Sat.Jul 14, 2018 - Fri.Jul 20, 2018

article thumbnail

Improve Your Application Performance with Garbage Collection Optimization

OverOps

Application performance is on the forefront of our minds, and Garbage Collection optimization is a good place to make small, but meaningful advancements. Automated garbage collection (along with the JIT HotSpot Compiler) is one of the most advanced and most valued components of the JVM, but many developers and engineers are far less familiar with Garbage Collection (GC), how it works and how it impacts application performance.

article thumbnail

Scrum is not an Agile Software Development Framework

Ron Jeffries

People have been telling me for years that Scrum is not an Agile Software Development Framework. I should have paid more attention. It's still good stuff, though.

SCRUM 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Top Steps to Take DevOps to the Next Level

OTS Solutions

Devops has been the subject of many IT debates since its launch. Some people have considered it to be just another marketing fad while others believe it is the next big thing in IT operations. Consequently, over the years, analysts have predicted that devops shall experience rapid growth. Nonetheless, the tool has grown steadily but hasn’t caught momentum among mainstream businesses.

DevOps 113
article thumbnail

Data collection and data markets in the age of privacy and machine learning

O'Reilly Media - Data

While models and algorithms garner most of the media coverage, this is a great time to be thinking about building tools in data. In this post I share slides and notes from a keynote I gave at the Strata Data Conference in London at the end of May. My goal was to remind the data community about the many interesting opportunities and challenges in data itself.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Specialized hardware for deep learning will unleash innovation

O'Reilly Media - Data

The O’Reilly Data Show Podcast: Andrew Feldman on why deep learning is ushering a golden age for compute architecture. In this episode of the Data Show , I spoke with Andrew Feldman, founder and CEO of Cerebras Systems , a startup in the blossoming area of specialized hardware for machine learning. Since the release of AlexNet in 2012 , we have seen an explosion in activity in machine learning , particularly in deep learning.

Hardware 112

More Trending

article thumbnail

Wondershare Video Converter Ultimate Review

The Crazy Programmer

Working on videos isn’t always as easy as making them. Editing, converting, recreating and enhancing the videos might be a very essential task of our day to day activities but it is not always the easier one. It sounds good to have a video edited within the spur of a moment, but in reality it takes a lot of hard work, focus, dedication and concentration.

Video 140
article thumbnail

Smart Cities Cybersecurity Challenge

CTOvision

Smart Cities will become a full-scale cyber war battleground unless Congress mandates cybersecurity. The biggest danger in Smart Cities is the assumption that IoT sensors communicating over a 5G fabric to Machine Learning and Blockchain systems will be safe from cyberattacks. To the contrary Smart Cities suffer from all the cyber vulnerabilities we have today [.].

article thumbnail

MLflow: A platform for managing the machine learning lifecycle

O'Reilly Media - Data

An overview of the challenges MLflow tackles and a primer on how to get started. Although machine learning (ML) can produce fantastic results, using it in practice is complex. Beyond the usual challenges in software development, machine learning developers face new challenges, including experiment management (tracking which parameters, code, and data went into a result); reproducibility (running the same code and environment later); model deployment into production; and governance (auditing mode

article thumbnail

The Art of the Tough Conversation: A Frontline Festival

Let's Grow Leaders

Welcome to the Let’s Grow Leaders Frontline Festival on the art of the tough conversation. We asked thought leaders from around the world to share their very best post on this topic. Thanks to Joy and Tom Guthrie of Vizwerx Group for the great pic […]. The post The Art of the Tough Conversation: A Frontline Festival appeared first on Let's Grow Leaders.

Groups 130
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Design Problem Statements – What They Are and How to Frame Them

Toptal

Even exciting product ideas can flop without an understanding of the user problem to solve. A design problem statement is an essential step in the design process for creating products that truly matter.

How To 110
article thumbnail

How to Impose Agile

Ron Jeffries

There's a lot of whinging going on about imposing 'Agile' methods and practices. These whiners just don't know how to do imposition correctly. Me either, but here's what I'd try.

Agile 108
article thumbnail

Of oaths and checklists

O'Reilly Media - Data

Oaths have their value, but checklists will help put principles into practice. "Oaths? We don't need no stinkin' oaths" (with apologies to Humphrey Bogart in “Treasure of the Sierra Madre”). Over the past year, there has been a great discussion of data ethics, motivated in part by discomfort over “fake news,” targeted advertising, algorithmic bias, and the effect that data products have on individuals and on society.

article thumbnail

Courage: 5 Ways to Show Up Stronger (Even When You’re Scared)

Let's Grow Leaders

Have you ever wanted to take a stand, but kept quiet? Have you had a moment of bravery you found hard to explain? Where does courage come from? A Courageous Guest Post from Selvia of Glowstone Peak Karin and David asked me to share […]. The post Courage: 5 Ways to Show Up Stronger (Even When You’re Scared) appeared first on Let's Grow Leaders.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Creating a UI Style Guide for Better UX

Toptal

A consistent UI leads to a better UX. But with so many moving parts in modern user interfaces, how can UI designers be sure they’re staying true to a digital product’s look and feel?

UI/UX 101
article thumbnail

C³ Webinar: Awareness Briefings on Russian Activity Against Critical Infrastructure

CTOvision

The Department of Homeland Security (DHS) Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR) division and the National Cybersecurity and Communications Integration Center (NCCIC) are joining forces to conduct a series of unclassified, virtual awareness briefings on Russian government cyber activity against critical infrastructure. We believe this webinar will be of interest to technical teams operating [.].

article thumbnail

Data engineering: A quick and simple definition

O'Reilly Media - Data

Get a basic overview of data engineering and then go deeper with recommended resources. As the the data space has matured, data engineering has emerged as a separate and related role that works in concert with data scientists. Ian Buss, principal solutions architect at Cloudera, notes that data scientists focus on finding new insights from a data set, while data engineers are concerned with the production readiness of that data and all that comes with it: formats, scaling, resilience, security,

article thumbnail

Scrum Hardware: eXtreme Manufacturing Explained

scruminc

Scrum Hardware: eXtreme Manufacturing Explained. by Joe Justice | July 13, 2018 | Blog. A continuously improving blast of new, high-quality products which get the marketplace excited, tests assumptions and makes money; That is the goal of Scrum Hardware. To Scrum hardware, we need fast design. The rules of Scrum give us a powerful and tested framework for new product development.

SCRUM 80
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

How to Approach Machine Learning Problems

Toptal

How do you approach machine learning problems? Are neural networks the answer to nearly every challenge you may encounter? In this article, Toptal Freelance Python Developer Peter Hussami explains the basic approach to machine learning problems and points out where neural may fall short.

article thumbnail

Chasing the Elusive Machine Learning Platform

CTOvision

If you have been following the breathless hype of AI and ML over these past few years, you might have noticed the increasing pace at which vendors are scrambling to roll out “platforms” that service the data science and ML communities. The “Data Science Platform” and “Machine Learning Platform” are at the front lines of [.].

article thumbnail

4 Tips for Capturing Leads with Your Website

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

75
article thumbnail

Performance Appraisals Update

scruminc

Impediments of Performance Appraisals. The research on performance appraisal shows that they: Demotivate employees. 70% of content is about the manager, not the employee, and the remainder often does not accurately reflect employee performance because the manager does not really know day to day what happens (the team does). They increase damage awards in the event of lawsuits.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What’s My Return on Investment and How Do I Calculate It?

Toptal

Finding out your return on investment from a project can become a subjective process with the myriad of returns measures and formulas that exist. This overview provides a breakdown and explanation of what type of return you need to measure and how to calculate it. With further guidance on how to use returns data to guide objective decision making.

Data 81
article thumbnail

Inform Your Cybersecurity Strategy With Lessons From July 1861

CTOvision

When I was the Director of Intelligence for DoD's first joint cyber defense organization (JTF-CND) our Commander (At the time, Army Major General Dave Bryan) and our J5 (Marine LTC Mike Davis) organized a visit for the senior staff to the Manassas Battlefield Park of Virginia. The purpose was not just team building, but to [.].

article thumbnail

3 Ways To Stop Sleep Walking Through Your Leadership Legacy

Lead on Purpose

Guest article by Glain Roberts-McCabe “She was completely whole and yet never fully complete” ?Maquita Donyel Irvin One day, I was having lunch with John, a successful CEO of a national retailer.

article thumbnail

Women Need to Be Risk Aware Entrepreneurs

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

74
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hot Module Replacement in Redux

Toptal

Hot module replacement is one of the most useful features offered by Webpack. It allows all kinds of modules, including JSON, CSS, and JS files, to be updated at runtime without needing a full refresh. In this article, Toptal Freelance JavaScript Developer Shaojiang Cai demonstrates how to use Hot Module Replacement in Redux.

article thumbnail

Apple iCloud data now stored on Chinese government servers, Data breach at LabCorp, SIM hijacking, Aircraft cybersecurity, half of US retailers suffer data breach in 2018

CTOvision

The following are some of the cyber security and cyber war related stories we are tracking: Apple’s iCloud user data in China is now handled by a state-owned mobile operator If you are an Apple iPhone or Mac user and are communicating with someone in China, you should be extra careful because as per the [.].

Data 65
article thumbnail

Classic WTF: The Source Control Shingle

The Daily WTF

Our summer break continues. I once worked on a team which made "shingles"- software modules that were layered on top of a packaged product. There were a lot of WTFs in those shingles, but nothing that can compare to this once. Original -- Remy. The year was 1999 and the dot-com boom was going full-throttle. Companies everywhere were focused on building revolutionary applications using nothing but top-shelf hardware and state-of-the-art software tools.

Backup 73