Thu.Jan 31, 2019

article thumbnail

Detecting Performance Anomalies in External Firmware Deployments

Netflix Tech

by Richard Cool Netflix has over 139M members streaming on more than half a billion devices spanning over 1,700 different types of devices from hundreds of brands. This diverse device ecosystem results in a high dimensionality feature space, often with sparse data, and can make identifying device performance issues challenging. Identifying ways to scale solutions in this space is vital as the ecosystem continues to grow both in volume and diversity.

article thumbnail

Using machine learning and analytics to attract and retain employees

O'Reilly Media - Ideas

The O’Reilly Data Show Podcast: Maryam Jahanshahi on building tools to help improve efficiency and fairness in how companies recruit. In this episode of the Data Show , I spoke with Maryam Jahanshahi , research scientist at TapRecruit, a startup that uses machine learning and analytics to help companies recruit more effectively. In an upcoming survey, we found that a “skills gap” or “lack of skilled people” was one of the main bottlenecks holding back adoption of AI technologies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Lead Different and Diverse People

Let's Grow Leaders

Achieve More When you Lead Different and Diverse People You know that the ability to lead different and diverse people to come together and blend their talents is key to achieving breakthrough results. But if you’re like most leaders we work with, we […]. The post How to Lead Different and Diverse People appeared first on Let's Grow Leaders.

How To 194
article thumbnail

Empty States – The Most Overlooked Aspect of UX

Toptal

Empty states are often overlooked in UX design, but they can be drivers of substantial business benefits, and if done right, contribute to a more compelling user experience.

111
111
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Why DevOps is not enough

TechBeacon

Accelerating time-to-market is more than a goal; it's a necessary survival skill in today's digital age. An enterprise's success depends on its ability to quickly create innovative digital applications, products, and services that can adapt to new and evolving business models.

DevOps 106

More Trending

article thumbnail

Minor Crimes and Misdemeanors in the Age of Automation

DevOps.com

Giving automation the power to detect crime and enforce punishment has ramifications, even for minor infractions In November, I broke the law. I crossed over a solid white line to make a right turn at a traffic intersection. At the time I was unaware of my violation. I was on my way to a shopping […]. The post Minor Crimes and Misdemeanors in the Age of Automation appeared first on DevOps.com.

DevOps 105
article thumbnail

Improving Experimentation Efficiency at Netflix with Meta Analysis and Optimal Stopping

Netflix Tech

By Gang Su & Ian Yohai From living rooms in Bogota, to morning commutes in Tokyo, to beaches in Los Angeles and dorms in Berlin, Netflix strives to bring joy to over 139 million members around the globe and connect people with stories they’ll love. Every bit of the customer experience is imbued with innovation, right from the very first encounter with Netflix during the signup process?

article thumbnail

DevTest Scales Out in the Cloud for 2019

DevOps.com

It’s 2019, which means a whole new year of advancements in all areas of technology. One topic that is near and dear to my “cloud” heart is the acceleration and maturation of development and test (DevTest) scenarios and solutions in the public and hybrid cloud space. I’ve been talking with folks and presenting on […]. The post DevTest Scales Out in the Cloud for 2019 appeared first on DevOps.com.

Cloud 95
article thumbnail

Get Ready for the Revolution – HPC Market Set for Major Disruption!

Dell EMC

Based on previous experience, this winter, we’ll be hearing about storms heading our way from the Atlantic. Maybe you are thinking of buying a new car this year and want to check out its safety record? Alternatively, you might be interested in advances in the diagnosis of genetic diseases? Compute-intensive tasks All these seemingly different scenarios have something in common!

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Don't Measure Unit Test Code Coverage

James Shore

01 Feb 2019. James Shore/Blog. If you're using test-driven development, don't measure unit test code coverage. It's worse than a useless statistic; it will actively lead you astray. What should you do instead? That depends on what you want to accomplish. To improve code and test practices. If you're trying to improve your team's coding and testing practices, perform root-cause analysis 1 of escaped defects, then improve your design and process to prevent that sort of defect from happening again.

article thumbnail

Cloud Workload Protection Products at Risk with New Cyber Attack

Edgewise

Security products are meant to prevent cyber attacks. What happens, then, when a cyber attack, namely malware, is used to uninstall security software designed specifically to prevent public cloud infrastructure compromise? This is precisely what happened with a new malware variant discovered by Palo Alto Networks’ Unit 42. According to the published report on the firm’s website , the so-called “Rocke” group created malware to exploit compromised Linux servers of five Chinese cloud workload prote

Malware 75
article thumbnail

Set Desktop Wallpaper from Command Line on Mac

David Walsh

Whenever I need to accomplish a basic task that typically calls for interacting with a UI, I challenge myself to complete the task from command line. After all, most UIs are simply a mask over basic commands, especially when it comes to the operating system. Suddenly I feel like an automation or systems engineer! One task I can imagine an IT administrator would need to automate is setting the desktop wallpaper via a script, remotely, or simply by providing the command to do so: osascript -e 'tel

article thumbnail

How to prepare your business for AI

Enterprise.nxt

AI experts at Hewlett Packard Enterprise share insights about where artificial intelligence is headed and how to apply the technology in the business world.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Learning more stacks puts you on the fast track

Coding Dojo

Last year, the median salary for a software developer was over $100,000 according to the US Department of Labor, and … Read more >>. The post Learning more stacks puts you on the fast track appeared first on Coding Dojo Blog.

article thumbnail

This is the Year for Complete Endpoint Defense

Symantec

You can’t build real endpoint defense while taking a black-and-white view of cyber security

92
article thumbnail

DeployHub® Partners with CircleCI to Make Release Automation and Microservices Publishing Easier

DevOps.com

DeployHub launches orb for CircleCI to perform Release Automation and Microservice publishing Santa Fe, NM – January 30, 2019– DeployHub, visionaries in continuous deployment and microservice publishing, today announced they have joined CircleCI as a technical partner. CircleCI allows teams to rapidly release code by automating the build, test, and delivery process.

article thumbnail

Changing of the Guard

Symantec

Symantec says goodbye to Vice President of CR Cecily Joseph as she leaves the department in Jaime Barclay’s capable hands

73
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

4 Cloud Computing Trends You Should Look Out For in 2019

KitelyTech

The traditional role of Chief Information Officer (CIO) is forever evolving, and with that in mind, 2019 promises increased pressure on the men and women in this role to deliver IT solutions that will meet the expectations of partners, employees, and customers. According to statistics, almost half of IT spending will be cloud-based, and that means it’s imperative for CIOs to consider cloud computing as a critical element of a competitive strategy.

Trends 56
article thumbnail

DigiCert announces CertCentral® Enterprise, a comprehensive, all-in-one digital certificate management solution for enterprise cloud and hosted TLS/SSL environments

DevOps.com

CertCentral Enterprise adds notable enterprise controls and anchors the DigiCert flagship TLS platform LEHI, Utah – (January 31, 2019) — DigiCert, Inc., the world’s leading provider of TLS/SSL, IoT and PKI solutions, today announced DigiCert CertCentral® Enterprise, a leading certificate management platform for cloud and hosted environments. CertCentral Enterprise comprises the most modern tools […].

article thumbnail

A 6-minute introduction to HELM

ProdOps

Simplifying K8S application management Photo by pexels.com After completing a 4-month period on a client’s project that included a complete migration from “raw” K8S-yaml-files to Helm Charts, I figured I need to put the things I’ve learned in writing for others to read, and for me to better learn. TL;DR of “why do I need it” You can install dependencies and proprietary software on your K8S cluster with a simple: helm install stable/mysql, there are hundreds of available installations like this o

article thumbnail

DigiCert Labs to innovate new security technologies that address emerging threats through collaboration with academic and industry research

DevOps.com

Postquantum cryptography and machine learning research initiatives currently underway in collaboration with universities and industry players like Microsoft Research LEHI, Utah – (January 31, 2019) — DigiCert, Inc., the world’s leading provider of TLS/SSL, IoT and PKI solutions, today announced the launch of DigiCert Labs, an initiative dedicated to researching and developing innovative approaches […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Third Party Patch Roundup  – January 2019

TechTalk

Third Party Patch Roundup – January 2019 The first month of this new year is ending with an arctic blast in many parts of the United States. Here in Texas, it’s our usual winter: lows in the 30s, highs in the 50s and 60s. Some parts of the country, though, are almost completely shut down […].

47
article thumbnail

Port Wars

DevOps.com

The post Port Wars appeared first on DevOps.com.

87
article thumbnail

Apple FacePalm: This story gets worse

TechBeacon

Apple FaceTime has a huge privacy bug. And it was a customer’s 14-year-old son who found it.

Mobile 68
article thumbnail

Feb 6-8 in Portland, Oregon: Agile Open Northwest

James Shore

31 Jan 2019. James Shore/Calendar. I'm attending Agile Open Northwest in Portland from February 6th to the 8th. Agile Open Northwest is an Open Space conference, which means the participants define the schedule. I'll be participating in a lot of sessions, and probably proposing a few as well. Two topics on my mind are large-scale agile systems and testing without mocks.

Agile 45
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Creating Cognito User Pools with CloudFormation

Stackery

I’ve been working on creating AWS Cognito User Pools in CloudFormation, and thought this would be a good time to share some of what I’ve learned. As an overview of this project: For sign-up, I’m creating Cognito users directly from my server app. It’s also possible to have users create their own accounts in Cognito, but that’s not what I want. I want to use email addresses as the user names, rather than having user names with separate associated email addresses.

Lambda 45
article thumbnail

What IT Service Management Pros Should Know About CX (Customer Experience)

Samanage

Customer Experience Management and How It Can Help Your Organization Thrive. ITSM can sometimes, despite the application of DevOps thinking and all of our hopeful intentions, seem a little insular in terms of its culture. And, while there are many strategies and accompanying tools to help drive engagement with users, customers, and other departments, one simple approach that is gaining contemporary traction is the employment of CX thinking to IT engagements with users.

Culture 45
article thumbnail

CDP vs. Snapshots: Which Provides Better Data Protection?

Arcserve

Need a kick in the butt to bolt down your data protection strategy? Look no further than the tumultuous world of cybersecurity. According to an annual study conducted by Ponemon Institute, the average cost of a data breach reached $3.86 million in 2018, a 6.4 percent increase over the previous year. The study also reported. Read more » The post CDP vs.

Data 40