Grasshopper ----------> Master ( D 2 )

11/17/2022

How Do We Manage Research Projects With Agile Methodologies

Posted by dhanuka ranasinghe at 11/17/2022 1 comments
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Agile
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Labels

Kubernetes (16) architecture (13) kafka (13) micro-service (8) ElasticSearch (5) SpringBoot (5) docker (5) spark (5) Flink (4) Streaming (4) kafka connect (4) MDM (3) cassandra (3) AI (2) AWS (2) Ansible (2) ArgoCD (2) BPMN (2) Camunda (2) EJB (2) ELK (2) GitOps (2) JVM (2) ML (2) YARN (2) Zeebe (2) cert-manager (2) istio (2) AKS (1) Agile (1) Azure (1) CICD (1) ChatBot (1) Cloud (1) Databricks (1) EKS (1) Flume (1) GitHub Action (1) Hadoop (1) Hashicorp-Vault (1) Hazelcast (1) Hibernate (1) Hive (1) Ingress (1) JBoss (1) JTA (1) KEDA (1) KStream (1) Kerberos (1) Lambda (1) Langchain (1) Nginx (1) Presto (1) Pulumi (1) Quarkus (1) R (1) RAG (1) SAGA (1) SNS (1) Tekton (1) apisix (1) cruise-control (1) distributed applications (1) event sourcing (1) gateway (1) keycloak (1) logback (1) mTLS (1) maven (1) prometheus (1) scala (1) system integration (1)

Popular Posts

  • Unlocking Parallelism in Spark (Databricks ) : Beyond Partition Columns
    A common understanding in the Apache Spark ecosystem is that partition columns are crucial for achieving parallel data processing. While the...
  • RAG based AI ChatBot
    image source:  https://www.datacamp.com/blog/what-is-retrieval-augmented-generation-rag  In this blogpost we are trying to explain how to cr...
  • Secure API Access using APISIX Gateway and Keycloak
      The purpose of this post is to explain how we can secure APIs using APISIX API Gateway and Keycloak.  We are going to use Keycloak for aut...
  • Kafka Connect Architecture
    Please note here I am using confluent platform. So please go to confluent installation directory and run below kafka related comman...
  • Secure HDFS With Kerberos And Access From Presto
    The purpose of this blog post is to setup Hadoop cluster which is secured by Kerberos authenti...

Search This Blog

Google Analytics

Translate

Pageviews past week

Blog Archive

  • ►  2025 (3)
    • ►  May (2)
    • ►  February (1)
  • ►  2024 (1)
    • ►  August (1)
  • ►  2023 (6)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  February (1)
  • ▼  2022 (7)
    • ▼  November (1)
      • How Do We Manage Research Projects With Agile Meth...
    • ►  September (1)
    • ►  August (1)
    • ►  March (2)
    • ►  February (2)
  • ►  2021 (7)
    • ►  September (2)
    • ►  August (1)
    • ►  July (4)
  • ►  2020 (8)
    • ►  October (2)
    • ►  May (1)
    • ►  April (2)
    • ►  March (1)
    • ►  January (2)
  • ►  2019 (7)
    • ►  December (2)
    • ►  June (1)
    • ►  April (2)
    • ►  February (2)
  • ►  2018 (14)
    • ►  November (1)
    • ►  July (4)
    • ►  June (1)
    • ►  May (6)
    • ►  April (2)
  • ►  2017 (10)
    • ►  December (1)
    • ►  October (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  April (2)
    • ►  March (3)
  • ►  2015 (2)
    • ►  October (2)
  • ►  2011 (1)
    • ►  July (1)

Followers

About Me

dhanuka ranasinghe
View my complete profile

javascript

html/javascript
Picture Window theme. Theme images by simonox. Powered by Blogger.