January, 2018

article thumbnail

Meltdown and Spectre: What they are, and what to do

The Parallax

Two newly discovered critical security vulnerabilities are very likely affecting your laptop and phone, security researchers revealed on Wednesday. The good news is that patches are coming to protect your devices. The bad news is that because the vulnerabilities are in the hardware architecture of the chips that power them, patched devices may run slower.

Hardware 214
article thumbnail

The Agile Retrospective Format For Any Retrospective

Luis Goncalves

Agile Retrospective Format. In today´s post, I want to talk about the Agile Retrospective format. I met several Scrum Masters and Agile Coaches that facilitate Agile Retrospectives without knowing this concept. In my opinion, a successful Agile Retrospective must follow somehow this structure. This concept was introduced some years ago by Esther Derby and Diana Larsen, in their book “Agile Retrospectives.

Agile 190
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why Your Team Won’t Collaborate (and What To Do About It)

Let's Grow Leaders

“I’m sick of this crap! Why can’t they just figure this out?” Scott was CEO of an engineering firm that produced communications hardware and software for industries around the globe. He had worked hard with his board and senior leadership team to […].

Hardware 192
article thumbnail

Main Street Cybersecurity: 10 Cost Effective Strategies for confronting Ransomware

CTOvision

As we usher in the new year of 2018, we are confronted with an ever-expanding network-borne threat landscape especially from ransomware. Ransomware is a type of malicious software which is used by malicious actors to encrypt systems or data. When the ransom is paid the key is in some cases provided to unlock the data. […].

Strategy 135
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

It’s your stage, what do you do with it?

General Leadership

“Be enthusiastic as a leader. You can’t light a fire with a wet match.”. -Author Unknown. It’s your stage, what do you do with it? As leaders, we are out in front of our organizations and they take cues from us. Our language, body language, and how we discuss and frame challenges can have a big effect on the culture and morale of the organization. I believe it is necessary for a leader to be able present themselves in a positive and constructive way, despite the challenges.

More Trending

article thumbnail

Google Play is an ‘order of magnitude’ better at blocking malware

The Parallax

During a month that’s seen Android malware new and old plague the world’s most popular mobile operating system, Google says its Play Store is becoming more civilized and less like the Wild West. In a report on the state of Google Play security , the company says that since its introduction of Google Play Protect last year, it has removed more than 700,000 malicious apps from the Play Store.

Malware 184
article thumbnail

Helpful Way To Express Your Team´s Feelings in a Team Retrospective

Luis Goncalves

Express Yourself is a simple Check-In agile retrospective exercise that aims at visualizing the team´s ideas and helping to gather data early in the team retrospective session. Often it is difficult for people to express their feelings and opinions especially when team members are shy or if there are new team members or even for members with strong personalities.

Exercises 178
article thumbnail

5 Powerful Ways to Ensure Leadership Training Sticks

Let's Grow Leaders

“Don’t bother me with this crap. I don’t believe in leadership training. It’s a complete waste of time. It’s nothing against you as the new Training Director. I get that I have to work with you in some way. If you MUST […]. The post 5 Powerful Ways to Ensure Leadership Training Sticks appeared first on Let's Grow Leaders.

Training 175
article thumbnail

How the Internet of Things is Influencing a New Cybersecurity Era

CTOvision

Cybersecurity is the new chief concern for every organization. Recent global attacks like Wannacry and NotPetya have proved that hackers aren’t sparing any institution in their latest show of might. Most companies have thus resulted in the internet of things, and it's cybersecurity features to help keep their digital assets safe. But does IoT offer […].

Internet 126
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

It’s Time for a Leadership Checkup!

General Leadership

There are times in your leadership adventure when you need to take some time and perform a Leadership Check-up. The check-up I am discussing is a little more than a quick peek under the hood…it is an honest conversation with the leader in the mirror and maybe a few others too. Everything in life requires observation, analysis, inspection, and often some adjustment.

article thumbnail

I'm looking for data engineers

Erik Bernhardsson

I’m interrupting the regular programming for a quick announcement: we’re looking for data engineers at Better. You would be the first one to join and would work a lot directly with me. Some fun things you could work on (these are all projects I’m working on right now): Building a forecasting model using MCMC to predict volume the next few months. Productionize it in the form of a job that posts an updated visualization to Slack every night.

article thumbnail

Slowly but surely, browsers are becoming more secure

The Parallax

WASHINGTON, D.C.—Your favorite Web browser is inching toward a more secure future, according to new research revealed at the cybersecurity conference ShmooCon here on Sunday. Browsers that security researchers at the Cyber Independent Testing Lab tested on Windows, Mac, and Linux computers have added more security features over the past year, says Sarah Zatko, a former NSA mathematician who heads up the lab she co-founded with her husband, famed hacker Peiter “Mudge” Zatko.

article thumbnail

Four Faulty Assumptions Diminish Your Ability to Influence Change

Change Starts Here

In your efforts to influence change at work, you may be making some common assumptions that reduce your effectiveness. These assumptions are blind spots that are lucky if they’re right, but more often, they’re wrong. They prevent you from taking action that would help your change initiative succeed. The following are common assumptions to avoid […].

114
114
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

5 Ways Leaders Can Focus When Everything Is Important

Let's Grow Leaders

“Mark, What’s your M.I.T.?” Mark pushed back from his desk. “That’s a great question. I’ve so much flying at me…” He sighed. “I don’t have a clue.” Mark’s calendar might look familiar: wall-to-wall meetings, often with two or three appointments competing for […].

Meeting 166
article thumbnail

Mac Vs. PC: Which is Better for Your Business?

CTOvision

The debate about Mac vs. PC has been around for quite some time and may not end anytime soon. Some users prefer the Mac because of its elegant and sleek design, intuitive interface, and reliable security. On the other hand, PCs attract a large fan base because they are versatile, readily available, and affordable. Typically, […].

106
106
article thumbnail

KPIs, Velocity, and Other Destructive Metrics

Allen Holub

"It is wrong to suppose that if you can’t measure it, you can’t manage it—a costly myth." –W. Edwards Deming The Deming quote at the top of this post is often twisted into something worthy of Frederick Taylor: "if you can't measure it, you can't manage it." Deming would disagree.

Metrics 111
article thumbnail

I'm looking for data engineers

Erik Bernhardsson

I’m interrupting the regular programming for a quick announcement: we’re looking for data engineers at Better. You would be the first one to join and would work a lot directly with me. Some fun things you could work on (these are all projects I’m working on right now): Building a forecasting model using MCMC to predict volume the next few months. Productionize it in the form of a job that posts an updated visualization to Slack every night.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

At Chaos, a chaotic response to assault allegations

The Parallax

LEIPZIG, Germany—Just before the 34th annual meeting of Europe’s largest hacker conference got under way on December 27, its organizers seemed quite mixed on how to respond to assault accusations among its participants. According to emails obtained by The Parallax, the Chaos Communication Congress on December 19 banned Netherlands-based Finnish programmer Teemu Hukkanen from attending Chaos.

article thumbnail

Asynchronous JavaScript: From Callback Hell to Async and Await

Toptal

Asynchronous programming used to be a challenge even for seasoned professionals, leading to aptly named phenomena like Callback Hell. In this article, Toptal JavaScript Developer Demir Selmanovic explains how async functions took us out of purgatory and why you should be using them.

article thumbnail

How Do I Stay Motivated When My Peers Are Lazy?

Let's Grow Leaders

Dear Karin and David, How do I stay motivated when my peers are lazy? I’m working twice as hard as them and I’m sick of picking up the slack. My boss doesn’t seem to notice. Signed, Tired and Frustrated #AskingForAFriend Do’s and […].

148
148
article thumbnail

How to master the ways to say NO

Scott Berkun

On Tuesdays I write about the top voted question on Ask Berkun (see the lovely archive ). This week’s question came from Sam K. [via email]: I lead a team in a very political organization. It’s hard to make things stick. I want to focus my team but I struggle with how to defend priorities as my boss and her peers often change their minds and commit to more things than we can possibly do.

How To 107
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Applying Quantum Physics to Data Security Matters Now and in the Future

CTOvision

There are several reasons why applying quantum physics to data security will make a difference now and in the future. However, for businesses with a need for the highest level of data security, or are merely intrigued by the advance of quantum computing and its potential impact on cybersecurity, we encourage you to look at […].

Data 95
article thumbnail

Birdcage liners

Joel on Software

My new year’s resolution was to give up on reading Twitter and Facebook. I gave up on the feeds because they were making me angry. A lot of times I was angry because of politics, but even on non-political things, the feeds seemed like they were full of conflict and stress. I can’t tell you how much happier I am without them. Am I the only one that hated reading feeds?

Social 105
article thumbnail

Hidden inside Dark Caracal’s espionage apps: Old tech

The Parallax

An aggressive malware campaign called Dark Caracal allegedly stole “hundreds of gigabytes of data” from thousands of military personnel, lawyers, activists, finance and medical professionals, and journalists across more than 21 countries, including the United States, Canada, Germany, France, Russia, and South Korea, according to a report published Thursday.

Malware 170
article thumbnail

REST Assured vs. JMeter: A Comparison of REST Test Tools

Toptal

Apache JMeter and REST Assured are two very popular Java-based tools for automated testing of REST API services. In this article, Toptal Freelance Java Developer Nemanja Veskovic gives us an overview of the pros and cons of both of these tools and shows where they fit best in your existing REST API projects.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Frontline Festival: Leaders Share about Strategy and Alignment

Let's Grow Leaders

Welcome to the Let’s Grow Leaders Frontline Festival on Strategy and Alignment. We asked thought leaders from around the world to share their very best post on strategy. Thanks to Joy and Tom Guthrie of Vizwerx Group for the great pic and to […].

Strategy 139
article thumbnail

Growing Companies Can Still Excite Employees with Startup Energy Even When No Longer a Startup

Steve Farber

Those early days are a blast but at some point, the fun becomes work. This entrepreneur figured out how to maintain the same excitement in later stages.

Energy 111
article thumbnail

How to Market Your Business When You’re Too Busy

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Marketing 101