Thu.Jul 16, 2020

article thumbnail

EventStorming; Core concepts, glossary and legend

Xebia

Recently on Twitter Chris Richardson asked if anyone has created a consistent and comprehensive glossary for EventStorming core concepts. I replied saying that #EventStorming is fuzzy by design. There are standard core concepts, and depending on the context, we use different words for the post-its. Because with that fuzziness, you get more insights.

130
130
article thumbnail

Digital Transformation: What It Means for Your Nonprofit and How to Get Started

TechSoup

In March of this year, TechSoup — and much of the nonprofit sector across the world — was forced to rapidly transition to a fully remote workplace. It wasn't easy and it wasn't pretty, but it forced us to focus on how we operate and work together and how we push forward our own digital transformation. It also further highlighted the need for this transformation to occur in the nonprofit sector at large.

Nonprofit 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Economics of Peace

CEO Insider

Today, Afghanistan remains the most heavily mined country in the world. Yet, over 80 percent of the jobs in Afghanistan are dependent upon agribusiness to lift the country up from poverty and create a stable government. It is a paradox to cultivate land for economic growth, with the fear of a landmine beneath the plow […]. License and Republishing: The views expressed in this article The Economics of Peace are those of the author Heidi Kühn alone and not the CEOWORLD magazine.

article thumbnail

Leaders Share about Mentoring: A Frontline Festival

Let's Grow Leaders

Are you looking to be a better mentor? Or, perhaps you’re looking for a mentor. In this month’s Frontline Festival, top leadership experts share their perspectives and insights on mentoring. Thanks to Joy and Tom Guthrie of Vizwerx Group for the great pic […]. The post Leaders Share about Mentoring: A Frontline Festival appeared first on Let's Grow Leaders.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Jump Over the Hidden Barriers to Digital Transformation

DevOps.com

Digital transformation is critical to success in the new normal. Here’s how to achieve it in an uncertain economy Bit by bit, we’re reopening the economy. No one knows how long it’ll take to get the economy back on track or what kind of regulations there will be to keep everyone safe. But we do […]. The post Jump Over the Hidden Barriers to Digital Transformation appeared first on DevOps.com.

How To 142

More Trending

article thumbnail

Who will win the epic battle for online meeting hegemony?

Dion Hinchcliffe's Web 2.0 Blog

The pandemic has focused much of the remote worker experience like a laser on the lowly online meeting, where many workers now spend so much of their work day now. Stalwarts like Cisco and HCL are facing intense competition from upstarts like Zoom and Slack as well as industry heavyweights Google and especially Microsoft.

Meeting 128
article thumbnail

Darktrace email finds: Microsoft Teams impersonation

Darktrace

The number of active daily users on Microsoft Teams has increased exponentially in recent months, and cyber-criminals are taking advantage of this shift in our working habits. Darktrace’s AI recently found a malicious email impersonating the collaboration platform to try and steal the recipient’s credentials.

126
126
article thumbnail

RunSafe Allies With JFrog to Secure Applications

DevOps.com

RunSafe Security, a provider of Alkemist tools that prevent memory exploits, has partnered with JFrog to create a plug-in for the Artifactory repository manager platform. Alkemist employs a combination of runtime application self-protection (RASP) and moving target defense (MTD) methods to neutralize memory corruption exploits such involving, for example, a memory overflow.

article thumbnail

A Fortune 1000 CEO’s Big Passion For Small Companies With Burton Goldfield

Steve Farber

It is one thing to grow your company. It is another to help others do the same. In this special episode, Steve Farber shares with us his live interview with Burton Goldfield, the President and. Read more.

Company 122
article thumbnail

Embrace AI: Make Your VoIP Service Stand Out

Dialogview is revolutionizing VoIP services with its AI-powered platform, which is now available for white labeling. Our solution autonomously resolves over 68% of customer queries in more than 40 languages, dramatically reducing your team’s workload. With advanced conversational AI, Dialogview understands customer sentiments and queries in real time, without any button presses needed by users.

article thumbnail

The Most Important Reason To Join the OODAloop Network: You want competitive advantage

CTOvision

This post provides a discount code for trying out membership in the OODA network. Since CTOvision and OODA Loop joined forces in January 2019 we have continued to refine and […].

Network 106
article thumbnail

Barracuda Networks Partners With Microsoft on SD-WAN Service

DevOps.com

Barracuda Networks today launched a software-defined wide area network (SD-WAN) service that runs natively on the Microsoft Azure cloud. Klaus Gheri, vice president of network security for Barracuda Networks, said Microsoft has made it possible to launch an SD-WAN service using Azure Virtual WAN Hubs, a networking service based on a hub-and-spoke architecture that unifies […].

WAN 114
article thumbnail

Clock ticks for TikTok: RNC and DNC nuke app, US mulls ban

TechBeacon

TikTok, millennials’ flavor of the month, is coming under yet more scrutiny this week. The app’s alleged spyware tendencies and connections to the Chinese Communist Party are causing some high-profile organizations to ban it.

Spyware 114
article thumbnail

Leaked Details of 142 Million MGM Hotel Guests Found for Sale on Dark Web

CTOvision

Researchers have found 142 million personal details from former guests at the MGM Resorts hotels for sale on the Dark Web, evidence that a data leak from the hotel chain […].

Hotels 97
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A container security checklist: 5 key questions to answer

TechBeacon

Enterprises are increasingly running applications in cloud-native environments using containers, along with orchestration tools such as Kubernetes, to facilitate scalability and resilience. If your organization falls into this category (and the chances are good that it does today, or plans to soon), you must make securing the deployment a top priority.

article thumbnail

How OmniSci Is Helping In The Fight Against COVID-19

CTOvision

Data and analytics have played a central role in the first wave of the global response to COVID-19. From the earliest days of the pandemic, OmiSci had up-to-date reports of […].

article thumbnail

7 Steps to Preventing Ransomware Disasters

Arcserve

By now, you’re well aware of the ransomware problem. But just in case you need a refresher, here are some facts that might put you on edge: Ransomware is still a huge problem Cybersecurity Ventures forecasts that ransomware costs will reach $20 billion by 2021. Ransomware is evolving Some of the newest ransomware doesn’t just. Read more » The post 7 Steps to Preventing Ransomware Disasters appeared first on StorageCraft Technology Corporation.

article thumbnail

DevSecOps Requires a Different Approach to Security

CTOvision

Read why the startup Traceable says that creaking applications into microservices means more difficulty in gaining good visibility into runtime security and performance issues on Dark Reading : As developers […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

How To Setup a CI/CD Pipeline With Kubernetes 2020

Dzone - DevOps

When it comes to DevOps, the word that clicks in mind is CI/CD pipeline. Let's have a look at Definition of CI/CD pipeline: CI is straightforward and stands for continuous integration, a practice that focuses on making preparing a release easier. But CD can either mean continuous delivery or continuous deployment and while those two practices have a lot in common, they also have a significant difference that can have critical consequences for a business.

article thumbnail

How to Create Your First Lambda Function on AWS

MagmaLabs

Reading Time: 5 minutes. In the beginning, the documentation for AWS LAMBDAS can be intimidating at times, but don’t worry, in this post, I will help you with the first steps to create an AWS LAMBDA Function. Keep reading! What’s a Lambda Function??. Amazon Web Services (AWS) Lambda is a compute service that lets you run code without provisioning or managing servers.

Lambda 98
article thumbnail

CEO Spotlight: Samsung Biologics’ CEO Dr. Tae Han Kim Talks Response to COVID-19, Future Vision

CEO Insider

In the midst of the COVID-19 outbreak, Dr. Tae Han Kim, the founder and CEO of Samsung Biologics, and his team proved that it’s possible to protect both the health of its workforce and clients, while also ensuring the company meets the continuous business operations, client demands, and production schedules without delay. Samsung Biologics is […].

Meeting 101
article thumbnail

Airship Launches Free Feature Flags by Apptimize, Allowing Mobile App Product Owners to Confidently Adapt to the New-Normal

DevOps.com

With app installs growing across many industries, and businesses rolling out new services to meet changing needs, feature release management maximizes opportunities and mitigates risks PORTLAND, Ore., — July 15, 2020 — Customer engagement company Airship today announced that it is launching a free version of Apptimize’s Feature Flags solution, enabling app developers to control […].

Mobile 91
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why You Should Adopt Continuous Delivery and Release Automation, According to Forrester

Flexagon

Forrester, a leading research and advisory firm, recently recognized Flexagon as a Leader in their Wave for Continuous Delivery and Release Automation (CDRA). Forrester said “Flexagon continues to pioneer continuous delivery for enterprise software platforms.” If you are a leader in technology or technology driven business solutions, we encourage you to read the CDRA Wave in.

article thumbnail

Data Security and Third-Party IT Asset Disposition: A Paradox

CTOvision

Read Heidi Parthena White write about the data security and third-party asset disposition paradox on Infosec Magazine: Data security is a hot topic these days, and for good reason. In […].

Data 82
article thumbnail

Plutora Recognized as a Leader in Value Stream Management Solutions by Independent Research Firm

DevOps.com

Noted for great release plan visibility, strong common data model and governance capability July 15, 2020 01:05 PM Eastern Daylight Time SANTA CLARA, Calif.–(BUSINESS WIRE)–Plutora, a leading provider of value stream management (VSM) solutions for enterprise IT, today announced that it has been positioned as a Leader in The Forrester Wave™: Value Stream Management Solutions, […].

article thumbnail

How To Improve Asset Management and Security

CTOvision

Read Gary Stevens explain how companies can improve asset management and security on Security Boulevard : You would be amazed at how many organizations still use archaic technologies to keep […].

How To 80
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Accelerate CI/CD Pipeline Blog Series - Part II - Test Automation

Trigent

In part I of this blog series we spoke about Continuous Testing (CT) and that Test Automation is a key to it's success. how to leverage test automation to enable coverage and speed. Let's get an in-depth understanding of why it's essential.

Testing 80
article thumbnail

DevOps Enterprise Summit 2020 Showcases a Work in Progress With Significant Business Outcomes

Dzone - DevOps

We're in a time where our meetups, conferences, and hackathons have moved virtual, and while we may not get the same experience, we still have the opportunity for learning and networking. I recently attended the DevOps Enterprise Summit , a three-day mighty behemoth of presentations, interviews, and discussion. Presenters shared real-world problems and how DevOps provides a framework to problem solve, change company culture, and ultimately drive forward customer satisfaction and financial benefi

DevOps 80
article thumbnail

To the Edge and Beyond: Network Function Offload

Dell EMC

In the first two blogs in this series we discovered what a programmable fabric is and what it looks like. Now we are ready to dive deeper into programmable fabrics and discover Network Function offload. Telecom communication service providers need to provision Network Functions (NFs) in their infrastructure in order to run the network. NFs like a BNG (Broadband Network Gateway) for terminating fixed access subscribers or UPF (User Plane Function) for terminating 5G wireless subscribers.

Network 78