This issue examines the ever-evolving practices of software planning—and how we can craft plans that enrich communication, alignment, and impact on engineering teams.
In React, we don't update the DOM directly, we tell React what we want the DOM to look like, and React tackles the rest. But how exactly does it do this? In this tutorial, we'll unpack exactly when and why React re-renders, and how we can use this information to optimize the performance of our React apps.
Principles of web security. The fundamentals and state-of-the-art in web security. Attacks and countermeasures. Topics include: the browser security model, web app vulnerabilities, injection, denial-of-service, TLS attacks, privacy, fingerprinting, same-origin policy, cross site scripting, authentication, JavaScript security, emerging threats, defense-in-depth, and techniques for writing secure code. Course projects include writing security exploits, defending insecure web apps, and implementing emerging web standards.
As engineering organizations grow and add more complexity with team members at different levels of experience, they also need to create clarity: the list of job levels, and what each role does. Done well, a career ladder can limit bias and provide a framework for hiring, paying, and promoting. Note: The articles below are often an introduction to the company's level guide, and the actual career ladder is a PDF or spreadsheet linked to from the article.
How finishing what you start makes teams more productive and predictable
Let’s be honest. When you read this post’s title, you thought it was obvious. Yet, most people don’t follow this simple piece of advice. You know that too, a...
Visit http://jobstobedone.org for more info.
also you can find the Jobs to be Done community at the #JTBD on twitter.
Online Course to learn how we find the JTBD through Interviews: http://learn.jobstobedone.org/
(thanks Kijuyswe2134)
Clayton Christensen on disruptive innovators and how to hire a milkshake.
from the University Of Phoenix Lecture Series
http://www.phoenix.edu/lectures.html
In this article, “remote development environments” refer to AWS EC2 instances where engineers make code changes and can see a running Slack application with those changes. For years, engineers at Slack isolated and tested their changes by running microcosms of the Slack application on their local computers. This was difficult for many reasons: it involved […]
Kubernetes is driven by an HTTP API server which allows complete configuration and control of Kubernetes runtime. Therefore, securing access to the API server is one of the most critical security controls to ensure resilient Kubernetes in production.