Latest Post

Continuous deployment means continuous engagement

Continuous deployment means continuous engagement

Just as effective Agile causes positive organisation changes beyond the tech team, so continuous deployment has similar wide, positive benefits. Superficially it’s a tech change: as soon as a technical changes passes its (automated) tests it gets deployed into production. But there are behaviour changes that are required to make it work effectively, and those … Continue reading


Hi. I'm Nik Silver. I've been running software teams for years. My specialism is getting technical teams working effectively with each other and with others, to deliver business value frequently and consistently. Take a look at my experience.

If you want to talk about turning talented people into brilliant teams then get in touch. I'm on e-mail, and I'm @pigsaw on Twitter.

RSS Recently spotted

  • Amazon’s Monopsony Is Not O.K. -
    ", the giant online retailer, has too much power, and it uses that power in ways that hurt America. [...] The desirability of new technology, or even Amazon’s effective use of that technology, is not the issue. After all, John D. Rockefeller and his associates were pretty good at the oil business, too — but Standard Oil nonetheless had too muc […]
  • Here's why Apple doesn't have a MacBook Air with a Retina display
    "Another Apple event has come and gone, and there's still no MacBook Air with a Retina display. [...] So, what gives? Is Apple holding back? The company may not be offering answers, but it's most likely that the technology needed to make a Retina-equipped Air simply isn't ready for prime time. As much as Apple would like the Air to hop on […]
  • Google discovers another web security flaw that leaves browsers vulnerable
    "Get ready for Heartbleed deja-vu: Google just found an exploit in SSL 3.0 that could give attackers the ability to work out the plaintext traffic of a secure connection. It's calling the attack "POODLE," or Padding Oracle On Downgraded Legacy Encryption, and it allows a man-in-the-middle attacker to decrypt HTTP cookies. Cookies can be u […]
  • Russian hackers used Windows flaw to steal NATO data
    "According to security firm iSight Partners, hackers from Russia recently gained access to sensitive NATO documents using a major flaw in Windows. The attack, which targeted data from a NATO summit last month, was reportedly part of an espionage campaign against members of the organization (such as the US, UK, France and Germany) to learn more about how […]
  • Controlling your Android phone with one button isn't as great as it sounds
    "The Pressy one-button Android controller found an eager audience when it debuted on Kickstarter in August 2013, overshooting its original funding goal of $40,000 to the tune of almost $700,000. [...] Backers were initially given a delivery date of March 2014, but shipments didn't actually go out until June. Though that's a fairly modest delay […]