Thu.Jan 10, 2019

Survey Sees Need for More Consistent Approaches to DevOps

DevOps.com

DevOps is arguably one of the most disruptive forces driving transformation of IT processes in recent memory. But a new survey finds that while IT organizations are making progress, adoption of DevOps processes remains uneven at best.

Survey 108

Gradually, then suddenly

O'Reilly Media - Ideas

Technological change often happens gradually, then suddenly. Tim O'Reilly explores the areas poised for sudden shifts. There’s a passage in Ernest Hemingway’s novel The Sun Also Rises in which a character named Mike is asked how he went bankrupt. Two ways,” he answers. Gradually, then suddenly.”.

Mob Programming

Agile Alliance

Mob Programming is a software development approach where the whole team works on the same thing, at the same time, in the same space, and at the same computer

Top Technologies Your Business Can Take Advantage of Today

OTS Solutions

Top Technologies Your Business Can Take Advantage of Today. To stay ahead of the curve in today’s market, businesses can’t rely on the quality of their services alone.

Ask the "Right" Questions: Your Analytics-Guided Product Strategy

Speaker: Yoav Yechiam, Founder and Head Instructor, productMBA

Analytics are highly important for product managers - and yet, analytic implementations often fail to actually help us. It's not the technology, and it's not the tactics. In most cases, it's our approach that's misguiding us! Analytics are there to answer important product questions, not just to collect data. How can we be mindful of our analytics so they enable us, rather than confine us? Join Yoav Yechiam, Founder and head instructor at productMBA, as he explains best practices for a data-guided strategy that helps product managers get to the "why" of their biggest product goals.

6 Reasons Your Staff Keeps You in the Dark

Let's Grow Leaders

Do you ever feel like your staff keeps you in the dark? Do you ever wonder if they’re going out of their way to keep you out of their way? That seems ridiculous. AND, it’s entirely possible. Here’s the scary part if […].

More Trending

How to Stay Healthy While Sitting at Your Desk and Working All Day

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. link]. Women On Business Sponsors

5 AI Trends that will change the future of sales in 2019

Apiumhub

Machine learning and AI-powered projects have been talked of the town for a long time now. Technology keeps moving ahead, and AI trends are no different. And with organizations incorporating AI to enhance their processes, the hype does not seem to settle for now.

Conversations with Robots: Voice, Smart Agents & the Case for Structured Content

A List Apart

In late 2016, Gartner predicted that 30 percent of web browsing sessions would be done without a screen by 2020. Earlier the same year, Comscore had predicted that half of all searches would be voice searches by 2020.

Learning Curves

DevOps.com

The post Learning Curves appeared first on DevOps.com. Blogs ROELBOB

77

The Changing Role of CX Testing in Digital Transformation

Speaker: Diego Lo Giudice and Chad Hendren

With new competition emerging every day, businesses are transforming themselves, and using software as a means to drive differentiation. Digital transformation has become a key initiative for businesses across the globe, and CX is ground zero. Register now for this webinar and hear from Cyara and their guest speaker, Diego Lo Giudice of Forrester, how testing and QA practices are changing to enable and accelerate digital transformation.

Two CEOs Describe What the Cloud Really Offers Them  

The New Stack

Oracle sponsored this podcast. Organizations will obviously make hard decisions first about why it might make sense for them to makes the jump to the cloud — especially when porting data and infrastructure to a microservices and Kubernetes environments.

Cloud 108

A List Apart - Untitled Article

A List Apart

In late 2016, Gartner predicted that 30 percent of web browsing sessions would be done without a screen by 2020. Earlier the same year, Comscore had predicted that half of all searches would be voice searches by 2020.

5 Software Development Trends Shaping the Media Industry in 2019

Agile Engine

Deloitte says there were 250+ media streaming channels in the US in 2018, with the average user subscribing to only three or four. This makes for a tough competition, so how do you win in a market like this? Fixing content discovery seems like a workable tactic.

Deep Learning AI Generates Realistic Game Graphics by Learning from Videos

The New Stack

The video game design industry has evolved immensely since its early, pixellated days: nowadays, games often feature high-end graphics, underpinning immersive worlds that are populated with non-player characters that one can interact with.

Games 98

What Is (and Isn’t) Product Management?

Speaker: Steve Johnson, VP of Products, Pragmatic Institute

Product Management is one of the most exciting - and most misunderstood - functions in technical organizations. Is it strategic or tactical? Is it a planning role or a support role? Many product professionals are unclear about what is (and isn't) product management. After all, product management spans many activities from business planning to market readiness. In this session, we’ll examine many product activities and artifacts for product strategy, planning, and growth, and introduce a simple tool that you can use in your organization to clarify the roles of product management and others. Steve Johnson explores the many roles of Product Management in this fun talk focused on why product managers should obsess on problems instead of solutions.

Little brother is watching: Your real-time location for sale

TechBeacon

An undercover report this week accuses mobile carriers of selling your location data to brokers, some of which aren’t choosy about whom they resell it to (because of course they’re not). Security, Information Security, Computer Privacy

Writing your own library

I'm Programmer

Best Programming Jokes. 1 of 9. Can't really wrap my head around this one Can't really wrap my head around this one. Tech interviews Tech interviews. Calm down antiviruses Calm down antiviruses. So hard to keep future product secret haha lol So hard to keep future product secret haha lol.

PHP 65

A World of Opportunity: What Blockchain Can Do for Your Business

PSL

? Blockchain is poised to transform the world of business, and here's how you can leverage it. One of the amazing things about blockchain technology — and this is why there's so much buzz surrounding it currently — is that it has so much potential to offer, and that's true for any industry.

Security Worries Rise as Container Adoption Increases

The New Stack

The more someone knows about container security, the more concerned they become according to Tripwire’s State of Container Security report, which surveyed 311 IT professionals that manage the security of environments that use containers.

Innovation: Five Signs You Might Be Faking It

Every company wants to be a leader in innovation, but how can you tell if your company is really innovating or just going through the motions? See the 5 signs you might be faking innovation and what to do if you are.

DevOps Chat: Identity Management with ForgeRock’s Peter Barker

DevOps.com

Two megatrends for 2019 and beyond is scale and automation. The identity management space is a perfect example. Considering all of the IP-enabled devices (machines) coming online and the billions of people and their identities, managing these billions and billions takes systems that will redefine scale and, almost by definition, have to be automated. Enter […]. The post DevOps Chat: Identity Management with ForgeRock’s Peter Barker appeared first on DevOps.com.

New tool automates phishing attacks that bypass 2FA

CTOvision

A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka –the English pronunciation of the Polish word for mantis– this new tool was created […]. Cyber Security News

5 Business Benefits of Business Vehicle Leasing

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. link]. Women On Business Sponsors

60

CodeSOD: Certifiable Success

The Daily WTF

“Hey, apparently, the SSL cert on our web-service expired… in 2013.”. Laura ’s company had a web-service that provided most of their business logic, and managed a suite of clients for interacting with that service. Those clients definitely used SSL to make calls to that web-service. And Laura knew that there were a bunch of calls to ValidateServerCertificate as part of the handshaking process, so they were definitely validating it, right?

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Highlights from Gorilla Logic’s Scaled Agile Workshop

Gorilla Logic

Many companies are spending millions on digital transformation initiatives with the promise of gaining more agility, innovating faster and gleaning deeper insights from their customers and prospects.

Agile 59

Marriott data breach exposed 5 million unencrypted passport numbers

CTOvision

More than 5 million unencrypted passport numbers were stolen as part of the Marriott data breach last year, according to an update from the hotel giant. The information accessed in the breach, which was first disclosed on Nov. 30th, also includes approximately 20.3 million encrypted passport numbers, the Bethesda, Md.-based based hotel chain revealed in an online […]. Cyber Security News

Influence with Design – A Guide to Color and Emotions

Toptal

The right color palette encourages people to behave in ways designers want them to, while the wrong palette can turn visitors away before they take any action at all

83

Praxent Attracts Talent from Prominent Austin Tech Firms & Expands Executive Team

Praxent

January, 2019 – Austin, Texas We’ve grown our executive team by five, attracting talent from well-known local tech firms Trendkite, Modernize, Mutual Mobile, and Blackboard.

Plan for Product Launch Success with Data and Analytics

Speaker: Piyanka Jain, President and CEO, Aryng

When you launch new feature (or an entirely new product), there are many questions that you'll need to answer. Is the feature being adopted? Do your customers like it, or does it need to be improved? Was the launch successful? Well, that all depends on how you define success. Join Piyanka Jain, President and CEO of Aryng, as she explains why - and how - you should use data and analytics to define and track a successful launch.