romanukha's picture Andrew Romanukha
Is Iterative Development Still Relevant? Is Iterative Development Still Relevant?

Iterative development is a forerunner of Agile and can be seen as a hybrid retaining some aspects of Waterfall. This article looks at whether it is still of value to project delivery and in what circumstances it could be useful.

Adrian Baker's picture Adrian Baker
What Makes Containerization Agile What Makes Containerization Agile

While a few other types of containers are available, Docker is the de facto standard for containerization. Containerization involves running multiple applications in containers on a Docker Engine that runs on an underlying operating system. The principles of Agile software emphasize simplicity, interactions among individuals, working software, customer collaboration, and responsiveness to change. Docker containers make all of these feasible.

Deepak Vohra's picture Deepak Vohra
5 Tips to Create a Secure CI/CD Pipeline 5 Tips to Create a Secure CI/CD Pipeline

The purpose of CI/CD security goes beyond identifying and remediating vulnerabilities—it also emphasizes keeping pace with other CI/CD processes. A secure CI/CD pipeline allows teams to find and fix issues without disrupting the overall CI/CD flow, achieving security without delaying or rolling back software releases.

Gilad David Maayan's picture Gilad David Maayan
Using the New Pattern Matching Feature in Java 16 Using the New Pattern Matching Feature in Java 16

A new language feature in Java 16, called Pattern Matching for instanceof, uses a type pattern instead of just a type for the instanceof operator. The benefit of this feature is that you can avoid unnecessary code that usually has to be used for casting the target object to the type and declaring a new variable for the resulting object.

Deepak Vohra's picture Deepak Vohra
New Java 18 Feature–Default Charset UTF-8 New Java 18 Feature–Default Charset UTF-8

This article discusses the new Java 18 feature of making the default charset as UTF-8, which makes software development more agile as it makes software more portable across different systems.

Deepak Vohra's picture Deepak Vohra
Top 7 Software Development Trends for 2022 Top 7 Software Development Trends for 2022

For software companies and developers, keeping up with the trends means offering state-of-the-art software products and establishing themselves as innovation leaders. Enterprises and businesses will, on the other hand, have to decide between purchasing an existing software solution or cashing in for a customized product tailored to their needs.

Frank Garnett's picture Frank Garnett
numerical password keypad Agile Authentication in Modern Applications—With OAuth 2.0

This article explains how the OAuth 2.0 authorization framework authenticates a user on a third-party HTTP website, and how this kind of social identity provider based authentication makes use of what is called authorization code grant flow.

Deepak Vohra's picture Deepak Vohra

Pages

Upcoming Events

Apr 28
Jun 02
Sep 22
Oct 13