Remove Network Remove Strategy Remove Systems Remove Workshop
article thumbnail

What the SEC cybersecurity disclosure mandate means for application security

Dynatrace

The mandate also requires that organizations disclose overall cybersecurity risk management, strategy, and governance. Do material incidents on “third-party systems” require disclosure? Be sure to incorporate cybersecurity into every one of your organization’s strategies to ensure full coverage.

article thumbnail

Modelling Bounded Contexts with the Bounded Context Design Canvas: A Workshop Recipe

Strategic Tech

How do we break a large system into smaller, more manageable modular components? This is the question I get asked the most, so I’ve put together this article describing a workshop recipe you can use. 45 minutes) I recommend allocating a full-day for this workshop as a starting point. 1 hour) Candidate Context Modelling (min.

Design 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Expanding mentoring opportunities for Young Architects

ACM Sigarch

While workshops may help bridge this gap, most workshops focus on a particular research theme and students working on “not hot” or not well established research areas are left out. We believe having all of these mechanisms as part of one workshop that specifically targets early stage students would complement existing efforts.

article thumbnail

The Flow Institute: The First Online Community for Value Stream Management (VSM)

Tasktop

A telecom giant changing its outsourcing strategy to negotiate better terms with its service partners. An online investment firm discovering a system bottleneck impeding digital channel innovation , t he remarkable success that organizations are witnessing with flow-based value stream metrics provides an exciting glimpse of what’s possible.

article thumbnail

Plan, execute, and modernize a cloud migration strategy with Dynatrace

Dynatrace

For IT teams seeking agility, cost savings, and a faster on-ramp to innovation, a cloud migration strategy is critical. But, as resources move off premises, IT teams often lack visibility into system performance and security issues. Define the strategy, assess the environment, and perform migration-readiness assessments and workshops.

Strategy 195
article thumbnail

Refactoring CSS: Strategy, Regression Testing And Maintenance (Part 2)

Smashing Magazine

Refactoring CSS: Strategy, Regression Testing And Maintenance (Part 2). Refactoring CSS: Strategy, Regression Testing And Maintenance (Part 2). In this article, we’ll take a deep dive into the refactoring process itself, and cover incremental refactoring strategy, visual regression testing, and maintaining the refactored codebase.

Strategy 132
article thumbnail

Where programming languages are headed in 2020

O'Reilly

Binder, she notes, “was widely used last year for teaching workshops and tutorials at many Python conferences.” Will the incremental strategy of delivering pattern matching and algebraic data types ( Project Amber ) pay off? Will Quarkus bear out its promise and the faith of its early fans?