Collaboration Tools

now browsing by category


SAFe 4.5 Scrum Master (SSM) Workshop – Boston, March 2018

SAFe 4.5 Scrum Master (SSM) Workshop – Boston, March 2018
Become a SAFe Scrum Master – Learn How To Build High Performing Agile Teams In The Lean/Agile Enterprise In this two-day course, attendees will gain an understanding of the role of a Scrum Master in a SAFe enterprise. Unlike traditional Scrum Master training that focuses on the fundamentals of team-level Scrum, the SAFe Scrum Master course explores the role of the Scrum Master in the context of the entire enterprise, and prepares attendees to successfully plan and execute the Program Increment (PI), the primary enabler of alignment throughout all levels of a SAFe organization. This includes learning the key components of Agile at scale development, how Scrum is facilitated throughout the enterprise, and how to execute Iteration Planning. Attendees will also discover how to build high performing Agile teams by becoming a servant leader and coach, and how to coach those teams to deliver the maximum business value at scale. SAFe 4 Scrum Master (SSM) certification signifies that people are prepared to perform the role of Scrum Master in a SAFe environment, increasing their value to teams and organizations that are implementing SAFe. The following individuals will benefit from this course: New Scrum Masters who need to perform the role Existing Scrum Masters who would like to understand their role in the context of a SAFe enterprise Team Leads who want to understand the Scrum Master role SAFe Release Train Engineers who want to coach Scrum Masters on their role   Learning Goals To perform the role of a SAFe® Scrum Master, attendees should be able to:   Describe Scrum in a SAFe enterprise Facilitate Scrum events Facilitate effective Iteration execution Support effective Program Increment execution Support relentless improvement Coach Agile teams for maximum business results Support DevOps implementation   Topics Covered In this course attendees will:   Introducing Scrum in SAFe Characterizing the role of the Scrum Master Experiencing Program Increment planning Facilitating Iteration execution Finishing the Program Increment Coaching the Agile team   Lead Trainer: Yuval Yeret (SPCT4) Yuval leads the Scaled Agile practice at AgileSparks working with companies such as Intel, Siemens, HP, CyberArk, CA Technologies. He is a SAFe Program Consultant Trainer (SPCT4), an internationally recognized Kanban Trainer as well as a Certified Scrum Master/Product Owner/Practitioner with lots of experience helping organizations use Scrum/SAFe in a way that works and delivers in the real world. He’s a recipient of the Lean Systems Society Brickell Key Award for world-influencing talent and is a Lean Systems Society Founding Fellow. You can check out his thinking in the popular blog at or in his book “Holy Land Kanban”. “Yuval’s class is great! His broad experience as a consultant and active member of various agile communities helps in connecting the dots. He also added examples from his own experience to practically every aspect and subject of the class. His interactive teaching style stimulates conversation and learning by building on experiences and knowledge from him and class attendees.” – Jasper Sonnevelt – Leankit   Learn more about the SAFe Scrum Master workshop Check out our Guarantees and Policies
starting on 2018-03-05 08:30:00

MicroTek Training Rooms
25 Burlington Mall Road #204
United States

See How HipChat and Confluence work together

See How HipChat and Confluence work together

Free droid apps – review

As time changed the lifestyle of peoples also kept changing now days even kids are available with cell phones to chat with their friends and family members. There are no obligations for the use of cell phones because of the popularity and necessity to the general peoples. Now day’s normal mobile phones are hardly used by any one there are lots of new and advanced features integrated by the cell phone manufacturing companies that have made cell phones unbelievable, now days even cell phones can be used as computer with small QWERTY keypad and a display with screen touch function enabled in it.

One important thing that was missing in cell phone was connectivity to internet but now days with the help of GPRS you can connect to internet where ever you are, it has enable the Wi-Fi services in which you will be able to access the high speed internet services where the Wi-Fi services is enabled. Now you can also browse internet on your cell phone device making it almost impossible to remain disconnected anymore. You can keep your personal and professional life all live and active with the use of droid hands-free app.

Now with the use of droid hands free app (android) you can use your droid in many different ways. When you are texting while driving, you could easily use speech aspect of this application to send the text to others, similarly you can listen to text messages while you are driving as well. The use of internet in mobile phones are increasing rapidly because each one of us requires fast and quick service without wastage of any time so with the help of mobile internet it’s possible to get as many services possible online.

One of the most amazing and attractive application derived is drive safely no don’t worry about that it’s not going to teach you how to drive safely but will help you in getting your text messages and emails to read. Most of the accidents are committed due to diversion if concentration during driving, but this app will help you to concentrate only on driving where as the message will be read by and iSpeech service enabled in it. Isn’t all these app interesting with the help of all these droid apps you can make your mobile a fully functioned and smarty cell phone. For more details on droid app feel free to visit our website


Now with the use of droid hands free droid app (android) you can use your droid in many different ways. According to experts recommendation you should try free droid app in your android phone to get you phone fully featured.




Social content software Photo
By mohamed1982eg from Pixabay

RC CWR – Lipo LOW VOLTAGE ERROR recharge battery

RC CWR – Lipo LOW VOLTAGE ERROR recharge battery

Lipo battery recharged from a low voltage error. The battery that I am recharging from a low voltage error is not damaged at all. I would not attempt this at all if I thought that the battery was damage in any way. I had left the battery plugged into my truck, draining the battery down below minimum voltage. This is a very dangerous charge to do to a lipo, extreme caution. Lipo batteries can start on fire for many reasons. I am in NO way saying that this a what you should do or saying that it is safe to do. I am just sharing with you what I did to my battery under my circumstances. I tried the battery after in my wraith and it work fine, to good maybe. I ended up braking one of the 4 link suspension arms, to fast, to quick, to high, to long, to much air off an ice jump. LOL. Easy fix and no I didn’t get it on video, dang it anyways. We were having to much fun. Thanks for watching and safe RCing.

Kevin MacLeod
Blown Away

Social Engineering: The Art of Human Hacking

Social Engineering: The Art of Human Hacking

Product Description
The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats

Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

From the Author: Defining Neuro-Linguistic Hacking (NLH)

Author Chris Hadnagy

NLH is a combination of the use of key parts of neuro-lingusitic programming, the functionality of microexpressions, body language, gestures and blend it all together to understand how to “hack” the human infrastructure. Let’s take a closer at each to see how it applies.

Neuro-Lingusitic Programming (NLP): NLP is a controversial approach to psychotherapy and organizational change based on “a model of interpersonal communication chiefly concerned with the relationship between successful patterns of behavior and the subjective experiences underlying them” and “a system of alternative therapy based on this which seeks to educate people in self-awareness and effective communication, and to change their patterns of mental and emotional behavior”

Neuro: This points to our nervous system which we process our five senses:
• Visual
• Auditory
• Kinesthetic
• Smell
• Taste

Linguistic: This points to how we use language and other nonverbal communication systems through which our neural representations are coded, ordered and given meaning. This can include things like:
• Pictures
• Sounds
• Feelings
• Tastes
• Smells
• Words

Programming: This is our ability to discover and utilize the programs that we run in our neurological systems to achieve our specific and desired outcomes.

In short, NLP is how to use the language of the mind to consistently achieve, modify and alter our specific and desired outcomes (or that of a target).

Microexpressions are the involuntary muscular reactions to emotions we feel. As the brain processes emotions it causes nerves to constrict certain muscle groups in the face. Those reactions can last from 1/25th of a second to 1 second and reveal a person’s true emotions.

Much study has been done on microexpressions as well as what is being labeled as subtle microexpressions. A subtle microexpression is an important part of NLH training as a social engineer as many people will display subtle hints of these expressions and give you clues as to their feelings.

Price: $20.09

  • Social Engineering The Art of Human Hacking

Slack Direct Messages

Slack Direct Messages

This video walks through the way to send a private message between Slack group members.

Do Better With Asana: Your Guide To Doing Great Things With Asana: Beginner Edition

Do Better With Asana: Your Guide To Doing Great Things With Asana: Beginner Edition

Product Description
Discover the Second Edition of the best-seller by Mike Vardy & Jeremy Roberts, now based on the re-branded version of Asana thanks to Bastien Siebman!

This Beginner Edition does not contain the chapter “Advanced Techniques”.

This book is the culmination of months of communication and collaboration and combined years of productivity specialization. Words traveled from the Northern Hemisphere to the Southern Hemisphere and back countless times, and what you’re reading right now is the end result. But the real question is, why did we come together to work on this project?

Because we love what Asana has allowed us to do over the years, and we want to share how you can get the most out of it—right from the time you use it.

One of the things we’ve heard about Asana on our websites and through various conversations we have online is that it can be too complex. For some, that will be true. For others, Asana will seem like a breath of fresh air compared to what they’ve used in the past (Microsoft Project anyone?). The two of us wanted to create something that would help those who struggle with getting out of the gate with Asana as well as deliver tips, tricks, and tactics for more seasoned users so that they can get even more out of Asana.

We’ve also heard that Asana is great for team task management but not for individual work. It may seem that way from the onset, but Asana is useful for one person operations just as much as it is for very large teams. Do Better With Asana aims to dispel all of the myths that surround Asana, including the myth that Asana just isn’t designed for personal use. Within these pages you’ll learn about the ways you can leverage Asana, no matter what your organizational structure and workflow preferences are. Asana is truly adaptable, and Do Better With Asana will demonstrate just how adaptable it is.

We just don’t talk the talk in Do Better With Asana; we walk the walk.

The three of us are active Asana users. We’ve been using Asana since its release. Jeremy and Bastien use Asana with several teams, and Mike uses it to communicate and collaborate with clients and Productivityist team members all over the world. Mike has even paid a visit to the Asana offices to get a closer look at what the team is building there.

But it doesn’t stop there with us. This entire program was built using Asana and tools that integrate with Asana. Since we live in opposite regions of the globe, we used Slack for communication in real-time. Asana is linked to Slack so we can track our activity in our Do Better With Asana Workspace. We used Asana to manage this project from its first steps to the creation process and into the launch phase and beyond. We also leveraged Google Drive’s integration with Asana to share the text for each section of the book and grabbed research links using the Google Chrome Extension in order to get the links into Asana. Every conceivable aspect of the Do Better With Asana product began and ended in Asana.

So if you’ve been looking to get more out of Asana–whether you have just added it to your productivity toolbox or have been using it for a lengthy period of time—this guide is going to be a valuable resource. We’re passionate about productivity, and we’re passionate about Asana. We wanted to distill those passions into something that will help people just like you power up their productivity and level up their lives as a result. We know Asana can help you do that…and Do Better With Asana will help you do that even better.

    LeanKit Kanban – Visualizing Prioritized Tasks

    LeanKit Kanban – Visualizing Prioritized Tasks

    This video demonstrates how you can use LeanKit Kanban to visually identify the priority of software development tasks, then enabling you to always focus your efforts on the most important work.

    Monkey Asana: Shoulder Stand

    Monkey Asana: Shoulder Stand
    Mara took these with her magnetic monkey. 🙂
    By DragonFly24 on 2006-08-24 10:09:23