Thu.Jan 10, 2019

Survey Sees Need for More Consistent Approaches to DevOps

DevOps is arguably one of the most disruptive forces driving transformation of IT processes in recent memory. But a new survey finds that while IT organizations are making progress, adoption of DevOps processes remains uneven at best.

Survey 107

Gradually, then suddenly

O'Reilly Media - Ideas

Technological change often happens gradually, then suddenly. Tim O'Reilly explores the areas poised for sudden shifts. There’s a passage in Ernest Hemingway’s novel The Sun Also Rises in which a character named Mike is asked how he went bankrupt. Two ways,” he answers. Gradually, then suddenly.”.

Mob Programming

Agile Alliance

Mob Programming is a software development approach where the whole team works on the same thing, at the same time, in the same space, and at the same computer

Top Technologies Your Business Can Take Advantage of Today

OTS Solutions

Top Technologies Your Business Can Take Advantage of Today. To stay ahead of the curve in today’s market, businesses can’t rely on the quality of their services alone.

Add Value with a Dashboard Refresh: What You Need to Know

Speaker: Miles Robinson, Agile and Management Consultant, Motivational Speaker

Dashboards and analytics can really set your application apart, but that doesn't mean you can implement them and forget about them. Are they adding value to your product? Do your users benefit from them anymore? What should be improved, and what do we have the resources to improve? Join Miles Robinson, former UX and Design Manager, as he explains the different ways to refresh your dashboards - and how to determine what's the best path to product dashboard success. You'll leave with an understanding of how to figure out the best next steps specifically for you and your application.

Successful Strategies for Hiring Full-Stack Developers

Full-stack development is a complex web programming discipline involving multiple levels of web design and coding. Due to the complexity of the skill, it may be difficult to strategize a method of attracting a full-stack developer.

More Trending

Learning Curves

The post Learning Curves appeared first on Blogs ROELBOB


Deep Learning AI Generates Realistic Game Graphics by Learning from Videos

The New Stack

The video game design industry has evolved immensely since its early, pixellated days: nowadays, games often feature high-end graphics, underpinning immersive worlds that are populated with non-player characters that one can interact with.

Games 101

5 Software Development Trends Shaping the Media Industry in 2019

Agile Engine

Deloitte says there were 250+ media streaming channels in the US in 2018, with the average user subscribing to only three or four. This makes for a tough competition, so how do you win in a market like this? Fixing content discovery seems like a workable tactic.

5 AI Trends that will change the future of sales in 2019


Machine learning and AI-powered projects have been talked of the town for a long time now. Technology keeps moving ahead, and AI trends are no different. And with organizations incorporating AI to enhance their processes, the hype does not seem to settle for now.

The Complete Predictive Analytics Lifecycle for Application Teams

Speaker: Sriram Parthasarathy, Senior Director of Predictive Analytics, Logi Analytics

Applications with predictive analytics are able to deliver massive value to end users. But what steps should product managers take to add predictive analytics to their applications? In this webinar, we’ll walk through an end-to-end lifecycle of embedding predictive analytics inside an application. Find out how a real-world application decided what predictive questions to ask, sourced the right data, organized resources, built models, deployed predictive analytics in production, and monitored model performance over time.

Little brother is watching: Your real-time location for sale


An undercover report this week accuses mobile carriers of selling your location data to brokers, some of which aren’t choosy about whom they resell it to (because of course they’re not). Security, Information Security, Computer Privacy

Writing your own library

I'm Programmer

Best Programming Jokes. 1 of 9. Can't really wrap my head around this one Can't really wrap my head around this one. Tech interviews Tech interviews. Calm down antiviruses Calm down antiviruses. So hard to keep future product secret haha lol So hard to keep future product secret haha lol.

PHP 65

Security Worries Rise as Container Adoption Increases

The New Stack

The more someone knows about container security, the more concerned they become according to Tripwire’s State of Container Security report, which surveyed 311 IT professionals that manage the security of environments that use containers.

How to Stay Healthy While Sitting at Your Desk and Working All Day

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. link]. Women On Business Sponsors

5 Key Considerations for Top-Notch Product Dashboards

Speaker: Miles Robinson, Agile and Management Consultant, Motivational Speaker

So you want to set your product apart with the latest analytics, but you’re not sure where to start. How do you know what your customers want? And how can you make sure that you’re solving their problems? And wait a second, is it even feasible for your team to take this on right now? Join Miles Robinson, Agile and Management Consultant, as he covers five key considerations for you to keep in mind when you’re updating your software or app to offer the latest in embedded dashboards. You’ll leave with a better understanding of where to begin on creating actionable, insightful dashboards.

Highlights from Gorilla Logic’s Scaled Agile Workshop

Gorilla Logic

Many companies are spending millions on digital transformation initiatives with the promise of gaining more agility, innovating faster and gleaning deeper insights from their customers and prospects.

Agile 61

DevOps Chat: Identity Management with ForgeRock’s Peter Barker

Two megatrends for 2019 and beyond is scale and automation. The identity management space is a perfect example. Considering all of the IP-enabled devices (machines) coming online and the billions of people and their identities, managing these billions and billions takes systems that will redefine scale and, almost by definition, have to be automated. Enter […]. The post DevOps Chat: Identity Management with ForgeRock’s Peter Barker appeared first on

A World of Opportunity: What Blockchain Can Do for Your Business


? Blockchain is poised to transform the world of business, and here's how you can leverage it. One of the amazing things about blockchain technology — and this is why there's so much buzz surrounding it currently — is that it has so much potential to offer, and that's true for any industry.

CodeSOD: Certifiable Success

The Daily WTF

“Hey, apparently, the SSL cert on our web-service expired… in 2013.”. Laura ’s company had a web-service that provided most of their business logic, and managed a suite of clients for interacting with that service. Those clients definitely used SSL to make calls to that web-service. And Laura knew that there were a bunch of calls to ValidateServerCertificate as part of the handshaking process, so they were definitely validating it, right?

5 Product Traps - And Better Paths

Speaker: Johanna Rothman, Management Consultant, Rothman Consulting Group

Is your agile team overloaded with feature requests, with no time for discovery? Do your roadmaps read like impossible wish lists? Well, you’re not alone. It may seem impossible now, but what if we said that with a few changes, you could be meeting deadlines with the ability to predict progress with accuracy, be happy with your progress against the roadmap, and be making time for near-continuous discovery? Johanna Rothman has seen this all too often across many different organizations. She will take us through five common traps that agile product teams fall into – and likely you are in several of those traps right now. And good news - she has ways to avoid them!

The New Reality for Retailers: Science Fiction No More

Armughan Ahmad - Dell EMC

How Dell Technologies is empowering retail surveillance with best-in-class AI and computer vision to capture brand new customer opportunities and maximize value. I want to ask you what may seem like a simple question. Why is surveillance so important for retail?

The Hybrid Cloud: Pros and Cons


The cloud has become one of the most popular methods of storage available to date. Whether for personal use or for business, its security, accessibility, and convenience have made it the perfect companion for data of all shapes and sizes.

Cloud 58

Conversations with Robots: Voice, Smart Agents & the Case for Structured Content

A List Apart

In late 2016, Gartner predicted that 30 percent of web browsing sessions would be done without a screen by 2020. Earlier the same year, Comscore had predicted that half of all searches would be voice searches by 2020.

Praxent Attracts Talent from Prominent Austin Tech Firms & Expands Executive Team


January, 2019 – Austin, Texas We’ve grown our executive team by five, attracting talent from well-known local tech firms Trendkite, Modernize, Mutual Mobile, and Blackboard.

UX and Design Tips for Better Dashboards: Product Manager Laura Klein Explains How to Improve Your Analytics

Speaker: Laura Klein, Principal at Users Know and Author of UX for Lean Startups

No one makes poorly designed products on purpose. And yet we have so many of them in our lives. That's why Laura Klein, product manager and UX designer, has a set of tips to help application teams improve their embedded dashboards and reports.

New tool automates phishing attacks that bypass 2FA


A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka –the English pronunciation of the Polish word for mantis– this new tool was created […]. Cyber Security News

Tracing: An Outline


If you are running a distributed system and have reached a point of scale where you’re running 5+ services, you are more than likely experiencing difficulties when troubleshooting. Does the following sound somewhat familiar? You’re on-call and an issue comes up.

Do Your Employees Tell You the Truth? How to Foster an Environment Where They Do

Strategy Driven

Are the people in your organization telling you the truth? As a manager, if you ask someone working for you, “What should we be doing better?” or “Where can we improve?” how honest do you think he or she will be?

Planbox Acquires Imaginatik Creating an Agile Innovation Powerhouse


Planbox, the pioneering provider of AI-Powered Agile Innovation Management software, and Imaginatik, the #1 ranked leader in Corporate Innovation Management according to Forrester Research, will join forces to seize on the innovation boom.

What Users Want: How and Why to Build Knowledge into Your Product

Speaker: Nils Davis, Principal, NPD Associates

Usage data allows PMs, the product team, and the whole organization to make better decisions. Good usage intelligence gives you the ability to be smarter, more active, more decisive, nimbler, and to minimize risk. But what if you don't have that data - such as before you have users? Or, what if the right decision seems to fly in the face of the data you have? Or, what if your product offers more than just the standard features? To get deeper into these questions, Nils Davis asks, "What is the most interesting thing about Instagram?" (Because who doesn't like a product that Facebook paid $1 billion for when it had fewer than 50 employees and no revenue?) Nils will use the example of Instagram’s Filters to talk about how putting prebuilt knowledge in your product can change the way your product is used for the better - putting you in the company of most market-leading products. Finally, he’ll tie it all together by explaining how the way you interpret and use usage data can impact the way your tell your product’s story, and ultimately, how your users use your product.

Hitachi Vantara’s API Strategy for The Smart Data Center

Hu's Place - HitachiVantara

In this post I will take a deeper dive into one of the key enablers for Digital Transformation, the REST API. I will cover our strategy for utilizing it in our products and provide some example of how it is utilized to enable the Smart Data Center.

New Year, New You


Your 2019 Resolutions to Keep Your Identity Safe


Marriott data breach exposed 5 million unencrypted passport numbers


More than 5 million unencrypted passport numbers were stolen as part of the Marriott data breach last year, according to an update from the hotel giant. The information accessed in the breach, which was first disclosed on Nov. 30th, also includes approximately 20.3 million encrypted passport numbers, the Bethesda, Md.-based based hotel chain revealed in an online […]. Cyber Security News