Sun.Jul 07, 2019

article thumbnail

An Agile Triple Play: Business Process Re-Engineering meets SOA meets Large Scale Agile

Agile Alliance

This experience report will address the volatility, challenges and solutions implemented within a Fortune 500 Order to Delivery manufacturing program with the goal of re-engineering and aligning global business processes with Web-services and Service Oriented Architecture. The program utilizes large scale agile to manage multi-year planning of incremental releases with delivery of quantifiable business value in each release.

SOA 127
article thumbnail

Consultants: Resistance Is Futile

N2Growth Blog

When you look back on your career, you remember the jobs you took, the jobs you declined, the opportunities realized and the opportunities lost. You remember the special people along the way; the great bosses, mentors, coaches and the lifelong friends. You also remember the Consultants. As a consumer of consulting services for more years than I care to admit, I have developed a well defined view of a typical engagement.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How DevOps Training and Certification Benefits the Team

DevOps.com

Cisco Systems recently announced sweeping changes to its training and certification programs to increase the real-world value of both. Cisco’s move demonstrates a trend by organizations that provide training and certification to place more value on the practical aspects of educating technology professionals—which, in turn, should have a major impact on those looking to build […].

Training 106
article thumbnail

CodeSOD: The Bogus Animation

The Daily WTF

Animations have become such an omnipresent part of our UI designs anymore that we tend to only notice them when they're bad. Ben is working on an iOS application which appeared to have a "bad" animation. In this case, it's bad because it's slow. How slow? Well, they have a table view with ten items in it, and the items should quickly tween to their new state- position, text, colors all could change in this process.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Access Control

DevOps.com

The post Access Control appeared first on DevOps.com.

93

More Trending

article thumbnail

If you’re wondering what’s next after Agile or are tired of limited offerings, here’s a place to go

Net Objectives

While Agile has made a definite improvement in the world since it started 2 decades ago, it is hard to argue that it hasn’t stagnated. We hear about dark Scrum and fake Agile almost as much as the real thing.

Agile 40
article thumbnail

Geospatial Anomaly Detection (Terra-Locus Anomalia Machina) Part 3: 3D Geohashes (and Drones)

Instaclustr

Massively Scalable Geospatial Anomaly Detection with Apache Kafka and Cassandra. In this blog we discover that we’ve been trapped in Flatland, and encounter a Dimension of the Third Kind. We introduce 3D geohashes, see how far up (and down) we can go (geostationary satellite orbits, the moon, and beyond), revisit Cassandra partition sizes, and come back down to earth with a suggested 3D geohash powered hazard proximity anomaly detector application for Drones!

3D 28
article thumbnail

Process is not the enemy, waste is

Net Objectives

“Just enough process to let people do their best work” is an Agile thought not a Lean one. Lean suggests process should be the explicit workflow and policies that enable people to do their best. We’re not going for more or less process, but rather clarity on what is the best way to get work … Continue reading "Process is not the enemy, waste is".

Agile 40
article thumbnail

Evaluation and Control Program Warning Flag 1 – The Illusion of Accuracy

Strategy Driven

“Measure with a micrometer, mark with a crayon, and cut with a chainsaw” Author Unknown. Evaluation and control programs provide executives and managers with the critical information they need to make effective business decisions. However, an equally critical component of the decision-making process is the understanding that no data-set is a perfect reflection of reality.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Telematics and the Digital Makeover of the Insurance Industry

RapidValue

Charles Darwin’s theory of evolution banks on the idea that the species that survive natural selection is not the most intellectual or the strongest but the one that is adaptable to change. This theory holds true even in the current context where industries from all over the world have been trying to equip themselves with the latest technologies to stay in the competition.

article thumbnail

How Much Does it Cost to Develop an E-commerce Mobile App?

Xicom

Did You Know? Mobile applications can propel an e-commerce website with a quantum of leaps. But, this might be lying on the line of lacking concrete costing for developing E-commerce mobile apps. The businessperson looking to branch out into the E-commerce field needs to harness the power of mobile apps expediently and affordable. As in today’s world, app development seeks significant growth opportunities and reach individual users needs.

Mobile 51
article thumbnail

Geospatial Anomaly Detection (Terra-Locus Anomalia Machina) Part 4: Cassandra, meet Lucene! – The Cassandra Lucene Index Plugin

Instaclustr

Massively Scalable Geospatial Anomaly Detection with Apache Kafka and Cassandra. After being Lost in (3D) Space in the last blog , this final part of the geospatial anomaly detection series, we come back down to Earth and try out the Cassandra Lucene Plugin (this was our destination all along, but it’s a long way to Alpha Centauri!). We’ll also reveal how well a subset of the alternative solutions, from this and the previous 1-3 parts, actually worked. 1.

3D 31
article thumbnail

The Real National Security Challenges at the Border

The Cipher Brief

The Cipher Brief is taking a look this week at the national security situation along the southern border. On NBC , the only Congressional Republican who represents a district along that border said on Sunday that officials aren’t focused enough on the issue of human smuggling. Congressman Will Hurd said he believes the issue should be a national intelligence priority.

Media 38
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.