Thu.Jan 23, 2020

article thumbnail

What You Should Know About the New California Consumer Privacy Act

TechSoup

The California Consumer Privacy Act of 2018 (CCPA) went into effect on January 1, 2020. It is the first law insuring personal online privacy being implemented in the U.S. Any "business" with an online presence around the world will have to comply with the California Consumer Privacy Act if it receives personal data from any California residents or has gross revenues over $25 million.

Insurance 100
article thumbnail

DevOps Deeper Dive: DevOps Consolidation This Way Comes

DevOps.com

The merger of XebiaLabs and CollabNet VersionOne announced this week will accelerate the ongoing consolidation of providers of DevOps platforms that has been slowly gaining momentum for the better part of two years. Under the terms of the agreement, the unnamed combined company will be led by Ashok Reddy, formerly with Broadcom, CA Technologies and […].

DevOps 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Visual artifacts and defined roles in running a program

Martin Fowler

Luiza and James finish their article on running programs in product mode organizations by discussing two useful practices. Investing in visual artifacts to help convey information to those involved, and the necessity of having defined roles for managing the overall program.

article thumbnail

Top 10 cities to hire developers

Hacker Earth Developers Blog

According to StackOverflow , the demand for software developers still outpaces the supply. Research reveals that in the US alone, tech talent shortage is predicted to cost the country USD 435.7 billion. . Unfortunately, businesses in major tech countries such as the US and the UK have long been suffering because of the rapid growth of tech industries and the shortage of talented developers.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Get Better Results in 2020: A Frontline Festival

Let's Grow Leaders

Welcome to the Let’s Grow Leaders Frontline Festival! This month, our contributors share their thoughts about how to achieve better results in 2020. Thanks to Joy and Tom Guthrie of Vizwerx Group for the great pic and to all our contributors. Are you […]. The post How to Get Better Results in 2020: A Frontline Festival appeared first on Let's Grow Leaders.

How To 193

More Trending

article thumbnail

Standards for Writing Accessibly

A List Apart

Writing to meet WCAG2 standards can be a challenge, but it’s worthwhile. Albert Einstein, the archetypical genius and physicist, once said, “Any fool can make things bigger, more complex, and more violent. It takes a touch of genius—and a lot of courage—to move in the opposite direction.”. Hopefully, this entire book will help you better write for accessibility.

Culture 125
article thumbnail

Infinite Storage in Confluent Platform

Confluent

A preview of Confluent Tiered Storage is now available in Confluent Platform 5.4, enabling operators to add an additional storage tier for data in Confluent Platform. If you’re curious about […].

Storage 122
article thumbnail

FBI calls, Apple obeys demand over iCloud data

TechBeacon

Apple killed its plan to protect iCloud with end-to-end encryption. Over two years ago, the FBI told Tim Cook to knock it off.

Data 124
article thumbnail

Phishing Today, Deepfakes Tomorrow: Training Employees to Spot This Emerging Threat

CTOvision

Read Ian Cruxton explains how to train employees to spot sophisticated phishing attacks on Dark Reading : Deepfake fraud is a new, potentially devastating issue for businesses. In fact, last year a top executive at an unidentified energy company was revealed to have been conned into paying £200,000 by scammers using artificial intelligence to replicate […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Resilience for the future of Agile

Agile42

Nowadays, there are hardly any IT projects in which non-agile approaches are used. But what does agility mean for the rest of the organizations, is it a method or an attitude? I am very happy to be able to present this year at the Agile Beyond IT conference in Berlin , where they are creating a networking platform for mutual exchange of experience to promote agility in companies.

Agile 90
article thumbnail

Apple Dropped iCloud Encryption Plans After FBI Complaint: Report

CTOvision

Apple dropped plans to offer end-to-end encrypted cloud back-ups to its global customer base after the FBI complained, a new report has claimed. Citing six sources “familiar with the matter,” Reuters claimed that Apple changed its mind over the plans for iCloud two years ago after the Feds argued in private it would seriously hinder investigations. The […].

Report 87
article thumbnail

Microservices: The Advantages of SOA Without Its Drawbacks

DevOps.com

Service Oriented Architecture (SOA) was the great hope of organizations decades ago when they sought to advance legacy system integration, reduce and bypass layers, and rapidly access the system of record. At the time, the existing solution was point-to-point integration, creating a brittle “spaghetti” middle layer that was hard to manage. This was replaced by […].

SOA 89
article thumbnail

Why Businesses Should Start Prioritising Cybersecurity

CTOvision

Read Tim Mocan explain why businesses should start prioritizing cybersecurity on Enterprise Times : Do you have £45 million to spare? That’s how much a ransomware attack cost Norsk Hydro in the first quarter of 2019. A total of 22,000 computers had their files forcibly encrypted (made unreadable without a particular key) across 40 countries […].

article thumbnail

How Embedded Analytics Helps Product Managers Exceed Their KPIs

Embedded analytics can help you deliver cutting-edge analytics experiences to your end-users that align with KPIs that are critical to the growth and success of your business. Read this eBook to learn how an embedded analytics platform, like Qrvey, can help PMs exceed the following KPIs: Growing revenue while improving customer retention rate Delivering rapid time to value Earning a high net-promoter score Increasing Gross Margin / Profitability Conversion rate from trial to paid Don’t just meet

article thumbnail

What you can learn from Dropbox's move to Python 3

TechBeacon

In 2015, Dropbox embarked on a massive project to migrate its software infrastructure and development teams from Python 2 to the more modern Python 3. While Python's core developers had announced their intention to sunset Python 2 seven years ago, for Dropbox, it was only in 2015 that the payoff of converting all its software to the latest version of Python made sense.

article thumbnail

Semi-supervised Image Classification with Unlabeled Data

Toptal

Supervised learning is the key to computer vision and deep learning. However, what happens when you don’t have access to large, human-labeled datasets? In this article, Toptal Computer Vision Developer Urwa Muaz demonstrates the potential of semi-supervised image classification using unlabeled datasets.

Data 81
article thumbnail

Building A Pentest Program To Prevent A Data Breach

CTOvision

It was a simple misconfiguration that doomed Capital One. In March 2019, former Amazon employee Paige Thompson exfiltrated the data of more than 100 million Capital One customers, culminating in one of the year’s worst breaches. Thompson exploited what’s known as a server-side request forgery (SSRF) to access credit applications, Social Security numbers and consumer […].

article thumbnail

The Full Stack

DevOps.com

The post The Full Stack appeared first on DevOps.com.

131
131
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Top 7 Reasons Alumni Recommend Coding Dojo

Coding Dojo

“I knew that if I failed I wouldn’t regret that, but I knew the one thing I might regret is … Read more >>. The post The Top 7 Reasons Alumni Recommend Coding Dojo appeared first on Coding Dojo Blog.

81
article thumbnail

2019 data breach disclosures: 10 more of the biggest

CTOvision

Read Alexander Culafi list 10 of the biggest data breach disclosures of 2019 on Tech Target : The details of these breaches vary widely in terms of how many users were affected as well as how long it took for a company to detect a breach; sometimes not long at all, like with Zynga, and […].

Data 67
article thumbnail

What does your budget look like going into the new year?

thoughtLEADERS, LLC

Our reader poll today asks: What does your budget look like going into the new year? We have a lot more to spend than this past year. 15.4% We have about the same amount to spend as this past year. 54.7% We have much less to spend than this past year. 29.9% Belts are a little tighter. A large portion of you reported having less to spend in the coming year.

Budget 65
article thumbnail

Error'd: Amazon Deal or No Deal

The Daily WTF

"Hey Alexa, can you help Amazon with their math?" Timothy W. wrote. . "Name my %1$s so I can identify it later? How about 'Placeholder Text Goes Here'?" writes Vladimír C. . Adam L. wrote, "Now I haven't seen the code behind the scenes here, but I imagine someone might have gotten a greater / less than operator backwards." .

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Is Your Enterprise Being Disrupted by Consumerization?

Teradata

With the consumer expectations and experience bleeding into all aspects of business and life, how is consumerization translating to the enterprise? Read more.

article thumbnail

5 Straight Years of Delighting Our Customers with Outstanding Customer Support

Palo Alto Networks

Palo Alto Networks has achieved certification for Rated Outstanding Assisted Support for a fifth consecutive year from the J.D. Power Certified Assisted Technical Support program. This distinguished certification recognizes Palo Alto Networks for delivering outstanding assisted support for five straight years to customers globally. This means Palo Alto Networks will assist and support your organization throughout your entire lifecycle of Palo Alto Networks solutions to ensure maximum security an

article thumbnail

What Every Business Leader Needs to Know About Python

TIBCO - Connected Intelligence

Reading Time: 4 minutes. In this blog, written for logistics and operations management, marketing professionals, and other business leaders, you’ll learn a bit about why a scripting language, Python, may be invaluable for your analysts and data scientists, and how it can help them to get more meaningful insights faster. What’s Python, and why does it matter to your data analysts and data scientists—and to you?

article thumbnail

3 SecOps Strategies To Enable Your Smart People To Focus on Smart Things

Palo Alto Networks

This blog is the third in a series based on our book, “Elements of Security Operations,” a guide to building and optimizing effective and scalable security operations. Download a free copy today. . Presumably, you hire smart people because you want them to spend their time doing smart things. But what happens when your processes are broken, outdated, poorly defined or unscalable?

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Four short links: 23 January 2020

O'Reilly Media - Ideas

The Business Case for Formal Methods — a short explanation, a list of benefits and case studies, and a demo. Everything’s in TLA+, but the arguments apply equally well to Alloy, B, statecharts, etc. (Via Lobsters ). Backend Lore — From late 2012 to the present I have been writing backends (server-side code) for web applications. This document summarizes many aspects of how I write these pieces of code. float-toy — play with the binary representation of IEEE floats. matterbridge

article thumbnail

Reducing Build Time with Observability in the Software Supply Chain

Honeycomb

Honeycomb engineer Ben Hartshorne is highlighted in Ben Linder’s InfoQ article on reducing build time with observability in the software supply chain. Read about how Hartshorne got a more in-depth insight into the build process performance, the benefits of this, and the valuable knowledge he gained. The post Reducing Build Time with Observability in the Software Supply Chain appeared first on Honeycomb.

article thumbnail

Visualizing Social Relationships Using Object Databases

Actian

Social relationships hold a wealth of information about your customers, employees, and suppliers that (if you have the tools to harness them) can provide you valuable insights about the factors that influence behaviors that ultimately impact your bottom line. The challenge with analyzing and visualizing social relationships is that the underlying data doesn’t match well with the relational data structures that most data warehouses are designed around.

Social 40