27.8 C
New York
Monday, July 16, 2018
Tags Agile

Tag: Agile

Securing The Trusted Base

Securing The Trusted Base By Bob Aiello Over the last several years, there have been many reported incidents where hackers have attacked banks, government agencies and financial...

Behaviorally Speaking – Process and Quality

Behaviorally Speaking - Process and Quality By Bob Aiello Configuration Management places a strong focus on process and quality so sometimes I am shocked to learn...

Training Video:: Bob Aiello On Agile ALM

This training video will give you an introduction to Agile Application Lifecycle Management Register online for new training videos! Bob Aiello on Agile ALM

Digital Currency Firm Victim of Cybercrime!

  As reported in the Wall Street Journal, digital currency firm DAO was the victim of a hack in which 3.6 million Ethereum coins, valued...

Understanding CM in an Agile World – Unit 1

Part 1 of 4 - Bob Aiello on Agile Configuration Management - The First Seven Things Complete series: Unit 1 Unit 2 Unit 3 Unit 4

Understanding CM In an Agile World – Unit 3

Part 3 of 4 - Bob Aiello on Agile Configuration Management - The First Seven Things Complete series: Unit 1 Unit 2 Unit 3 Unit 4  

Understanding CM in an Agile World – Unit 4

Part 4 of 4 - Bob Aiello on Agile Configuration Management - The First Seven Things Complete series: Unit 1 Unit 2 Unit 3 Unit 4  

Understanding CM in an Agile World – Unit 2

Part 2 of 4 - Bob Aiello on Agile Configuration Management - The First Seven Things Complete series: Unit 1 Unit 2 Unit 3 Unit 4  

Subscribe

Subscribe to receive the Agile ALM DevOps Journal! You can also register to receive an account for posting comments on articles. Contact me directly if you...