ContentPosts from @dinuwan97..
Discovery IconThat's all from @dinuwan97 โ€” explore more posts below...
Story
@viktoriiagolovtseva shared a post, 16ย minutes ago

How to Make Your Jira Sprint Planning Really Agile

You know the drill:build a product roadmap in Jira, create your product backlog, review it, update the user stories, come up with a sprint goal before the meeting, and finally, review every story to decide which ones need to be completed this sprint. Easier said than done, right? Well-planned sprint..

Zrzut ekranu 2026-04-29 152303
Story
@laura_garcia shared a post, an hour ago
Software Developer, RELIANOID

Not all ๐—ฑ๐—ถ๐—ด๐—ถ๐˜๐—ฎ๐—น ๐—ฐ๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ฒ๐˜€ are created equal

๐Ÿšจ Not all ๐—ฑ๐—ถ๐—ด๐—ถ๐˜๐—ฎ๐—น ๐—ฐ๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ฒ๐˜€ are created equal. From ๐——๐—ฉ, ๐—ข๐—ฉ, ๐—˜๐—ฉ ๐˜๐—ผ ๐—บ๐—ง๐—Ÿ๐—ฆ ๐—ฐ๐—น๐—ถ๐—ฒ๐—ป๐˜ ๐—ฐ๐—ฒ๐—ฟ๐˜๐˜€ and ๐—ฐ๐—ผ๐—ฑ๐—ฒ ๐˜€๐—ถ๐—ด๐—ป๐—ถ๐—ป๐—ด, each plays a different role in your security posture. ๐Ÿ” Encryption is just the beginning: โ†’ Identity validation โ†’ Trust chains (Root โ†’ Intermediate โ†’ Leaf) โ†’ Secure software delivery โ†’ Zero Trust..

Story WrapPixel Team
@sanjayjoshi shared a post, an hour ago

8+ Shadcn Combobox Components for React & Nextjs Projects

Shadcn combobox components are more than just UI elements theyโ€™re productivity boosters. They simplify complex selections, enhance usability, and make your applications feel fast and modern.

Shadcn Combobox Cover pic OG image
ย Activity
@rafidbottler created an organization WPWeb Infotech , 2ย hours, 18ย minutes ago.
ย Activity
@qistmarkett started using tool MetalLB , 2ย hours, 37ย minutes ago.
ย Activity
@qistmarkett started using tool All in One SEO Pack , 2ย hours, 37ย minutes ago.
Story
@cloudsignals shared a post, 9ย hours ago
Director - Cloud Engineering, osttra

From Hunters to Algorithms: How AI Is Rewriting the Rules of Vulnerability Discovery

Security has entered its algorithmic era. AI is rapidly transforming vulnerability discovery by scanning code at scale, uncovering hidden patterns, and accelerating detection beyond human limits. For maintainers, this means shifting from reactive patching to intelligent triage and secure-by-design systems. For bug hunters, success now lies in combining AI speed with human creativity to uncover deeper, context-driven flaws. The future of security isnโ€™t human vs machineโ€”itโ€™s human amplified by machine.

AI-driven vulnerability discovery concept showing a split human and artificial intelligence face analyzing cybersecurity threats, with dashboards displaying SQL injection detection, risk score, and automated code analysis in a futuristic interface.
ย Activity
@koukibadr started using tool Mapbox GL JS , 18ย hours, 2ย minutes ago.
ย Activity
@koukibadr started using tool Google Maps , 18ย hours, 2ย minutes ago.
ย Activity
@koukibadr started using tool GitLab CI/CD , 18ย hours, 2ย minutes ago.