Thu.Jan 10, 2019

article thumbnail

Survey Sees Need for More Consistent Approaches to DevOps

DevOps.com

DevOps is arguably one of the most disruptive forces driving transformation of IT processes in recent memory. But a new survey finds that while IT organizations are making progress, adoption of DevOps processes remains uneven at best. A survey of 2,419 IT professionals conducted by OverOps, a provider of code analysis tools, finds that 82 […].

Survey 107
article thumbnail

Gradually, then suddenly

O'Reilly Media - Ideas

Technological change often happens gradually, then suddenly. Tim O'Reilly explores the areas poised for sudden shifts. There’s a passage in Ernest Hemingway’s novel The Sun Also Rises in which a character named Mike is asked how he went bankrupt. “Two ways,” he answers. “Gradually, then suddenly.”. Technological change happens much the same way. Small changes accumulate, and suddenly the world is a different place.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mob Programming

Agile Alliance

Mob Programming is a software development approach where the whole team works on the same thing, at the same time, in the same space, and at the same computer.

article thumbnail

6 Reasons Your Staff Keeps You in the Dark

Let's Grow Leaders

Do you ever feel like your staff keeps you in the dark? Do you ever wonder if they’re going out of their way to keep you out of their way? That seems ridiculous. AND, it’s entirely possible. Here’s the scary part if […]. The post 6 Reasons Your Staff Keeps You in the Dark appeared first on Let's Grow Leaders.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Top Technologies Your Business Can Take Advantage of Today

OTS Solutions

Top Technologies Your Business Can Take Advantage of Today. To stay ahead of the curve in today’s market, businesses can’t rely on the quality of their services alone. They have to adopt cutting-edge technologies that give customers and employees the convenience they’ve come to expect from competitive firms. These are some of the top technologies your business can implement today to stay successful.

More Trending

article thumbnail

Influence with Design – A Guide to Color and Emotions

Toptal

The right color palette encourages people to behave in ways designers want them to, while the wrong palette can turn visitors away before they take any action at all.

104
104
article thumbnail

Little brother is watching: Your real-time location for sale

TechBeacon

An undercover report this week accuses mobile carriers of selling your location data to brokers, some of which aren’t choosy about whom they resell it to (because of course they’re not).

Mobile 98
article thumbnail

Marriott data breach exposed 5 million unencrypted passport numbers

CTOvision

More than 5 million unencrypted passport numbers were stolen as part of the Marriott data breach last year, according to an update from the hotel giant. The information accessed in the breach, which was first disclosed on Nov. 30th, also includes approximately 20.3 million encrypted passport numbers, the Bethesda, Md.-based hotel chain revealed in an online […].

Hotels 86
article thumbnail

The best software testing conferences of 2019

TechBeacon

Some may see testing as a fairly boring and static set of practices, but the leaders in this space know that it is a vibrant discipline that is constantly improving every year, thanks to exciting new techniques made possible by better automation tools and artificial intelligence.

Testing 97
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Stay Healthy While Sitting at Your Desk and Working All Day

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

How To 95
article thumbnail

The best software testing conferences of 2019

TechBeacon

Some may see testing as a fairly boring and static set of practices, but the leaders in this space know that it is a vibrant discipline that is constantly improving every year, thanks to exciting new techniques made possible by better automation tools and artificial intelligence.

Testing 94
article thumbnail

German cyber-attack: man admits massive data breach, say police

CTOvision

A 20-year-old man has admitted to police that he was behind one of the country’s biggest data breaches, in which the private details of almost 1,000 public figures were leaked. The man, who lives with his parents in the central German state of Hesse and is still in the education system, told police he had acted […].

Data 82
article thumbnail

Conversations with Robots: Voice, Smart Agents & the Case for Structured Content

A List Apart

In late 2016, Gartner predicted that 30 percent of web browsing sessions would be done without a screen by 2020. Earlier the same year, Comscore had predicted that half of all searches would be voice searches by 2020. Though there’s recent evidence to suggest that the 2020 picture may be more complicated than these broad-strokes projections imply, we’re already seeing the impact that voice search, artificial intelligence, and smart software agents like Alexa and Google Assistant are making on th

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Malvertising Campaign Delivers Info-Stealer Plus Ransomware

CTOvision

Security researchers have warned users of P2P sites of a new malvertising campaign featuring a twin threat: info-stealing malware and ransomware. By registering rogue advertising domains, the attackers are able to direct torrent site visitors to two different exploit kits: Fallout EK and GrandSoft EK, according to Malwarebytes. Those unlucky enough to be pushed according to geolocation […].

Malware 79
article thumbnail

A List Apart - Untitled Article

A List Apart

In late 2016, Gartner predicted that 30 percent of web browsing sessions would be done without a screen by 2020. Earlier the same year, Comscore had predicted that half of all searches would be voice searches by 2020. Though there’s recent evidence to suggest that the 2020 picture may be more complicated than these broad-strokes projections imply, we’re already seeing the impact that voice search, artificial intelligence, and smart software agents like Alexa and Google Assistant are making on th

article thumbnail

Successful Strategies for Hiring Full-Stack Developers

DevOps.com

Full-stack development is a complex web programming discipline involving multiple levels of web design and coding. Due to the complexity of the skill, it may be difficult to strategize a method of attracting a full-stack developer. Full-stack developers are the full package—they understand the development of both the front end and back end of a […].

article thumbnail

Protecting businesses from insider threats with machine learning

CTOvision

Machine learning and AI are the latest tools being utilized by businesses to help prevent cybercrime and stop cyber attacks. However, what if these same tools could be used to help stop insider threats such as employees leaking or misusing company data? TechRadar Pro spoke with Jazz Networks’ CEO Hani Mustafa who explained how businesses have […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Customer Education Through DTV, the YouTube Digital Transformation Channel

DevOps.com

One of the most valuable functions a services provider can perform for its customers is education. High-level education about industry and technology trends is generally not part of any contract, but, as odd as that may seem, keeping customers apprised of important industry trends can help them make wiser choices in the selection of products, […].

article thumbnail

Praxent Attracts Talent from Prominent Austin Tech Firms & Expands Executive Team

Praxent

January, 2019 – Austin, Texas We’ve grown our executive team by five, attracting talent from well-known local tech firms Trendkite, Modernize, Mutual Mobile, and Blackboard. Praxent Executive Team left to right: Managing Partner – Kevin Hurwitz, Director of Operations – Chris Walker, Director of Engineering – Ryan Ostrom, Operations Manager – Mollie Alred, Director of Product Design – Ryan Spanswick, Director of PMO – Jamie Gelo, Principal, Product

article thumbnail

DevOps Chat: Identity Management with ForgeRock’s Peter Barker

DevOps.com

Two megatrends for 2019 and beyond is scale and automation. The identity management space is a perfect example. Considering all of the IP-enabled devices (machines) coming online and the billions of people and their identities, managing these billions and billions takes systems that will redefine scale and, almost by definition, have to be automated.

DevOps 78
article thumbnail

Hitachi Vantara’s API Strategy for The Smart Data Center

Hu's Place - HitachiVantara

In this post I will take a deeper dive into one of the key enablers for Digital Transformation, the REST API. I will cover our strategy for utilizing it in our products and provide some example of how it is utilized to enable the Smart Data Center. Application Program Interface, API, is software that allows applications to talk to each other. APIs have been an essential part of software development since the earliest days of programming.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Women in the workplace: The changing face of women in IT

Capgemini

Since the dawn of time, women have assumed different roles in different cultures. In rare instances do women enjoy more power than men. For most of us, it’s still very much a man’s world. Our society is full of stereotypes that keep women from realizing their full potential and thriving independently. And, although times are changing, women still have to prove themselves at every step, fighting a new battle every day in a war that is far from over.

Survey 68
article thumbnail

Little brother is watching: Your real-time location for sale

TechBeacon

An undercover report this week accuses mobile carriers of selling your location data to brokers, some of which aren’t choosy about whom they resell it to (because of course they’re not).

Mobile 67
article thumbnail

The New Reality for Retailers: Science Fiction No More

Dell EMC

How Dell Technologies is empowering retail surveillance with best-in-class AI and computer vision to capture brand new customer opportunities and maximize value. I want to ask you what may seem like a simple question. Why is surveillance so important for retail? Most people would immediately assume preventing theft and saving money. And up until now, these have precisely been the major driving forces behind the development and adoption of security and surveillance technologies.

Retail 66
article thumbnail

5 Software Development Trends Shaping the Media Industry in 2019

Agile Engine

Deloitte says there were 250+ media streaming channels in the US in 2018, with the average user subscribing to only three or four. This makes for a tough competition, so how do you win in a market like this? Fixing content discovery seems like a workable tactic. According to Deloitte, people spend up to an hour a day searching for content, which leaves plenty of room for optimization.

Media 66
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Redis Labs Delivers the Fastest Multi-Model Database on Intel® Optane™ DC Persistent Memory

DevOps.com

Redis Enterprise Provides Developer Flexibility to Process Massive Data Sets Quickly and Affordably Mountain View, Calif., January 10, 2019—Redis Labs, the home of Redis and provider of Redis Enterprise, announced today that Redis Enterprise is now available for Intel® Optane™ DC persistent memory across multiple cloud services or as downloadable software for supported hardware from […].

article thumbnail

5 Business Benefits of Business Vehicle Leasing

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

65
article thumbnail

CodeSOD: Certifiable Success

The Daily WTF

“Hey, apparently, the SSL cert on our web-service expired… in 2013.”. Laura ’s company had a web-service that provided most of their business logic, and managed a suite of clients for interacting with that service. Those clients definitely used SSL to make calls to that web-service. And Laura knew that there were a bunch of calls to ValidateServerCertificate as part of the handshaking process, so they were definitely validating it, right?