Thu.Feb 14, 2019

article thumbnail

Why Your Big-Team Software Project Needs a Utility Player

Atomic Spin

Projects with big teams introduce a slew of interesting problems–problems like keeping developers fed with multiple tracks of work, understanding areas with large technical risks, and sharing knowledge. On a recent project, we developed a role to help solve these problems. I call it the utility player. In this post, I’ll define the role, the required skills, and my experience in the role.

article thumbnail

Notes from On-call Adjacency

Honeycomb

I’ve never been on-call, but I’ve been on-call adjacent for a lot of my adult life—my partners, my housemates, my friends…they’ve largely been sysadmins, in Operations, or Dev/Ops, which means I’ve experienced a lot of the pain second-hand. Being on-call is of course about being reachable when something goes wrong. And if lots of things go wrong when you’re on-call, you end up getting paged a lot and losing sleep and all the other crappy things that go along w

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Steps to Prepare Your Business for AI

OTS Solutions

There Are Top Ten Steps to Prepare Your Business for Artificial Intelligent. The business world of today is fast evolving on the basis of technological advancements. The innovative creations of technology couldn’t be of any success if it wasn’t for the reliability of Artificial Intelligent (AI). AI app development has acted like a big influential force for many modern businesses.

article thumbnail

What To Do When the Job Outgrows Your Employee

Let's Grow Leaders

Your team needs your leadership during rapid growth. Recently, we received a great question from a manager who had taken part in a Winning Well Leadership Intensive. Her question is one you’ll face in your career – especially if you work in a fast-growing […]. The post What To Do When the Job Outgrows Your Employee appeared first on Let's Grow Leaders.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Hackers love Docker: Container catastrophe in 3, 2, 1.

TechBeacon

The day we all feared would come has come. Docker and Kubernetes containers are revealed to be badly vulnerable—along with LXC, Mesos, and several other container flavors.

109
109

More Trending

article thumbnail

Survey Finds Wide Gap Between DevOps Adoption and Success

DevOps.com

A recent HBR survey shows there is work to be done to advance DevOps in organizations A survey of 654 subscribers to the Harvard Business Review found that while 86 percent of respondents said it is important for their organizations to be able to build and deploy software quickly, only 10 percent said they are […]. The post Survey Finds Wide Gap Between DevOps Adoption and Success appeared first on DevOps.com.

Survey 98
article thumbnail

How to find flow in your software delivery

TechBeacon

The idea of the Flow Framework started with my attempt to visualize manufacturing like production flow for software delivery. The core premise of the Flow Framework is that we need to measure the end-to-end flow of business value.

article thumbnail

Open Mainframe Project: Zowe Ready for Prime Time

DevOps.com

There is a lot of interest in updating mainframe technology/interfaces across traditional enterprises. As development environments and toolsets have evolved outside the mainframe, there is a struggle to keep up—partially because backward compatibility requirements make wild changes difficult and partly because the very architecture of mainframes is different.

article thumbnail

Top Business Security Risks: How to Protect Yourself

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

How To 89
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

How Symantec’s Email Fraud Protection Keeps Your Company Safe and Secure

Symantec

The very things that make email such a potent business tool also make it vulnerable to spam, malware, ransomware and impersonation attacks

Malware 93
article thumbnail

What is Multi-Factor Authentication for Systems?

Edgewise

Privileged account exploitation is a tried and true means of accomplishing a cyber attack. Nearly every major breach in the last 10 years has included some variant on privileged account credential theft. Once acquired, credentials are used by attackers to move laterally within an organization’s networks to access sensitive data from databases or applications.

article thumbnail

How to Collect Judgment Money From People Who Owe You

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

How To 74
article thumbnail

DigitalOcean Launches Managed Databases

DevOps.com

New offering enables developers to deploy fully managed databases without administrative overhead New York City, NY; February 14, 2019 – DigitalOcean, the cloud for developing modern apps, today announced the launch of Managed Databases, with PostgreSQL as its first offering. The service will allow developers to create fully managed database instances in the cloud quickly […].

Cloud 72
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How Tinder Ensures You Can't Help Falling in Love

Dataiku

Dating apps are changing the ways we meet new romantic partners. Whether you’ve succumbed begrudgingly or gleefully, millennials on average spend 10 hours a week swiping and chatting on online dating apps. We know that recommendation engines are keen to predict relationships and anticipate breakups , so that they can send you ads for spa days and ice cream.

Meeting 63
article thumbnail

The Qualities of Leadership

DevOps.com

The post The Qualities of Leadership appeared first on DevOps.com.

article thumbnail

7 Tips On “Choosing a Right Software Development Company?”

Sunflower Lab

So what do you do when you decide to go digital or get a new software developed? The answer is obvious. You either decide to hire a custom software development company or a team who provides software development services. Businesses want to stay competitive, so to accelerate their business processes, they’ll want to digitize as many processes as possible for better results and higher efficiency.

article thumbnail

Cashing in on XaaS (3-Part Strategy for as-a-Service Digital Innovation)

Praxent

This article outlines a three-part, high-level strategy for developing an XaaS business model. With this practical approach, even small-to-mid–sized established companies can unlock new revenue streams by addressing industry bottlenecks through cloud-based, as-a-service digital platforms. The race to digital domination characterizes the current era.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Mendix’s Hyper Growth Continued in 2018 with 150% Year-Over-Year U.S. Revenue Increase; Siemens Acquisition Marks Largest-Ever Investment in Low-Code Category

DevOps.com

142 new customers signed with major multinationals and government enterprises Siemens US$730 million acquisition in October cements Mendix as global leader in low-code for the enterprise and opens major new market opportunities; Mendix’s brand and exec leadership continue under Siemens ‘freedom to operate’ model Top analyst firms continue to position Mendix as low-code ‘Vision Leader’; […].

article thumbnail

The technical, societal, and cultural challenges that come with the rise of fake media

O'Reilly Media - Ideas

The O’Reilly Data Show Podcast: Siwei Lyu on machine learning for digital media forensics and image synthesis. In this episode of the Data Show , I spoke with Siwei Lyu , associate professor of computer science at the University at Albany, State University of New York. Lyu is a leading expert in digital media forensics, a field of research into tools and techniques for analyzing the authenticity of media files.

Media 52
article thumbnail

How to output JUnit tests through CircleCI 2.0 for expanded Insights

CircleCI

CircleCI provides useful information around the performance of your jobs and tests. It can tell you when you ran your last run, your median job time, queue time, and success rate, along with some graphs to help you visualize things.

Testing 49
article thumbnail

Workloads like SAP, Oracle and Microsoft are Key to Digital Transformation

Dell EMC

Early in 2019, we are seeing businesses fully-engaged in modernizing IT for this digital era. This presents the potential for a “Perfect Storm” (good movie, by the way) for IT. What I mean is simply this, disruption is happening throughout IT (applications and infrastructure) and customers turn to Dell EMC to help them navigate this journey. Consider for a moment the transformations at SAP and Microsoft; Both organizations have invested in next-generation application and database platforms, embr

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Four short links: 14 February 2019

O'Reilly Media - Ideas

Learning Morality, Civilization Error Codes, Can't Unsee, and Procedural Text. The Moral Choice Machine: Semantics Derived Automatically from Language Corpora Contain Human-like Moral Choices -- We create a template list of prompts and responses, which include questions such as “Should I kill people?”, “Should I murder people?”, etc., with answer templates of “Yes/no, I should (not).

Culture 46
article thumbnail

5 Steps for Saving Your Data in a Disaster

Arcserve

When Hurricane Sandy finished blasting through New York and New Jersey in 2012, she left in her wake billions of dollars in damages to homes and businesses. Fires, power outages, storm surges, flooding, and gale-force winds gut-punched many companies, highlighting their vulnerabilities when it came to recovering data and restoring their technology systems after a.

Data 45
article thumbnail

Does Your Company Need Voice-Enabled Technology? – Part 1

Perficient

In the era of Siri and Alexa, is it important to keep up with trends by enabling voice-activated options for your users or should your efforts be directed elsewhere? With the mass popularity of Amazon's, Google's and Apple's virtual assistants, the demand for systems that allow users to interact with an interface through voice commands is skyrocket.

article thumbnail

How to Design Self-service Network Analytics into Your Services

Kentik

We recently blogged on why network insight is essential for communications service consumers , including why self-service portals are increasingly important for today’s network and network operators. In that blog post, we looked at self-service portals from an end-user standpoint. At Kentik, we believe in curated, actionable insight catering to different user personas across organizations.

Network 45
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

INFINIDAT Named a February 2019 Gartner Peer Insights Customers’ Choice for General-Purpose Disk Arrays

Infinidat

WALTHAM, Mass. – February 14, 2019 – INFINIDAT, the market’s leading independent provider of enterprise-class data storage solutions, today announced that it has been recognized as a February 2019 Gartner Peer Insights Customers’ Choice for General-Purpose Disk Arrays, based on reviews and ratings from end-users. In addition to being named a Customers’ Choice.

Storage 45
article thumbnail

The Rise of the Enterprise Cloud Manager

ParkMyCloud

There’s a growing job function among companies using public cloud: the Enterprise Cloud Manager. We recently did a study on ParkMyCloud users which showed that a growing proportion them have “cloud” or the name of their cloud provider such as “AWS” in their job title. This indicates a growing degree of specialization for individuals who manage cloud infrastructure.

article thumbnail

New software standards aim to slow rampant credit card theft

Synopsys

With the new PCI standards, the Payment Card Industry Security Standards Council intends to reduce credit card fraud. But the new standards may not be enough. The original version of this post was published in Forbes. Anything that could reverse, or even slow down, the rampant theft of credit card data would be a very […]. The post New software standards aim to slow rampant credit card theft appeared first on Software Integrity Blog.