Soumettre la recherche
Mettre en ligne
Prove it, ship it! - XP2010 Lightning talk
•
Télécharger en tant que PPTX, PDF
•
0 j'aime
•
315 vues
Anders Sveen
Suivre
Talk held at XP2010
Lire moins
Lire la suite
Technologie
Business
Affichage du diaporama
Signaler
Partager
Affichage du diaporama
Signaler
Partager
1 sur 27
Télécharger maintenant
Recommandé
Whether you’re a manager, product manager, designer or engineer, at some point during the product lifecycle you will have to deal with legacy. During this talk, I will explain how to tackle product legacy by understanding what it is, evaluating the gravity of it, defining and applying the right techniques and most importantly what you should learn from it. All of this without having to start coding from scratch and without impacting your existing users.
Transforming legacy into success
Transforming legacy into success
Andreas - Creten
Getting a product to market faster than competitors is often a primary business goal for tech companies. How does that goal shape the engineering process? What is needed to guarantee a fast pace of delivery, even when the project is live, used heavily, and growing ever more complex? We’ll go through engineering practices, system monitoring, incident preparedness, knowledge sharing and other tools that companies use to ship often, learn fast, and stay ahead of the curve.
Moving Fast and Managing Complexity - Serhiy Kostyshyn
Moving Fast and Managing Complexity - Serhiy Kostyshyn
Serhiy Kostyshyn
Implementation demystification 10 keys to a successful p6 implementation ppt
Implementation demystification 10 keys to a successful p6 implementation ppt
p6academy
The benefits of using open source software are well known, well documented and well leveraged by organisations all over the world. The risks of using open source software are not always as well understood. The risks are real and there’s always more which can be done to manage risk but at what cost? Attend this keynote for a discussion on the results of a four-year, industry-wide study on application security practices, policies, and trends related to open source development. To date, over 11,000 professionals have participated in the study. Among the surprising survey results that will be discussed: 1-in-3 organizations had or suspected an open source breach in the past 12 months Only 16% of participants must prove they are not using components with known vulnerabilities 64% don't track changes in open source vulnerability data
OWF14 - Plenary Session : David Jones, Chief Solutions Architect, Sonatype
OWF14 - Plenary Session : David Jones, Chief Solutions Architect, Sonatype
Paris Open Source Summit
Devops presentation at Visual Studio 2017 Launch presented for Microsoft at Melbourne.
Devops
Devops
Himanshu Desai
Salesforce, Google, Facebook, NimbleUser -- To be sure all of our customers are using all of our best work, software as a service peeps rollout software fixes continuously, and major versions several times a year. Learn what best practices we use to ensure each release is better than the last, with take-away pointers as to how you can use similar techniques in your own organization.
Ship It!
Ship It!
Ted Husted
Microsoft Application Insights and Test Hub at Visual studio 2017 Launch presented for Microsoft at Melbourne.
App insights and testhub
App insights and testhub
Himanshu Desai
Test environment management has become a vital part in keeping any organisation together. To fetch some in-depth learning environment, what it is and how exactly it works, there is a ‘use case’ developed. Summing up, the test environment brings down all the aspects of the organisation together like project managers, test managers, developers, and most importantly the environment managers.
Strategizing to build a perfect test environment
Strategizing to build a perfect test environment
Enov8
Recommandé
Whether you’re a manager, product manager, designer or engineer, at some point during the product lifecycle you will have to deal with legacy. During this talk, I will explain how to tackle product legacy by understanding what it is, evaluating the gravity of it, defining and applying the right techniques and most importantly what you should learn from it. All of this without having to start coding from scratch and without impacting your existing users.
Transforming legacy into success
Transforming legacy into success
Andreas - Creten
Getting a product to market faster than competitors is often a primary business goal for tech companies. How does that goal shape the engineering process? What is needed to guarantee a fast pace of delivery, even when the project is live, used heavily, and growing ever more complex? We’ll go through engineering practices, system monitoring, incident preparedness, knowledge sharing and other tools that companies use to ship often, learn fast, and stay ahead of the curve.
Moving Fast and Managing Complexity - Serhiy Kostyshyn
Moving Fast and Managing Complexity - Serhiy Kostyshyn
Serhiy Kostyshyn
Implementation demystification 10 keys to a successful p6 implementation ppt
Implementation demystification 10 keys to a successful p6 implementation ppt
p6academy
The benefits of using open source software are well known, well documented and well leveraged by organisations all over the world. The risks of using open source software are not always as well understood. The risks are real and there’s always more which can be done to manage risk but at what cost? Attend this keynote for a discussion on the results of a four-year, industry-wide study on application security practices, policies, and trends related to open source development. To date, over 11,000 professionals have participated in the study. Among the surprising survey results that will be discussed: 1-in-3 organizations had or suspected an open source breach in the past 12 months Only 16% of participants must prove they are not using components with known vulnerabilities 64% don't track changes in open source vulnerability data
OWF14 - Plenary Session : David Jones, Chief Solutions Architect, Sonatype
OWF14 - Plenary Session : David Jones, Chief Solutions Architect, Sonatype
Paris Open Source Summit
Devops presentation at Visual Studio 2017 Launch presented for Microsoft at Melbourne.
Devops
Devops
Himanshu Desai
Salesforce, Google, Facebook, NimbleUser -- To be sure all of our customers are using all of our best work, software as a service peeps rollout software fixes continuously, and major versions several times a year. Learn what best practices we use to ensure each release is better than the last, with take-away pointers as to how you can use similar techniques in your own organization.
Ship It!
Ship It!
Ted Husted
Microsoft Application Insights and Test Hub at Visual studio 2017 Launch presented for Microsoft at Melbourne.
App insights and testhub
App insights and testhub
Himanshu Desai
Test environment management has become a vital part in keeping any organisation together. To fetch some in-depth learning environment, what it is and how exactly it works, there is a ‘use case’ developed. Summing up, the test environment brings down all the aspects of the organisation together like project managers, test managers, developers, and most importantly the environment managers.
Strategizing to build a perfect test environment
Strategizing to build a perfect test environment
Enov8
Threat modeling promotes the idea of thinking like an attacker. It enables organizations to build software with security considerations, rather than addressing security as an afterthought. Here are the top 6 threat modeling misconceptions.
Shedding Light Onto the Top 6 Threat Modeling Misconceptions
Shedding Light Onto the Top 6 Threat Modeling Misconceptions
Synopsys Software Integrity Group
Presentation given during the Enterprise Security and Risk Management conference 2018.
It’s Time to Treat Software Engineers as Security Evangelists
It’s Time to Treat Software Engineers as Security Evangelists
Darren Hickling MBCS
Are your operations disjointed from using multiple software tools from different vendors? In this infographic, we share how a unified solution fixes this.
You Need a Unified Solution (Not Individual Tools)
You Need a Unified Solution (Not Individual Tools)
24/7 Software
Learn the most effective way to integrate a security culture into your company.
Effective security
Effective security
Mike Mackintosh
Subject: Successful DevSecOps evolution through realistic expectations and company-wide transparency Description: Although most companies are somewhere in the middle and it's hard to really determine the factors that allow them to manage their security operations, there is a lot we can learn by studying the stories of companies that thrive on DevSecOps and those that really struggle to make it work. In my experience, the biggest reason for companies failing to succeed with DevSecOps is that instead of embracing it, they engage in the project with deep resistance because they know they haven't really done their homework and aren't prepared enough to comprehend the big-picture perspective. During my presentation, I want to share with you my observations from over 5 years spent in the trenches, which should turn helpful if your goal is to build a DevSecOps roadmap that focuses on practicality and positive long-term influence at your organization. The release of this video on my youtube channel has been approved by Joe Colantonio from SecureGuild 2019.
Successful DevSecOps Organizations - by Dawid Balut
Successful DevSecOps Organizations - by Dawid Balut
Dawid Balut
How many times have you been asked by your manager, a product owner, or a stakeholder, "how long will writing a new feature take?" And how many times have you actually given an accurate time estimate—say within 1 week of your estimation? Learn about how my development team at Atlassian faced these same issues and how we transformed our practices to consistently nail time estimates
The Secret to Nailing Project Estimations
The Secret to Nailing Project Estimations
Atlassian
See more on: http://tasktop.com/resources/videos Southern Fried Agile 2014 presentation by Dave West, Tasktop's Chief Product Officer To listen to the audio recording of the presentation, go to: http://www.tasktop.com/resources/videos/southern-fried-agile-2014
Dave West (Tasktop Technologies) - Wizard of Oz
Dave West (Tasktop Technologies) - Wizard of Oz
Tasktop
Join us for a webinar featuring Forrester VP and Research Director Amy DeMartine to learn more about why open source security has become critical for securing modern applications, the main considerations when evaluating an open source security and license compliance solution and what she sees in store for the future. Additionally, WhiteSource Senior Director of Product Marketing, Jeff Crum, will discuss recent analysis of the Software Composition Analysis (SCA) market, including takeaways from The Forrester Wave™: Software Composition Analysis, Q2 2019.
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
WhiteSource
"DevSecOps sets out to relieve the costly and stressful delays that can occur when security testing is performed late in the game, by setting up processes and tools for ""shifting left"" so security testing can happen early and often. As organizations continue to embrace this DevSecOps approach, testing tools and practices are integrated even further left in the development pipeline. Join Senior Product Manager, Shiri Ivtsan, as she discusses: Where and how developers are implementing DevSecOps in the SDLC; Best practices for developers to adopt DevSecOps and more efficiently handle vulnerabilities; Necessary steps for implementing a process for detection, prioritization, and remediation of open source vulnerabilities."
DevSecOps: Closing the Loop from Detection to Remediation
DevSecOps: Closing the Loop from Detection to Remediation
WhiteSource
Code is code—and COBOL is no exception. The obstacles to mainframe application agility aren’t in the COBOL language. They are in archaic waterfall development processes, an inflexible culture and obsolete tools used to manage applications written in that language. Compuware is working hard to transform the future of mainframe app dev for our customers. We demonstrate how in our “Mainstreaming the Mainframe: Can it be Just Another Platform?” webcast hosted by IBM Systems Magazine. Compuware Product Managers Jim Liebert and Steven Kansa discuss how Compuware Topaz together with technology integrations with leading vendors like SonarSource are enabling agile delivery of quality COBOL code by mainstream development teams.
Mainstreaming the Mainframe: Can it be Just Another Platform? Webcast
Mainstreaming the Mainframe: Can it be Just Another Platform? Webcast
Compuware
Find out how this practice adds value to your business’s strategy and management.
InfoComics - Agile Methodologies
InfoComics - Agile Methodologies
Taller Negócio Digitais
PROFES 2018, Wolfsburg: Talk by Tilman Seifert (Principal IT Consultant at QAware) === Please download slides if blurred! === Abstract: Processes cannot just be judged as ``good'' or ``efficient''---they must be appropriate for the type of project. As the type of a project changes over time, the processes must adjust in order to stay efficient and appropriate. We accompanied the transformation of a large and fast-growing project, using agile development methods and cloud-native technologies, from the very first steps of a prototype to the development of a customer-ready product. This experience report shows patterns we found on the way. It argues that systematic process evolution can be done without documentation overhead or relying on questionable process KPIs. We only used information which is available anyway; this includes our archive of sprint retro boards which allows to create a clear picture of the project's evolution, regarding both the process and the product quality.
Process Evolution and Product Maturity
Process Evolution and Product Maturity
QAware GmbH
Bugs are cute until they trap into your application. We prevent this! :)
QA Services by EffectiveSoft
QA Services by EffectiveSoft
Kathrine Troyanova
Incident response teams are evolving, thanks to DevOps, agile, and today’s demand for always-on services. But, what’s the best way to respond when you’re faced with a complex mix of systems, software, and teams? Is there a way to respond faster, collaborate better, and continuously improve your incident management process? Join Simon Kubica, Product Manager for Opsgenie, as he uncovers best practices that’ll streamline every stage of your response effort. See how Atlassian, Amazon and Google enable collaboration between support, operations and development, and learn how to leverage automation and conduct effective postmortems. Plus, Simon will show live demos on how you can implement these tips in Opsgenie, Statuspage, and Jira Service Desk.
Resolve Incidents Faster: Transforming Your Incident Management Process
Resolve Incidents Faster: Transforming Your Incident Management Process
Atlassian
Open-source components are prevalent in approximately 97% of modern applications and dominate anywhere between 60-80% of their codebases. This is hardly surprising given how integrating open source accelerates software development and enables organizations to keep up with today's frantic release pace and standards of constantly supplying new features and improvements. However, taking into consideration the fact that recent years have seen an upsurge in reported open-source vulnerabilities, whose details and exploits are publicly available, it's no wonder that organizations are increasingly directing focus towards ensuring that their open-source components are securely integrated into their software. Join Guy Bar-Gil, Product Manager at WhiteSource, as he discusses: 1. The four layers of open-source security 2. How to integrate continuous security into your SDLC 3. Best practices for organizations to own and execute the security process
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
WhiteSource
Prepare for software reaching end-of-life with the must-have tips! Watch the full webinar here: http://www.aventissystems.com/Articles.asp?ID=386
How to Avoid End-of-Life Software Pitfalls
How to Avoid End-of-Life Software Pitfalls
Aventis Systems, Inc.
What can Enterprise IT ops look like in a world eaten by software? How do you cope with vendor releases every few days when your release cycle takes weeks? This is the story of how IT engineering and ops teams in a global bank collaborated with an XP team and learned to changed the way they work.
High Performance Ops for Enterprise PaaS
High Performance Ops for Enterprise PaaS
Dan Young
Watch here for an interactive enablement webinar where you can learn new Puppet sales messaging. We cover tips and tricks on how to deliver the pitch directly from a Puppet Inside Sales Rep, and what they find most successful when talking about Puppet Enterprise to current customers and prospects. Featured Speakers Michael Olson, Sr. Product Marketing Manager, Puppet J.D. Delacerna, Sr. Inside Sales Rep, Puppet
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet
Uncertainty in agile projects
Uncertainty in agile projects
Skills Matter
Thales Training and Consultancy's tips on how to managed projects well.
Tips managing projects presentation
Tips managing projects presentation
Thales Training & Consultancy
Change is not about process, but about culture and mind set. JavaZone 2010 lightning talk
So you think you can change? - JavaZone 2010
So you think you can change? - JavaZone 2010
Anders Sveen
So you think you can change? - XP2010
So you think you can change? - XP2010
Anders Sveen
Contenu connexe
Tendances
Threat modeling promotes the idea of thinking like an attacker. It enables organizations to build software with security considerations, rather than addressing security as an afterthought. Here are the top 6 threat modeling misconceptions.
Shedding Light Onto the Top 6 Threat Modeling Misconceptions
Shedding Light Onto the Top 6 Threat Modeling Misconceptions
Synopsys Software Integrity Group
Presentation given during the Enterprise Security and Risk Management conference 2018.
It’s Time to Treat Software Engineers as Security Evangelists
It’s Time to Treat Software Engineers as Security Evangelists
Darren Hickling MBCS
Are your operations disjointed from using multiple software tools from different vendors? In this infographic, we share how a unified solution fixes this.
You Need a Unified Solution (Not Individual Tools)
You Need a Unified Solution (Not Individual Tools)
24/7 Software
Learn the most effective way to integrate a security culture into your company.
Effective security
Effective security
Mike Mackintosh
Subject: Successful DevSecOps evolution through realistic expectations and company-wide transparency Description: Although most companies are somewhere in the middle and it's hard to really determine the factors that allow them to manage their security operations, there is a lot we can learn by studying the stories of companies that thrive on DevSecOps and those that really struggle to make it work. In my experience, the biggest reason for companies failing to succeed with DevSecOps is that instead of embracing it, they engage in the project with deep resistance because they know they haven't really done their homework and aren't prepared enough to comprehend the big-picture perspective. During my presentation, I want to share with you my observations from over 5 years spent in the trenches, which should turn helpful if your goal is to build a DevSecOps roadmap that focuses on practicality and positive long-term influence at your organization. The release of this video on my youtube channel has been approved by Joe Colantonio from SecureGuild 2019.
Successful DevSecOps Organizations - by Dawid Balut
Successful DevSecOps Organizations - by Dawid Balut
Dawid Balut
How many times have you been asked by your manager, a product owner, or a stakeholder, "how long will writing a new feature take?" And how many times have you actually given an accurate time estimate—say within 1 week of your estimation? Learn about how my development team at Atlassian faced these same issues and how we transformed our practices to consistently nail time estimates
The Secret to Nailing Project Estimations
The Secret to Nailing Project Estimations
Atlassian
See more on: http://tasktop.com/resources/videos Southern Fried Agile 2014 presentation by Dave West, Tasktop's Chief Product Officer To listen to the audio recording of the presentation, go to: http://www.tasktop.com/resources/videos/southern-fried-agile-2014
Dave West (Tasktop Technologies) - Wizard of Oz
Dave West (Tasktop Technologies) - Wizard of Oz
Tasktop
Join us for a webinar featuring Forrester VP and Research Director Amy DeMartine to learn more about why open source security has become critical for securing modern applications, the main considerations when evaluating an open source security and license compliance solution and what she sees in store for the future. Additionally, WhiteSource Senior Director of Product Marketing, Jeff Crum, will discuss recent analysis of the Software Composition Analysis (SCA) market, including takeaways from The Forrester Wave™: Software Composition Analysis, Q2 2019.
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
WhiteSource
"DevSecOps sets out to relieve the costly and stressful delays that can occur when security testing is performed late in the game, by setting up processes and tools for ""shifting left"" so security testing can happen early and often. As organizations continue to embrace this DevSecOps approach, testing tools and practices are integrated even further left in the development pipeline. Join Senior Product Manager, Shiri Ivtsan, as she discusses: Where and how developers are implementing DevSecOps in the SDLC; Best practices for developers to adopt DevSecOps and more efficiently handle vulnerabilities; Necessary steps for implementing a process for detection, prioritization, and remediation of open source vulnerabilities."
DevSecOps: Closing the Loop from Detection to Remediation
DevSecOps: Closing the Loop from Detection to Remediation
WhiteSource
Code is code—and COBOL is no exception. The obstacles to mainframe application agility aren’t in the COBOL language. They are in archaic waterfall development processes, an inflexible culture and obsolete tools used to manage applications written in that language. Compuware is working hard to transform the future of mainframe app dev for our customers. We demonstrate how in our “Mainstreaming the Mainframe: Can it be Just Another Platform?” webcast hosted by IBM Systems Magazine. Compuware Product Managers Jim Liebert and Steven Kansa discuss how Compuware Topaz together with technology integrations with leading vendors like SonarSource are enabling agile delivery of quality COBOL code by mainstream development teams.
Mainstreaming the Mainframe: Can it be Just Another Platform? Webcast
Mainstreaming the Mainframe: Can it be Just Another Platform? Webcast
Compuware
Find out how this practice adds value to your business’s strategy and management.
InfoComics - Agile Methodologies
InfoComics - Agile Methodologies
Taller Negócio Digitais
PROFES 2018, Wolfsburg: Talk by Tilman Seifert (Principal IT Consultant at QAware) === Please download slides if blurred! === Abstract: Processes cannot just be judged as ``good'' or ``efficient''---they must be appropriate for the type of project. As the type of a project changes over time, the processes must adjust in order to stay efficient and appropriate. We accompanied the transformation of a large and fast-growing project, using agile development methods and cloud-native technologies, from the very first steps of a prototype to the development of a customer-ready product. This experience report shows patterns we found on the way. It argues that systematic process evolution can be done without documentation overhead or relying on questionable process KPIs. We only used information which is available anyway; this includes our archive of sprint retro boards which allows to create a clear picture of the project's evolution, regarding both the process and the product quality.
Process Evolution and Product Maturity
Process Evolution and Product Maturity
QAware GmbH
Bugs are cute until they trap into your application. We prevent this! :)
QA Services by EffectiveSoft
QA Services by EffectiveSoft
Kathrine Troyanova
Incident response teams are evolving, thanks to DevOps, agile, and today’s demand for always-on services. But, what’s the best way to respond when you’re faced with a complex mix of systems, software, and teams? Is there a way to respond faster, collaborate better, and continuously improve your incident management process? Join Simon Kubica, Product Manager for Opsgenie, as he uncovers best practices that’ll streamline every stage of your response effort. See how Atlassian, Amazon and Google enable collaboration between support, operations and development, and learn how to leverage automation and conduct effective postmortems. Plus, Simon will show live demos on how you can implement these tips in Opsgenie, Statuspage, and Jira Service Desk.
Resolve Incidents Faster: Transforming Your Incident Management Process
Resolve Incidents Faster: Transforming Your Incident Management Process
Atlassian
Open-source components are prevalent in approximately 97% of modern applications and dominate anywhere between 60-80% of their codebases. This is hardly surprising given how integrating open source accelerates software development and enables organizations to keep up with today's frantic release pace and standards of constantly supplying new features and improvements. However, taking into consideration the fact that recent years have seen an upsurge in reported open-source vulnerabilities, whose details and exploits are publicly available, it's no wonder that organizations are increasingly directing focus towards ensuring that their open-source components are securely integrated into their software. Join Guy Bar-Gil, Product Manager at WhiteSource, as he discusses: 1. The four layers of open-source security 2. How to integrate continuous security into your SDLC 3. Best practices for organizations to own and execute the security process
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
WhiteSource
Prepare for software reaching end-of-life with the must-have tips! Watch the full webinar here: http://www.aventissystems.com/Articles.asp?ID=386
How to Avoid End-of-Life Software Pitfalls
How to Avoid End-of-Life Software Pitfalls
Aventis Systems, Inc.
What can Enterprise IT ops look like in a world eaten by software? How do you cope with vendor releases every few days when your release cycle takes weeks? This is the story of how IT engineering and ops teams in a global bank collaborated with an XP team and learned to changed the way they work.
High Performance Ops for Enterprise PaaS
High Performance Ops for Enterprise PaaS
Dan Young
Watch here for an interactive enablement webinar where you can learn new Puppet sales messaging. We cover tips and tricks on how to deliver the pitch directly from a Puppet Inside Sales Rep, and what they find most successful when talking about Puppet Enterprise to current customers and prospects. Featured Speakers Michael Olson, Sr. Product Marketing Manager, Puppet J.D. Delacerna, Sr. Inside Sales Rep, Puppet
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet
Uncertainty in agile projects
Uncertainty in agile projects
Skills Matter
Thales Training and Consultancy's tips on how to managed projects well.
Tips managing projects presentation
Tips managing projects presentation
Thales Training & Consultancy
Tendances
(20)
Shedding Light Onto the Top 6 Threat Modeling Misconceptions
Shedding Light Onto the Top 6 Threat Modeling Misconceptions
It’s Time to Treat Software Engineers as Security Evangelists
It’s Time to Treat Software Engineers as Security Evangelists
You Need a Unified Solution (Not Individual Tools)
You Need a Unified Solution (Not Individual Tools)
Effective security
Effective security
Successful DevSecOps Organizations - by Dawid Balut
Successful DevSecOps Organizations - by Dawid Balut
The Secret to Nailing Project Estimations
The Secret to Nailing Project Estimations
Dave West (Tasktop Technologies) - Wizard of Oz
Dave West (Tasktop Technologies) - Wizard of Oz
Taking Open Source Security to the Next Level
Taking Open Source Security to the Next Level
DevSecOps: Closing the Loop from Detection to Remediation
DevSecOps: Closing the Loop from Detection to Remediation
Mainstreaming the Mainframe: Can it be Just Another Platform? Webcast
Mainstreaming the Mainframe: Can it be Just Another Platform? Webcast
InfoComics - Agile Methodologies
InfoComics - Agile Methodologies
Process Evolution and Product Maturity
Process Evolution and Product Maturity
QA Services by EffectiveSoft
QA Services by EffectiveSoft
Resolve Incidents Faster: Transforming Your Incident Management Process
Resolve Incidents Faster: Transforming Your Incident Management Process
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
How to Avoid End-of-Life Software Pitfalls
How to Avoid End-of-Life Software Pitfalls
High Performance Ops for Enterprise PaaS
High Performance Ops for Enterprise PaaS
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Uncertainty in agile projects
Uncertainty in agile projects
Tips managing projects presentation
Tips managing projects presentation
En vedette
Change is not about process, but about culture and mind set. JavaZone 2010 lightning talk
So you think you can change? - JavaZone 2010
So you think you can change? - JavaZone 2010
Anders Sveen
So you think you can change? - XP2010
So you think you can change? - XP2010
Anders Sveen
Foredrag på frokostseminar hos Bouvet 30. januar 2014
Christian Stensholt: Smidig gjør oss LEANe
Christian Stensholt: Smidig gjør oss LEANe
Bouvet ASA
Presentation held for Miles internally. Norwegian only.
Heroku for Java
Heroku for Java
Anders Sveen
Slides from talk at JavaZone 2009, sorry only Norwegian.
Rules engine vs. domain logic - JavaZone 2009
Rules engine vs. domain logic - JavaZone 2009
Anders Sveen
My talk from JavaZone 2010 on pragmatic integration. Sorry, Norwegian only. :)
Pragmatisk integrasjon - JavaZone 2010
Pragmatisk integrasjon - JavaZone 2010
Anders Sveen
An internal presentation I did at Miles about Docker. In Norwegian and definitely lacks some polish, but here if someone might need it. :)
Docker for Dummies
Docker for Dummies
Anders Sveen
En vedette
(7)
So you think you can change? - JavaZone 2010
So you think you can change? - JavaZone 2010
So you think you can change? - XP2010
So you think you can change? - XP2010
Christian Stensholt: Smidig gjør oss LEANe
Christian Stensholt: Smidig gjør oss LEANe
Heroku for Java
Heroku for Java
Rules engine vs. domain logic - JavaZone 2009
Rules engine vs. domain logic - JavaZone 2009
Pragmatisk integrasjon - JavaZone 2010
Pragmatisk integrasjon - JavaZone 2010
Docker for Dummies
Docker for Dummies
Dernier
With real-time traffic, hazard alerts, and voice instructions, among others, launching an intuitive taxi app in Brazil is your golden ticket to entrepreneurial success. For more info visit our website : https://www.v3cube.com/uber-clone-portuguese-brazil/
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
V3cube
Details
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
What are drone anti-jamming systems? The drone anti-jamming systems and anti-spoof technology protect against interference, jamming, and spoofing of the UAVs. To protect their security, countries are beginning to research drone anti-jamming systems, also known as drone strike weapons. The anti-jam and anti-spoof technology protects against interference, jamming and spoofing. A drone strike weapon is a drone attack weapon that can attack and destroy enemy drones. So what is so unique about this amazing system?
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
MySQL Webinar, presented on the 25th of April, 2024. Summary: MySQL solutions enable the deployment of diverse Database Architectures tailored to specific needs, including High Availability, Disaster Recovery, and Read Scale-Out. With MySQL Shell's AdminAPI, administrators can seamlessly set up, manage, and monitor these solutions, ensuring efficiency and ease of use in their administration. MySQL Router, on the other hand, provides transparent routing from the application traffic to the backend servers in the architectures, requiring minimal configuration. Completely built in-house and supported by Oracle, these solutions have been adopted by enterprises of all sizes for their business-critical applications. In this presentation, we'll delve into various database architecture solutions to help you choose the right one based on your business requirements. Focusing on technical details and the latest features to maximize the potential of these solutions.
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Join our latest Connector Corner webinar to discover how UiPath Integration Service revolutionizes API-centric automation in a 'Quote to Cash' process—and how that automation empowers businesses to accelerate revenue generation. A comprehensive demo will explore connecting systems, GenAI, and people, through powerful pre-built connectors designed to speed process cycle times. Speakers: James Dickson, Senior Software Engineer Charlie Greenberg, Host, Product Marketing Manager
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
This presentations targets students or working professionals. You may know Google for search, YouTube, Android, Chrome, and Gmail, but did you know Google has many developer tools, platforms & APIs? This comprehensive yet still high-level overview outlines the most impactful tools for where to run your code, store & analyze your data. It will also inspire you as to what's possible. This talk is 50 minutes in length.
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Read about the journey the Adobe Experience Manager team has gone through in order to become and scale API-first throughout the organisation.
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Presentation from Melissa Klemke from her talk at Product Anonymous in April 2024
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
I've been in the field of "Cyber Security" in its many incarnations for about 25 years. In that time I've learned some lessons, some the hard way. Here are my slides presented at BSides New Orleans in April 2024.
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Effective data discovery is crucial for maintaining compliance and mitigating risks in today's rapidly evolving privacy landscape. However, traditional manual approaches often struggle to keep pace with the growing volume and complexity of data. Join us for an insightful webinar where industry leaders from TrustArc and Privya will share their expertise on leveraging AI-powered solutions to revolutionize data discovery. You'll learn how to: - Effortlessly maintain a comprehensive, up-to-date data inventory - Harness code scanning insights to gain complete visibility into data flows leveraging the advantages of code scanning over DB scanning - Simplify compliance by leveraging Privya's integration with TrustArc - Implement proven strategies to mitigate third-party risks Our panel of experts will discuss real-world case studies and share practical strategies for overcoming common data discovery challenges. They'll also explore the latest trends and innovations in AI-driven data management, and how these technologies can help organizations stay ahead of the curve in an ever-changing privacy landscape.
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
writing some innovation for development and search
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Digital Global Overview Report 2024 Slides presentation for Event presented in 2024 after compilation of data around last year.
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
As privacy and data protection regulations evolve rapidly, organizations operating in multiple jurisdictions face mounting challenges to ensure compliance and safeguard customer data. With state-specific privacy laws coming up in multiple states this year, it is essential to understand what their unique data protection regulations will require clearly. How will data privacy evolve in the US in 2024? How to stay compliant? Our panellists will guide you through the intricacies of these states' specific data privacy laws, clarifying complex legal frameworks and compliance requirements. This webinar will review: - The essential aspects of each state's privacy landscape and the latest updates - Common compliance challenges faced by organizations operating in multiple states and best practices to achieve regulatory adherence - Valuable insights into potential changes to existing regulations and prepare your organization for the evolving landscape
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
How to get Oracle DBA Job as fresher.
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Terragrunt, Terraspace, Terramate, terra... whatever. What is wrong with Terraform so people keep on creating wrappers and solutions around it? How OpenTofu will affect this dynamic? In this presentation, we will look into the fundamental driving forces behind a zoo of wrappers. Moreover, we are going to put together a wrapper ourselves so you can make an educated decision if you need one.
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
💉💊+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI}}+971581248768 +971581248768 Mtp-Kit (500MG) Prices » Dubai [(+971581248768**)] Abortion Pills For Sale In Dubai, UAE, Mifepristone and Misoprostol Tablets Available In Dubai, UAE CONTACT DR.Maya Whatsapp +971581248768 We Have Abortion Pills / Cytotec Tablets /Mifegest Kit Available in Dubai, Sharjah, Abudhabi, Ajman, Alain, Fujairah, Ras Al Khaimah, Umm Al Quwain, UAE, Buy cytotec in Dubai +971581248768''''Abortion Pills near me DUBAI | ABU DHABI|UAE. Price of Misoprostol, Cytotec” +971581248768' Dr.DEEM ''BUY ABORTION PILLS MIFEGEST KIT, MISOPROTONE, CYTOTEC PILLS IN DUBAI, ABU DHABI,UAE'' Contact me now via What's App…… abortion Pills Cytotec also available Oman Qatar Doha Saudi Arabia Bahrain Above all, Cytotec Abortion Pills are Available In Dubai / UAE, you will be very happy to do abortion in Dubai we are providing cytotec 200mg abortion pill in Dubai, UAE. Medication abortion offers an alternative to Surgical Abortion for women in the early weeks of pregnancy. We only offer abortion pills from 1 week-6 Months. We then advise you to use surgery if its beyond 6 months. Our Abu Dhabi, Ajman, Al Ain, Dubai, Fujairah, Ras Al Khaimah (RAK), Sharjah, Umm Al Quwain (UAQ) United Arab Emirates Abortion Clinic provides the safest and most advanced techniques for providing non-surgical, medical and surgical abortion methods for early through late second trimester, including the Abortion By Pill Procedure (RU 486, Mifeprex, Mifepristone, early options French Abortion Pill), Tamoxifen, Methotrexate and Cytotec (Misoprostol). The Abu Dhabi, United Arab Emirates Abortion Clinic performs Same Day Abortion Procedure using medications that are taken on the first day of the office visit and will cause the abortion to occur generally within 4 to 6 hours (as early as 30 minutes) for patients who are 3 to 12 weeks pregnant. When Mifepristone and Misoprostol are used, 50% of patients complete in 4 to 6 hours; 75% to 80% in 12 hours; and 90% in 24 hours. We use a regimen that allows for completion without the need for surgery 99% of the time. All advanced second trimester and late term pregnancies at our Tampa clinic (17 to 24 weeks or greater) can be completed within 24 hours or less 99% of the time without the need surgery. The procedure is completed with minimal to no complications. Our Women's Health Center located in Abu Dhabi, United Arab Emirates, uses the latest medications for medical abortions (RU-486, Mifeprex, Mifegyne, Mifepristone, early options French abortion pill), Methotrexate and Cytotec (Misoprostol). The safety standards of our Abu Dhabi, United Arab Emirates Abortion Doctors remain unparalleled. They consistently maintain the lowest complication rates throughout the nation. Our Physicians and staff are always available to answer questions and care for women in one of the most difficult times in their lives. The decision to have an abortion at the Abortion Cl
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
This project focuses on implementing real-time object detection using Raspberry Pi and OpenCV. Real-time object detection is a critical aspect of computer vision applications, allowing systems to identify and locate objects within a live video stream instantly.
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
My presentation at the Lehigh Carbon Community College (LCCC) NSA GenCyber Cyber Security Day event that is intended to foster an interest in the cyber security field amongst college students.
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Stay safe, grab a drink and join us virtually for our upcoming "GenAI Risks & Security" Meetup to hear about how to uncover critical GenAI risks and vulnerabilities, AI security considerations in every company, and how a CISO should navigate through GenAI Risks.
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
What is a good lead in your organisation? Which leads are priority? What happens to leads? When sales and marketing give different answers to these questions, or perhaps aren't sure of the answers at all, frustrations build and opportunities are left on the table. Join us for an illuminating session with Cian McLoughlin, HubSpot Principal Customer Success Manager, as we look at that crucial piece of the customer journey in which leads are transferred from marketing to sales.
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Dernier
(20)
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Prove it, ship it! - XP2010 Lightning talk
1.
Prove it, ship
it! Anders Sveen, XP2010
2.
Shipyour software as
early as possible
3.
Agile development
4.
Working software is
theprimarymeasureofsuccess- Principlesbehindthe Agile Manifesto
5.
Working?
6.
It won’twork in
my environment
7.
Dedication
8.
Changesthewayyouthinkabout software development
9.
Expose problems in
process and technology
10.
Adapt
11.
Changecourse and your
software
12.
The right thing?
13.
Validate
14.
Reflection
15.
Handle risk
16.
Force risk intotheopen
17.
Delayingproduction
18.
Accumulating risk
19.
risk + risk
20.
Superadditivity1+1=3- Scott Page
21.
Much more
22.
Handle risk in
smallincrements
23.
Focusononetask
24.
Splitting up problems
25.
Just ship it!
26.
Worth it
27.
anders.sveen@capgemini.com / @anderssv
/ http://blog.f12.no
Télécharger maintenant