Fri.Dec 17, 2021

article thumbnail

Backed by former Facebook and Twitter execs, Tagg launches social branding app for Gen Z

TechCrunch

Gen Z isn’t satisfied with the social media they grew up with, so they’re building the apps that they want to use. A “social branding” app for creative teens and twenty-somethings, Tagg is announcing a $2 million seed round today from Twitter co-founder Biz Stone, Facebook’s former VP of International Growth Ed Baker, TripAdvisor founder Stephen Kaufer, Pillar VC and more.

Social 295
article thumbnail

Addressing Problems with Your Peers

Let's Grow Leaders

What do you do when you see a problem and you want to bring it to your colleagues’ attention, but you’re worried it might create problems? This topic came in as a question from a member of the Let’s Grow Leaders community and it’s a fantastic opportunity to address some leadership challenges that everyone can empathize with. In this episode, you get three steps to use to address problems with your peers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Fuzey takes in $4.5M to charge up its management tools for service-based businesses

TechCrunch

Fuzey , a London-based company providing what it calls a “digital one-stop shop” for small businesses and independent contractors, raised $4.5 million in seed funding. The round was led by byFounders with participation from Flash Ventures, Global Founders Capital, Ascension and a group of angel investors, including Index Ventures’ venture partner Stephane Kurgan and Amplo VC founder and CEO Sheel Tyle.

Tools 289
article thumbnail

How to Empower Your Team During Times of Uncertainty (Video)

Let's Grow Leaders

Start here to empower your team, even when you don’t have all the answers. “Karin, there’s so much uncertainty these days. I feel like I’m caught in a constant wait-and-see sea of indecision. What can I do to empower my team to keep moving?” #AskingForaFriend. Lessons from Gail: Tips to Help Empower Your Team. 1. Create real clarity about what matters most and why.

Video 171
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Full Harvest targets food waste by finding homes for imperfect, surplus produce

TechCrunch

Food waste is a $2.6 trillion problem globally as some 40% of food is wasted annually. Full Harvest believes this is a distribution problem that can be solved by digitizing the produce supply chain. The San Francisco-based company’s produce business-to-business marketplace provides a way for produce buyers and sellers to quickly close deals on surplus or imperfect crops in just a few clicks.

More Trending

article thumbnail

No-code data pipeline platform Hevo raises $30 million led by Sequoia Capital India

TechCrunch

Hevo Data, a SaaS startup that is helping firms collate troves of data they generate and accumulate to make better use of them, has raised $30 million in a new financing round following a strong year of growth. Sequoia Capital India led the San Francisco and Bangalore-headquartered startup’s $30 million Series B round. A number of investors, including Qualgro, Lachy Groom and Chiratae Ventures, also participated in the round, which pushes the five-year-old startup’s all-time funding to $43

Data 250
article thumbnail

Don’t burry the waterfall

Xebia

TLDR: if you do sprints you might not be actually doing Agile. At the same time, separating your process into development and delivery phases doesn’t necessarily mean you’re doing it wrong. However, hiding the actual methodology you are practicing under labels may do more harm than good. And if your organization’s development process performs linearly, don’t bury it under the agile elements. .

Agile 130
article thumbnail

Fraîche grabs new capital to whip up fresh-delivered meals for New York offices

TechCrunch

As companies get employees back into offices, startups like New York-based foodtech company Fraîche aims to be the brand feature that welcomes them back. Today, the company, founded in 2019, announced $2 million in seed funding by backers that included La Boulange’s Pascal Rigo, Petrus Winery’s Jean Moueix, Bakerly’s Bruno and Julien Caron and the Newlab.

Budget 249
article thumbnail

How to Reset Performance Expectations for Better Results

Let's Grow Leaders

The start of the year is the perfect time to reset and refresh performance expectations. Outstanding performance starts with clear performance expectations —a shared understanding of what success looks like. But what do you do when a critical player on your team is doing “okay,” but not great? Or, perhaps you’ve relaxed your performance expectations because of all the stress and strain of this crazy year , but now the lower bar has become the new normal.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

You are the most influential person we know

TechCrunch

Hello and welcome back to Equity , a podcast about the business of startups where we unpack the numbers and nuance behind the headlines. To close out the year, Natasha and Mary Ann and Alex headed to the mic with Grace and Chris behind the scenes. We got to our favorite topics, and honestly, got a chance to just laugh our way through the final innings of the year.

Course 216
article thumbnail

Threat Alert: Tracking Real-World Log4j Attacks

Aqua Security

This blog was co-authored with Ori Glassman, a security researcher at Aqua Security. Until last week, Log4j was just a popular Java logging framework, one of the numerous components that run in the background of many modern web applications. But since a zero-day vulnerability (CVE-2021-44228) was published, Log4j has made a huge impact on the security community as researchers found that it’s vulnerable to arbitrary code execution.

Research 140
article thumbnail

Are Nubank’s low IPO fees a sign of the times?

TechCrunch

Fees on the Nubank IPO were among the lowest of the year, Bloomberg revealed this week. Of the $2.6 billion the Brazilian fintech’s parent company, Nu Holdings, raised in the operation, only 1.6% are going to its underwriters, which included Goldman Sachs, Morgan Stanley, Citigroup and others. “Among 490 IPOs in the U.S. so far this year, only three paid a smaller percentage,” Bloomberg noted.

Fintech 215
article thumbnail

Article: Measure Outcomes, Not Outputs: Software Development in Today’s Remote Work World

InfoQ Culture Methods

Today’s remote work world calls for a closer look at how to measure software developer productivity. Currently, there is no standard metric and widely used methods are flawed. The author describes how they successfully lead 500+ remote software developers by measuring outcomes, rather than outputs in order to produce the ideal balance between speed and quality code development.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Promoting Diversity As A Sports Business Leader Is Crucial To Moving Sport Forward

CEO Insider

Sport usually brings people, cultures, and businesses together from all walks of life. Ironically, at the heart of the global sports industry, Diversity, Equity, and Inclusion (DEI) are often neglected by organisations who treat them as little more than keywords as part of compulsory corporate training. However, when you understand the value of DEI, and […].

Sport 129
article thumbnail

The best cloud and IT Ops conferences of 2022

TechBeacon

After two years of mainly virtual events, the majority of cloud and IT Ops conferences in 2022 will be in-person events, although some organizers have decided to hold a combination of in-person and virtual events.

article thumbnail

Red Hat Adds Service to Customize RHEL Images

DevOps.com

Red Hat this week announced a public beta of an Image Builder service that streamlines the process of building customized instances of the Red Hat Enterprise Linux (RHEL) operating system. Scott Herold, director of product management for RHEL at Red Hat, said the Image Builder service enables an IT team to define a “gold” template […]. The post Red Hat Adds Service to Customize RHEL Images appeared first on DevOps.com.

Linux 108
article thumbnail

Desktop High-Performance Computing

Dzone - DevOps

Ever since Amazon Web Services debuted in 2008, builders of complex engineering software systems have had increasingly powerful ways to scale heavy computational workloads in the cloud. Calculations that previously would have required the purchase of dozens of expensive servers can now be executed at a fraction of the cost in AWS, Azure, or Google Cloud.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Vite JS – Next Generation Frontend Tool

Radixweb

If you are looking to enhance your experience in frontend development, you are not alone in this race. With the same goal, the creator of Vue, Evan You, came up with the new tool called Vite.js. He calls it – the next generation of frontend tooling. A build tool – Vite or Vite.

Tools 98
article thumbnail

CVE-2021-44228, CVE-2021-45046, CVE-2021-4104: Frequently Asked Questions About Log4Shell and Associated Vulnerabilities

Tenable

CVE-2021-44228, CVE-2021-45046, CVE-2021-4104: Frequently Asked Questions About Log4Shell and Associated Vulnerabilities. Satnam Narang. Fri, 12/17/2021 - 16:35. A list of frequently asked questions related to Log4Shell and associated vulnerabilities. Background. Following the discovery of the Apache Log4j vulnerability known as Log4Shell on December 9, The Security Response Team has put together the following blog post to answer some of the more frequently asked questions (FAQ) about Log4Shell

.Net 98
article thumbnail

What are Citizen Developers and How They Help Scale

Sunflower Lab

Bloom Automation. Automating From the Bottom Up Citizen developers play a vital role in helping you scale your RPA strategy. The idea of knowledge workers being the force behind robotic process automation is becoming increasingly popular as more and more companies pursue digital transformation and intelligent automation. This grassroots approach is a great way to empower your knowledge workers to learn a new skill and offload their boring, rule-based tasks on a software robot.

article thumbnail

Log4J Vulnerability: Using Behavioral Anomaly Detection to Spot Active Attacks

Lacework

Editor’s Note: Log4j is an unfolding situation that we are closely monitoring. We will be updating our blog on a regular basis so check back for updates. The disclosure of a critical vulnerability with pervasive impact across the internet and cloud computing is something that makes our hearts sink. Last week was no exception. Apache [.]. Read More. from Log4J Vulnerability: Using Behavioral Anomaly Detection to Spot Active Attacks.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Slow Build Pipeline? Build Faster by Building Only What You Need

Dzone - DevOps

In today’s fast-paced software world, organizations need to deliver fast, as fast as multiple times per day. Agile methodologies and DevOps culture have contributed to enabling this constant delivery. Continuous integration and continuous delivery (CI/CD) is an almost basic requirement for any company that wants to remain competitive in the market. CI/CD allows the delivery of code changes more frequently and reliably by automating the required steps to take a working piece of software to a prod

article thumbnail

#ClouderaLife Spotlight: Manoj Shanmugasundaram – Principal Solutions Engineer

Cloudera

Manoj Shanmugasundaram has been with Cloudera for 5 and a half years bringing his talents to our Solutions Engineering team. . As a Principal Solutions Engineer, he says his core responsibility is “to take Cloudera’s latest and greatest technology and meet a customer’s complex business requirements, across the data lifecycle, on any cloud or the datacenter.”.

article thumbnail

How to Manage Test Data in Software Testing

Dzone - DevOps

This article was p ublished with permission by Justin Reynolds. To compete in today’s market, software companies need to create programs that are free of bugs and vulnerabilities.

Testing 94
article thumbnail

5 IT Financial Management (ITFM) Best Practices To Consider In 2022

CloudZero

If IT Financial Management (ITFM) was as simple as widely presumed, we’d be seeing IT expenditure dropping globally with the continued adoption of cloud services.

Cloud 94
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Externalizing Configurations in Kubernetes Using ConfigMap and Secret

Dzone - DevOps

Configurations are attributes needed by an application when it runs. These configurations are values that are used frequently across the application. They may be used to provide dynamic behavior of an application based on customer, geographical region, language, and locale. Frequently used configurations are database URL, username, password, etc. These values are not hardcoded along with the application code as they may change depending on different factors.

article thumbnail

Trigger your CircleCI pipelines from a GitHub Actions workflow

CircleCI

If you are already a GitHub user, you may know that GitHub Actions provides you with powerful tools to increase efficiencies in your software delivery life cycle. Actions can be impactful for team collaborations and process simplification. For example, you can automate things like building a container, welcoming new users to your open source projects, managing branches, or triaging issues.

article thumbnail

Ivanti Response to Log4J Vulnerability (CVE-2021-44228)

Ivanti

At Ivanti, we are committed to delivering innovative, high quality and secure solutions for our customers. Part of this is ensuring our customers are aware of the latest cyber threats, which must be met with agility and action. A vulnerability was reported on the 10th of December 2021 in the open-source Java logging library (log4j), in Log4j-core versions between 2.0.0 and 2.14.1.