Fri.Mar 22, 2019

article thumbnail

Automating ethics

O'Reilly Media - Ideas

Machines will need to make ethical decisions, and we will be responsible for those decisions. We are surrounded by systems that make ethical decisions: systems approving loans, trading stocks, forwarding news articles, recommending jail sentences, and much more. They act for us or against us, but almost always without our consent or even our knowledge.

article thumbnail

5 Tips for Owning Your Cloud Security

Perficient

As cloud expands and evolves, so does the need for customers and providers to work together to ensure data is stored safely and securely. The rise of cloud-native environments brings with it a series of new challenges that make collaboration even more relevant. Security has jumped to the forefront of priorities for IT and cloud projects in the.

Cloud 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Heuristics on approaching Example Mapping

Xebia

While Bruno Boucard, Thomas Pierrain, and I were preparing our DDDEurope 2019 workshop, we discussed how to approach Example Mapping. For the workshop, we were combining EventStorming and Example Mapping to go from problem space to solution space. The way I have been approaching Example Mapping was slightly different then Thomas and Bruno did. Mine followed […].

Examples 100
article thumbnail

How DevOps Orchestration and Feedback Loops Can Enhance Your DevOps Pipeline

DevOps.com

DevOps orchestration and feedback loops can significantly impact and improve your organization’s delivery pipeline. In this post, we’ll define and illuminate the importance of DevOps orchestration and feedback loops, and how together they can make a difference in your pipeline. DevOps Orchestration Although people widely use the terms “automation” and “orchestration” interchangeably, their scopes vary […].

DevOps 103
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Operational Resilience in the Cloud | Maximizing Business Value with AWS

Linux Academy

Operational Resilience in the Cloud. Operationally resilient organizations depend on the help of four cornerstones: Operations , Security , Software , and Infrastructure. The cloud allows you to drive improved SLAs on applications, reduce regulatory compliance complexity, minimize unplanned outages that unexpectedly cut revenue or cost money to address.

AWS 68

More Trending

article thumbnail

A Look At Our New Business Platform: Introducing Dashboard Analytics

Linux Academy

Understanding how your team is consuming training, your ROI for purchasing Linux Academy subscriptions, and knowing just what your company is doing with Linux Academy is always important. While we cover the cost of labs in your organization for you, I’m sure you still have questions such as: How many labs and how much playground usage does my organization use?

article thumbnail

Delegating Work and Tasks = Effective Leadership

CoachStation

Delegating work and tasks to your team members is one of the most necessary and important skills of leadership. It also remains one of the most challenging for many new and experienced managers. However, there are several things you can do to develop this skill. In order to free up space to be more strategic, have a greater impact, be more efficient, and achieve work/life balance, delegating appropriate tasks to others is necessary and even required for managers today.

article thumbnail

Security Relevance Can’t Be Bought

Lacework

Lacework is purpose-built for cloud and container security; Palo Alto Networks is employing a duct tape strategy. Those of us who sweat the details of things like configurations and file integrity monitoring know that complexity and imprecision are our constant enemies. Enterprise data lives and functions in a massively complex, continuously changing state that can [.].

Network 55
article thumbnail

Stuff The Internet Says On Scalability For March 22nd, 2019

High Scalability

Wake up! It's HighScalability time: Van Gogh? Nope. A satellite image of phytoplankton populations or algae blooms in the Baltic Sea. ( NASA ). Do you like this sort of Stuff? I'd greatly appreciate your support on Patreon. Know anyone who needs cloud? I wrote Explain the Cloud Like I'm 10 just for them. It has 41 mostly 5 star reviews. They'll learn a lot and love you even more.5 billion : weekly visits to Apple App store; $500m : new US exascale computer; $1.7 billion : EU's newest fine on Goo

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Why You Need to Know the Relationship between Lurking Variables and Release Management

Apps Associates

It was early fall. That time of year when the aspen leaves are just starting to change colors to yellow, gold, orange, and red colors in the high country. During the day, dark green conifers and deep blue skies provide a backdrop, while at night the crisp, cool canyon breeze gently rustles the leaves. The … Continue reading "Why You Need to Know the Relationship between Lurking Variables and Release Management".

article thumbnail

Channel Scoop – March 22, 2019

Palo Alto Networks

How often do you visit the NextWave Partner Portal ? Well, you’re in for a treat! The portal is getting a facelift. Yes, it’s time for a new look. You’ll find the same great content with new top navigation and page designs. Stay tuned for more updates. SLED Use Cases. We have five packages available to partners that address a host of SLED use cases.

Course 51
article thumbnail

3 ways to advance your IT career, and 3 ways to undermine it

DXC

This is a glass-half-empty, glass-half-full sort of blog post — featuring three suggestions for how you can get your IT career to the next level and three warning signs that your career is dead in the water. Let’s start with the good stuff, from CIO contributor Paul Heltzel, who compiled a list of 15 things […].

50
article thumbnail

5 Tips for Owning Your Cloud Security

Perficient

As cloud expands and evolves, so does the need for customers and providers to work together to ensure data is stored safely and securely. The rise of cloud-native environments brings with it a series of new challenges that make collaboration even more relevant. Security has jumped to the forefront of priorities for IT and cloud projects in the.

Cloud 45
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Do s and Don ts When Using Cloud and its Services

Cabot Solutions

Integrating the cloud into your business can be easy when done the right way Pay attention to these do s and don ts when using cloud and its services

Cloud 49
article thumbnail

Four short links: 22 March 2019

O'Reilly Media - Ideas

Explainable AI, Product Management, REPL for Games, and Open Source Inventory. XAI -- An explainability toolbox for machine learning. Follows the Ethical Institute for AI & Machine Learning's 8 principles. The Producer Playbook -- Guidelines and best practices for producers and project managers. Repl.it Adds Graphics -- PyGame in the browser, in fast turnaround time.

article thumbnail

Error'd: Killer Errors

The Daily WTF

Adam wrote, "I hear that NewFeature1 is a real, ahem, killer feature of these Wi-Fi drivers." . "Gigabyte Easy Tune6 installer must release to the failure! There is no other option!" writes Jeff B. . "DPD is having a really hard time guessing which month my Ebay delivery will take place," Rupert W. writes. . "So this USB expander can power all my peripherals, an old timey typewriter, AND a fan?

Malware 43
article thumbnail

Cloud Security This Week – March 22, 2019

Lacework

New from Lacework Integrating DevOps and Security While DevOps emphasizes speed, it has not always necessarily focused as much on security. Learn the three key practices that are critical to integrating the processes and mindsets of DevOps and SecOps. Triaging a CryptoSink Infection in 5 Minutes with Lacework When triaging an alert, a security analyst [.].

Cloud 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hands-on IoT applications with OpenWhisk and Rust

The Agile Monkey

Introduction Serverless computing is a hot topic in technology right now. As a result of this interest, all the main cloud vendors are providing their own serverless solutions. In this article, we’ll explore Apache OpenWhisk (which we’ll refer to simply as OpenWhisk), an open-source, distributed serverless platform that allows us to execute functions in response to events.

IoT 40
article thumbnail

Identity is Security: Privacy Pains

Sailpoint

Is there a bounty on privacy? That’s the question we’re exploring following SailPoint CMO Juliette Rizkallah’s latest Forbes article on the rising use of smart technology in our home. From Wi-Fi-connected baby monitors, home security systems and even Alexa—our home and office environments have changed quite a bit from dial-up and corded telephones. Working in identity management definitely keeps your mind tuned in to what and where your personal data is being used for.

article thumbnail

Making the Case for a Comprehensive Blockchain Reference Architecture

Coforge

Blockchain is a hot topic of discussion in many mainstream business boardrooms these days. Though it was once seen as part of an altogether alternative technology universe, its unique cardinal features of trust, immutability, peer-to-peer networking efficiency are now compelling businesses to rush to adopt it for transforming their large-scale business functions.

article thumbnail

How Storyfit Uses Data to Help the Entertainment Industry Hit Its Mark

DataRobot

What stories are the most compelling? What plot lines are resonating with audiences the most?

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Give Hacking a Try.You Might Just Be Great!

Security Innovation

One of the biggest challenges facing the AppSec industry today is the lack of skilled people. No matter how many firewalls are stood up, scans are run, or courses attended, almost all security efforts require highly trained practitioners. Whether it’s penetration testers, developers, hiring managers or release engineers, there are thousands of unfilled roles waiting for the right hires.

article thumbnail

Of Mice and Men and Mother Nature: Preparing for Disaster

Nutanix

Most people prefer not to think about disasters–which is why, despite all of the available information, most people are grossly underprepared when disasters do occur.

20