Data architecture vs backend architecture
Erik Bernhardsson
JANUARY 9, 2019
O'Reilly Media - Ideas
JANUARY 8, 2019
From infrastructure to tools to training, Ben Lorica looks at what’s ahead for data. Whether you’re a business leader or a practitioner, here are key data trends to watch and explore in the months ahead. Increasing focus on building data culture, organization, and training. In a recent O’Reilly survey , we found that the skills gap remains one of the key challenges holding back the adoption of machine learning.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
DevOps.com
JANUARY 7, 2019
Feature flags, also known as feature toggles, provide a means for DevOps teams to test and add new capabilities to their applications without having to take the entire application offline. The downside is they generally result in more branches of applications that need to be carefully managed within the context of a DevOps process. A […]. The post Feature Flagging Poised for Wider Adoption appeared first on DevOps.com.
OTS Solutions
JANUARY 10, 2019
Top Technologies Your Business Can Take Advantage of Today. To stay ahead of the curve in today’s market, businesses can’t rely on the quality of their services alone. They have to adopt cutting-edge technologies that give customers and employees the convenience they’ve come to expect from competitive firms. These are some of the top technologies your business can implement today to stay successful.
Advertisement
IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d
The Crazy Programmer
JANUARY 9, 2019
Data breaches and compromised websites frequently used to spread malware can be risky for your business; including small businesses. In fact, small or medium-sized businesses are likely to suffer more consequences of cyber-attacks than large enterprises. Large enterprises have the benefit of huge financial reliance as well as organizational resources to combat any attacks.
CTO Universe brings together the best content for CTOs from the widest variety of industry thought leaders.
Let's Grow Leaders
JANUARY 10, 2019
Do you ever feel like your staff keeps you in the dark? Do you ever wonder if they’re going out of their way to keep you out of their way? That seems ridiculous. AND, it’s entirely possible. Here’s the scary part if […]. The post 6 Reasons Your Staff Keeps You in the Dark appeared first on Let's Grow Leaders.
Xebia
JANUARY 11, 2019
History In 2014 I started at Xebia in the business unit Agile Consultancy and Training (ACT). Colleague Nicole Belilos took me under her wings and helped me develop and grow within this group of Agile coaches. Together with Laurens Bonnema we formed a group who had experienced a lot of bad Scrum, fake Scrum, Scrum […]. The post Celebrating one year of Scrum Boosters!
The Crazy Programmer
JANUARY 8, 2019
Queue is an important structure for storing and retrieving data and hence is used extensively among all the data structures. Queue, just like any queue (queues for bus or tickets etc.) follows a FIFO mechanism for data retrieval which means the data which gets into the queue first will be the first one to be taken out from it, the second one would be the second to be retrieved and so on.
Agile Alliance
JANUARY 7, 2019
At Agile Alliance, we pride ourselves on the wealth of high-quality, in-depth Agile-related resources we offer you. But we also realize that sometimes too much of a good thing can be overwhelming. In order to help combat that issue, I'm proud to begin offering curated monthly emails on subjects of interest to you. I’ve identified … Continued.
Advertisement
Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.
Let's Grow Leaders
JANUARY 8, 2019
When a leader is always right, they’re not effective. If you had been with me early in my career, you would have seen my growing frustration. My first job out of grad school was teaching and I had a class of students who […]. The post The Danger When a Leader is Always Right appeared first on Let's Grow Leaders.
Erik Bernhardsson
JANUARY 9, 2019
A modern tech stack typically involves at least a frontend and backend but relatively quickly also grows to include a data platform. This typically grows out of the need for ad-hoc analysis and reporting but possibly evolves into a whole oil refinery of cronjobs, dashboards, bulk data copying, and much more. What generally pushes things into the data platform is (generally) that a number of things are.
The Crazy Programmer
JANUARY 7, 2019
Procedure: In computer programming a specific set of instructions together called a procedure. Depending on the programming language it can be called as subroutine, subprogram or a function. Function: It is one of the basic concept in programming of computer. As it name says, it performs a function (work). It can be either user defined or system defined.
CTOvision
JANUARY 7, 2019
Read why Floyd DCosta says that blockchain technology could be a crucial cog in the Internet of Things infrastructure on Entrepreneur : The era of the Internet of things (IoT) is upon us and it is impacting our lives. Today, technology has pervaded into nearly all walks of life, and constant innovation has made it […].
Advertisement
As a SaaS leader, you know that the more metrics, insights, and analytics you add to your products, the more engagement you’ll have – and the stickier your product will become with customers. At what point do you decide to keep building your analytics in-house or invest in an embedded analytics solution? Read our Build vs. Buy Analytics guide to learn: Top 4 benefits of embedded analytics A quick cost comparison of in-house analytics development vs embedded analytics 10 considerations to help yo
Change Starts Here
JANUARY 8, 2019
Trust is a necessary prerequisite of influence because it is the foundation of healthy relationships. Put simply, people are more likely to be influenced by someone they trust. On the other hand, the absence of trust creates resistance to change by creating doubt, uncertainty, and fear. In my Fundamentals of Influencing Change at Work course, […].
Toptal
JANUARY 9, 2019
Without proper state management, your Angular app will become a UX nightmare. But even with that solved, persisting state across sessions and devices can be tricky. This tutorial shows how to leapfrog that challenge using Firebase.
DevOps.com
JANUARY 8, 2019
Without proper consideration given to security best practices, the continuous delivery of software changes facilitated by DevOps is risky. On the other hand, DevOps provides an opportunity to reduce security risks if security is integrated into the continuous delivery pipeline according to best practices. This blog enumerates best practices for security across nine pillars of […].
O'Reilly Media - Ideas
JANUARY 10, 2019
Technological change often happens gradually, then suddenly. Tim O'Reilly explores the areas poised for sudden shifts. There’s a passage in Ernest Hemingway’s novel The Sun Also Rises in which a character named Mike is asked how he went bankrupt. “Two ways,” he answers. “Gradually, then suddenly.”. Technological change happens much the same way. Small changes accumulate, and suddenly the world is a different place.
Advertiser: Data Robot
The buzz around generative AI shows no sign of abating in the foreseeable future. Enterprise interest in the technology is high, and the market is expected to gain momentum as organizations move from prototypes to actual project deployments. Ultimately, the market will demand an extensive ecosystem, and tools will need to streamline data and model utilization and management across multiple environments.
OverOps
JANUARY 8, 2019
We’re taking a walk down memory lane to see which topics, trends and posts interested you in 2018. As part of our 2019 resolutions, we’ve decided we want to write more about the topics that interest you, our beloved audience. And in order to do that, we took a deep look into the top topics and posts that interested you throughout 2018. We made a list, checked it twice, and found out who’s mention-worthy (and who’s not).
Toptal
JANUARY 7, 2019
As simple as your RESTful API may be, even internal users will want a JavaScript package that will do all the heavy lifting for them. Why build each CRUD request by hand, or worse, deal with related resources using custom code for every scenario? With ActiveResource.js, you don't have to.
DevOps.com
JANUARY 6, 2019
Choosing the right DevOps tools should be a careful, thoughtful process. On May 12, 1848, a store owner named Sam Brannan held a “one-man parade” to announce the start of the San Francisco Gold Rush. “Gold! Gold from the American River!” Brannan shouted up and down the market street in San Francisco. He held his […]. The post Don’t Let Your DevOps Transformation Be a Parade of Tools appeared first on DevOps.com.
CTOvision
JANUARY 9, 2019
Editor’s note: The below is from the press release for the launch of my new firm, OODA LLC. I’m very excited about this new venture and intend on making a positive difference in addressing several next generation security challenges. For more see: OODA.com Industry Veterans Launch New Company to Address Next Generation Security Challenges Security, […].
Speaker: Blackberry, OSS Consultants, & Revenera
Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?
TechBeacon
JANUARY 9, 2019
Prior to my Automation Guild conference each year, I survey the community about the issues they're struggling with. I also speak with many testing thought leaders on my weekly Test Talks podcast.
Toptal
JANUARY 8, 2019
Data-driven UI design is both art and science. Understanding how to collect and analyze data and implement designs based on it is an important skill for beginner and expert designers alike.
DevOps.com
JANUARY 11, 2019
DevOps can help make HIPAA compliance more achievable Automating the provisioning of HIPAA-compliant server infrastructure enables compliant hosting service providers with the ability to provision and deploy infrastructure-as-code with minimal human intervention. Providing the automated process is thoroughly tested, revised and updated, it can offer a healthcare organization huge flexibility when enforcing a HIPAA-compliant server […].
Flexagon
JANUARY 8, 2019
The most effective development processes are tailored to the company and product IT teams are working with. The most effective teams develop standardized processes that help reduce errors and speed up the software delivery lifecycle, while increasing efficiency for their specific product. DevOps spans people, process, and technology, and can be integrated into every IT.
Advertisement
Think your customers will pay more for data visualizations in your application? Five years ago, they may have. But today, dashboards and visualizations have become table stakes. Turning analytics into a source of revenue means integrating advanced features in unique, hard-to-steal ways. Download this white paper to discover which features will differentiate your application and maximize the ROI of your analytics.
Women on Business
JANUARY 7, 2019
We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].
CTOvision
JANUARY 10, 2019
A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka –the English pronunciation of the Polish word for mantis– this new tool was created […].
DevOps.com
JANUARY 10, 2019
DevOps is arguably one of the most disruptive forces driving transformation of IT processes in recent memory. But a new survey finds that while IT organizations are making progress, adoption of DevOps processes remains uneven at best. A survey of 2,419 IT professionals conducted by OverOps, a provider of code analysis tools, finds that 82 […].
Let's personalize your content