article thumbnail

Four Phases of Maturing Enterprise Agile Development

Social, Agile and Transformation

I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 and business transformation. Tuesday, February 16, 2010. Also, see my Top Ten Thoughts for SCRUM Newbies.

Agile 100
article thumbnail

Agile Process Improvement Using. Agile! - Social, Agile, and.

Social, Agile and Transformation

I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 big data. (20). media and publishing. (6). big data. (20). media and publishing. (6).

Agile 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

No Scrum Master? No Problem - Social, Agile, and Transformation

Social, Agile and Transformation

I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 big data. (20). media and publishing. (6). big data. (20). media and publishing. (6).

SCRUM 100
article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

The company's website was defaced with a leering Yoba face, and the attackers claimed to have stolen some 7 1/2 terabytes of data. The SyTech projects exposed included social media monitoring solutions and TOR deanonymization tools. So the app will ask you for permission to use your location data. states and territories.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

The company's website was defaced with a leering Yoba face, and the attackers claimed to have stolen some 7 1/2 terabytes of data. The SyTech projects exposed included social media monitoring solutions and TOR deanonymization tools. So the app will ask you for permission to use your location data. states and territories.

article thumbnail

THE CYBERWIRE DAILY PODCAST EP. 389 WITH GUEST SPEAKER DAVID BRUMLEY

ForAllSecure

The company's website was defaced with a leering Yoba face, and the attackers claimed to have stolen some 7 1/2 terabytes of data. The SyTech projects exposed included social media monitoring solutions and TOR deanonymization tools. So the app will ask you for permission to use your location data. states and territories.