Agile Archives - JASON SUTTIE
Jason Suttie Head of Disruption at The Foundery division of Rand Merchant Bank
Jason, Suttie, RMB, Agile, DevOps, Rand, Merchant, Bank, Technology, IT, Disruption, Foundery,
60
archive,category,category-agile,category-60,ajax_fade,page_not_loaded,,qode_grid_1300,footer_responsive_adv,qode-theme-ver-16.2.1,qode-theme-bridge,disabled_footer_bottom,wpb-js-composer js-comp-ver-5.4.7,vc_responsive

Agile

FinTech is making waves across the globe - but little is known or predicted about how this will shape banking in Africa. I sat down with KNect 365 on what the future could look like. ...

On the 29th August, FirstRand in partnership with BSG hosted the Fast Fish Forum at FNB Bank City. The forum titled “Demystifying the Data Science cookbook - Tasty meals or disasters waiting to happen?” focused on how to do Data Science projects right and some of the pitfalls in the delivery lifecycle. Post a short Data Science cookbook presentation – paired with delicious food from a great chef, the forum then moved to an emergent agenda that was participant directed....

DevSecOps = DevOps + Security ( Sec ) In the world of DevSecOps as you may predict we have three teams working together. Development, the Security team and Operations. ...

THE “SEC” OF DEVSECOPS introduces changes into the following: • Engineering • Operations • Data Science • Compliance...

Even if you are focussing on the tools and technology in DevOps. You cant forget about the behaviour of people. The change in technology that DevOps brings is equally profound as the change people need to make in the way they work....

The body has organs that provide specific and vital functions. In order to survive each organ needs to work in harmony with the other. Just like the body, enterprises have organizational divisions/silos that provide specific functions....

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern" css=".vc_custom_1463146108811{padding-bottom: 20px !important;}"][vc_column offset="vc_col-lg-offset-1 vc_col-lg-10 vc_col-md-offset-1 vc_col-md-10"][vc_column_text][dropcaps type='normal' font_size='45' color='#191919' background_color='' border_color='']T[/dropcaps]ypically, IT policies cover many aspects of technology – including security. These policies are written in elaborate documents and then are stored somewhere cryptic. Then we hire experts to come in and manually run penetration tests against the environment which gives us measurement feedback on both compliance and vulnerabilities. We then take these manually generated penetration test reports and ask people in...