Wed.Jan 09, 2019

article thumbnail

Blame Replaces Strategy: Enterprise IT War Rooms Causing Incalculable Losses

DevOps.com

The concept of a “war room” is time-honored. One of the early examples is the Churchill War Rooms, an underground bunker that allowed Britain’s leaders to plot the allied route to victory during World War II. British Prime Minister Winston Churchill, as plain-speaking and self-assured as ever, said, “This is the room from which I […]. The post Blame Replaces Strategy: Enterprise IT War Rooms Causing Incalculable Losses appeared first on DevOps.com.

article thumbnail

How Should CIOs Give Negative Feedback?

The Accidental Successful CIO

It’s critical the CIOs give negative feedback, but they need to do it correctly Image Credit: Daniel Friedman. We’ve all been there. All of a sudden we realize that someone in the IT department has failed to deliver on a commitment that they made to us that has something to do with the importance of information technology. As the person with the CIO job, it is now going to be your job to give them negative feedback so that they know that they have failed.

Course 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Protect Your Small Business from a Hacker Attack

The Crazy Programmer

Data breaches and compromised websites frequently used to spread malware can be risky for your business; including small businesses. In fact, small or medium-sized businesses are likely to suffer more consequences of cyber-attacks than large enterprises. Large enterprises have the benefit of huge financial reliance as well as organizational resources to combat any attacks.

article thumbnail

Data architecture vs backend architecture

Erik Bernhardsson

A modern tech stack typically involves at least a frontend and backend but relatively quickly also grows to include a data platform. This typically grows out of the need for ad-hoc analysis and reporting but possibly evolves into a whole oil refinery of cronjobs, dashboards, bulk data copying, and much more. What generally pushes things into the data platform is (generally) that a number of things are.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

State Management in Angular Using Firebase

Toptal

Without proper state management, your Angular app will become a UX nightmare. But even with that solved, persisting state across sessions and devices can be tricky. This tutorial shows how to leapfrog that challenge using Firebase.

How To 111

More Trending

article thumbnail

The state of test automation: 7 key trends to watch

TechBeacon

Prior to my Automation Guild conference each year, I survey the community about the issues they're struggling with. I also speak with many testing thought leaders on my weekly Test Talks podcast.

Testing 102
article thumbnail

Building Amazing Apps, Part 1: Optimizing the Front End

DevOps.com

There are millions of apps available today, and it’s incredibly easy for any user to download and install any of them with just a few taps on a screen or click of a mouse. If you want to build and deliver an app that will amaze users, you need to be able to differentiate from […]. The post Building Amazing Apps, Part 1: Optimizing the Front End appeared first on DevOps.com.

Network 102
article thumbnail

The state of test automation: 7 key trends to watch

TechBeacon

Prior to my Automation Guild conference each year, I survey the community about the issues they're struggling with. I also speak with many testing thought leaders on my weekly Test Talks podcast.

Testing 88
article thumbnail

Maturing DevOps adoption increasingly embraces the database, new Redgate research finds

DevOps.com

Third annual State of Database DevOps Survey sees closer collaboration between teams, enabling compliance and faster code deployment, and the wider use of DevOps practices across both database and application development. Cambridge UK, Wednesday 9 January 2019 – DevOps adoption is increasing and spreading across organizations, bringing together application and database development, driving business benefits, […].

DevOps 100
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Git Checkout at Previous Timeframe

David Walsh

In the past I’ve blogged about checking out branches created on a specific date as well as sorting git branches by date , but one frequent usage of git and dates is checking out a commit at a given time in the past. For example, I often say “Weird, this feature was working a month ago” or “We removed that UI two months ago, how did it look again?

article thumbnail

Red Hat Adds Support for Nested Workflows to Ansible Automation Framework

DevOps.com

Red Hat today announced it is adding support for nested playbooks created using the open source Ansible automation framework within one another, which, in turn, will make it easier to automate complex IT processes. Bill Nottingham, product manager for Ansible, said the goal is to enable DevOps teams to reuse existing Ansible playbooks to kick […].

article thumbnail

Data architecture vs backend architecture

Erik Bernhardsson

article thumbnail

How AIOps Helps You Get More Out of DevOps

DevOps.com

DevOps may seem like an overused term. It involves taking an application’s source code and running it in an environment. It can cover the processes, the technology or even the people that maintain the technology that is running those very processes. At its heart, though, DevOps is about helping developers to be self-sufficient when it […]. The post How AIOps Helps You Get More Out of DevOps appeared first on DevOps.com.

DevOps 92
article thumbnail

How Embedded Analytics Helps Product Managers Exceed Their KPIs

Embedded analytics can help you deliver cutting-edge analytics experiences to your end-users that align with KPIs that are critical to the growth and success of your business. Read this eBook to learn how an embedded analytics platform, like Qrvey, can help PMs exceed the following KPIs: Growing revenue while improving customer retention rate Delivering rapid time to value Earning a high net-promoter score Increasing Gross Margin / Profitability Conversion rate from trial to paid Don’t just meet

article thumbnail

My Capgemini Experience

Capgemini

Saturdays in Williams Brice Stadium. Lazy Sunday afternoons on the horseshoe. Adventures along the river front. Being a student at the University of South Carolina developed not only a love for strong community, but also gave me a love for the city of Columbia and all that it had to offer. In my 4 years at the university I developed skills in critical thinking, problem solving, and nurtured a love for technology and what was to come next.

article thumbnail

The best security conferences of 2019

TechBeacon

You can find a security conference tailored to every IT security pro's needs, covering application security, information security and data security. Some are very large, while others are more intimate. Some are loud and boisterous; others are more formal and toned down. Some focus on vendors and their latest products, while others emphasize training and education.

article thumbnail

What are The key Factors To Determine Whether To Build Or Buy Custom Software?

Sunflower Lab

There has always been an eternal debate on build vs. buy custom software. It still exists. Companies at times get confused whether to build custom software or buy pre-built software. Neither of them is bad. But, it depends on various factors which will determine whether to build custom software or buy pre-built software (off-the-shelf software) from the market.

article thumbnail

The best security conferences of 2019

TechBeacon

You can find a security conference tailored to every IT security pro's needs, covering application security, information security and data security. Some are very large, while others are more intimate. Some are loud and boisterous; others are more formal and toned down. Some focus on vendors and their latest products, while others emphasize training and education.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Embotics Named a Leader in Gartner Magic Quadrant for Cloud Management Platforms

DevOps.com

Ottawa, ON – January 9, 2019 – Embotics®, the hybrid cloud automation and orchestration company, today announced it was named a Leader in the first Gartner Magic Quadrant for Cloud Management Platforms. According to the report, “infrastructure and operations leaders who need to provide automation, governance, lifecycle management and brokering across multicloud resources are discovering […].

Cloud 61
article thumbnail

Workflow vs. Workflow Automation - What's the Difference?

Docuphase

Is workflow the same thing as workflow automation? While some people may use these terms interchangeably, there's a world of difference between the two concepts.

article thumbnail

Pulseway Closes 2018 with Major Customer Win Milestones; Leading Remote Monitoring and Management Market

DevOps.com

2018 Marked with Exponential Customer Growth, New Offerings, Partnerships and Awards SAN JOSE, Calif., January 9, 2019 — Pulseway, a leading provider of mobile-first, cloud-first remote monitoring and management (RMM) software, is closing out 2018 recapping major business milestones the industry leader has accomplished. With the addition of over 1,200 new paying customers and 25,000 […].

article thumbnail

Being Agile on a Fixed Cost and Timeline: 6 Key Learnings

QBurst

In part 1 of the two-part series on Being Agile on a Fixed Cost and Timeline, I had discussed a case study based on our experience in executing an agile fixed cost project for a large US-based company. Needless to say, it was a complex project, thanks to its magnitude, the constraints on the timeline […]. The post Being Agile on a Fixed Cost and Timeline: 6 Key Learnings appeared first on QBurst - Blog.

Agile 53
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Representative Line: It Only Crashes When It Works

The Daily WTF

We already know that Kara ’s office has a problem with strings. Kara’s back again, with more string related troubles. These troubles are a bit worse, once we add in some history. You see, some of their software does machine control. That is to say, it sends commands to some bit of machinery, which then moves or extrudes or does whatever the machine does.

article thumbnail

JANUARY 2019 – Microsoft Patch Tuesday

TechTalk

JANUARY 2019 – Microsoft Patch Tuesday The holidays are behind us and here we are, already well into a brand new year. They seem to come and go faster and faster, the older I get. One constant, though (at least for the past sixteen years) is that when the second Tuesday of the month […].

51
article thumbnail

Ten Blockchain Benefits for Supply Chain Management

Trigent

Blockchain, as a distributed database that stores digital information securely is transforming supply chain management in the manufacturing space.

article thumbnail

IDC’s AI-Based Automation Evolution Framework: a New Way to Think About AI Automation

IDC

In October 2018, a Reuters article informed the world that Amazon had scrapped an AI–based recruitment application that turned out to be biased against women. Most headlines about this story highlighted the company’s failure in developing an actionable and fair solution for one of the most important processes of the HR team. However, what this and similar examples of today’s AI “failures” neglect to acknowledge is the complexity of end-to-end process automation based on A

article thumbnail

A Tale of Two Case Studies: Using LLMs in Production

Speaker: Tony Karrer, Ryan Barker, Grant Wiles, Zach Asman, & Mark Pace

Join our exclusive webinar with top industry visionaries, where we'll explore the latest innovations in Artificial Intelligence and the incredible potential of LLMs. We'll walk through two compelling case studies that showcase how AI is reimagining industries and revolutionizing the way we interact with technology. Some takeaways include: How to test and evaluate results 📊 Why confidence scoring matters 🔐 How to assess cost and quality 🤖 Cross-platform cost vs. quality tr

article thumbnail

Four short links: 9 January 2019

O'Reilly Media - Ideas

Quantum Computing Zines, Phone Locations, Secret Wi-Fi Networks, and Programming the Integers. Quantum Computing Zines -- from EPiQC , the University of Chicago-led quantum research collaboration. Topics: history, hype, measurement, operations, notation, reversibility, superposition, and entanglement. Surprising People Have Access to Your Phone's Location (VICE) -- T-Mobile, Sprint, and AT&T are selling access to their customers’ location data, and that data is ending up in the hands of boun

Fashion 44
article thumbnail

Agile: Optimise for velocity over predictability

Abhishek Tiwari

When it comes to agile estimation, quite often agile teams spend a big chunk of their time in heavyweight processes like detailed story point estimation to improve the predictability or accuracy of their estimates. In other words, agile teams invest more time in estimation to reduce that variance (i.e. time estimated vs. time taken) which otherwise can be used to create features and add business value.

Agile 40
article thumbnail

Five Cloud Deployment Mistakes That Will Cost You

Kentik

With physical network infrastructure moving to the cloud, it’s easy to think that networks are instantly faster, more reliable, limitless, and cheap. This fallacy is one of the biggest drivers of cloud deployment mistakes. Cloud technology can be complex though, especially when it comes to networking. It’s full of new concepts like VPCs, cloud interconnects, and multiple availability zones and regions.

Cloud 40