Thu.Jan 10, 2019

article thumbnail

Survey Sees Need for More Consistent Approaches to DevOps

DevOps.com

DevOps is arguably one of the most disruptive forces driving transformation of IT processes in recent memory. But a new survey finds that while IT organizations are making progress, adoption of DevOps processes remains uneven at best. A survey of 2,419 IT professionals conducted by OverOps, a provider of code analysis tools, finds that 82 […].

Survey 107
article thumbnail

Gradually, then suddenly

O'Reilly Media - Ideas

Technological change often happens gradually, then suddenly. Tim O'Reilly explores the areas poised for sudden shifts. There’s a passage in Ernest Hemingway’s novel The Sun Also Rises in which a character named Mike is asked how he went bankrupt. “Two ways,” he answers. “Gradually, then suddenly.”. Technological change happens much the same way. Small changes accumulate, and suddenly the world is a different place.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mob Programming

Agile Alliance

Mob Programming is a software development approach where the whole team works on the same thing, at the same time, in the same space, and at the same computer.

article thumbnail

6 Reasons Your Staff Keeps You in the Dark

Let's Grow Leaders

Do you ever feel like your staff keeps you in the dark? Do you ever wonder if they’re going out of their way to keep you out of their way? That seems ridiculous. AND, it’s entirely possible. Here’s the scary part if […]. The post 6 Reasons Your Staff Keeps You in the Dark appeared first on Let's Grow Leaders.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Top Technologies Your Business Can Take Advantage of Today

OTS Solutions

Top Technologies Your Business Can Take Advantage of Today. To stay ahead of the curve in today’s market, businesses can’t rely on the quality of their services alone. They have to adopt cutting-edge technologies that give customers and employees the convenience they’ve come to expect from competitive firms. These are some of the top technologies your business can implement today to stay successful.

More Trending

article thumbnail

Influence with Design – A Guide to Color and Emotions

Toptal

The right color palette encourages people to behave in ways designers want them to, while the wrong palette can turn visitors away before they take any action at all.

104
104
article thumbnail

Little brother is watching: Your real-time location for sale

TechBeacon

An undercover report this week accuses mobile carriers of selling your location data to brokers, some of which aren’t choosy about whom they resell it to (because of course they’re not).

Mobile 98
article thumbnail

Marriott data breach exposed 5 million unencrypted passport numbers

CTOvision

More than 5 million unencrypted passport numbers were stolen as part of the Marriott data breach last year, according to an update from the hotel giant. The information accessed in the breach, which was first disclosed on Nov. 30th, also includes approximately 20.3 million encrypted passport numbers, the Bethesda, Md.-based hotel chain revealed in an online […].

Hotels 86
article thumbnail

The best software testing conferences of 2019

TechBeacon

Some may see testing as a fairly boring and static set of practices, but the leaders in this space know that it is a vibrant discipline that is constantly improving every year, thanks to exciting new techniques made possible by better automation tools and artificial intelligence.

Testing 97
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Stay Healthy While Sitting at Your Desk and Working All Day

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

How To 95
article thumbnail

The best software testing conferences of 2019

TechBeacon

Some may see testing as a fairly boring and static set of practices, but the leaders in this space know that it is a vibrant discipline that is constantly improving every year, thanks to exciting new techniques made possible by better automation tools and artificial intelligence.

Testing 94
article thumbnail

German cyber-attack: man admits massive data breach, say police

CTOvision

A 20-year-old man has admitted to police that he was behind one of the country’s biggest data breaches, in which the private details of almost 1,000 public figures were leaked. The man, who lives with his parents in the central German state of Hesse and is still in the education system, told police he had acted […].

Data 82
article thumbnail

Conversations with Robots: Voice, Smart Agents & the Case for Structured Content

A List Apart

In late 2016, Gartner predicted that 30 percent of web browsing sessions would be done without a screen by 2020. Earlier the same year, Comscore had predicted that half of all searches would be voice searches by 2020. Though there’s recent evidence to suggest that the 2020 picture may be more complicated than these broad-strokes projections imply, we’re already seeing the impact that voice search, artificial intelligence, and smart software agents like Alexa and Google Assistant are making on th

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Malvertising Campaign Delivers Info-Stealer Plus Ransomware

CTOvision

Security researchers have warned users of P2P sites of a new malvertising campaign featuring a twin threat: info-stealing malware and ransomware. By registering rogue advertising domains, the attackers are able to direct torrent site visitors to two different exploit kits: Fallout EK and GrandSoft EK, according to Malwarebytes. Those unlucky enough to be pushed according to geolocation […].

Malware 79
article thumbnail

A List Apart - Untitled Article

A List Apart

In late 2016, Gartner predicted that 30 percent of web browsing sessions would be done without a screen by 2020. Earlier the same year, Comscore had predicted that half of all searches would be voice searches by 2020. Though there’s recent evidence to suggest that the 2020 picture may be more complicated than these broad-strokes projections imply, we’re already seeing the impact that voice search, artificial intelligence, and smart software agents like Alexa and Google Assistant are making on th

article thumbnail

Successful Strategies for Hiring Full-Stack Developers

DevOps.com

Full-stack development is a complex web programming discipline involving multiple levels of web design and coding. Due to the complexity of the skill, it may be difficult to strategize a method of attracting a full-stack developer. Full-stack developers are the full package—they understand the development of both the front end and back end of a […].

article thumbnail

Protecting businesses from insider threats with machine learning

CTOvision

Machine learning and AI are the latest tools being utilized by businesses to help prevent cybercrime and stop cyber attacks. However, what if these same tools could be used to help stop insider threats such as employees leaking or misusing company data? TechRadar Pro spoke with Jazz Networks’ CEO Hani Mustafa who explained how businesses have […].

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Customer Education Through DTV, the YouTube Digital Transformation Channel

DevOps.com

One of the most valuable functions a services provider can perform for its customers is education. High-level education about industry and technology trends is generally not part of any contract, but, as odd as that may seem, keeping customers apprised of important industry trends can help them make wiser choices in the selection of products, […].

article thumbnail

Praxent Attracts Talent from Prominent Austin Tech Firms & Expands Executive Team

Praxent

January, 2019 – Austin, Texas We’ve grown our executive team by five, attracting talent from well-known local tech firms Trendkite, Modernize, Mutual Mobile, and Blackboard. Praxent Executive Team left to right: Managing Partner – Kevin Hurwitz, Director of Operations – Chris Walker, Director of Engineering – Ryan Ostrom, Operations Manager – Mollie Alred, Director of Product Design – Ryan Spanswick, Director of PMO – Jamie Gelo, Principal, Product

article thumbnail

DevOps Chat: Identity Management with ForgeRock’s Peter Barker

DevOps.com

Two megatrends for 2019 and beyond is scale and automation. The identity management space is a perfect example. Considering all of the IP-enabled devices (machines) coming online and the billions of people and their identities, managing these billions and billions takes systems that will redefine scale and, almost by definition, have to be automated.

DevOps 84
article thumbnail

Hitachi Vantara’s API Strategy for The Smart Data Center

Hu's Place - HitachiVantara

In this post I will take a deeper dive into one of the key enablers for Digital Transformation, the REST API. I will cover our strategy for utilizing it in our products and provide some example of how it is utilized to enable the Smart Data Center. Application Program Interface, API, is software that allows applications to talk to each other. APIs have been an essential part of software development since the earliest days of programming.

article thumbnail

A Tale of Two Case Studies: Using LLMs in Production

Speaker: Tony Karrer, Ryan Barker, Grant Wiles, Zach Asman, & Mark Pace

Join our exclusive webinar with top industry visionaries, where we'll explore the latest innovations in Artificial Intelligence and the incredible potential of LLMs. We'll walk through two compelling case studies that showcase how AI is reimagining industries and revolutionizing the way we interact with technology. Some takeaways include: How to test and evaluate results 📊 Why confidence scoring matters 🔐 How to assess cost and quality 🤖 Cross-platform cost vs. quality tr

article thumbnail

Women in the workplace: The changing face of women in IT

Capgemini

Since the dawn of time, women have assumed different roles in different cultures. In rare instances do women enjoy more power than men. For most of us, it’s still very much a man’s world. Our society is full of stereotypes that keep women from realizing their full potential and thriving independently. And, although times are changing, women still have to prove themselves at every step, fighting a new battle every day in a war that is far from over.

Survey 68
article thumbnail

Little brother is watching: Your real-time location for sale

TechBeacon

An undercover report this week accuses mobile carriers of selling your location data to brokers, some of which aren’t choosy about whom they resell it to (because of course they’re not).

Mobile 67
article thumbnail

Redis Labs Delivers the Fastest Multi-Model Database on Intel® Optane™ DC Persistent Memory

DevOps.com

Redis Enterprise Provides Developer Flexibility to Process Massive Data Sets Quickly and Affordably Mountain View, Calif., January 10, 2019—Redis Labs, the home of Redis and provider of Redis Enterprise, announced today that Redis Enterprise is now available for Intel® Optane™ DC persistent memory across multiple cloud services or as downloadable software for supported hardware from […].

article thumbnail

5 Software Development Trends Shaping the Media Industry in 2019

Agile Engine

Deloitte says there were 250+ media streaming channels in the US in 2018, with the average user subscribing to only three or four. This makes for a tough competition, so how do you win in a market like this? Fixing content discovery seems like a workable tactic. According to Deloitte, people spend up to an hour a day searching for content, which leaves plenty of room for optimization.

Media 66
article thumbnail

How To Package & Price Embedded Analytics

Just by embedding analytics, app owners can charge 24% more for their product. How much value could you add? This framework from Software Pricing Partners explains how application enhancements can extend your product offerings. You’ll learn: How to take a disciplined approach to pricing The three elements of the Packaging Decision Framework Ways to structure your new embedded analytics offering Download the White Paper to learn about How To Package & Price Embedded Analytics.

article thumbnail

5 Business Benefits of Business Vehicle Leasing

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

65
article thumbnail

CodeSOD: Certifiable Success

The Daily WTF

“Hey, apparently, the SSL cert on our web-service expired… in 2013.”. Laura ’s company had a web-service that provided most of their business logic, and managed a suite of clients for interacting with that service. Those clients definitely used SSL to make calls to that web-service. And Laura knew that there were a bunch of calls to ValidateServerCertificate as part of the handshaking process, so they were definitely validating it, right?

article thumbnail

Symantec Discusses Securing Private Mobile App Data in the Cloud

Symantec

HospitalGown and Azure Blob Service: Mobile Security Relies on Data Security

Mobile 95