Tue.Jul 16, 2019

article thumbnail

20 influential women in software development

Apiumhub

In the software development field, we always hear famous names like Martin Fowler, Kent Beck, George H. Fairbanks, Uncle Bob, Mark Richards, etc. As many in the Tech industry, often, they are men. That is why today I decided to write about amazing successful, talented and influential women in software development. After doing some research, here’s a list of 20 women in software development I admire for what they have done and for their contribution in the Software Development Industry. . . 20 i

article thumbnail

How can attackers abuse artificial intelligence?

CTOvision

But a new report published by the SHERPA consortium – an EU project studying the impact of AI on ethics and human rights – finds that while human attackers have access to machine learning techniques, they currently focus most of their efforts on manipulating existing AI systems for malicious purposes instead of creating new attacks […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Examples of AI at Work in DataOps

DevOps.com

Artificial intelligence (AI) is making all the difference between innovators and laggards in the global marketplace. Yet, implementing a state-of-the-art DataOps operation involves a long-term commitment to putting in place the right people, processes and tools that will deliver results. In this post, we look at three organizations that are doing cutting-edge work in the […].

Examples 111
article thumbnail

Rails 6 Features: What's New and Why It Matters

Toptal

Rails 6 is finally here, featuring major improvements and clever new features that should make development easier and faster than ever. In this article, Toptal Ruby on Rails Developer Avant Mittal dives into the Rails 6 changelog to introduce you to these new features and explain how you will be using them in your next Rails project.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Chef Brings DevOps to Windows Platform Migrations

DevOps.com

Chef and Microsoft revealed today that they are working together to apply DevOps processes to accelerate the migration of Windows Server 2008 and SQL Server 2008 to more current versions. Announced at the Microsoft Inspire conference, the goal is to enable organizations to leverage Chef Enterprise Automation Stack (EAS), which includes an EAS Migration Accelerator […].

Windows 109

More Trending

article thumbnail

GitLab Survey Surfaces Major DevSecOps Challenges Ahead

DevOps.com

A report based on a survey of 4,071 software professionals published this week by GitLab, a provider of a continuous integration and continuous deployment (CI/CD) platform, found that while appreciation of the potential value of DevSecOps best practices is high, the ability to implement those practices is uneven at best. According to the survey, half […].

Survey 108
article thumbnail

Ford-VW alliance expands to include autonomous and electric vehicles

CTOvision

On a widely anticipated move, Ford and Volkswagen announced Friday their plan to expand their seven-month-old alliance to include autonomous and electric vehicles. As part of the deal, VW will invest a whopping $2.6 billion in Argo AI, the autonomous vehicle startup based in Pittsburgh that practically no one had heard of until Ford’s own eye-popping […].

73
article thumbnail

Transforming the Security Team Into a DevOps Partner

DevOps.com

Securing DevOps environments is an increasingly important concern for chief information security officers (CISOs) and security teams. While developers often recognize security is important, it is not their top priority. More typically, the DevOps team prioritizes delivering new capabilities and features to the business and customers, often as part of a larger digital transformation initiative. […].

DevOps 103
article thumbnail

12 app sec tool trends to watch

TechBeacon

Applications have become rich targets for hackers. According to the US Department of Homeland Security, 90% of reported security incidents (PDF document) result from exploits against defects in the design or code of software.

Trends 82
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Detect Cryptocurrency by Wallet Address

David Walsh

I’ve always been a massive advocate of cryptocurrency. I love the technology, the ease of use, and the freedom that cryptocurrencies bring to the world. Despite my love of crypto, I know that adoption will take a long time and that the state of crypto is not friendly to new adopters. One scary part of crypto is sending currency to another wallet address.

IPv6 80
article thumbnail

Google’s new ‘data echoing’ technique speeds up AI training

CTOvision

AI accelerator hardware like Google’s Tensor Processing Units and Intel’s Nervana Neural Network Processor promise to speed up AI model training, but because of the way the chips are architected, earlier stages of the training pipeline (like data preprocessing) don’t benefit from the boosts. That’s why scientists at Google Brain, Google’s AI research division, propose […].

article thumbnail

Climbing Mountains

Symantec

What do we do with the opportunities that have been given to us? Mario C. shares stories of how his grandparents’ and parents’ lives in Mexico provided the opportunity for him to succeed in America.

73
article thumbnail

To prepare today’s workforce for AI, they must understand it’s not a threat

CTOvision

Read why Alex Adamopoulos says that employees should understand that artificial intelligence use is not a threat on The Next Web : For countless businesses across all industries and around the world, AI is dominating mindshare to impossible-to-ignore levels. It’s all entrepreneurs and business leaders can talk about: What does a future with AI look […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ChefDK Install: What you need to know

Linux Academy

Installing ChefDK(Chef Development Kit) isn’t too complicated, but there are a few things to watch out for. We’re going to run through a simple install here real quick, to help keep you from hitting the potholes that trip people up sometimes. Download ChefDK. Before a ChefDK install, there’s got to be a download, and you can download ChefDK here.

Linux 63
article thumbnail

ShiftLeft Ocular Identifies Business Logic Flaws 10x Faster than Manual Code Reviews

DevOps.com

Support for New Programming Languages and Enhanced Regression Testing Delivers First-of-its-Kind Vulnerability Analysis Solution Santa Clara, Calif. – July 16, 2019 – ShiftLeft Inc., an innovator in automated application security, today announced enhancements to its Ocular solution that empower organizations to discover business logic flaws during application development 10 times faster than manual code reviews.

article thumbnail

NIST proposes Secure Software Development Framework

DXC

Ever since Bill Gates fired off his famous Trustworthy Computing memo in January 2002, developing secure software has been a hot topic of discussion. It was important before then, for sure, but it was often overlooked. It took a series of high-profile worms such as Code Red and Nimda and a series of breaches to […].

article thumbnail

How to Enjoy Hybrid Partitioning with Teradata Columnar

Teradata

Teradata Vantage's NewSQL Engine's performance-enhancing options include column-row hybrid partitioning. Find out how to take advantage of this great feature.

How To 75
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

ChefDK Install: What you need to know

Linux Academy

Installing ChefDK(Chef Development Kit) isn’t too complicated, but there are a few things to watch out for. We’re going to run through a simple install here real quick, to help keep you from hitting the potholes that trip people up sometimes. Download ChefDK. Before a ChefDK install, there’s got to be a download, and you can download ChefDK here.

Linux 60
article thumbnail

5 Tips to Help You Create Amazing Aerial Photographs for Your Business

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

69
article thumbnail

Near raises 100 Million to Roll Out New Platform Offerings, Fuel Expansion

DevOps.com

Financing to help launch new suite of data products and expand into strategic markets New York / San Francisco — July 16, 2019 – Near, the platform that leverages AI to make real-world data actionable, announced today that it has raised $100 million in a new round of funding. The investment comes from London headquartered […]. The post Near raises 100 Million to Roll Out New Platform Offerings, Fuel Expansion appeared first on DevOps.com.

article thumbnail

Not Just Another G: The Next Generation

Dell EMC

This is the second installment in our series Not Just Another G, which provides insight into 5G and what it means to the service provider industry. Missed the first post? Catch up here. The next-generation 5G architecture is built around the realization that different services are consumed differently, and by different types of users. Thus, next-generation mobile access technology must have: A way to define those differences, A way to determine and place constraints so as to meet those differenc

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

DevOps Institute Named Continuous Learning Track Sponsor of DevOps World | Jenkins World 2019

DevOps.com

DevOps Institute to help upskill attendees by offering DevOps Leader and DevSecOps Engineering certification courses and a panel session on the future IT workforce BOCA RATON, Fla. – July 16, 2019 – DevOps Institute ([link] a global member-based association for advancing the human elements of DevOps, today announced its unique role as the Continuous Learning […].

DevOps 66
article thumbnail

How to Ensure Optimum Security and Streamlining of Process at DevOps?

Kovair - DevOps

We are living in an increasingly connected world with mobile apps and cloud computing defining our business models and processes. The demand for continuous value. The post How to Ensure Optimum Security and Streamlining of Process at DevOps? appeared first on Kovair Blog.

DevOps 60
article thumbnail

Seven Guiding Principles to Selecting the Right Cloud Security Solution

Palo Alto Networks

Allan Kristensen, Sr. Director, Systems Engineering, Public Cloud at Palo Alto Networks. I recently had the opportunity to chat with Palo Alto Networks Senior Director of Worldwide Public Cloud Security SEs, Allan Kristensen, who brings 15+ years of experience building highly effective solutions engineering (SE) teams. The Palo Alto Networks SE team has firsthand knowledge of the unique and diverse cloud security challenges that prospective customers are looking to solve.

Cloud 59
article thumbnail

9 Ways to Avoid an Incident Response Disaster

Symantec

“Evidence Mangling” where critical information gets inadvertently destroyed, has become an all-too-often problem.

74
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Worldwide Water Access: Tapping into a Well of Data

DataRobot

Access to water is a fundamental human right, and it is one of UNICEF’s global sustainable development goals ( SDG #6 ). Around the world, nearly one billion people (mostly in Africa and Asia) rely on rural water points, such as hand pumps or taps, for their daily water use. These water points are a big part of the community and an essential factor for life.

article thumbnail

The 5G Requirement for Data Storage

Hu's Place - HitachiVantara

This year we have seen some of communications service providers (CSP) like ATT, China Mobile, and Telefonica begin the rollout of 5G services. 5G stands for fifth-generation cellular wireless. 5G is fundamentally different than 4G, the previous generation. 5G tops out at 10 Gbps which is 100 times the theoretical top speed of 4G. Its network latency of 1 ms is almost 50 times lower than 4G; and it will support 1 million devices per sq km vs 2000 for 4G, with 99.999% availability of the network.

Storage 49
article thumbnail

What is Headless Content Management System (CMS)?

Daffodil Software

The ever-growing array of digital channels has made it imperative for businesses to create omnichannel experiences for their customers. To reach out to a larger customer base, delivering content across multiple channels, such as a web page, mobile app, IoT devices, and even AR, VR devices has become vitally important.

VR 49