Banner

What is Agile and its Principles?

What is Agile? Agile framework is defined by different sources differently. There is no one right or wrong. Below are few thoughts on Agile to understand it. As defined by Wikipedia: “Agile software development is a group of software development methods based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing, cross functional teams. It promotes adaptive planning, evolutionary development and delivery, a time-boxed iterative approach, and encourages rapid and flexible response to change. It is a conceptual framework that promotes foreseen interactions throughout the development cycle” As per Highsmith 2002 “Agility is the ability […]

What is Agile and its Principles? Read More »

What is TDD and its phases?

Test driven development – TDD, as its name describes is based on test first approach. Tests drives the development. In a very simple language Test Driven Development is nothing but frequent or fast cycles of testing, coding and refactoring with testing before coding. The speed of these cycles is such that it’s not possible to do so in a manual way. Therefore TDD is a computer programming based methodology that consists of small rapid iterations. TDD has the following steps: Think & write test cases Red – Failure of test case Green – Code and get the new test case

What is TDD and its phases? Read More »

How Project Schedule activities are related?

Project scheduling is a constant activity for a Project Manager. There are multiple challenges a project managers face when it comes to making sure the timelines are met and the project is going as per schedule or project schedule is able to absorb the challenges. It’s very important to understand for a project manager how different activities are related to each other. Without which any adoption or control of project schedule will be near to impossible. Relationships in a network diagram are defined depending upon the type of project and project needs/constraints. From PMP® prospective, there are four types of

How Project Schedule activities are related? Read More »

Two Factor Authentication

We have already read about ‘authentication’ and its role in security domains and software technologies.  Defining authentication yet again, ‘Authentication’ is specifying who you are to access protected resources. We will elaborate this concept to discuss 2FA or ‘Two factor authentication’ in this blog post. Why 2FA? Before we see what is meant by 2FA, let us see the reasons behind implementing 2FA. Data breaches are not new but the magnanimity of the breaches is growing each year. In 2014 alone, more than 1 billion personal records were accessed illegally. (zdnet.com)The ‘Anthem’ data breach, the IRS data breach are the

Two Factor Authentication Read More »

What is Kanban?

In today’s Agile world where waterfall becomes complete, not for many customers, Kanban is a very common term. Many of us assume from the word itself that it’s a board which is managed to work in agile environment. Though it’s not wrong to say Kanban is a board or informational card, there are more bites to it. This concept has been publicized by Toyota by introducing and implementing successful Just in Time concepts. Just In Time concept emphasizes on no/minimal inventories, which did wonders when implemented across organizations in terms of cost savings. As it’s clear from JIT concept, Kanban

What is Kanban? Read More »

How Lead and Lag helps in Scheduling?

Lead and Lag are two closely related terms which are commonly used in project scheduling and planning. Project Manager, while working on the schedule and activities of its project, has to closely put these two in place. These are the concepts used to derive the relationships among different activities of the project. Lead denotes acceleration of the following activity or we can say that following activity in full some or partially will start in parallel to first activity. In PMBOK® also lead is described as the amount of time whereby a successor activity can be advanced with respect to a

How Lead and Lag helps in Scheduling? Read More »

Do we have different types of Float?

Float is nothing but the bandwidth or buffer one has in the project schedule. There are lot of questions around float which troubles a project manager. Questions like, why do we need float? What are types of floats a project manager can have? Whenever any project manager starts its project, the first thing he works on is amount of total work he has to complete. Definitely when we know the total work, to manage and track it efficiently, one breaks it down in the form of activities. These activities are what a project manager uses to understand the dependencies and

Do we have different types of Float? Read More »

What is Scrum? Why we need it?

Before understanding Scrum, one need to be aware of What is Agile? Though Agility is well known term or jargon these days the basic fundamental of any Agile framework is based on iterative development and requirement evolution. Any framework can be agile as far as its in line with Agile manifesto, values and Agile principles. Scrum is one of them. Scrum in a very simple term is a framework to implement agility in a easy manner. Scrum word is taken from rugby where team is moving to the target together. Scrum is very famous these days for development due to

What is Scrum? Why we need it? Read More »

Web Application Security

Securing web applications in Java involves the very same core security concepts that are known to every InfoSec professional. These concepts and understanding the different authentication mechanisms for the ‘Web component developer’ exam forms the basis of this post. This post assumes knowledge of servlets, deployment descriptors and the servlet life cycle. The four security mechanisms: There are four basic security mechanisms that come into play when securing web applications. They are authentication, authorization, confidentiality and data integrity. Authentication is verifying who you really are. Specifying a name and password is one form of enforcing authentication. Authorization is giving individuals

Web Application Security Read More »

Data privacy in the age of the Apple vs FBI debate

With most of the technology world glued to the outcome of the tussle between Apple and FBI, “data privacy” again takes center stage in the age of social media. For almost a month now, the Apple vs FBI debate has kept us all guessing and taking sides on what is right and what is wrong. Our mobile world:               Smart phones, tablets and other mobile devices continue to grow in popularity and we store abundant amount of personal information in it. Chats, pictures, personal data, health data are all examples of some personal information stored on mobile devices. Seizing any

Data privacy in the age of the Apple vs FBI debate Read More »

Scroll to Top