Join Kevlin Henney to take a look at the relationship between agile processes and good architecture, taking in development process models, architectural styles, requirements techniques, sufficient modelling techniques, design patterns and testing practices.
Sign up for this highly intensive and interactive 4-day masterclass with Jim Manico. This class will provide essential application security training for web application and webservices developers and architects through a combination of lecture, security testing demonstration and code review.
Join this 4-day flagship Spring Framework masterclass to build a Spring-powered Java application that demonstrates the Spring Framework and other Spring technologies such as Spring Boot, Spring Data, AOP and Spring Security in an intensely productive, hands-on setting.
If you’re someone who is comfortable with the “business side” of projects, a Certified Scrum Product Owner® (CSPO®) certification is likely right for you.
Come and learn how to use scrum patterns, what they can mean to your organization and how you can use them to chart a powerful new direction of kaizen for your scrum team!
As a Certified ScrumMaster® (CSM®), you’ll help the scrum team perform at their highest level. CSMs also protect the team from both internal and external distractions. Through the certification process, you will learn the scrum framework and gain an understanding of team roles, events and artifacts.
This course explores effective models for deployment pipelines.
- How the scope of your pipeline(s) impacts on team structure, and vice versa?
- How do you optimize your deployment pipeline(s) to give fast feedback?
- How do you protect this strategic “channel to production”?
This 16-hour on-line course spanning 3 days is an in-depth presentation and exploration of the Scrum@Scale framework. This course teaches you how to safely and pragmatically scale Scrum across an entire enterprise. Download and read The Scrum At Scale Guide
Exclusive featuring The co-creator of Scrum and creator of Scrum@Scale, Dr. Jeff Sutherland will offer the participants a 30 min. Q&A Session.
Join Trine and Thomas for an introduction to the mindset that shapes user-centered, lovable digital applications that are easily adopted by end users. Get the 101 on the five core principles that support the methodology that Invokers apply to every innovative and action-oriented Design Thinking process:
- Mindful of the process
- Creative / Collaborative
- Familiarize yourself with the variety of Design Thinking formats, ranging from single exercises, small workshops, 5 days sprint to larger Design Thinking processes.
According to a CareerBuilder study, only 40% of new engineering leaders receive formal training when they become a boss for the first time. The rest are forced to get scrappy to quickly equip themselves with new skills, techniques and mindsets to effectively transition into their new roles.
This workshop was designed to fill this gap; providing tactical techniques and resources for both new and seasoned technical leaders — regardless of your title!!
This masterclass aims at giving you an in-depth overview of the strategic part of domain-driven design. Strategic domain-driven design is a powerful methodology for designing large systems in a decoupled and especially decentralized manner.
Until recently, getting affective business results with AI and machine learning required a team of experts and a deep knowledge of the many statistical and neural network based approaches. Lately, we have seen rapid commoditization of AI and machine learning resulting in a growing range of cloud native AI services. Accessing the power of AI and machine learning is now just an API call away.
In this masterclass you'll learn novel analysis techniques that support both technical and organizational decisions around your codebase. The techniques use data from the most underused informational source that we have in our industry: our version-control system. Combined with metaphors from forensic psychology, you'll learn to analyze version-control data to identify the code that’s most expensive to maintain amongst millions lines of code.
Aino will share her experiences with distributed retrospectives; those that went well as well as those which did not go well. You'll come away with things to be aware of when preparing a distributed retrospective, how to organize it, how to prepare it and how to facilitate it during the retrospective in a virtual setting.
In the rapidly changing and evolving tech ecosystem, it is vital that you can add value, increase your development speed, and cut out as many of the cumbersome, boring and repetitive tasks as possible.
Between tailoring your own strict schedule, eliminating distractions and preserving your mental health, what other habits, methods and methodologies will help developer productivity? Agile, Scrum, Kanban? Is there a be-all end-all method to upping developer productivity? Fact is, we must continuously adapt to constant changes.
In recent years, we've seen a huge increase in AI innovations prompted by vast amounts of data, the cloud, innovations in algorithms and more. There is still a stark contrast between the number of data scientists and the need for AI professionals. Therefore developers will have to implement AI technology in their professional and personal projects as it continues to permeate just about every industry. So how can developers begin to design AI applications that engage customers, optimize operations and transform products?
Where should you start? Get to know the different AI frameworks and APIs which will enable you to learn new skills and stay relevant in the work space.
50 years ago, quantum computing was just a theory, almost SciFi. Today, quantum programming is getting close to becoming the new reality for software developers. The same can be said for virtual worlds and holograms. This topic will shine on some of the things the generations before us would have seen as Science Fiction.
Software Architecture is as important as ever. Newer distributed architectures like event-driven, microservices and serverless are increasing in popularity and adoption but much of the world still runs smoothly because of solid application architectures. These cohesively coupled monoliths often solve problems in the simplest way and might be the right choice for some organizations. But it still critical for architects to understand how to take existing applications and migrate them to microservices or other service-based architectures.
We live in a time where the hierarchical structure of teams with managers is moving to a new model of tribes with leaders. In the ideal version of this new landscape, the expertise of developers and specialists is recognized and everyone is involved in the decision-making process. How can we make this transition? How do we cope with our new roles? What works and what doesn’t?
Behind every online interaction is a real live person with their own unique background, perspectives, biases and context. To be successful we must embrace and nurture our relationships with other humans, whether they are a community member in an open source project, the founder of a startup or work for a huge corporation. How have our conversations changed in the past year? In the past five years? How will they change in the future?
Many smart gadgets are taking over analogue ones. They are consuming a lot of energy, polluting the environment and creating millions of tons of e-waste. Whether technology is destroying the world or helping mankind, is still an ongoing debate within our society. What if you use technology for the good like shown in 2018's keynote by Jaideep Bansal? Bringing energy and education to remote areas to save the villages and cultures. Let’s make these positives outweigh the negatives and save the world!
On average, it takes a company 8 months to figure out it's been hacked. In a world where innovation and deployment is expected at an ever-increasing pace, security is often neglected. Security requires time, and this time is often not prioritized, imposing a challenge when new vulnerabilities are discovered and exposed every day.
As developers, how do we build inherently secure and maintainable code and infrastructure to protect our data and identities? How do we equip ourselves with tools to withstand intrusive and adversarial attacks and prepare for unforeseen security risks?