Skip to content

Pages

Courses

ALL COURSES

Resources

ALL RESOURCES

Blogs

ALL BLOGS
Page 6
14th Annual State of Agile Report – 5 Key Results You Need to Know

Agile

14th Annual State of Agile Report – 5 Key Results You Need to Know

The Annual State of Agile Report has become something of a standard in my organization over the past few years. It has been an interesting journey to see the practice of Agile methods spread across...

Read Article >

Types of Application Security

Cprime

Types of Application Security

In an earlier post, we discussed what application security is and why it\'s important. That was covering the basics. So, what next? Once you know the importance of application security, you should of course work...

Read Article >

Success with your Agile Team is all about Change Management – Here’s How

Agile

Success with your Agile Team is all about Change Management – Here’s How

I recently realized something that I probably have always known in the back of my mind years ago – implementing new ways of working is primarily about change management. Although I have coached numerous teams...

Read Article >

Agile Change Management – 3 Tips for your Agile Adoption

Agile

Agile Change Management – 3 Tips for your Agile Adoption

Recently, I have been studying how people, teams, and organizations respond to change. This may seem surprising, but I have found the human side of Agile to be the one aspect that is most often...

Read Article >

Message Driven Agility (pt. 1): Fighting Fragmentation with Atlassian + Slack

Atlassian

Message Driven Agility (pt. 1): Fighting Fragmentation with Atlassian + Slack

Let’s face it. Our world of work is fragmented despite our best efforts to achieve agility. At the heart of successful Agile transformations are tech stacks powered by workflows that transcend across value streams. Organizational...

Read Article >

Why You Should Use Xray for Jira as your Test Management Solution

Agile

Why You Should Use Xray for Jira as your Test Management Solution

Many activities go into developing any type of software. From gathering requirements to deploying to real-world users, lots of factors influence the final product. Testing is one of these factors that you have to take...

Read Article >

Lean Portfolio Management Blog Series Part 2: Strategic Alignment

Business Agility

Lean Portfolio Management Blog Series Part 2: Strategic Alignment

Strategies for shifting from “imitation LPM” to “real LPM.” In the previous installment of this blog series we provided an overview of the signs of imitation Lean Portfolio Management (LPM). In this state, organizations have...

Read Article >

Lean Portfolio Management Blog Series Part 4: Tooling

Business Agility

Lean Portfolio Management Blog Series Part 4: Tooling

In the previous articles in this series, we’ve discussed the dangers of “imitation” lean portfolio management (LPM), the steps required to set up effective LPM in your organization, and the importance of connecting all levels...

Read Article >

Lean Portfolio Management Blog Series Part 3: Organizing for Value

Business Agility

Lean Portfolio Management Blog Series Part 3: Organizing for Value

Organizing teams to shift from “imitation LPM” to “real LPM.” In the previous installment of this blog series, we discussed how organizations implementing LPM treat strategy and some of the signs of imitation LPM in...

Read Article >

Lean Portfolio Management Blog Series Part 1: An Overview

Business Agility

Lean Portfolio Management Blog Series Part 1: An Overview

  An overview on shifting from \"imitation LPM\" to \"real LPM.\"   Lean Portfolio Management (LPM) is supposed to be a world-changing paradigm shift that promises to boost productivity, time to market, quality, customer satisfaction,...

Read Article >

Introduction to Application Security: The What, Why, and How

Cprime

Introduction to Application Security: The What, Why, and How

In this digital age, we\'re surrounded by applications. From services to products, from basic needs to entertainment and luxury, we directly or indirectly depend on applications. And this high dependency has made application security a...

Read Article >

Agile Transformation Strategy – Top down or bottom up?

Agile

Agile Transformation Strategy – Top down or bottom up?

Over the past couple of years, I have worked with a variety of organizations to help them adopt Agile practices. One of the most interesting things that I have learned through the Agile transformation experience...

Read Article >