Thu.Jan 10, 2019

Survey Sees Need for More Consistent Approaches to DevOps

DevOps.com

DevOps is arguably one of the most disruptive forces driving transformation of IT processes in recent memory. But a new survey finds that while IT organizations are making progress, adoption of DevOps processes remains uneven at best.

Survey 101

Gradually, then suddenly

O'Reilly Media - Ideas

Technological change often happens gradually, then suddenly. Tim O'Reilly explores the areas poised for sudden shifts. There’s a passage in Ernest Hemingway’s novel The Sun Also Rises in which a character named Mike is asked how he went bankrupt. Two ways,” he answers. Gradually, then suddenly.”.

Mob Programming

Agile Alliance

Mob Programming is a software development approach where the whole team works on the same thing, at the same time, in the same space, and at the same computer

Top Technologies Your Business Can Take Advantage of Today

OTS Solutions

Top Technologies Your Business Can Take Advantage of Today. To stay ahead of the curve in today’s market, businesses can’t rely on the quality of their services alone.

The 5 Levels of Analytics Maturity

Basic dashboards used to be enough to thrill end users. But over time, modern capabilities have emerged—and bare-minimum features are no longer cutting it. How have analytics changed? And where do your BI offerings fall? Find out sophisticated ways to future-proof your application. Brought to you by Logi Analytics.

Successful Strategies for Hiring Full-Stack Developers

DevOps.com

Full-stack development is a complex web programming discipline involving multiple levels of web design and coding. Due to the complexity of the skill, it may be difficult to strategize a method of attracting a full-stack developer.

More Trending

Learning Curves

DevOps.com

The post Learning Curves appeared first on DevOps.com. Blogs ROELBOB

71

5 Software Development Trends Shaping the Media Industry in 2019

Agile Engine

Deloitte says there were 250+ media streaming channels in the US in 2018, with the average user subscribing to only three or four. This makes for a tough competition, so how do you win in a market like this? Fixing content discovery seems like a workable tactic.

Two CEOs Describe What the Cloud Really Offers Them  

The New Stack

Oracle sponsored this podcast. Organizations will obviously make hard decisions first about why it might make sense for them to makes the jump to the cloud — especially when porting data and infrastructure to a microservices and Kubernetes environments.

Cloud 98

Writing your own library

I'm Programmer

Best Programming Jokes. 1 of 9. Can't really wrap my head around this one Can't really wrap my head around this one. Tech interviews Tech interviews. Calm down antiviruses Calm down antiviruses. So hard to keep future product secret haha lol So hard to keep future product secret haha lol.

PHP 65

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

Deep Learning AI Generates Realistic Game Graphics by Learning from Videos

The New Stack

The video game design industry has evolved immensely since its early, pixellated days: nowadays, games often feature high-end graphics, underpinning immersive worlds that are populated with non-player characters that one can interact with.

Games 86

New tool automates phishing attacks that bypass 2FA

CTOvision

A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka –the English pronunciation of the Polish word for mantis– this new tool was created […]. Cyber Security News

CodeSOD: Certifiable Success

The Daily WTF

“Hey, apparently, the SSL cert on our web-service expired… in 2013.”. Laura ’s company had a web-service that provided most of their business logic, and managed a suite of clients for interacting with that service. Those clients definitely used SSL to make calls to that web-service. And Laura knew that there were a bunch of calls to ValidateServerCertificate as part of the handshaking process, so they were definitely validating it, right?

Marriott data breach exposed 5 million unencrypted passport numbers

CTOvision

More than 5 million unencrypted passport numbers were stolen as part of the Marriott data breach last year, according to an update from the hotel giant. The information accessed in the breach, which was first disclosed on Nov. 30th, also includes approximately 20.3 million encrypted passport numbers, the Bethesda, Md.-based based hotel chain revealed in an online […]. Cyber Security News

5 Early Indicators Your Embedded Analytics Will Fail

Many application teams leave embedded analytics to languish until something—an unhappy customer, plummeting revenue, a spike in customer churn—demands change. But by then, it may be too late. In this White Paper, Logi Analytics has identified 5 tell-tale signs your project is moving from “nice to have” to “needed yesterday.". Brought to you by Logi Analytics.

Conversations with Robots: Voice, Smart Agents & the Case for Structured Content

A List Apart

In late 2016, Gartner predicted that 30 percent of web browsing sessions would be done without a screen by 2020. Earlier the same year, Comscore had predicted that half of all searches would be voice searches by 2020.

DevOps Chat: Identity Management with ForgeRock’s Peter Barker

DevOps.com

Two megatrends for 2019 and beyond is scale and automation. The identity management space is a perfect example. Considering all of the IP-enabled devices (machines) coming online and the billions of people and their identities, managing these billions and billions takes systems that will redefine scale and, almost by definition, have to be automated. Enter […]. The post DevOps Chat: Identity Management with ForgeRock’s Peter Barker appeared first on DevOps.com.

Tracing: An Outline

Honeycomb

If you are running a distributed system and have reached a point of scale where you’re running 5+ services, you are more than likely experiencing difficulties when troubleshooting. Does the following sound somewhat familiar? You’re on-call and an issue comes up.

Tools 56

Hitachi Vantara’s API Strategy for The Smart Data Center

Hu's Place - HitachiVantara

In this post I will take a deeper dive into one of the key enablers for Digital Transformation, the REST API. I will cover our strategy for utilizing it in our products and provide some example of how it is utilized to enable the Smart Data Center.

Why “Build or Buy?” Is the Wrong Question for Analytics

Every time an application team gets caught up in the “build vs buy” debate, it stalls projects and delays time to revenue. There is a third option. Partnering with an analytics development platform gives you the freedom to customize a solution without the risks and long-term costs of building your own. Learn when and why it makes sense to build, buy, or take a combined approach to embedded BI. Brought to you by Logi Analytics.

Four short links: 10 January 2019

O'Reilly Media - Ideas

Post Mortems, GDPR Implementation, Feature Engineering, and State of Security. Post Mortems (Dan Luu) -- a collection of outage postmortems from big and small companies. via Laurent Vanbever ). Guide to GDPR -- UK's guide. It explains each of the data protection principles, rights, and obligations. It summarizes the key points you need to know, answers frequently asked questions, and contains practical checklists to help you comply.

Malvertising Campaign Delivers Info-Stealer Plus Ransomware

CTOvision

Security researchers have warned users of P2P sites of a new malvertising campaign featuring a twin threat: info-stealing malware and ransomware. By registering rogue advertising domains, the attackers are able to direct torrent site visitors to two different exploit kits: Fallout EK and GrandSoft EK, according to Malwarebytes. Those unlucky enough to be pushed according to geolocation […]. Cyber Security News

Security Worries Rise as Container Adoption Increases

The New Stack

The more someone knows about container security, the more concerned they become according to Tripwire’s State of Container Security report, which surveyed 311 IT professionals that manage the security of environments that use containers.

German cyber-attack: man admits massive data breach, say police

CTOvision

A 20-year-old man has admitted to police that he was behind one of the country’s biggest data breaches, in which the private details of almost 1,000 public figures were leaked. The man, who lives with his parents in the central German state of Hesse and is still in the education system, told police he had acted […]. Cyber Security News

New Study: 2018 State of Embedded Analytics Report

Why do some embedded analytics projects succeed while others fail? We surveyed 500+ application teams embedding analytics to find out which analytics features actually move the needle. Read the 6th annual State of Embedded Analytics Report to discover new best practices. Brought to you by Logi Analytics.

World wide web

I'm Programmer

The post World wide web appeared first on I'm Programmer. Programming Funny Images Programming Jokes WWW WWW Funny Humor WWW Meme

5 AI Trends that will change the future of sales in 2019

Apiumhub

Machine learning and AI-powered projects have been talked of the town for a long time now. Technology keeps moving ahead, and AI trends are no different. And with organizations incorporating AI to enhance their processes, the hype does not seem to settle for now.

5 Crazy Products that Connect to Your Phone

I'm Programmer

You already knew your smartphone could be more awesome with all sorts of apps, but did you know that you can turn your phone into a breathalyzer, metabolism measure, thermometer, credit card machine, and activity tracker?

Customer Education Through DTV, the YouTube Digital Transformation Channel

DevOps.com

One of the most valuable functions a services provider can perform for its customers is education. High-level education about industry and technology trends is generally not part of any contract, but, as odd as that may seem, keeping customers apprised of important industry trends can help them make wiser choices in the selection of products, […]. The post Customer Education Through DTV, the YouTube Digital Transformation Channel appeared first on DevOps.com.

The Complete Predictive Analytics Lifecycle for Application Teams

Speaker: Sriram Parthasarathy, Senior Director of Predictive Analytics, Logi Analytics

Applications with predictive analytics are able to deliver massive value to end users. But what steps should product managers take to add predictive analytics to their applications? In this webinar, we’ll walk through an end-to-end lifecycle of embedding predictive analytics inside an application. Find out how a real-world application decided what predictive questions to ask, sourced the right data, organized resources, built models, deployed predictive analytics in production, and monitored model performance over time.

snake case and camel case

I'm Programmer

The post snake case and camel case appeared first on I'm Programmer. Programming Funny Images Programming Jokes Camel case camelCase vs snake_case difference between snake case and camel case snake case snake case and camel case

The New Reality for Retailers: Science Fiction No More

Armughan Ahmad - Dell EMC

How Dell Technologies is empowering retail surveillance with best-in-class AI and computer vision to capture brand new customer opportunities and maximize value. I want to ask you what may seem like a simple question. Why is surveillance so important for retail?

Protecting businesses from insider threats with machine learning

CTOvision

Machine learning and AI are the latest tools being utilized by businesses to help prevent cybercrime and stop cyber attacks. However, what if these same tools could be used to help stop insider threats such as employees leaking or misusing company data? TechRadar Pro spoke with Jazz Networks’ CEO Hani Mustafa who explained how businesses have […]. Cyber Security News