The MEMORY storage engine stores all data in memory (RAM), and is used for fast lookup of data. InnoDB supports a buffer pool ...
Most of the advice on meetings concerns how to run them. But what about when you’re attending the meeting rather than running it, and the meeting is endless or boring? Certainly, it can help to stay ...
This is the age of speed dating, speed networking, speed yoga, and, yes, even speed meditation. It’s a time of rush-rush-rush in the attempt to do more, sooner, faster. But there doesn’t seem to be a ...
Occasionally, I hear someone maintain that you can’t have too much communication. I disagree. In matters of communication, more is not necessarily better. Sure, too little communication can result in ...
Behavior-driven development (BDD) and keywords are both widely used techniques to facilitate automated testing. The approaches are similar in that tests can be written in a business-readable, ...
Let’s agree that it is irrational to assume that we can completely define the requirements of a complex system upfront. Few sane practitioners would suggest that was ever an option. I’ve heard some ...
Managing software development projects involves a lot of moving parts. You might come across considerable bottlenecks and challenges that you will be required to overcome in order to accomplish ...
One of the most intriguing aspects of software architecture is trying to bring structure to areas that can’t be structured easily. Whenever an architect designs a system, service, or feature, they are ...
A transition to agile can be confusing for everyone in the organization. Agile changes many roles, as it works in a much different way from traditional software development processes. Some might argue ...
Java is one of the top programming languages. One of the choices Java developers often have to make is the Java version to install. The choice becomes complicated due to the multitude of ...
With new threats emerging exponentially in an increasingly networked ecosystem, threat modeling‍ has transitioned from a theoretical concept into an information security best practice. Organizations ...
A set of vertices with each vertex having zero or more labels and zero or more properties/attributes. A set of edges with each edge being directed from one vertex to another vertex. Each edge has zero ...