Trending Articles

article thumbnail

Where’s the ROI for AI? CIOs struggle to find it

CIO

Finding the return on investment for AI remains elusive for many organizations, even as they rush to adopt the technology. Difficulties estimating or demonstrating the value of AI technologies to the business have been or will be a top barrier to their implementation, according to a recent Gartner survey of more than 700 IT leaders at organizations that have adopted or plan to adopt AI.

article thumbnail

Test-Driving HTML Templates

Martin Fowler

When building a server-side rendered web application, it's valuable to test the HTML that's generated through templates. While these can be tested through end-to-end tests running in the browser, such tests are slow and more work to maintain than unit tests. My colleague Matteo Vaccari has written an article on how to use TDD to test drive these templates using xunit-style tools which can be run easily from the command line or as part of build scripts.

Testing 284
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Reimagining Agile at JAFAC: Back to basics and forward to the future

Agile Alliance

The Reimagining Agile workshop at JAFAC 2024 united New Zealand's Agile community to rethink the Agile Manifesto and address modern challenges, fostering collaborative discussions and questioning established narratives to envision Agile's future. The post Reimagining Agile at JAFAC: Back to basics and forward to the future first appeared on Agile Alliance.

Agile 179
article thumbnail

Linux as the new developer default at 37signals

David Heinemeier Hansson

For over twenty years, the Mac was the default at 37signals. For designers, programmers, support, and everyone else. That mono culture had some clear advantages, like being able to run Kandji and macOS-specific setup scripts. But it certainly also had its disadvantages, like dealing with Apple's awful reliability years , and being cut off from seeing how half our Basecamp customer base saw by default (since they're on Windows!).

Linux 136
article thumbnail

10 Rules for Managing Apache Cassandra

It’s no surprise that Apache Cassandra has emerged as a popular choice for organizations of all sizes seeking a powerful solution to manage their data at a scale—but with great power comes great responsibility. Due to the inherent complexity of distributed databases, this white paper will uncover the 10 rules you’ll want to know when managing Apache Cassandra.

article thumbnail

All Business Strategies Fall into 4 Categories

Harvard Business Review

The problem with strategy frameworks is that although they can help you determine whether an opportunity is attractive or whether a given strategy is likely to work, they generally don’t help you in the task of identifying the opportunity or crafting the strategy in the first place. This article introduces a framework, built on an in-depth analysis of the creativity literature, that aims to fill that gap by providing a systematic approach to identifying potential strategies.

Strategy 126

More Trending

article thumbnail

Testing the contents of generated HTML

Martin Fowler

Matteo Vaccari continues his testing of template-generated HTML by describing tests for the contents of that HTML. He shows how to gradually build up the template, using Test-Driven Development in Go and Java.

Testing 189
article thumbnail

Logz’s AI Chatbot Makes Your Observability Tools Smart(er)

DevOps.com

Everyone is adding AI to their applications. Sometimes that's overkill. But Logz.io's IQ Assistant, which purports to make the most of your software stack's records, actually makes sense.

Tools 121
article thumbnail

Linguistic Lumberjack: Attacking Cloud Services via Logging Endpoints (Fluent Bit - CVE-2024-4323)

Tenable

Tenable Research has discovered a critical memory corruption vulnerability dubbed Linguistic Lumberjack in Fluent Bit, a core component in the monitoring infrastructure of many cloud services. Key takeaways Fluent Bit is a logging utility heavily used by all major cloud providers. Tenable Research discovered a critical vulnerability dubbed Linguistic Lumberjack (CVE-2024-4323) within Fluent Bit’s built-in HTTP server that could potentially allow for denial of service, information disclosure, or

article thumbnail

Helpful Tips for Working with an Indecisive Manager

Let's Grow Leaders

Episode 258: In this episode, David Dye explores the all-too-common frustration of working with an indecisive manager. He shares practical strategies that you can use to navigate this challenging situation. David suggests using powerful phrases to pinpoint where your boss is getting stuck and to gain clarity on the decision-making process. He also advises demonstrating to your boss that acting is often easier than remaining in the status quo.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

10 projects top of mind for IT leaders today

CIO

The CIO position has morphed since its inception 40 years ago, shifting from a nuts-and-bolts techie job to an increasingly business- and strategy-focused executive role. Nearly half (49%) of IT leaders responding to the 2024 State of the CIO Study from Foundry, publisher of CIO.com, say they expect to play more of a strategic role in the upcoming years, with another 36% anticipating a heavy emphasis on transformational responsibilities.

article thumbnail

Code Splitting in Single-Page Applications

Martin Fowler

Single-Page Applications often require a lot of code to be downloaded to the browser, which can delay a page's initial appearance. Juntao Qiu's next pattern, Code Splitting , describes how this code can be divided up, so that modules are only loaded if they are going to be needed, and the dangers of doing so.

article thumbnail

You Need New Skills to Make a Career Pivot. Here’s How to Find the Time to Build Them.

Harvard Business Review

With any significant change in your career comes the need for new skills. But that’s even more true when you want a radical career change. In these situations, it’s going to take more than listening to a few webinars to build the knowledge you need get to where you want to go. You must set aside a significant amount of time for self-directed learning, formal training, or even a second job to gain the skills for the big leap.

How To 126
article thumbnail

Why Board Members Must Prioritize Cybersecurity and Regulatory Compliance: Lessons from the SEC’s $10 Million Fine on Intercontinental Exchange and NYSE

Ooda Loop

The SEC charged Intercontinental Exchange (ICE) and nine affiliates, including the New York Stock Exchange, with failing to promptly inform the SEC about a cyber intrusion in 2021 (more here). ICE was fined $10 million for delaying notification and not following Regulation SCI, which mandates immediate reporting of cyber events.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Human Connection: How Do I Train Someone to Connect More Deeply?

Let's Grow Leaders

To Get Better at Human Connection, Make Connecting a Habit “Hey Karin, I was just in your and David’s session at the Association for Talent Development (ATD) Global Conference in New Orleans, where you talked about human connection and the 4 dimensions of productive conflict (collaboration): connection , clarity , curiosity , and commitment.

article thumbnail

US lawmakers advance bill to close loopholes in AI export controls

CIO

The House Foreign Affairs Committee has advanced a bill that would enhance the White House’s ability to regulate the export of AI systems, amid ongoing efforts to tighten grip on key technologies. “The US-China Economic and Security Review Commission reported last year that China is using commercial AI advancements to prepare for military conflict with Taiwan,” bill co-author and House Representative Michael McCaul said in a statement.

article thumbnail

Nonprofit CEO Search: Strategies for Sustainable Leadership

N2Growth Blog

Identifying the Key Qualities and Skills of an Effective Nonprofit CEO Nonprofit organizations thrive under the guidance of exceptional CEOs who possess a unique set of qualities and skills. As a leading executive search firm , we’ve found that one of the most important qualities to look for in a nonprofit CEO is strong leadership and communication skills.

article thumbnail

3 Ways to Clearly Communicate Your Company’s Strategy

Harvard Business Review

For all the communication around strategy, we know that leaders at many companies don’t provide the necessary context for employees to understand what the words and sentences in a strategy statement actually mean. What can leaders do to help employees understand enough context to understand a strategy? In this article, the authors offer three recommendations: 1) Present the alternatives considered and explain why they were not adopted. 2) Explain how each choice is linked to the organization’s p

Strategy 109
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Are PSYOPS in Cyberspace a Viable Tool Against Adversaries?

Ooda Loop

A recent article revealed that the U.S. National Security Agency (NSA) would try to counter prolific ransomware gangs beyond using cyber responses, and also include psychological warfare into its toolbox.

Tools 116
article thumbnail

Defining DevSecOps for IoT

DevOps.com

By embedding security practices at every stage of the IoT development lifecycle, from design through deployment, organizations can significantly enhance the security and integrity of their IoT ecosystems.

IoT 108
article thumbnail

IT leaders look beyond LLMs for gen AI needs

CIO

With the generative AI gold rush in full swing, some IT leaders are finding generative AI’s first-wave darlings — large language models (LLMs) — may not be up to snuff for their more promising use cases. LLMs, with their advanced ability to comprehend and generate text, have become a near stand-in for generative AI in the collective mindshare. Along with code-generating copilots and text-to-image generators, which leverage a combination of LLMs and diffusion processing, LLMs are at the core of m

article thumbnail

From Today to Tomorrow: Ensuring Continuity through Strategic Succession

N2Growth Blog

Defining the Key Elements of a Strategic Succession Strategy A robust succession plan depends on thorough strategic planning and preparation. It begins with identifying key organizational roles that could impact its continuity and growth. Creating detailed role descriptions outlining responsibilities, requirements, and potential for growth is essential.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Scaling a Midsize Startup

Harvard Business Review

The “mighty-middle” segment of startups falls between venture-scale unicorns and small businesses. These startups aim for valuations in the high single-digit to high tens of millions within 5-10 years, targeting midsize niches with significant growth potential. Enabled by internet tools, global advertising, and affordable tech, mighty-middle businesses often bootstrap, use contractors, and require entrepreneurs to acquire diverse skills.

article thumbnail

Russia, in New Push, Increasingly Disrupts Ukraine’s Starlink Service

Ooda Loop

Russia has deployed advanced tech to interfere with Elon Musk’s satellite internet service, Starlink, leading to more outages on the northern front battle line. Starlink has been critical to the Ukrainian military since the earliest days of the war with Russia.

Internet 105
article thumbnail

Transform Innovation into Value: The Dell AI Factory with NVIDIA

Dell EMC

The Dell AI Factory with NVIDIA turbocharges AI adoption to simplify development, automate workflows and deliver up to 86% faster business outcomes.

article thumbnail

10 most powerful ERP vendors today

CIO

Back-office ERP systems are gaining strategic importance as organizations seek to digitize and automate business processes, modernize their application stack, migrate to the cloud, and accelerate the speed of business. In its latest MarketScape on worldwide SaaS and cloud-enabled large enterprise ERP, IDC says, “The pace of innovation is increasing, and ERP vendors focused on AI, ML, natural language processing (NLP), chatbots, robotics process automation (RPA), and genAI are critical partners t

SMB 291
article thumbnail

10 Rules for Managing Apache Kafka

Without proper guidance, it’s easy to miss out on Kafka’s full capabilities. While not the easiest technology to optimize, Kafka rewards those willing to explore its depths. Under the hood, it is an elegant system for stream processing, event sourcing, and data integration. Download this white paper to learn the 10 critical rules that will help you optimize your Kafka system and unlock its full potential.

article thumbnail

Unveiling Excellence: How Executive Coaching Drives Business Success

N2Growth Blog

The Power of Executive Coaching in Driving Business Success In today’s competitive business landscape, the importance of executive coaching cannot be overstated. Executives can improve their leadership skills through tailored and personalized coaching programs, overcome challenges, and achieve tangible results for their organizations. One of the key benefits of executive coaching is its ability to empower executives to reach their full potential.

article thumbnail

3 Ways to Make a Request That Doesn’t Feel Coercive

Harvard Business Review

Research shows that people feel more pressured to agree to requests than we realize, frequently agreeing to do things they would rather not do, such as taking on burdensome, low-promotability work tasks. As a manager, what can you do to ensure that your employees aren’t taking things on because they feel like they have to, but because they actually want to?

Research 106
article thumbnail

Woman Accused of Helping North Korean IT Workers Infiltrate Hundreds of US Firms

Ooda Loop

As a part of an effort to disrupt a North Korean IT workers scheme, the U.S. government announced charges, seizures, arrests, and reward incentives. A network of North Korean IT workers has earned millions of dollars for North Korea by infiltrating hundreds of companies.