A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Agile and Scrum are not competing concepts. In fact, to implement the Scrum methodology properly, you must approach it with an Agile mindset. To do Scrum right, product development teams must be Agile ...
In the software industry, in which I have worked for the past 25 years, we often use the adage, "What's old is new again." Today's messaging tools like Slack and Teams, for example, owe a lot to the ...
Agile software development has becoming more prevalent in the digital evolution of today’s world. While the transformation of software development has progresses, the management of information ...
Agile project management works well outside of software development. Not all elements of Agile can apply to every business. Picking and choosing the right elements for your business can have a ...
Adopting Agile DevSecOps in the U.S. Department of Defense (DoD) is not without its challenges, especially when managing open-source technologies. Technologies such ...
Digital transformation is highly prized but poorly understood. While more than two-thirds (69%) of directors want their organisations to accelerate digital business initiatives, as many as 80% of IT ...
In the age of agile, too many software designers are afraid to over-design their applications upfront. As a result, many software teams have abandoned architectural thinking, up front design, ...
The increasing nature of computing capabilities, the number of technologies that are interconnected to the cyber world, the amount of data generated, and the speed at which data is reported are all ...
Many medical device companies develop software using a traditional waterfall methodology in which each step is taken in sequence: requirements, design, implementation, verification, and validation ...
When U.S. federal agencies need to deploy a new software application or information system, they must first ensure it complies with a comprehensive set of government-approved security standards — and ...