Related Content
Pandemic Challenge 205 of 7,923: Recognizing Project Milestones These days teams are compensating as best they can, but some aspects of project life are difficult with remote teams and social distancing. Celebrating milestone achievement is hard but necessary in our current circumstances. |
||
Operationalizing Cloud Security with Policy-as-Code Josh Stella explores why PaC is critical to validate that large, complex cloud infrastructure environments adhere to industry compliance standard and internal policies.
|
||
A Tale of Toxic Sponsorship It is difficult to succeed without effective sponsorship—and almost impossible if your sponsor is toxic, as this true tale explains. |
||
How Agile Principles Help in a Remote Working Atmosphere When working remotely, teams often face high risks due to lack of communication and differences. However, when implementing agile principles, even remote teams can minimize the risks of failure. |
||
How to Run a Productive and Effective Remote Team With remote work becoming the norm, now is a good time to consider how you can help your team do their best without causing burnout. Fortunately, remote work may actually improve productivity. After all, it's one of the factors that largely contribute to job satisfaction. |
||
A Physical Metaphor for Quick Fixes and Root Cause Analysis If you deal with legacy code you’ve likely found yourself struggling to debug and fix a mysterious, intermittent problem. Along the way you may have discovered some code that didn’t quite make sense. |
||
Schedule Risk Analysis Building schedules for complex projects is challenging. While the results are never perfect, credible schedules are a useful communication and coordination device. Incredible schedules are a dangerous waste of time and energy that damage a project manager’s credibility and cost an enterprise a fortune. |
||
3 Critical Considerations for Technical Due Diligence Technical due diligence is the process of verifying a company’s technical capabilities, quality, and processes. It is typically performed by investors or buyers before a contract. There are many aspects you can investigate, but three are crucial: a code review, security evaluation, and open source components compliance. |