Mon.Jul 08, 2019

article thumbnail

Making Your Cloud Work For You

DevOps.com

Does your cloud work for you, or do you work for your cloud? Given the enormous dependency and costs associated with cloud computing, that is a question more and more DevOps teams are asking these days. After more than a decade of pressure from higher-ups to move workloads to the public cloud, DevOps teams are […]. The post Making Your Cloud Work For You appeared first on DevOps.com.

Cloud 104
article thumbnail

How to tame event-driven microservices

Bernd Rucker

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Hacks, cracks, and malware attacks – July 2019 

TechTalk

Each month, we’ll take a look at what’s happening on the front lines of the battle against various types of cyber-attacks, new variants of malicious software, phishing and other scams, vulnerability exploits, and other threats to the security of your networks, systems, and data. There was a time, not so long ago, when the only […].

Malware 68
article thumbnail

Hermes transforms data infrastructure to speed parcel deliveries

CIO

Parcel delivery is a cutthroat business in the U.K., with margins of just pennies per parcel.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

How Conduct a Remarkably Better Post-Mortem Review

Let's Grow Leaders

Ditch the Post-Mortem and Hold a Post-Project Celebration If you’re like most managers we talk with, you know the importance of post-mortem reviews. But unless your project ends in disaster, it’s easy to skip the review and move on to the next […]. The post How Conduct a Remarkably Better Post-Mortem Review appeared first on Let's Grow Leaders.

More Trending

article thumbnail

Words and Actions – A Guide to Microcopy

Toptal

Without interface copy, there’d be UX chaos on a global scale. Thankfully, we can use words whenever we want, but how do we use them well? These easy-to-use principles lead to convincing microcopy.

110
110
article thumbnail

What Quality Metrics Matter Most for DevOps?

DevOps.com

The way we develop and deliver software has changed dramatically in the past five years—but the metrics we use to measure quality remain largely the same. Despite seismic shifts in business expectations, development methodologies, system architectures and team structures, most organizations still rely on quality metrics that were designed for a much different era.

Metrics 101
article thumbnail

Simple Ways to Make Your Workplace More Secure

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

93
article thumbnail

Accelerate HPC workloads with SAGA – Find out how with Dell EMC Isilon and Altair

Dell EMC

An ongoing challenge with HPC workloads is that as the number of concurrent jobs increases, storage reaches a critical point where NFS latency spikes, and beyond that critical point, all workloads are running on that storage crawl. An integration of Dell EMC Isilon scale-out storage with Altair Accelerator enables Storage-Aware Grid Acceleration (SAGA), an elegant and innovative solution that can address your next wave of design challenges.

Storage 93
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Low-Code Providers Continue Enhancing Their Development Platforms

DevOps.com

Enterprise low-code development continues to grow in popularity as software vendors continue to unveil tool enhancements designed to help business users and non-developers build functional applications and business processes. The help from low-code platforms (and other platforms that are integrating low-code capabilities) couldn’t come at a better time, as enterprises continue to struggle to digitize […].

article thumbnail

Nine Best Practices For Integrating Application Security Testing Into DevOps

CTOvision

Read Ruslan Desyatnikov list nine best practices for integrating application security testing into DevOps on Forbes : The software community is on the brink of accelerating changes as DevOps practices, agile development methodologies and AI gradually, but surely, phase out legacy approaches. But while this is a fantastic development on the one hand, it’s also […].

DevOps 78
article thumbnail

Why we need to transform the Internet for a cloud-native world

TechBeacon

When people talk about the Internet of Things (IoT), their focus inevitably falls on the "things," because we all take the Internet itself for granted.

article thumbnail

Pivotal Embraces Spinnaker for Continous Delivery

DevOps.com

Pivotal Software has added support for the Spinnaker continuous delivery platform to its platform-as-a-service (PaaS) environment for the open source Cloud Foundry PaaS. Richard Seroter, vice president of product marketing at Pivotal, said version 2.6 of Pivotal Cloud Foundry (PCF) extends the reach of the Spinnaker CD platform developed by Netflix to its PaaS environment […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Crypto-Mining Malware Outsmarting Image Scanners

Aqua Security

In previous crypto-mining attacks, we observed hackers investing little to no effort in hiding their malicious activities. They just ran the malicious container with all of its scripts and configuration files in clear text. This made the analysis of their malicious intent fairly easy.

Malware 80
article thumbnail

How Do Your Cyber Exposure Practices Stack Up to Those of Your Peers?

Tenable

In part five of our six-part blog series, we explore the challenges facing organizations as they try to accurately answer the question: “How do we compare to our peers?” Here’s what you need to know. Achieving visibility into your organization’s attack surface is the fundamental first step to building a mature cybersecurity strategy. Once you’ve laid a strong foundation for your Cyber Exposure efforts, the next step is developing an understanding of how your strategy compares to other organizati

article thumbnail

Overcome Organizational Myopia To Achieve True Digital Transformation

CEO Insider

Born digital companies that have created platform-based business models such as Facebook, Uber, Amazon, Airbnb, etc. have become tremendously successful and created immense value. Accustomed to the new enhanced “digital way of life”, consumers are less tolerant towards user experiences that do not offer interactivity, convenience and compelling pricing models.

Company 79
article thumbnail

Apple Testing Face ID and Touch ID sign-in for iCloud on iOS 13 and macOS Catalina

CTOvision

We have been evaluating the current beta versions of Apple‘s next generation operating systems for the iPad, iPhone and Macs. These are very quirky but that is to be expected in beta versions. Still we see many productivity enhancements that will be welcome improvements to the Apple suite of products. Here is more from 9 […].

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

The future of machine learning is tiny

O'Reilly Media - Ideas

Pete Warden digs into why embedded machine learning is so important, how to implement it on existing chips, and shares new use cases it will unlock. Continue reading The future of machine learning is tiny.

article thumbnail

IAM market evolves, but at a cost

CTOvision

Read Jesse Scardina take a look at the current state of Identity and Access Management software on Tech Target : The identity and access management market is rapidly changing. Technological disruptions such as artificial intelligence are advancing the capabilities of identity and access management (IAM) software, while organizations struggle to modernize systems and manage employee identities […].

article thumbnail

Expand Endpoint Security to Office365 with MobileIron UEM and Microsoft Azure

Ivanti

Expand Endpoint Security to Office365 with MobileIron UEM and Microsoft Azure. sraikow. Mon, 07/08/2019 - 10:07. MobileIron is proud to announce today an ongoing partnership with Microsoft to extend endpoint security capabilities to Microsoft Azure and Office 365 using MobileIron UEM. This collaboration allows Microsoft, a leader in Identity Management, and MobileIron, a leader in Unified Endpoint Management, to allow Azure AD Premium customers to utilize MobileIron compliance engine.

Azure 65
article thumbnail

Facebook’s Cryptocurrency Plan Draws European Central Bank Warning on Regulation

CTOvision

Financial regulators must act fast to prepare for the push by U.S. tech giants such as Facebook Inc. into the financial system, according to European Central Bank Executive Board member Benoit Coeure. “It’s out of the question to allow them to develop in a regulatory void for their financial service activities, because it’s just too dangerous,” […].

Banking 67
article thumbnail

Revolutionizing Contact Centers: Next-Gen Tech for Enhanced CX

Speaker: Liran Meir Frenkel, Performance Management and RPA Sr Product Marketing Manager at NICE; Harpreet Makan, Practice Director at Everest Group; & Santhosh Kumar, Practice Director at Everest Group

As contact centers navigate the challenges of delivering excellence within budget constraints and adapting to evolving employee expectations, optimizing agent tasks becomes crucial. Discover a holistic approach across three pillars - people, process, and technology - that is essential to excel in this dynamic landscape, and explore how next-gen technologies such as generative AI, performance analytics, and process intelligence play a pivotal role in transforming contact centers into advanced CX

article thumbnail

Organizations Must Realign to Face New Cloud Realities

Symantec

While cloud adoption is moving fast, many enterprises still underestimate the scale and complexity of cloud threats

Cloud 81
article thumbnail

Can you smell that? That’s my data! Data can now be stored inside the molecules that power our metabolism

CTOvision

DNA isn’t the only molecule we could use for digital storage. It turns out that solutions containing sugars, amino acids and other small molecules could replace hard drives too. Jacob Rosenstein and his colleagues at Brown University, Rhode Island, stored and retrieved pictures of an Egyptian cat, an ibex and an anchor using an array of […].

Storage 62
article thumbnail

Power the IoT with Adabas & Natural Applications

Beyond B2B

There are countless ways Adabas & Natural can and should be a core part of your digital transformation initiatives. I recently wrote about how to maximize the value of your Adabas & Natural data.

IoT 61
article thumbnail

The future of hiring and the talent market with AI

O'Reilly Media - Ideas

Maria Zheng examines AI and its impact on people’s jobs, quality of work, and overall business outcomes. Continue reading The future of hiring and the talent market with AI.

article thumbnail

Embedded Analytics: A Force Multiplier for Business

The possibilities for embedded analytics to drive real value for businesses, end users, and society are as fascinating as they are limitless. No matter the industry, brand after brand is finding that analytics can be the solution to a multitude of business challenges. Go deep with five insightsoftware customers as they share the details of their analytics journeys and discuss the transformative power of data.

article thumbnail

BGP and RPKI: A Path Made Clear with Kentik

Kentik

Border Gateway Protocol (more commonly known as BGP ) is the routing protocol that makes the internet work. It is the language spoken by routers to determine how packets can be sent from one router to another to reach their final destination. In its early days, BGP didn’t include any method to ensure whether a prefix from a peer had the correct ASN originating it in its AS_PATH attribute.

article thumbnail

Designing computer hardware for artificial intelligence

O'Reilly Media - Ideas

Michael James examines the fundamental drivers of computer technology and surveys the landscape of AI hardware solutions. Continue reading Designing computer hardware for artificial intelligence.

article thumbnail

Show Me the APIs!

SecureWorks

Show Me the APIs! UI may be the eye candy but without the right API, we're left hungry for more. UI may be the eye candy but without the right API, we’re left hungry for more.