Remove Network Remove Processing Remove Strategy Remove Workshop
article thumbnail

What the SEC cybersecurity disclosure mandate means for application security

Dynatrace

The mandate also requires that organizations disclose overall cybersecurity risk management, strategy, and governance. What application security best practices should your cybersecurity risk management process consider? Additionally, ensure they are aware of each of their roles and responsibility during the process.

article thumbnail

Modelling Bounded Contexts with the Bounded Context Design Canvas: A Workshop Recipe

Strategic Tech

This is the question I get asked the most, so I’ve put together this article describing a workshop recipe you can use. This workshop format is designed around both of these needs and uses two tools in order to find the most effective system design: EventStorming and the Bounded Context Design Canvas. Look for pivotal events?—?look

Design 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Expanding mentoring opportunities for Young Architects

ACM Sigarch

However, there is great value in cultivating mentors outside a student’s immediate circle (advisors and immediate collaborators) for this can potentially provide holistic inputs in the crucial process of transforming students into independent researchers. Next, we outline what we believe such a workshop should provide its students.

article thumbnail

The Three Types of Performance Testing

CSS Wizardry

Simply knowing the different forms of performance testing that we have available to us, and where they sit in the product development process, makes it much easier for businesses to adopt a performance strategy and keep on top of things. Each have their own time, place, purpose, focus, and audience. Who: Engineers.

article thumbnail

The Flow Institute: The First Online Community for Value Stream Management (VSM)

Tasktop

Whatever your industry, structure, methodology, tooling or processes, the Flow Framework provides a clear blueprint for practicing VSM in software delivery. A telecom giant changing its outsourcing strategy to negotiate better terms with its service partners. And, crucially, builds on all the great progress you’ve already made.

article thumbnail

Plan, execute, and modernize a cloud migration strategy with Dynatrace

Dynatrace

For IT teams seeking agility, cost savings, and a faster on-ramp to innovation, a cloud migration strategy is critical. Define the strategy, assess the environment, and perform migration-readiness assessments and workshops. The pilot cloud migration helps uncover risks related to process, operational, and technology changes.

Strategy 197
article thumbnail

Refactoring CSS: Strategy, Regression Testing And Maintenance (Part 2)

Smashing Magazine

Refactoring CSS: Strategy, Regression Testing And Maintenance (Part 2). Refactoring CSS: Strategy, Regression Testing And Maintenance (Part 2). In this article, we’ll take a deep dive into the refactoring process itself, and cover incremental refactoring strategy, visual regression testing, and maintaining the refactored codebase.

Strategy 132