martinheider.wordpress.com
Martin Heider | Thoughts from an unknown planet in agile space | Page 2
https://martinheider.wordpress.com/page/2
Thoughts from an unknown planet in agile space. 40 Agile Monday: Make Impacts, not software. November 5, 2013. Und seinen Workshop über Impact and Story Mapping auf der XP2013 in Wien). Wenn das Thema Euch neugierig gemacht habt, anbei noch ein paar Links zum Vertiefen:. Make impacts, not software, keynote. Story Maps in practice: … build what really matters, Christian Hassa. Power of Communities of Practice. November 2, 2013. Darüber hinaus haben Michael Stingl. Vom Coworking Space und Thilo Schumann.
blog.johanneslink.net
September | 2013 | My Not So Private Tech Life
https://blog.johanneslink.net/2013/09
My Not So Private Tech Life. Johannes Link's Travels through Software Development Space. Archive for September, 2013. September 30, 2013. Almost 2 years ago I told you about why I was leaving the field. Of Agile coaching and that I’d be co-founding a start-up called. Netdosis. Very recently we eventually stopped the project. And sold the assets to a company which – among other things – is building software for drug therapy safety. There are two questions which might be of interest to you:. When in early ...
blog.johanneslink.net
August | 2014 | My Not So Private Tech Life
https://blog.johanneslink.net/2014/08
My Not So Private Tech Life. Johannes Link's Travels through Software Development Space. Archive for August, 2014. August 1, 2014. One of the recurring questions in TDD workshops is “How do I test private methods? You take a String. Split the text into lines of length. And then assemble the text by columns top-down and left to right. Here is the encryption table for “. The battle will start at daybreak. With key 7. Ignoring all spaces the resulting cipher text is “. In order to reduce the usual testing f...
blog.johanneslink.net
February | 2011 | My Not So Private Tech Life
https://blog.johanneslink.net/2011/02
My Not So Private Tech Life. Johannes Link's Travels through Software Development Space. Archive for February, 2011. Tail Recursion Optimization with Groovy’s AST Transformations. February 11, 2011. Is notorious for not being able to optimze tail recursive functions. Tail recursion. When feeding large numbers into a recursive function in Java. Let’s look at a classical example: Calculating the factorial of a number. A recursive – but not tail recursive! 8211; solution is this:. Int factorial(int number, ...
blog.johanneslink.net
Uncategorized | My Not So Private Tech Life
https://blog.johanneslink.net/category/uncategorized
My Not So Private Tech Life. Johannes Link's Travels through Software Development Space. Archive for the ‘Uncategorized’ Category. Laquo; Older Entries. April 19, 2016. General purpose OO languages – like Java or C# – come with a library for collection type objects like arrays, lists, and. If you throw in a static type system those languages usually differentiate between collection interfaces (. List, Queue, Set. And implementing classes (. ArrayList, PriorityQueue, HashSet. All that seems missing is an.
blog.johanneslink.net
October | 2011 | My Not So Private Tech Life
https://blog.johanneslink.net/2011/10
My Not So Private Tech Life. Johannes Link's Travels through Software Development Space. Archive for October, 2011. Simplified Use of Locks in Groovy. October 25, 2011. I am currently writing an article about the challenges and pitfalls of concurrent programming for a German software magazine. Since the magazine’s readers come from all kinds of platforms and programming languages I’ve chosen Groovy. As a concise means to present my examples. Groovy – together with its associated library GPars. PS: Don...
blog.johanneslink.net
tdddecrypted | My Not So Private Tech Life
https://blog.johanneslink.net/tag/tdddecrypted
My Not So Private Tech Life. Johannes Link's Travels through Software Development Space. Posts Tagged ‘tdddecrypted’. August 1, 2014. One of the recurring questions in TDD workshops is “How do I test private methods? You take a String. Split the text into lines of length. And then assemble the text by columns top-down and left to right. Here is the encryption table for “. The battle will start at daybreak. With key 7. Ignoring all spaces the resulting cipher text is “. In order to reduce the usual testin...
semgermany.wordpress.com
About | software.einfach.machen
https://semgermany.wordpress.com/about
Wie Sie Reden und Handeln wieder unter einen Hut bringen können. Hau ihn einfach um! Kam als Physiker zur Softwareentwicklung und blieb dort mit wachsender Begeisterung. Er arbeitet als Freiberufler und berät Kunden sowohl als Architekt, als auch in Prozess- und Verfahrensfragen. In den letzten Jahren hat das WIE des Arbeitens zunehmend seine Aufmerksamkeit und Neugierde geweckt. Mittlerweile ist der Auffassung, dass das WIE so gut wie ausschließlich den Projekterfolg determiniert.
semgermany.wordpress.com
Hau ihn einfach um! | software.einfach.machen
https://semgermany.wordpress.com/hau-ihn-einfach-um
Wie Sie Reden und Handeln wieder unter einen Hut bringen können. Hau ihn einfach um! Hau ihn einfach um! Gegenschnitt. Der Trainer in der anderen Ecke sagt nur einen Satz:. 8222;Hau’ ihn einfach um! Was glauben Sie, wer jenen denkwürdigen Kampf gewonnen hat? Und es wird um die Kultur gehen, den spirit eines Unternehmens. Um den schmalen Grat zwischen Kultur und Barbarei – nun ja, ein hartes Wort, aber der Realität mancher Projekte durchaus angemessen. Denn wie sollte man es sonst nennen, we...PS Mehr zu ...
SOCIAL ENGAGEMENT