💻
Software Development
Technical Knowledges
Technical Knowledges
  • Everything anyone should know
    • Fundamental
      • Life cycle of Dependency Injection
        • When to use?
          • Transient
          • Scoped
          • Singleton
      • OOP
        • Inheritance
          • More with override in C#
            • Why need to use "virtual" keyword when we can use "new" keyword
          • How to achieve multiple inheritance in C#
          • Note
        • Polymophism
        • Encapsulation
        • Abtraction
          • Not use "override" keyword in abstract method
          • Notes
      • Data representing
        • JSON
        • XML
        • Comparation
      • Middleware
      • Status Code
      • API Styles
        • SOAP
        • REST
          • Question
        • GraphQL
        • gRPC
        • WebSocket
        • Webhook
        • Comparation
          • SOAP vs REST
          • REST vs GraphQL
          • gRPC vs REST
          • HTTP vs WebSocket
      • SDK
    • Advanced
      • Memoize
      • N+1 issues
      • Concurrency
        • Thread
          • Race Condition
          • Thread Safety
          • Critical Sections
        • Deadlock
        • Semaphore
    • Comparison
      • Architecture
        • SOA vs Microservices
        • Strong Consistency vs Eventual Consistency
      • Data structures
        • Instance vs Object
        • Field vs Property
        • Properties vs Method
        • Class vs Struct
        • const vs readoly vs static
        • Value types and Reference types
        • i++ vs ++i
        • Prototypal Inheritance vs Class Inheritance
        • Abstraction vs Interface
        • Run-time vs Compile-time
        • Overloading vs Overriding
      • Front-end
        • SSR vs SPA
        • Axios vs Fetch
      • Databases
        • Different between Function() and Store Procedure()
      • Security
        • Encoding vs Encryption vs Tokenization
      • Message Broker
        • RabbitMQ vs Kafka
      • Devops
        • Kubernetes vs Docker Swarm
        • Docker Repository vs Docker Registry
      • Cloud
      • Computer Science
        • Recursion and Iteration
      • Technology
        • .NET Core vs .NET Framework
        • Cache vs Local Storage vs Session Storage vs Cookies
      • SDLC
        • TDD vs BDD
  • Design Pattern
    • Overview
    • Creational Design Patterns
      • Abstract Factory
        • Code Example
          • C#
          • Java
          • Python
      • Builder
        • Code Example
          • C#
          • Java
          • Python
      • Factory Method
        • Code Example
          • C#
          • Java
          • Python
      • Prototype
        • Code example
          • C#
          • Java
          • Python
      • Singleton
        • Code example
          • C#
            • Naïve Singleton
            • Thread-safe Singleton
          • Java
            • Naïve Singleton (single-threaded)
            • Naïve Singleton (multithreaded)
            • Thread-safe Singleton with lazy loading
          • Python
            • Naïve Singleton
            • Thread-safe Singleton
    • Structural Design Patterns
      • Adapter
        • Code example
          • C#
          • Java
          • Python
            • Conceptual Example (via inheritance)
            • Conceptual Example (via object composition)
      • Bridge
        • Code example
          • C#
          • Java
          • Python
      • Composite
        • Code example
          • C#
          • Java
          • Python
      • Decorator
        • Code example
          • C#
          • Java
          • Python
      • Facade
        • Code example
          • C#
          • Java
          • Python
      • Flyweight
        • Code example
          • C#
          • Java
          • Python
      • Proxy
        • Code example
          • C#
          • Java
          • Python
    • Behavior Design Patterns
      • Chain of Responsibility
        • Code example
          • C#
          • Java
          • Python
      • Command
        • C#
        • Java
        • Python
      • Interpreter
        • Code example
          • C#
      • Iterator
        • Code example
          • C#
          • Java
          • Python
      • Mediator
        • Code example
          • C#
          • Java
          • Python
      • Memento
        • Code example
          • C#
          • Java
          • Python
      • Observer
        • Code example
          • C#
          • Java
          • Python
      • State
        • Code example
          • C#
          • Java
          • Python
      • Strategy
        • Code example
          • C#
          • Java
          • Python
        • Different with using abstract class
      • Template Method
        • Code example
          • C#
          • Java
          • Python
      • Visitor
        • Code example
          • C#
          • Java
          • Python
    • Use cases
      • Real-life example
    • More
      • Circuit Breaker Pattern
      • Repository Pattern
      • Unit Of Work Pattern
    • Some design patterns contradictory
  • Architect
    • Clean Architecture
    • Layered (n-tier) Architecture
    • Microservices Architecture
    • Monolithic Architecture
    • Service-Oriented Architecture (SOA)
    • Domain-Driven Design (DDD)
    • Blackboard Architecture
    • Object-Oriented Architecture
  • Microservices Design Pattern
    • Saga Pattern
      • Example
    • Strangler Fig Pattern
    • API Gateway Pattern
    • Backends For Frontends (BFF) Pattern
    • Service Discovery Pattern
    • Circuit Breaker Pattern
    • Bulk Head Pattern
    • Retry Pattern
    • Sidecar Pattern
    • Event Driven Architecture Pattern
    • CQRS (Command and Query Responsibility Segregation)
      • Event Sourcing
      • Code example
        • Basic
        • CQRS + MediatR + EDA + RabbitMQ
      • The Good, the Bad, and the Ugly
    • Configuration Externalization Pattern
  • Design and development principles
    • SOLID aka Design Principles
    • Cohesion Principles
    • Coupling principle
    • Some fundamental principles
      • Separation of Concerns
      • Persistence Ignorance
      • DRY
      • KISS
  • Authentication and Authorization Standards
    • SAML
    • OAuth
    • OIDC
    • SCIM
    • SSO
    • Tools
      • Keycloak
    • More
      • JWT
      • Access Token & Refresh Token
  • .NET TECHNOLOGY
    • .NET MVC
      • HTML Helpers
        • Extension method for HTML Helpers
      • Filters
        • Order of Filters
    • Fundamental
      • Startup file
      • Query Data
        • Linq
          • Filtering
          • Sorting
          • Projecting
          • Quantifying
          • Flattening
          • Grouping
          • Joining
          • Aggregating
          • Deferred execution vs Immediate execution
        • OData
          • Filter Expression
      • ORM
        • Entity Framework
          • Eager Loading vs Lazy Loading vs Explicit Loading
          • How to improve our entity framework core query performance
        • Dapper
        • Why Dapper faster than Entity Framework
      • Identity Server
      • Fluent Validation
      • Minimal API
      • Generic
      • IoC
        • Castle Windsor
        • Autofac
        • Ninject
      • CLR
      • Refit
      • Task Schedule
        • Hangfire
        • Quartz
      • Some notice
    • Advanced
      • Multi Thread
        • Thread pool
        • Parallel
        • Comparation
        • Code comparation
      • Caching
        • IMemoryCache
      • MediatR
      • SignalR
      • API Gateway
        • Ocelot
      • gRPC
      • Multitenancy
      • Special C# technique
        • Generic
        • Extension Method
        • Delegate
        • Lambda Expression
        • Yield
      • Jetbrain tools
        • dotTrace
        • dotMemory
        • dotPeek
      • ABP Framework
        • Multi Layered
          • Domain Layer
            • Entities
            • Repository
            • Domain Services
          • Application Layer
            • Application Services
            • Data Transfer Objects
          • Data Access
            • Entity Framework Core Integration
            • MongoDB Integration
        • Microservice Architecture
        • DDD
          • Domain Layer
            • Entities & Aggregate Roots
            • Value Objects
            • Repositories
            • Domain Services
            • Specifications
          • Application Layer
            • Application Services
            • Data Transfer Objects
            • Unit of Work
    • Tutorial Coding
      • Custom and Using Middleware in .NET CORE
      • Connect Elastic Search and MongoDB
      • Implementing the Unit of Work Pattern in Clean Architecture with .NET Core
    • ServiceStack
    • POCO
  • System Design
    • Blueprint
    • Fundamental
      • Scale from zero to millions of users
        • Single server setup
        • Database
        • Load balancer
        • Database replication
        • Cache
        • Content delivery network (CDN)
        • Stateless web tier
        • Data centers
        • Message queue
        • Logging, metrics, automation
        • Database scaling
        • Millions of users and beyond
      • A framework for system design interviews
        • Step 1 - Understand the problem and establish design scope
        • Step 2 - Propose high-level design and get buy-in
        • Step 3 - Design deep dive
        • Step 4 - Wrap up
        • Summarize
      • Back-of-the-envelope estimation
      • Design a rate limiter
        • Step 1 - Understand the problem and establish design scope
        • Step 2 - Propose high-level design and get buy-in
          • Algorithms for rate limiting
            • Token bucket algorithm
            • Leaking bucket algorithm
            • Fixed window counter algorithm
            • Sliding window log algorithm
            • Sliding window counter algorithm
          • High-level architecture
        • Step 3 - Design deep dive
          • Rate limiting rules
          • Exceeding the rate limit
          • Detailed design
          • Rate limiter in a distributed environment
          • Performance optimization
          • Monitoring
        • Step 4 - Wrap up
      • Design consistent hashing
        • Consitent hashing
        • Two issues in the basic approach
        • Wrap up
      • Design key-value store
        • Understand the problem and establish the design scope
        • CAP theorem
        • System components
          • Data partition
          • Data replication
          • Consistency
          • Inconsistency resolution
          • Handling failures
          • System architecture diagram
          • Write path
          • Read path
      • Design a unique id generator in distributed systems
        • Step 1 - Understand the problem and establish design scope
        • Step 2 - Propose high-level design and get buy-in
          • Multi-master replication
          • UUID
          • Ticket Server
          • Twitter snowflake approach
        • Step 3 - Design deep dive
        • Step 4 - Wrap up
      • Design a url shortener
        • Step 1 - Understand the problem and establish design scope
        • Step 2 - Propose high-level design and get buy-in
        • Step 3 - Design deep dive
          • Data model
          • Hash function
          • URL shortening deep dive
          • URL redirecting deep dive
        • Step 4 - Wrap up
      • Design a web crawler
        • Step 1 - Understand the problem and establish design scope
        • Step 2 - Propose high-level design and get buy-in
        • Step 3 - Design deep dive
          • DFS vs BFS
          • URL frontier
          • HTML Downloader
          • Robustness
          • Extensibility
          • Detect and avoid problematic content
        • Step 4 - Wrap up
    • Use cases
      • Design Youtube
      • Design Social Media App
      • Design Typehead Suggestion
      • Design Taxi Booking System
      • Design Messaging App
  • DBMS
    • Fundamental
      • ACID
      • Order Of Execution of the SQL query
      • Transaction – Concurrency Control Techniques
        • Isolation level
      • Index
        • Clustered Index vs Non-clustered index
        • Index vs Unique index
      • Built-in functions
        • String Functions
          • ASCII
          • CHAR
          • CHARINDEX
          • CONCAT
          • CONCAT_WS
          • DATALENGTH
          • DIFFERENCE
          • FORMAT
          • LEFT
          • LEN
          • LOWER
          • LTRIM
          • NCHAR
          • PATINDEX
          • QUOTENAME
          • REPLACE
          • REPLICATE
          • REVERSE
          • RIGHT
          • RTRIM
          • SOUNDEX
          • SPACE
          • STR
          • STUFF
          • SUBSTRING
          • TRANSLATE
          • TRIM
          • UNICODE
          • UPPER
        • Numeric Functions
          • ABS
          • ACOS
          • ASIN
          • ATAN
          • ATN2
          • AVG
          • CEILING
          • COUNT
          • COS
          • DEGREES
          • EXP
          • FLOOR
          • LOG
          • LOG10
          • MAX
          • MIN
          • PI
          • POWER
          • RADIANS
          • ROUND
          • SIGN
          • SIN
          • SQRT
          • SQUARE
          • SUM
          • TAN
        • Date Functions
          • CURRENT_TIMESTAMP
          • DATEADD
          • DATEDIFF
          • DATEFROMPARTS
          • DATENAME
          • DATEPART
          • DAY
          • GETDATE
          • GETUTCDATE
          • ISDATE
          • MONTH
          • SYSDATETIME
          • YEAR
        • Advance Functions
          • CASE
          • CAST
          • COALESCE
          • CONVERT
          • CURRENT_USER
          • LEAD
          • LAG
          • IIF
          • ISNULL
          • ISNUMERIC
          • NULLIF
          • SESSION_USER
          • SESSIONPROPERTY
          • SYSTEM_USER
          • USER_NAME
      • SQL Best Practice
      • Execution Plan
      • Optimize query execution
    • Advanced
      • CTE
      • Window function
      • Performance Tuning
        • Query tuning
        • Interview ques
      • DB Sharding
      • Concurrency Control
        • Optimistic lock
        • Pessimistic lock
      • Compare DELETE VS TRUNCATE
    • Comparation
      • Oracle vs SQL Server vs Postgre vs Mysql
  • Javascript
    • ES6 Techniques
      • Hoisting
      • Destructing
      • Spread Operator
      • Rest Operator
    • Basic
      • Const vs Let vs Var
      • Debounce & Throttle
      • Callback()
    • 5 ways to define a function
  • Clean code
    • Page 2
  • Search Engine
    • Elastic Search
      • Interview question
      • Code Example
    • Solr
    • IBM Watson Discovery
    • Google Cloud Search
    • Coveo Relevance Cloud
  • Cloud Service
    • Overview
    • Azure
      • Certificate
        • AZ-900
          • Describe cloud concepts
            • What is Cloud Computing?
            • Benefits of using cloud services
              • High Availability and Scalability
              • High Elasticity
              • High Reliability and Predictability
              • High Security and Governance
              • High manageability
            • IaaS vs PaaS vs SaaS
            • Cloud Deployment Models
            • CAPEX vs OPEX
          • Describe Azure architecture and services
            • Describe the core architectural components of Azure
              • Learn sandbox
              • Azure physical infrastructure
              • Azure management infrastructure
              • Create an Azure resource
            • Describe Azure compute and networking services
              • Azure Virtual Machines
              • Create an Azure Virtual Machine
              • Azure Virtual Desktop
              • Azure Containers
              • Azure Function
              • Describe application hosting options
              • Configure network access
              • Describe Azure Virtual Networking
              • Azure Virtual Private Networks
              • Azure ExpressRoute
              • Azure DNS
            • Describe Azure storage services
              • Azure storage accounts
              • Azure storage redundancy
              • Azure storage services
              • Create a storage blob
              • Identify Azure data migration options
              • Identify Azure file movement options
            • Describe Azure identity, access, and security
              • Azure directory services
              • Azure authentication methods
              • Azure external identities
              • Azure conditional access
              • Azure role-based access control
              • Zero trust model
              • Defense-in-depth
              • Microsoft Defender for Cloud
          • Describe Azure management and governance
            • Describe cost management in Azure
              • Factors that can affect costs in Azure
              • Compare the Pricing and Total Cost of Ownership calculators
              • Estimate workload costs by using the Pricing calculator
              • Compare workload costs using the TCO calculator
              • Azure Cost Management tool
            • Describe features and tools in Azure for governance and compliance
              • Azure Blueprints
              • Azure Policy
              • Purpose of resource locks
              • Configure a resource lock
              • Service Trust portal
            • Describe features and tools for managing and deploying Azure resources
              • Tools for interacting with Azure
              • Azure Arc
              • Azure Resource Manager and Azure ARM templates
            • Describe monitoring tools in Azure
              • Azure Advisor
              • Azure Service Health
              • Azure Monitor
        • SC-900
          • Describe the concepts of security, compliance, and identity
            • Describe security and compliance concepts
              • Shared responsibility model
              • Defense in depth
              • Zero Trust model
              • Encryption and hashing
              • Compliance concepts
            • Describe identity concepts
              • Authentication and authorization
              • Identity as the primary security perimeter
              • Role of the identity provider
              • Directory services and Active Directory
              • Federation
          • Describe the capabilities of Microsoft Azure Active Directory, part of Microsoft Entra
            • Describe the services and identity types of Azure AD
              • Azure Active Directory
              • Available Azure AD editions
              • Azure AD identity types
              • Types of external identities
              • Concept of hybrid identity
            • Describe the authentication capabilities of Azure AD
              • Authentication methods available in Azure AD
              • Multi-factor authentication (MFA) in Azure AD
              • Self-service password reset (SSPR) in Azure AD
              • Password protection and management capabilities of Azure AD
            • Describe the access management capabilities of Azure AD
              • Conditional Access in Azure AD
              • Benefits of Azure AD roles and role-based access control
            • Describe the identity protection and governance capabilities of Azure AD
              • Identity governance in Azure AD
              • Entitlement management and access reviews
              • Privileged identity Management
              • Azure Identity Protection
          • Describe the capabilities of Microsoft security solutions
            • Describe basic security capabilities in Azure
              • Azure DDoS protection
              • Azure Firewall
              • Web Application Firewall
              • Network segmentation in Azure
              • Azure Network Security groups
              • Azure Bastion and JIT Access
              • Describe ways Azure encrypts data
            • Describe security management capabilities of Azure
              • Cloud security posture management
              • Microsoft Defender for Cloud
              • Enhanced security of Microsoft Defender for Cloud
              • Microsoft cloud security benchmark and security baselines for Azure
            • Describe security capabilities of Microsoft Sentinel
              • SIEM and SOAR
              • How Microsoft Sentinel provides integrated threat management
              • Understand Sentinel costs
            • Describe threat protection with Microsoft 365 Defender
              • Microsoft 365 Defender services
              • Microsoft Defender for Office 365
              • Microsoft Defender for Endpoint
              • Microsoft Defender for Cloud Apps
              • Microsoft Defender for Identity
              • Microsoft 365 Defender portal
          • Describe the capabilities of Microsoft compliance solutions
            • Describe the Service Trust Portal and privacy at Microsoft
              • Service Trust Portal
              • Microsoft's privacy principles
              • Microsoft Priva
            • Describe the compliance management capabilities in Microsoft Purview
              • Microsoft Purview compliance portal
              • Compliance Manager
              • Describe use and benefits of compliance score
            • Describe information protection and data lifecycle management in Microsoft Purview
              • Know your data, protect your data, and govern your data
              • Data classification capabilities of the compliance portal
              • Sensitivity labels and policies
              • Data loss prevention
              • Retention policies and Retention labels
              • Records management
            • Describe insider risk capabilities in Microsoft Purview
              • Risk management
              • Communication compliance
              • Information barriers
            • Describe the eDiscovery and audit capabilities of Microsoft Purview
              • eDiscovery solutions in Microsoft Purview
              • Audit solutions in Microsoft Purview
            • Describe resource governance capabilities in Azure
              • Azure Policy
              • Azure Blueprints
              • Capabilities in the Microsoft Purview governance portal
        • DP-900
          • Core Concept
            • Explore core data concepts
              • Data formats
              • File storage
              • Databases
              • Transactional data processing
              • Analytical data processing
            • Explore data roles and services
              • Job roles in the world of data
              • Identify data services
          • Relational Data in Azure
            • Explore fundamental relational data concepts
              • Relational data
              • Normalization
              • SQL
              • Database objects
            • Explore relational database services in Azure
              • Azure SQL services and capabilities
              • Azure services for open-source databases
              • Exercise: Explore Azure relational database services
          • Non-relational data in Azure
            • Explore Azure Storage for non-relational data
              • Azure blob storage
              • Azure DataLake Storage Gen2
              • Azure Files
              • Azure Tables
              • Exercise: Explore Azure Storage
            • Explore fundamentals of Azure Cosmos DB
              • Azure Cosmos DB
              • Identify Azure Cosmos DB APIs
              • Exercise: Explore Azure Cosmos DB
          • Data analytics in Azure
            • Explore fundamentals of large-scale data warehousing
              • Data warehousing architecture
              • Data ingestion pipelines
              • Analytical data stores
              • Exercise: Explore data analytics in Azure with Azure Synapse Analytics
            • Explore fundamentals of real-time analytics
              • Understand batch and stream processing
              • Explore common elements of stream processing architecture
              • Azure Stream Analytics
              • Exercise: Explore Azure Stream Analytics Completed
              • Apache Spark on Microsoft Azure
              • Exercise: Explore Spark Streaming in Azure Synapse Analytics Completed
            • Explore fundamentals of data visualization
              • Power BI tools and workflow
              • Core concepts of data modeling
              • Considerations for data visualization
              • Exercise – Explore fundamentals of data visualization with Power BI Completed
        • AI-900
      • Azure Subscription
      • Azure App Service
      • Azure Dictionary B2C
      • Azure Front Door
      • Azure Traffic Manager
      • Azure Load Balancer
      • Azure KeyVault
      • API Management
      • Azure Logic Apps
      • Azure Metric and Logs
      • Azure Workbooks
      • Azure Messaging Services
      • Azure Service Fabric
      • Comparison
        • Durable Function vs Logic App
        • Storage queues vs Service Bus queues
        • Event Grid vs Service Bus
    • AWS
      • Certificate
        • CLF-C02
          • Cloud Concepts
            • Cloud Computing
            • The Deployment Models of the Cloud
            • The Five Characteristics of Cloud Computing
            • Six Advantages of Cloud Computing
            • Problems solved by the Cloud
            • Types of Cloud Computing
            • Pricing of the Cloud
            • AWS Global Infrastructure
              • AWS Regions
              • AWS Availability Zones
              • AWS Points of Presence (Edge Locations)
            • Tour of the AWS Console
            • Shared Responsibility Model diagram
          • Security & Compliance
            • AWS Shared Responsibility Model
            • DDOS
            • Network Firewall
            • Penetration Testing on AWS Cloud
            • Encryption
            • AWS Certificate Manager (ACM)
            • AWS Secrets Manager
            • AWS Artifact (not really a service)
            • Amazon GuardDuty
            • Amazon Inspector
            • AWS Config
            • AWS Macie
            • AWS Security Hub
            • Amazon Detective
            • AWS Abuse
            • Root user privileges
            • IAM Access Analyzer
            • Summary
            • Advanced Identity
              • STS
              • Cognito
              • Directory Services
              • IAM Identity Center
              • Summary
          • Cloud Technology & Services
            • IAM
              • IAM: Users & Groups
              • IAM: Permissions
              • IAM Policies inheritance
              • IAM Policies Structure
              • IAM – Password Policy
              • Multi-Factor Authentication - MFA
              • How can users access AWS?
                • AWS CLI
                • AWS SDK
              • IAM Roles for Services
              • IAM Security Tools
              • IAM Guidelines & Best Practices
              • Shared Responsibility Model for IAM
              • Summary
            • EC2
              • Overview
              • EC2 Instance Types
                • Overview
                • General Purpose
                • Compute Optimized
                • Memory Optimized
                • Storage Optimized
                • Example
              • Security Groups
              • SSH in EC2
              • EC2 Instance Purchasing Options
                • On-Demand Instances
                • Reserved Instances
                • Savings Plans
                • Spot Instances
                • Dedicated Hosts
                • Dedicated Instances
                • Capacity Reservations
                • Summary
              • EC2 Instance Storage
                • EBS
                • EBS Snapshot
                • AMI
                • EC2 Image Builder
                • EC2 Instance Store
                • EFS
                • Shared Responsibility Model for EC2 Storage
                • Amazon FSx
                • Summary
            • ELB & ASG
              • High Availability, Scalability, Elasticity
              • ELB
              • ASG
              • Summary
            • Amazon S3
              • Overview
              • Security
              • Techniques
              • Shared Responsibility Model for S3
              • AWS Snow Family
              • Summary
            • Database & Analytics
              • Overview
              • RDS & Aurora
              • Amazon ElastiCache
              • DynamoDB
              • Redshift
              • EMR
              • Amazon Athena
              • Amazon QuickSight
              • DocumentDB
              • Amazon Neptune
              • Amazon QLDB
              • Amazon Managed Blockchain
              • AWS Glue
              • DMS – Database Migration Service
              • Summary
            • Other Compute Service
              • Docker
              • ECS
              • Fargate
              • ECR
              • AWS Lamda
              • Amazon API Gateway
              • AWS Batch
              • Amazon Lightsail
              • Summary
                • Other Compute - Summary
                • Lambda Summary
            • Deploying and Managing Infrastructure
              • CloudFormation
              • CDK
              • Elastic Beanstalk
              • AWS CodeDeploy
              • AWS CodeCommit
              • AWS CodePipeline
              • AWS CodeArtifact
              • AWS CodeStar
              • AWS Cloud9
              • SSM
              • AWS OpsWorks
              • Summary
            • Global Infrastructure
              • Overview
              • Route 53
              • CloudFront
              • AWS Global Accelerator
              • AWS Outposts
              • AWS WaveLength
              • AWS Local Zones
              • Global Applications Architecture
              • Summary
            • Cloud Integration
              • Overview
              • SQS
              • Kinesis
              • SNS
              • MQ
              • Summary
            • Cloud Monitoring
              • CloudWatch
              • EventBridge
              • CloudTrail
              • X-Ray
              • CodeGuru
              • Health Dashboard
              • Summary
            • VPC
              • Overview
              • IP Addresses in AWS
              • VPC Diagram
              • Core networking
              • VPC Flow Logs
              • VPC Peering
              • VPC Endpoints
              • AWS PrivateLink (VPC Endpoint Services)
              • Site to Site VPN & Direct Connect
              • AWS Client VPN
              • Transit Gateway
              • Summary
            • Machine Learning
              • Rekognition
              • Transcribe
              • Polly
              • Translate
              • Lex & Connect
              • Comprehend
              • SageMaker
              • Forecast
              • Kendra
              • Personalize
              • Textract
              • Summary
            • Other Services
              • WorkSpaces
              • AppStream 2.0
              • IoT Core
              • Elastic Transcoder
              • AppSync
              • Amplify
              • Device Farm
              • Backup
              • Disaster Recovery Strategies
              • AWS Elastic Disaster Recovery (DRS)
              • DataSync
              • Application Discovery Service
              • Application Migration Service (MGN)
              • Migration Evaluator
              • Migration Hub
              • FIS
              • Step Functions
              • Ground Station
              • Pinpoint
          • Account Management, Billing & Support
            • Organizations
            • SCP
            • Control Tower
            • RAM
            • Service Catalog
            • Savings Plan
            • AWS Compute Optimizer
            • Billing and Costing Tools
            • Pricing Calculator
            • Tracking costs in cloud
              • Cost Explorer
            • Monitoring costs in the could
            • AWS Cost Anomaly Detection
            • AWS Service Quotas
            • Trusted Advisor
            • Support Plans
            • Summary
              • Account Best Practices
              • Billing and CostingTools
          • AWS Architecting & Ecosystem
            • General Guiding Principles
            • Well Architected Framework
              • Operational Excellence
              • Security
              • Reliability
              • Performance Efficiency
              • Cost Optimization
              • Sustainability
            • AWS CAF
            • AWS Right Sizing
            • AWS Ecosystem
      • Comparison
        • Region, Availability Zone and Edge Location in AWS
        • EBS vs EFS
    • GCP
    • OCI
    • Object Storage Server
      • MinIO
    • Comparison
      • Azure Active Directory B2C vs AWS Cognito
  • Front End
    • Basic
      • HTML
        • <ul> vs <ol>
        • <table>
      • CSS
        • Padding
        • Box Model
        • Outline
        • Text
        • Display
        • Position
        • z-index
        • Overflow
        • Float
        • Inline vs Inline-block
        • CSS Combinators
        • CSS [attribute] Selector
        • Website Layout
        • Unit
        • CSS The !important Rule
        • Flexbox
        • Comparation
          • div.classname vs div .classname
          • .classname vs .clasname #id vs .classname#id
      • JQuery
        • Syntax
        • Document
      • AJAX
    • Modern Framework
      • React
        • HOC
        • State Management
          • Redux
            • Selector
            • Middleware
              • Saga
              • Thunk
          • MobX
        • Hooks
        • Life Cycle
          • React Lifecycle Methods
          • React Lifecycle Hooks
          • Comparation
        • Signals
      • Angular
        • Directives
          • Component Directives
          • Attribute Directives
            • Built-in
            • Building an Attribute Directive
          • Structural Directives
            • Built-in
            • Custom
        • Binding
        • Components
        • Routing
      • Vue
    • Compile & Module
      • Webpack
      • Babel
    • TypeScript
      • Cheat sheet
    • Blazor
      • WebAssembly
    • UI Library
      • Formik
      • Material UI
      • Tailwind CSS
    • Security
      • Top 7 Common Frontend Security Attacks
    • Some notices
  • Microservices
    • Service Mesh
    • Service Registry
    • Service Discovery
    • Composition
    • Orchestration
    • Transformation
    • Dapr
  • Network
    • Protocols
      • Overview
      • HTTP
      • MQTT
      • AMQP
      • FTP
      • TCP
      • UDP
      • ICMP
    • OSI Model
  • Cache
    • Redis
      • What data should and should not be cached
      • Use cache in
      • Demo in .NET
    • Hazelcast
    • Memcached
  • Message Broker
    • RabbitMQ
      • Demo in .NET
      • Interview Ques
      • Use case
    • Kafka
      • Top 5 Kafka Use Case
    • ActiveMQ
    • Masstransit
  • Bash Script
    • Linux file system
    • Cheat sheet
    • 18 Most-used Linux Commands
    • Interview Question
  • Devops
    • Overview
      • What is ?
      • IaC
      • SAFe
      • Progressive Delivery
        • Blue Green Deployments
        • Canary Deployments
        • A/B Test
      • Platform Engineering
    • Azure Pipeline
    • Docker
      • What is ?
      • Docker Engine
        • Image
        • Docker file
          • Some commands
        • Container
        • Network
        • Volume
          • Additional infomation
      • Docker CLI
      • Docker Compose
        • Additional
      • Docker Security
        • Best Practice
        • Additional Information
      • Docker Swarm
      • Storing
        • Docker Registry
        • Docker Hub
      • Summarize
    • Kubernetes
      • What is ?
        • Additional
      • Kubernetes Pod
      • Replication Controllers
      • ReplicaSets and DaemonSets
        • Additional
      • Kubernetes Services
      • Deployment
        • Additional
      • Volume
      • PersistentVolumes
        • Additional
      • Configuration
        • Additional
      • StatefulSets
        • Additional
      • Downward API
      • Kubernetes internals architecture
      • Pod internal
      • ServiceAccount and Role Based Access Control
      • Network
        • Additional
      • Managing and calculating resources used for Pods
      • Automatic scaling Pods and clusters
      • Advanced scheduling
        • Taints and tolerations
        • Node affinity and Pod affinity
        • Additional
      • Adding custom resource to Kubernetes
    • Openshift
    • IaC
      • Terraform
        • Definition
        • Why chose Terraform?
        • IAC with Terraform
          • Terraform Workflow
            • Terraform Init
            • Terraform Plan
            • Terraform Apply
            • Terraform Destroy
          • Terraform Syntax
        • Terraform Architecture
          • Variable in terraform
          • Variable Type Contraint
          • Terraform Output
          • Terraform Provisioners
        • Terraform State
          • The concept
          • Local and Remote State Storage
          • Persisting Terraform State in AWS S3
          • Hand on
        • Terraform Modules
          • Accessing and Using Terraform Modules
          • Interating with Terraform Module Inputs and Outputs
          • Hand on
        • Built-in Functions and Dynamic Blocks
          • Built-in Function
          • Terraform Type Constraints (Collection & Structural)
          • Terraform Dynamic Block
          • Hand on
        • Terraform CLI
          • Terraform CLI: fmt, taint & import
          • Hand on
            • Practicing Terraform CLI commands(fmt, taint, import)
            • Using Terraform CLI Commands (workspace and state) to Manipulate a Terraform deployment
      • Ansible
    • Jenkin
    • GitOps
      • What is ?
      • Argo CD
    • Monitoring
      • Prometheus and Grafana
      • New Relic
  • Web Server
    • Apache
    • Nginx
    • IIS
  • Security
    • How to prevent crawl data
    • SQL Injection
    • OWASP
      • Web Application Security Risks
        • Broken Access Control
        • Cryptographic Failures
        • Injection
        • Insecure Design
        • Security Misconfiguration
        • Vulnerable and Outdated Components
        • Identification and Authentication Failures
        • Software and Data Integrity Failures
        • Security Logging and Monitoring Failures
        • Server-Side Request Forgery
      • API Security Risks
        • Broken Object Level Authorization
        • Broken Authentication
        • Broken Object Property Level Authorization
        • Unrestricted Resource Consumption
        • Broken Function Level Authorization
        • Unrestricted Access to Sensitive Business Flows
        • Server Side Request Forgery
        • Security Misconfiguration
        • Improper Inventory Management
        • Unsafe Consumption of APIs
    • Security headers
      • HTTP Strict Transport Security (HSTS)
      • Content Security Policy (CSP)
      • Cross Site Scripting Protection (X-XSS-Protection)
      • X-Frame-Options
      • X-Content-Type-Options
      • X-Permitted-Cross-Domain-Policies
      • Public Key Pinning (PKP)
        • What is HTTP Public Key Pinning and Why It’s Not Good to Practice
      • Expect-CT
        • The end of Expect-CT
      • Referer-Policy
      • Pragma
      • Cache-Control
        • Difference between Pragma and Cache-Control headers
      • Same-origin policy
      • Cross-origin resource sharing (CORS)
  • Data Change Capture (CDC)
    • Debezium
  • Software Development Life Cycle (SDLF)
    • Waterfall
    • V Model
    • Agile
      • Methods
        • Xtreme Programming
          • TDD
          • BDD
        • Scrum
        • Kanban
      • Question
  • Secure Software Development Framework (SSDF)
    • Page 1
  • Source Control
    • Git
    • SVN
    • TFS
  • Integration Systems
    • Stripe
    • Salesforce
    • TaxJar
    • Zendesk
  • Enterprise Service Bus (ESB)
    • Mulesoft
  • Data
    • 5 type of analytics
  • SOFTWARE QUALITY STANDARDS – ISO 5055
    • Standard
    • All about ISO 5055
  • Interview Question
    • Overview
      • Roadmap To Clearing Technical Interview
    • Technical
      • DSA
      • System Design
      • C#
      • React
    • Behavior
    • Question back to the interviewer
  • Roadmap
    • .NET
    • Java
  • English
    • Phát âm ed
    • Many vs much
    • Most vs most of vs almost vs the most
    • Quy tắc thêm s,es vào danh từ và cách phát âm s,es chuẩn xác nhất
  • Those will be seen later
    • Note
    • Interview
  • Programming Language
    • Python
      • Data structure
        • Set
    • Javascript
      • Data Structure
        • Map
    • C#
      • Data Structure
        • Value type & Reference type
        • Using statement
        • HashSet
        • Dictionary
        • Priority Queue
      • Fact
        • Understand about IEnumerable vs. IQueryable vs. ICollection vs. IList
        • 5 things you should know about enums in C#
    • Java
Powered by GitBook
On this page
  • 1. Definition of Kanban
  • 2. Key concepts in the Kanban model
  • 3. Advantages and disadvantages of the Kanban method
  • 4. Compare Kanban, Scrum and Agile
  • 5. Basic steps to implement Kanban
  • 6. Some management tools use the Kanban method
  • 7. Conclusion
  1. Software Development Life Cycle (SDLF)
  2. Agile
  3. Methods

Kanban

PreviousScrumNextQuestion

Last updated 11 months ago

1. Definition of Kanban

1.1. What is Kanban?

Kanban is a term originating from Japan, first used at Toyota car company. In Japanese, Kanban is composed of the words "kan" meaning "sight" and "ban" meaning "card", so this term can be simply understood as an "information board".

The Kanban model is used as a tool to visualize tasks to be done, so project members can see where they are in the workflow. A simple way is to use whiteboards and stick colored sheets of paper underneath to describe and manage the work process.

1.2. History of the birth of Kanban

In the late 40s of the last century, Toyota Corporation was in a period of crisis due to great competition from domestic and foreign corporations. To solve that crisis, engineer proposed a plan to improve and optimize the group's production system. This method, originally called Just-in-time , was used with the goal of keeping up with production schedules according to customer needs, based on identifying material shortages in the process.

The team used colorful Kanban cards to record information, and had them move one by one through work stations in the production line: a card could serve as an order ticket while at the work station. work, then when going to the next stop it becomes a transportation ticket.

In doing this, Toyota has adhered to the following principles:

  • Details are always transmitted from the previous stage to the next stage

  • When you don't receive a Kanban card, don't start production

  • Each box in the line needs to contain a Kanban card clearly stating: product details, place of production, destination, quantity.

  • Each box and each tray needs to contain the specified quantity, without excess

  • Do not hand over parts or waste products to the next stage

  • The time between deliveries and the number of Kanbans should be minimized

As a result, Kanban cards have indeed helped the team to strictly control each step in the production line. It's important that they all show alignment with previous workflows and carry sufficient information.

Later, engineer Taiichi Ohno and Toyota Corporation realized that the Kanban principle is not limited to the manufacturing sector, but can be applied to any other process or organization. That was the forerunner of the current Kanban management method.

1.3. Operating principle of Kanban

Today, the Kanban model is based on some basic principles as follows:

  • Workflow visualization: Kanban uses Kanban boards, columns, and cards to visualize tasks and workflows. Each card represents a task that needs to be done, and the columns on the board represent different stages of the workflow – also different states of the task. At its simplest, a Kanban board can include 3 columns: To-do, Doing, and Done.

  • Work In Progress Limit – WIP Limit : Kanban limits the amount of work done at once at each stage of the workflow. The amount of work for each person and each department also needs to be limited to a feasible level. This helps avoid overload and at the same time motivates people to increase focus on the current job instead of running multiple tasks at the same time.

  • Maintain workflow flow: The goal of Kanban is to optimize workflow, ensuring that work moves from one stage to the next coherently, without unnecessary delays. Moving the Kanban card to change the status of each task will be done sequentially according to the original regulations to avoid congestion.

  • Focus on continuous improvement : The production process is always improved continuously, even if it is already very good. Did you know that if you consistently make very small improvements to increase your productivity by 1% every week, after a year you can increase your productivity by up to 67%?

  • No products are defective.

2. Key concepts in the Kanban model

2.1. Job board

A task board (Kanban board) is a board containing the to-do items of a project or work process. In traditional management tools, this is called a "project" or "workspace". .

In a Kanban board, work cards are moved through columns that correspond to stages in the workflow, to represent the progress of the work. In addition, Kanban Boards can include additional information such as performance statistics, requests, notes, or other charts to assist in managing and tracking work progress.

Looking at the task board, the implementer can easily grasp the route to the plan's goal, the overall progress of the work flow, and outstanding information such as which tasks need to be prioritized. First, which jobs are about to expire and have expired,...

2.2. Job list column

A Kanban column is a concept used to describe sections of a Kanban board, each representing a different stage or state in the workflow. Work tags move through these columns as they are executed one after another through the workflow.

Each Kanban column will contain a List of cards - usually cards in the same stage of the process. In traditional project management, this is a “to-do list” or “task list.”

2.3. Job card

Work cards (Kanban cards) are used to visualize tasks in the workflow. Each task card represents a specific task, such as a task to be completed or a product to be realized. Kanban cards in traditional project management tools are called “to-dos” or “tasks”.

Each Kanban card will include necessary information such as:

  • Card title: Brief description of the task to be performed

  • Person in charge: Name of the person assigned to the task or responsible for that task

  • Estimated completion: A deadline or expected time to complete the task

  • Code: The number corresponding to each card, used to accurately identify and search for that card in the Kanban system

  • Color code or sticker: Marks the status of work cards, or identifies cards that have been classified

  • Priority marking: Signs to identify tasks that need to be prioritized for early implementation.

The job card is evidence of all activities that form work results. Therefore, every time the entire work process needs to be reevaluated, the management team can quickly check each job card to have a more detailed and accurate view.

3. Advantages and disadvantages of the Kanban method

Nothing is perfect, and the Kanban method has its advantages and disadvantages to keep in mind.

3.1. Advantage

  • Everyone is on the same plane: The Kanban method makes it easy for everyone to see all tasks and to-dos, bringing transparency to the entire work process. Accordingly, each member has the ability to eliminate unnecessary work and focus on the most important tasks.

  • Flexible work management: During the work process, new Kanban cards will be easily added, or their status and priority will be changed. Thanks to that, Kanban is considered a quick response model, helping the workflow easily respond to changing requirements.

  • Increase work productivity: The Kanban method requires people to focus on current tasks until they are completed, avoiding multitasking that causes process congestion or affects the output quality of work. This principle has helped tasks to be handled more neatly and scientifically, increasing actual work productivity.

  • Helps quickly detect bottlenecks in the process: When working on a Kanban board filled with job cards, it is not difficult to recognize bottlenecks in the process: some columns are overloaded with tasks, Some columns have been stuck for a long time, some cards have not been moved to another stage for a long time, etc. This is one of the outstanding advantages of the visualization method.

  • Simple system, easy to deploy: Thanks to the easy-to-understand usage principle and easy-to-set-up model, the Kanban method can be deployed in any team, business of any industry or scale. It can even be flexibly applied to different processes, or different stages of the project without causing too much disturbance.

3.2. Defect

  • Difficulty in estimating time: Kanban focuses on continuous work and does not place many time limits. The columns on the board correspond to work stages but do not have corresponding time frames, making it difficult to plan when tasks will be performed, and estimate when everything will be completed. .

  • Must update regularly: The Kanban method requires users to update the status of job cards regularly, even instantly; because otherwise, the team risks working with inaccurate information, and also loses the meaning of visualizing workflows into tables and columns.

  • Difficult to apply on a large scale: If in a work flow there are too many related activities or tasks that require frequent transitions, or there are tasks that do not meet the requirements and must change status. "Going back" to the previous stage, the Kanban board is easy to get confused. It will be difficult for the execution team to capture and keep up with all of this activity.

  • No guaranteed output: Kanban often focuses on transitioning statuses to cards in the workflow, so while it drives daily task execution, it can put the bigger picture at risk: small tasks are completed, but the final output – in the grand scheme of things – is not necessarily achieved.

3.3. So how is Kanban suitable for projects?

The Kanban method is most suitable in projects where priorities fluctuate to a high degree – even from day to day, especially projects that possess the following factors:

  • The project emphasizes a continuous workflow rather than single, critical deadlines

  • The project is facing a backlog due to work delays. The basic process is stable but operations need to be smoother and more efficient.

  • There is not much pressure on completion time

  • Need a flexible system to add, delete, and edit task information during work

  • Need continuous improvement in the working process

  • You want the team to have the ability to report results at any time

4. Compare Kanban, Scrum and Agile

4.1. Explanation of concepts

On the other hand, Kanban is also a management model that belongs to the Agile family , which means it provides specific tools and processes for Agile implementation. It embodies many of the principles that characterize Agile methodology, including adaptability to change and promoting transparency across the entire team.

Therefore, essentially we will only need to compare Kanban and Scrum to clearly see the difference.

4.2. Compare Kanban and Scrum

Scrum

Kanban

Origin history

Software Development

Lean production

Principle operate

Continuously improve through implementing and evaluating the results of development iterations (Sprints)

Use visuals to visualize workflows and tasks (tables, columns, and cards)

Core principles

– Transparency – Adaptation – Inspection

– Effective – Efficient – ​​Predictable

Workflow

There is a fixed duration, there is a sprint phase

Is a continuous flow

Implementation steps

– Build and manage Product Backlog – Sprint planning – Sprint execution – Daily meeting – Sprint review – Sprint improvement meeting

– Outline the workflow on the Kanban board – Set up WIP Limit for each column – Create Kanban cards – Start working – Improve the Kanban system

Team structure

Complete team with 3 specific roles: Product Owner, Scrum Master, Scrum Development Team

No specific roles are divided, can be applied to any team structure

Performance metrics

Completion speed Workload Team satisfaction

Cycle Time Total time from request to completion Efficiency of process flow

4.3. Should I choose Kanban or Scrum?

Depending on the scale and nature of the project, you can choose to apply the Kanban or Scrum model accordingly. Both of these approaches promise to make the implementation process more transparent, more efficient, and improved over time.

Or else, you can implement and manage projects in a model that combines (and is influenced by) both Kanban and Scrum – called Scrumban . Scrumban uses Scrum processes and Kanban visualization tools. For example, leveraged Kanban boards are a great tool for tracking individual tasks within a Scrum sprint.

5. Basic steps to implement Kanban

Step 1: Outline the workflow on the Kanban board

To implement Kanban, you need to start by having a whiteboard or online Kanban board. Then, separate your workflow into specific stages from start to finish. Draw columns on the board, each column representing one of the stages.

Step 2: Set WIP Limit for each column

To use the Kanban method effectively, you need to define and apply a concurrent workload limit (WIP Limit) to each Kanban column – the maximum number of jobs allowed to exist in that column at the same time. point. This step is to keep the workflow throughout the project smooth, avoiding work overload.

Considering your individual workload, you should also set a limit of only 2-3 tasks that need to be done at the same time. This number will help you concentrate better, not feel pressured by doing too many things at once, and also not reduce the quality of your work output.

Step 3: Create Kanban cards

Next, it's time to create the corresponding Kanban card for each job or task, and then place them on the corresponding column of the board. Each card should contain essential information such as title, person in charge, due date, and any additional information.

Note that you can arrange the cards in each column in order of priority – with the most urgent tasks at the top, so you have a clear view of the work in progress and know how to prioritize tasks reasonable.

You can also choose different colors for the cards to associate different types of work, urgency or priority (For example: Red is urgent, yellow is priority). second, blue is normal).

Step 4: Start working

Once you've deployed your Kanban board, you can start working on the work on the top card of each column. Once completed, move the card to the next column in the workflow. Note that you need to ensure compliance with WIP Limits to avoid overload and optimize performance.

If there are problems or obstacles during work, handle them quickly, to ensure the process is as smooth as possible.

Step 5: Improve the Kanban system

Don't forget to continuously collect feedback from your team and stakeholders (partners, customers, supporters) and use this information to improve the Kanban system – including the process work, structure of tables and columns, or how to arrange and label on Kanban cards,...

And after a regular period of time, you can count and summarize the status of the work cards: how many cards have moved to the last column, how many cards are overdue,... to Know the actual performance of individuals and teams. Through these numbers, it is possible to evaluate whether the Kanban method is really effective – compared to before using it, or before you made improvements to the system.

6. Some management tools use the Kanban method

6.1. Trello task management application

Trello's working interface is identical to sticky notes stuck on a whiteboard. The columns are collectively called List, often applied to describe the steps of a simple process flow. For example: To-do > Step 1 > Step 2 > Step 3 > Complete.

On Trello, you can easily move Cards by drag-and-drop, from one List to another. The necessary information fields in each job card are guaranteed. In particular, group members can communicate directly with each other right in each Card, by leaving comments and tagging each other's names.

Trello's weaknesses are the hierarchy of admin members, no time management, and no reporting.

6.2. Base Wework project management software

Base Wework inherits Trello's optimized Kanban interface, but at the same time completely solves the disadvantages that Trello has :

  • Customize strict decentralization, transparency, support for an individual to participate in deploying and/or managing multiple departments and projects.

  • Built-in internal chat feature, allowing 1-1 online chat and group chat

  • Employees receive automatic reminders every day, including to-do lists and late alerts

  • Develop a feature to review work results, ensuring the work flow is not congested and ensuring output quality

  • In particular: There is a comprehensive reporting system on project implementation results, with data updated in real-time on the amount of work, implementation progress, and individual performance. core,…

With a set of professional and flexible features, Base Wework project management software is a tool favored by administrators, suitable for projects of all nature and scale.

6.3. Base Workflow business process management software

In each process, the software supports managing quantity, quality and progress accurately:

  • Inside each big task can be a list of small tasks. Only when they are all marked complete is the big task ready for handover. A handover is a task that will automatically include all attachments, information, results, notes, etc.

  • Each step in the process is responsible for one or more specific personnel. When the work is handed over to that step, the software will automatically assign the work and send a notification to the responsible person, on the principle of balancing the amount of work to be done between personnel.

  • There are detailed performance reports for each business process.

In particular, the power of Base Workflow is demonstrated in linking business processes into a comprehensive system, capable of automatically transferring between processes (For example: When a job is pulled - drop to the completion step of the Contract Processing Flow , it will be automatically forwarded to the Payment Flow ). This is a special feature that Trello and traditional Kanban tools do not have.

7. Conclusion

Managing work and processes is now easier with the Kanban method and supporting software. Kanban can be applied flexibly at many times - in many places - in many cases, as long as the implementer possesses system thinking and understands its principles.

Photo of Kanban system at Toyota factory (Source: Internet)
Simple Kanban model
The Kanban method is best suited in projects where priorities fluctuate to a high degree

In essence, is a methodology, an overarching philosophy based on iterative and incremental principles for project management. The goal of Agile is to help shorten product development time and bring products to customers as soon as possible.

is a framework that follows the Agile methodology, often used in product development projects where the end goal has not yet been determined by the user. Scrum focuses on optimizing value achieved in fixed time cycles lasting from 1-4 weeks, to continuously improve the product, technology, team and work environment.

Read more:

is one of the popular work management tools based on the Kanban method. With a minimalist design, easy experience, plus a free version, Trello is popular for use by individuals or small teams.

Trello's familiar Kanban interface

In Vietnam, is the leading project management software alternative to Trello.

Intuitive and flexible progress tracking in a variety of methods, suitable for many purposes and project natures: not limited to the Kanban interface, data can also be flexibly converted to list formats ( to-do list), schedule format, format ,...

Applying the Kanban method in

Also developed by Base.vn, is a 4.0 Business Process Management software , applying the Kanban method thoroughly and advancedly.

Set up which is a specific time limit for each step. The automatic timer has the ability to exclude holidays and non-working hours. When a task is overdue and has not been delivered, it will turn red for both employees and managers to recognize.

Applying the Kanban method in
Taiichi Ohno
Agile
Scrum
What is the Waterfall model? How to apply Waterfall to project management
Trello
Base Wework
Gantt chart
Base Workflow
an SLA (Service Level Agreement)
Base Wework project management software
Base Workflow business process management software
Trello's kanban interface
What is kanban?
Simple Kanban model
kanban model
kanban method in process management
Kanban method in work management
kanban and scrum