Tue.Jun 18, 2019

article thumbnail

Clear as Mud – Attaining Real Transparency in Agile

Agile Alliance

How transparent are you? How transparent is your team, your organization? We all know that transparency is an essential aspect of Agile development, but do you really understand just how critical it is? Transparency is often a key tenant of corporate mission statements. The need for greater transparency in government and business has led to … Continued.

Agile 237
article thumbnail

Forget monoliths vs. microservices. Cognitive load is what matters.

TechBeacon

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The quest for high-quality data

O'Reilly Media - Ideas

Machine learning solutions for data integration, cleaning, and data generation are beginning to emerge. “AI starts with ‘good’ data” is a statement that receives wide agreement from data scientists, analysts, and business owners. There has been a significant increase in our ability to build complex AI models for predictions, classifications, and various analytics tasks, and there’s an abundance of (fairly easy-to-use) tools that allow data scientists and analysts to provision complex models with

Data 105
article thumbnail

Frictionless checkouts for GAMMA and KARWEI

Xebia

Over the years, Xebia has been the driver of Agile software development at Intergamma, known for the GAMMA and KARWEI DIY stores. A year ago, we set out to replace the checkout process for their webshops. The existing checkout was slow and cumbersome to use, and no longer on par with other parts of the […]. The post Frictionless checkouts for GAMMA and KARWEI appeared first on Xebia Blog.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

HPE Extends Hybrid Cloud Computing Strategy

DevOps.com

Hewlett-Packard Enterprise (HPE) today advanced its hybrid cloud computing strategy by announcing at its HPE Discover 2019 conference an alliance with Google to embrace Kubernetes in hybrid cloud computing environments and then extending the reach of its software-defined infrastructure for building private clouds to legacy ProLiant servers. Lauren Whitehouse, director of marketing for the software-defined […].

Strategy 106

More Trending

article thumbnail

Leveraging Machine Learning and Artificial Intelligence for 5G

CableLabs

The heterogenous nature of future wireless networks comprising of multiple access networks, frequency bands and cells – all with overlapping coverage areas – presents wireless operators with network planning and deployment challenges. Machine Learning (ML) and Artificial Intelligence (AI) can assist wireless operators to overcome these challenges by analyzing the geographic information, engineering parameters and historic data to: Forecast the peak traffic, resource utilization and a

article thumbnail

NET Unit Testing: Spend Upfront to Save Later On

Toptal

Unit testing sometimes sounds like an unnecessary expense, but it is a powerful, yet simple tool. Unit tests allow you to identify and rectify weaknesses with relatively little effort. In this article, Toptal Software Engineer Nickolas Fisher takes you on a quick tour of unit testing and explains why you can’t have too many unit tests.

.Net 100
article thumbnail

AI Experts: Your country needs you

CTOvision

If you are in the DC area and have a technology, service or smart approach to government use of AI please join your community 24-26 June at the Reagan Center for AI World Gov. Use the discount code below to register: AI World Gov is coming! Mark your calendars now for this 24-26 June 2019 […].

article thumbnail

Developers Have More in Common With Marketers Than They Think

DevOps.com

Marketing professionals and developers together are critical in advancing customer experience More than a decade ago, in the early age of digital transformation, industry analysts and insiders began discussing the need for an increased focus on the collaboration between CTOs, CIOs and CMOs to achieve business goals. It was determined that CMOs would spend more […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Smarts Also Means New Vulnerabilities for Connected Buildings

Symantec

With building infrastructure automation, experts are starting to take cyber security seriously and say the average smart building remains open to network attacks

article thumbnail

CVE-2019-11707: Critical Type Confusion Zero-Day in Mozilla Firefox Exploited in the Wild

Tenable

Security researchers discover a zero-day vulnerability in Mozilla Firefox used in targeted attacks. Background. On June 18, the Mozilla Foundation published a security advisory to address a zero-day vulnerability in Mozilla Firefox being used in targeted attacks in the wild. Analysis. According to the security advisory, CVE-2019-11707 is a type confusion vulnerability in Mozilla Firefox that can result in an exploitable crash due to issues in Array.pop which can occur when manipulating JavaScrip

article thumbnail

Business Decisions, Including Due Diligence, Require New Insights Into The Age of Geopolitical Risk

CTOvision

The convergence of trends like globalization, rapidly advancing technology, cyber espionage and trade wars mean we live in an age that requires new understanding of geopolitical risks to business operations, as well as risks to mergers and acquisition. OODAloop.com is a resource designed to capture actionable insights into geopolitical risk, technological risk and cyber conflict […].

article thumbnail

Applitools Launches Free Open Source Software Licensing, Partners with Open Source Apprentice Program

DevOps.com

The company supports diversity in tech initiative, makes automated visual testing available for all open source libraries SAN MATEO, Calif., June 18, 2019 — Applitools, a provider of AI Powered end-to-end visual testing and monitoring, today announced a version of its flagship product, Applitools Eyes, is now available for open source libraries.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Mitigating Container Image Vulnerabilities with Aqua Vulnerability Shield™

Aqua Security

Managing known vulnerabilities in container images has been one of the first issues to get the attention of organizations that adopt containers. Knowing what vulnerabilities (CVEs) lurk in your image code is important, but fixing or patching the images that contain vulnerabilities has been a challenge, since it’s not always easy, speedy, or even possible to do so.

article thumbnail

Contrast Security Launches Next Generation Open Source Software Security Platform for DevOps

DevOps.com

Fortune 100 Financial Services Company Immediately Adopts Contrast OSS to Reduce Open Source Risk Contrast Security, the pioneer in enabling “self-protecting” software by embedding vulnerability analysis and exploit prevention directly into modern software, continues to re-invent application security with the launch of Contrast OSS. Contrast OSS is offered as a solution to help organizations building modern […].

article thumbnail

How To Maximize An Agile Team – Don’t Give Up On Scrum

Modus Create

When I first attended Scrummaster training, I went in wide-eyed and excited to learn all of the secrets behind this amazing “new” agile project-management strategy called Scrum. I immediately donned the rose-colored glasses they handed out, and gobbled up the information that was presented. It all seemed so perfect… until I went back to my job.

SCRUM 75
article thumbnail

Unravel: A System Architect’s Guide to Data Operations

DevOps.com

Big data is an older fashionable term that, when combined with agile methodology, AI and ML and analytics, has become a powerful trend once again in data operations (DataOps). If you’re a systems architect, it pays to understand the philosophies, benefits and tools to power DataOps and improve your data-driven applications. This article serves as […].

System 80
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CVE-2019-11707, CVE-2019-11708: Multiple Zero-Day Vulnerabilities in Mozilla Firefox Exploited in the Wild

Tenable

Security researchers discover two zero-day vulnerabilities in Mozilla Firefox used in targeted attacks. Editor’s Note : This blog was updated on June 20 to reflect additional information regarding a second vulnerability used in combination with CVE-2019-11707, as well as security updates from Mozilla. . Background. On June 18 and June 20, the Mozilla Foundation published security advisories [ 1 , 2 ] to address two zero-day vulnerabilities in Mozilla Firefox being used in targeted attacks in the

article thumbnail

Performance-Optimized Runtime Protection for Serverless Functions with Aqua

Aqua Security

In order to protect serverless functions while they are running, you need to consider the very short execution times, and ensure that you’re not slowing down applications or increasing cloud usage costs. Now in Aqua CSP 4.2 we’ve introduced advanced runtime protection that does just that, while complementing our existing risk assessment, function scanning, and function assurance capabilities.

article thumbnail

What Really Scares Us in AI

Dataiku

When I very enthusiastically joined Dataiku over 3 years ago, I was full of hope in technology, the startup world, and empowering people with data.

article thumbnail

DataRobot Recognized as a Leader in Forrester New Wave for Automation-Focused Machine Learning Solutions

DataRobot

In 2012, DataRobot co-founders Jeremy Achin and Tom de Godoy recognized the profound impact that AI and machine learning could have on organizations, but that there wouldn’t be enough data scientists to meet the demand. The technology they invented, automated machine learning, allowed organizations to scale data science capacity by teaching machines to perform much of the tedious and time-consuming work for a data scientist while also giving them access to hundreds of different algorithms.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

SACK Panic: Linux and FreeBSD Kernels Vulnerable to Remote Denial of Service Vulnerabilities (CVE-2019-11477)

Tenable

Researchers at Netflix have disclosed new remote denial of service and resource consumption vulnerabilities in most Linux and FreeBSD versions. Background. On June 17, Netflix published an advisory to its GitHub repository for security bulletins. The advisory highlights the discovery of four Transmission Control Protocol (TCP) networking vulnerabilities in the Linux and FreeBSD kernels, including a severe vulnerability called “SACK Panic” that could result in “a remotely-triggered kernel panic

Linux 71
article thumbnail

Building Your SOC Need Not Be a Zero-Sum Game

Symantec

As your organization builds out parts of your security operations, don’t forget that cyber security thrives on collaboration

Games 85
article thumbnail

New GCP Pricing Options: Google Cloud Capacity Reservations and More Committed Use

ParkMyCloud

Google Cloud recently released a new pricing option: Google Cloud capacity reservations. This new option intended for users with anticipated spikes in usage, such as over holidays or planned backups. It also expanded its Committed Use discount program to apply to more types of resources. Manish Dalwadi, product manager for Compute Engine, said in Google’s announcement of these releases, “you shouldn’t need an advanced degree in finance to get the most out of your cloud investment.”.

article thumbnail

The Growing Demand for Object Storage

Hu's Place - HitachiVantara

There has been a growing buzz from analysts and thought leaders on the growing role of object storage in the data center. A recent IDC InfoBrief, sponsored by Hitachi Vantara, titled “ Object Storage: Foundational Technology for Top IT Initiatives ,” shows that Object Storage has taken on a much more important role in supporting IT’s top initiatives.

Storage 66
article thumbnail

Revolutionizing Contact Centers: Next-Gen Tech for Enhanced CX

Speaker: Liran Meir Frenkel, Performance Management and RPA Sr Product Marketing Manager at NICE; Harpreet Makan, Practice Director at Everest Group; & Santhosh Kumar, Practice Director at Everest Group

As contact centers navigate the challenges of delivering excellence within budget constraints and adapting to evolving employee expectations, optimizing agent tasks becomes crucial. Discover a holistic approach across three pillars - people, process, and technology - that is essential to excel in this dynamic landscape, and explore how next-gen technologies such as generative AI, performance analytics, and process intelligence play a pivotal role in transforming contact centers into advanced CX

article thumbnail

Slough: Europe’s Data Hub

Zayo

British culture has not been kind to Slough. The Thames Valley town was berated by the Poet Laureate Sir John Betjeman as being spoiled by rapid industrialization, “Come, friendly bombs and fall on Slough, it isn’t fit for humans now” while it also home to the fictional Wernham Hogg, the setting for the excruciating “The Office” and its chilled-out entertainer boss from hell , David Brent.

article thumbnail

Datical Adds Support for AWS Database Platforms, Enabling Enterprise Cloud Application Development and Migration

DevOps.com

Leader in Database Release Automation Announces Expanded Platform Coverage for Amazon RDS for Oracle, Amazon Aurora PostgreSQL, Amazon RDS for PostgreSQL, EnterpriseDB Postgres and PostgreSQL Community Edition AUSTIN, Texas – June 18, 2019 – Datical, the leading provider of database release automation solutions, today announced its enterprise-class platform now supports the Amazon Web Services (AWS) […].

AWS 66
article thumbnail

Automatically deploy a Gatsby site to Firebase Hosting

CircleCI

Firebase Hosting is a web application hosting platform by Google. Through this service, you can host your web apps on Google’s infrastructure. It enables easy one-step deployment and has other cool features such as fast hosting from CDNs and rollbacks. A good overview of the service is available in the Firebase Hosting Docs. Gatsby is a framework that enables you to create fast React-based apps and websites.