Wed.Mar 20, 2019

Proposals for model vulnerability and security

O'Reilly Media - Ideas

Apply fair and private models, white-hat and forensic model debugging, and common sense to protect machine learning models from malicious actors. Like many others, I’ve known for some time that machine learning models themselves could pose security risks.

What Are The 5 Skills It Takes To Be A Successful CIO?

The Accidental Successful CIO

It takes talent and these 5 skills to be a successful CIO Image Credit: Alan Levine. So CIO, are you a good manager? I suspect that most of us think that we are. However, over at the Gallop company they have just completed a survey of managers.

How your organization can achieve the ambidextrous advantage

Cutter Consortium

Organizational resilience is emerging as a key source of competitive advantage in the age of hyper-competition and disruption. A new breed of leaders understands that winning requires being ambidextrous—the ability to embrace both speed/creativity and scale/productivity.

A Day In The Life Of A ScrumMaster

3back

The daily life of a Scrum Master [1] is anything but mundane. Play along with one Scrum Master as she facilitates, coaches, and runs interference all in the name of becoming a Well-Formed Team [2]. Download a PDF Version of This Infographic.

TDD 158

Encouraging Innovation in an Established Product Culture

Speaker: Richard Cardran, Chief Creative Officer and VP Strategy, HIA Technologies

Innovation is both a process and an outcome. The place to begin innovating your products and services is by first bringing innovation to your internal process. We'll explore the innovation process including the challenges, solutions, and hands-on techniques for becoming a successful "agent of change" within a well-established product culture. We'll examine the importance of UX and user-centric feature analysis, the adaptation of Agile Methodologies to the creative process as well as a way to drive successful culture change for setting expectations and winning approvals with cross-functional stakeholders. Innovation and Leadership go hand in hand. Join Richard Cardran, Chief Creative Officer and VP Strategy, HIA Technologies, as we assess some case studies and see how to lead with a clear strategy, well-defined tactics, and an unbiased 360 understanding of perhaps the most fundamental question of all; "why are you innovating?"

Velocity 2019 will focus on the rise of cloud native infrastructure

O'Reilly Media - Ideas

Organizations that want all of the speed, agility, and savings the cloud provides are embracing a cloud native approach.

More Trending

Thank You to Our Customers: Tenable Recognized as a March 2019 Gartner Peer Insights Customers’ Choice

Tenable

Thank you to all the customers who took the time to share your experience working with Tenable, and for trusting us to help you understand and reduce your cybersecurity risk. At Tenable, our customers are at the heart of what we do.

Why Unikernels Are Great for DevOps

DevOps.com

DevOps tooling seems to be in a never-ending state of self-transformation. The continuing evolution of infrastructure and the tools that go with it are forever creating new ecosystems.

5G: Is it Hype? …Or Crucial for IoT?

Beyond B2B

G iven the media messages around 5G, it looks like it is the most important upcoming technology ever. At the Mobile World Congress in Barcelona, there were lots of interesting announcements about 5G use cases for many market domains shown by the telecom operators. telecommunications cumulocity Iot

IoT 95

The Lazy Programmer’s Guide to Web Scrapers

Stackery

I am a proud lazy programmer. This means that if I can automate a task, I will absolutely do it. Especially if it means I can avoid doing the same thing more than once.

Embedding Operational Reports: Everything Product Managers Should Know

Speaker: Dean Yao, Sr. Director of Product Marketing, Logi Analytics

Businesses are run with analytics - but companies continue to struggle with interpreting, analyzing, and distributing data. Operational reports help get information to the people who need it most, in formats they understand, and in a timeframe that matters. Join the webinar to learn how embedding operational reports can give your users a precisely formatted, ready-to-analyze view of their operational activities. World-class software teams are embedding operational reports to empower end users with interactive data visualizations, detailed information, and highly precise formats that can be shared via email, PDF, print, or online.

Weekly Scrum Interview Question - What is the Duration of a Sprint?

Scrum.org

This question "What is the duration of a Sprint" is seemingly simple, but depending on the interviewing situation, company, interviewer, and their familiarity with Scrum you might need to give them more or less details and answer additional questions your answer might bring up. Sprint Duration - Where Size Matters. The answer is simple, a Sprint is a time-box of one month or less. A reasonable follow-up question would be, “what is the optimal Sprint duration?”

SCRUM 128

March Madness: How to Up Your Game by Building a Better Bracket

DataRobot

The 2019 NCAA March Madness tournament has arrived! This is one of the most famous annual sports events in the United States, bringing together the best Division 1 men’s and women’s college basketball teams from 68 schools to compete against each other for the NCAA Champion title. AI in the News

Sport 87

Kafka Streams’ Take on Watermarks and Triggers

Confluent

Back in May 2017, we laid out why we believe that Kafka Streams is better off without a concept of watermarks or triggers , and instead opts for a continuous refinement model.

Will There Be a Fast Path to ITIL V4?

DevOps.com

The Feb. 28 release of the ITIL Foundation ITIL 4 Edition book illustrates that big changes are coming to ITIL, bringing fear, uncertainty and doubt to those who have invested in ITIL and achieved certifications. It all comes down to how far along someone is in the ITIL V3 certification process.

Measure the Immeasurable: Beyond Vanity Metrics

Speaker: Sari Harrison, Product Management Instructor, Product School

As a product manager, it's your job to realize your product’s vision by executing your chosen strategy. It’s also your job to deliver value to the business. Ultimately, these two outcomes are aligned so the temptation is to focus primarily on business metrics. Doing this can cause you to lose focus on the real value you are trying to achieve, in favor of moving the vanity metrics such as launches and time spent. Join Sari Harrison, Product Management Instructor at Product School, as she explains how to use immeasurable success criteria along with your more standard KPIs to deliver products that don't just get used a lot, but deliver real value.

Why development teams aren’t upgrading to PHP 7 – and why they should

Zend

Drawing on a recent poll, this blog post examines why PHP users have not upgraded to PHP 7+ - and explains why they should. The post Why development teams aren’t upgrading to PHP 7 – and why they should appeared first on The Zend Blog. PHP Leadership php

PHP 81

Building a Three Node Kubernetes Cluster | Quick Guide

Linux Academy

There are many ways to build a Kubernetes Cluster. One of them is using a tool called kubeadm. Kubeadm is the official tool for “first-paths” when creating your first kubernetes cluster.

Linux 79

Adding Search to Your Site with JavaScript

David Walsh

Static website generators like Gatsby and Jekyll are popular because they allow the creation of complex, templated pages that can be hosted anywhere. But the awesome simplicity of website generators is also limiting. Search is particularly hard.

Data 106

Ixia Performance Test Confirms PA-7080 Is Fastest NGFW

Palo Alto Networks

Mobility and cloud are transforming today’s networks, bringing an explosion of data and new mobile and Internet of Things (IoT) devices with greater access to data and services anywhere, anytime. Application workloads are now more dynamic and move across multiple physical data centers and private, public and hybrid clouds. Our customers with large data centers, high volumes of encrypted traffic, and a growing ecosystem of IoT devices need performance without compromising security.

Get Growth With Partner Integrations

Speaker: Mandy Howard, Product Manager, ServiceTitan

Once your SaaS product hits a certain level of revenue, you'll need to change things up to move past the plateau. One of the ways to do this is to move past your core product and introduce new business streams. If you're strategic about your integrations, you can strengthen your ties to your target market. Join Mandy Howard, Product Manager at ServiceTitan, as she takes you through the three key questions that you need to answer to grow your product with the right partner integrations. Whether you're a start-up, or working on a new product in an enterprise environment, you'll learn how to push through to a new level of growth.

Network Engineering and Operations in the Multi-Cloud Era

Kentik

A new research report, “ Network Engineering and Operations in the Multi-Cloud Era ,” looks at the networking challenges enterprises face as they move to cloud environments.

How to evaluate your database

The Citus Data

Choosing a database isn’t something you do every day. You generally choose it once for a project, then don’t look back. If you experience years of success with your application you one day have to migrate to a new database, but that occurs years down the line.

How Kubernetes Could Orchestrate Machine Learning Pipelines

The New Stack

This article is a post in a series on bringing continuous integration and deployment (CI/CD) practices to machine learning. Check back to The New Stack for future installments.

How to Use Aviatrix SD Cloud Routing to Build Azure Networks

Aviatrix

But, as enterprises migrate more and more mission critical applications to the cloud, there are many connectivity and security requirements that are not natively available in Azure. In this post, we’ll look at a few of these requirements.

Azure 70

Build Delightful Products with Customer Validation

Speaker: John Little, Head of Product Marketing, Centercode

When it comes to delivering a solid product/market fit, customer validation is key. After all, you want to provide customers with a product that not only fills the need, but is delightful -- right? To get there, you need to commit to a vital blend of market research, strategy, and user testing. Join John Little, Head of Product Marketing at Centercode, as he explains a two-part approach to customer validation. First, how do you strategically identify your top product areas that need attention prior to release. And second, how do you turn user data into strategic priorities that help the right teams make the right decisions.

The Critical Importance of Creating a Cloud Culture

A Cloud Guru

Whether you’re just embarking on taking your company to the cloud or you’ve been slogging down the path for awhile now, I’m sure you’ve learned that the journey to cloud adoption isn’t simple. You can’t call an Uber. There’s no easy button. Migrating workloads to the cloud is challenging and complex.

SolarWinds Adds Ability to Profile Live Code to APM Platform

DevOps.com

SolarWinds is advancing its campaign to become a leading provider of DevOps tools by adding the ability to profile live code to SolarWinds AppOptics application performance monitoring (APM) platform.

3 Ways to Supercharge K-12 Educator Professional Development with PowerSchool

PowerSchool

Better teachers and improved student performance go hand in hand. Investing in educator career development lays the foundation for attracting and retaining top teachers, which ultimately leads to students getting the best possible opportunity to reach their highest potential. But many districts find that their professional development programs fall short. Poor course planning, a lack of goal tracking and accountability, and a clunky, dated user interface can tank any effort to drive growth.

If-Modified-Since Http Header

InnovationM

What is If-Modified-Since? The smart and efficient way to get images, icons and more from your server. If-Modified-Since is an HTTP header Which is sent to the server as a condition. If the content has been changed on the server, then the server responds with 200 status code with the whole requested document. Else If the content is not changed on the server, the server responds with a status code. Source. Android HTML5 / CSS / JS iOS Mobile Web service googleBot HTTP headers

How To Launch A Feature To Maximize Growth

Speaker: Brian Balfour, CEO, Reforge

Have you ever been part of a launch that, despite everyone's hard work, was more like a balloon deflating than a rocket taking off? It turns out that some of the most popular product and feature launch tactics can be counterproductive to achieving sustainable growth. Brian Balfour, Founder and CEO of Reforge, has taken a close look at these practices to figure out just why they can slow - or even hurt - growth. Now, he has a repeatable model for you to use in your next launches to get the growth you're looking for.

Creating Meaningful Diversity of Thought in the Cybersecurity Workforce

CTOvision

Read Bill Bonney explain how businesses can create meaningful diversity of ideas in the way their cybersecurity works on Security Intelligence : The other day, I learned something that great French winemakers have known for centuries: It is often difficult to make a complex wine from just one variety of grape. It is easier to […]. Cyber Security News

62

Meet the Women of the Dell EMC Partner Program: Diane Brode

Armughan Ahmad - Dell EMC

This is the seventh post in our Meet the Women of the Dell EMC Partner Program series, which provides insight into what drives the inspiring women of the Dell EMC channel. Missed the first posts?

IoT 88

Does GDPR compliance reduce breach risk?

CTOvision

Compliance can be costly and often feels more like red tape and a barrier to business than anything that provides a benefit. A report by EY and the International Association of Privacy Professionals (IAPP) estimates that organizations have spent an average of $3 million to achieve compliance with the European Union’s General Data Protection Regulation […]. Cyber Security News