Sat.May 23, 2020 - Fri.May 29, 2020

article thumbnail

Key Marketing AI Concepts (In Plain English!)

Dataiku

Today’s marketing teams have no shortage of business questions they want to solve, yet they run into all kinds of challenges when trying to make AI a reality. One of them is wanting to democratize the use of AI and data but unable to do so due to a lack of knowledge and transparency around how AI-based technology works.

article thumbnail

DevOps Your Skill: Static Code Quality Analysis

Dzone - DevOps

Without a doubt, one of the aspects a developer should pay more attention to is trying to always generate understandable, maintainable, and clear code — in short, to generate clean code. During the development of code (modules, libraries), it is important to integrate objective tools that measure the status of the code and provide the information to know its quality and thus be able to detect and prevent problems: duplicate functions, excessively complex methods, code low quality, non-standard c

Analysis 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

A Look at the 5 Most Common Types of Cyberattacks

Tenable

Learn more about the key threat vectors you will need to combat with vulnerability assessment tools and cybersecurity best practices. The modern cybersecurity landscape is incredibly complex by any standard. Whether or not you are a cybersecurity professional, everyone can benefit from learning about the dangers you're most likely to face — and determine how security tactics like vulnerability assessment can help protect you. .

Malware 102
article thumbnail

Branching Patterns: Final Thoughts and Recommendations

Martin Fowler

Final post in “Branching Patterns” As I said at the beginning of this long piece: branching is easy, merging is harder. Branching is a powerful technique, but it makes me think of goto statements, global variables, and locks for concurrency. Powerful, easy to use, but easier to over-use, too often they become traps for the unwary and inexperienced.

System 356
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Are You a Developer?

David Walsh

“You’re not really a developer. Sooner or later people are going to realize you don’t know what you’re talking about. You’re just not good enough.”. You’ve probably had thoughts like these at one point or another. You’ve never heard someone else tell you that you’re not a developer, but you’re still thinking it. You may be thinking along these lines right now.

More Trending

article thumbnail

7 Ways to Encourage Creative Thinking in Your Team

Let's Grow Leaders

It Takes Clarity and Curiosity to Encourage Creative Thinking Businesses around the world face a changing normal, where it’s hard to say what things will look like in one year, much less six months from now. For some this means finding entirely […]. The post 7 Ways to Encourage Creative Thinking in Your Team appeared first on Let's Grow Leaders.

article thumbnail

Branching Patterns: Looking at some branching policies

Martin Fowler

In this article, I've talked about branching in terms of patterns. I do this because I don't wish to advocate The One Approach to Branching, but rather to lay out the common ways people do this, and reflect on their trade-offs within the wide range of different contexts that we find in software development. Lots of branching approaches that have been described over the years.

Policies 324
article thumbnail

Managing a Company with Agile

Agile Alliance

This week I had the great pleasure to interview Jorge Silva from Argentina. Jorge, together with three other partners, founded 10Pines more than a decade ago. It is a software company that lives and breaths Agility. Jorge’s education includes and MBA and his passion these days is helping organizations to become healthier and safer places … Continued.

Agile 246
article thumbnail

5 artificial intelligence (AI) types, defined

CTOvision

Read Stephanie Overby define five types of artificial intelligence on Enterprisers Project : Artificial intelligence (AI) is redefining the enterprise’s notions about extracting insight from data. Indeed, the vast majority […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

How To Disrupt the Disruption and Help Your Team Move Forward

Let's Grow Leaders

You wouldn’t have wished for this ridiculous, unprecedented disruption. But if you’re like many leaders I talk with, this stressful period has also been surprisingly energizing. Until it wasn’t. You’re proud of your team. They’ve been working round the clock on a […]. The post How To Disrupt the Disruption and Help Your Team Move Forward appeared first on Let's Grow Leaders.

How To 244
article thumbnail

Threat Modeling: Prioritise and fix

Martin Fowler

New installment in “A Guide to Threat Modelling for Developers” Software teams are incentivised to deliver, and rarely have unlimited bandwidth to go away and address every threat identified. And some of the threats may pose an insignificant risk. You need to filter down and prioritise a few most important actions which you can take away and execute on effectively. more….

Software 311
article thumbnail

Employer data goes AWOL under Covid-19 lockdowns

The Parallax

Covid-19-era data breaches go beyond unemployment insurance fraud, medical-research hacks, and other hot topics. And unfortunately for public organizations and private companies, the data loss — from theft or otherwise — is getting worse. That’s according to several studies published this month, including the Digital Guardian Data Trends Report , published today, which paints an increasingly dire picture for organizations.

Data 173
article thumbnail

Solve IndexError: list index out of range in Python

The Crazy Programmer

Hello readers, welcome back to a yet another post of The Crazy Programmer. Today I’ll be discussing one of the common error programmers make when they start with programming and that is IndexError. Now before talking about this error, let’s try to see what an Index is and why this error occurs. An index is a location of an item in an Array or a List and in most of the programming language, it starts from 0.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Interview: How to Engage Remote Employees in Change

Change Starts Here

Even before the pandemic, engaging remote employees in change initiatives was a hot topic. In this episode of the Influence Change at Work™ Show, Dr. Douglas Williams shares his research and experience about working with people who are not collocated with each other.

How To 176
article thumbnail

Threat Modeling: Brainstorm threats

Martin Fowler

New installment in “A Guide to Threat Modelling for Developers” Jim looks at how to come up with threats to a system, introducing STRIDE, a simple framework to help teams think about threats. more….

System 293
article thumbnail

The Problem with Artificial Intelligence in Security

CTOvision

Read Dr. Leila Powell take a look at the security issues associated with artificial intelligence on Dark Reading: If you believed everything you read, artificial intelligence (AI) is the savior […].

article thumbnail

How OverOps Helps a Leading Telehealth Provider Support 10X Demand From COVID-19

OverOps

The COVID-19 pandemic is accelerating digital transformation across the healthcare industry. OverOps helps telemedicine providers have confidence in their ability to quickly scale applications without compromising software quality. The COVID-19 pandemic has accelerated digital transformation for many industries, but perhaps none so much as the healthcare sector.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Pandemic discourages regulators from enforcing GDPR

The Parallax

As resources are diverted to fighting the ongoing coronavirus pandemic, Europe’s enthusiasm for protecting consumer rights under the General Data Protection Regulation might be taking a pause, but it’s certainly not rewinding, experts say. A month after the United Kingdom’s data-regulating Information Commissioner’s Office issued statements indicating that it would be taking a softer touch in enforcing the GDPR, which the region uses to govern how businesses manage their

article thumbnail

DevOps Your Skill: Deploy

Dzone - DevOps

When the code is checked in the previous steps, it is time to deploy the Skill to the Alexa cloud in order to start the next steps that will run different kind of tests. There are some tests, like VUI tests, integrations tests, end-to-end tests, and validation tests that we cannot run in localhost only with our code. This is why we need to deploy the Alexa Skill to the development stage.

DevOps 145
article thumbnail

Towards A More Transparent AI

CTOvision

Read why Ron Schmelzer says that artificial intelligence has to be transparent on Forbes : One cornerstone of making AI work is machine learning – the ability for machines to […].

article thumbnail

DataOps and DevOps: A Match Made in Heaven

DevOps.com

The adoption of IT technologies has increased exponentially over the last few decades. Nowadays, the need to create quality web applications while simultaneously managing their extensive data effectively is a major concern for any organization. As such, there have been continuous efforts to come up with better approaches to software development, data analysis and data […].

DevOps 145
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

RPA essentials: What it is, and why it matters

TechBeacon

Robotic process automation (RPA) technology helps organizations automate defined, multi-step manual tasks that are done in high volume. RPA does this by creating software robots, or RPA bots, that emulate human actions to interact with existing application interfaces.

article thumbnail

Introducing Edge Handlers in Preview

Netlify

As adoption of the Jamstack model has become more widespread, so have the needs of a traditional CDN shifted. Today, content is expected to be fast, highly customizable, and up to date within a fraction of a second. Strictly static CDNs, which store static assets and serve them indistinguishably for every request, are insufficient to handle the more dynamic, personalized nature of modern content.

Examples 141
article thumbnail

Using Kotlin for Back-end Development: A Quick Overview

Toptal

Kotlin has features that make it an ideal language for back-end development. Learn what these features are and how you can use them to create high-performing systems.

article thumbnail

Putting BDD in Practice Using Scala

Dzone - DevOps

This article aims to give a brief explanation of what BDD is and how it can be used to fill the information gap between stakeholders and development teams, ensuring everyone (technical or not) is involved in the project’s progress. The first time I had contact with this approach to software development was a few years ago during a Massive Open Online Course (MOOC) and, I must warn you, I've never applied it in production.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

How to go from performance tester to performance engineer

TechBeacon

Companies are increasingly recognizing the value of performance engineering, which goes well beyond performance testing. These organizations now require the capability to fix performance issues whenever and wherever they exist—and they're willing to pay a premium for those skills. That’s why many performance testers are stepping up their game.

article thumbnail

You are what you Git: how your VCS branching model affects your delivery cadence

CircleCI

The path of a software engineer is one of constant learning. We learn things from concepts and processes to languages and tools. Once we have seen them work, we add them to our arsenal and make them our praxis. Before joining CircleCI, my years of experience led me to believe that I was an engineer with a firm understanding of the technical aspects of the craft, as well as what is considered good practice.

article thumbnail

3 Ways Every Company Should Prepare For The Internet Of Things

CTOvision

Read Bernard Marr explain the three ways in which companies can prepare their Internet of Things strategy on Forbes: With the global Internet of Things (IoT) market being valued at […].

Internet 118