Wed.Nov 07, 2018

article thumbnail

Fighting the Ecosystem Wars in the Proactive Cloud

High Scalability

This article is a chapter from my book Explain the Cloud Like I'm 10. It has 30 reviews on Amazon! If you like this chapter then you'll love the book. The cloud is always busy proactively working for you in the background. That’s how cloud services compete with each other to keep you in their ecosystem. Most of the cloud services we’ve talked about so far have been request driven.

Cloud 48
article thumbnail

Highlights from the JVM Ecosystem Report 2018

OverOps

A new report examining the JVM Ecosystem was recently published by Snyk with contribution by Oracle’s Java Magazine. They surveyed 10,000+ Java developers from the community (namely, members of Java User Groups and Java Magazine subscribers). The topics covered in the report include: Language and JDK, Tools, Application Infrastructure and CI/CD and other processes.

Report 216
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

FBI and Intel Community Release Framework to Thwart Insider Threats

CTOvision

The multi-agency push to prevent illegal disclosures from the next Edward Snowden acquired some practical tools with the release on Nov. 1 of the “Program Maturity Framework” compiled by the National Insider Threat Task Force. The 19 “maturity elements” outline steps for senior management and line employees to implement in such areas as training, legal protections […].

article thumbnail

Lessons Learned from the JVM Ecosystem Report 2018

OverOps

A new report examining the JVM Ecosystem was recently published by Snyk with contribution by Oracle’s Java Magazine. They surveyed 10,000+ Java developers from the community (namely, members of Java User Groups and Java Magazine subscribers). The topics covered in the report include: Language and JDK, Tools, Application Infrastructure and CI/CD and other processes.

Report 187
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Top Level Control with Redux State Management: A ClojureScript Tutorial

Toptal

ClojureScript is the tool of choice for front-end developers who have tried it. Recently in this series, we showed how to use it to get started with React. In today's tutorial, Toptal Freelance Clojure Developer Luke Tomlin dives into how to use Redux for React state management in ClojureScript.

Tools 103

More Trending

article thumbnail

The Undeniable Importance of a Business Plan

Toptal

We often hear about business plans in the context of early-stage companies; however, constructing excellent business plans is difficult and time-consuming, so many entrepreneurs avoid them. But, is this a mistake? While most people may be aware of the “soft” arguments for and against writing a business plan, in this article, a Toptal Finance Expert takes a data-driven approach to addressing the debate.

article thumbnail

HSBC suffers data breach on small number of online accounts

CTOvision

Maybe we should state the obvious here. HSBC is a bank. So they are a target. It is also worth pointing out that they know they are a bank and should know that they are a target. Another thing they should know is that there are ways to economically raise defenses and then test that […].

Banking 73
article thumbnail

An Agilist at WIRED25, Part 1

Accenture

Image: Author at WIRED25 Festival. Agilists may not realize that WIRED magazine started with its own manifesto, written by one of its founders, Louis Rossetto. And at the WIRED25 Festival and Summit – a four-day celebration of a quarter century of journalism on tech, culture, politics and more – the ideas behind both manifestos emerged. This event had a retrospective-like feeling to it, and I wondered how those who were at the genesis of our technological revolution might perceive th

Social 81
article thumbnail

Anthem data breach settlement points to larger data access

CTOvision

In light of Anthem Inc. recently agreeing to pay the largest HIPAA settlement on record for the Anthem data breach that affected nearly 79 million plan members, providers must get better at controlling who has access to patient data and internal systems. That advice comes from David Harlow, a Boston healthcare lawyer and consultant. “Anthem didn’t […].

Data 73
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Changing organizational culture at Siemens Digital Factory

Agile42

We first worked with Siemens Digital Factory in 2015, helping one of the project teams start using Agile methods. The 50-person team was in charge of developing software automation systems used by manufacturers all around the world. They were well suited to tackle the challenges they were facing, and fully embraced the new incremental approach and the necessary changes in behavior.

Culture 70
article thumbnail

FTC Offers Small Businesses Free Cybersecurity Resources

CTOvision

Dark Reading provided a good overview of an initiative of interest: The Federal Trade Commission’s (FTC) newly launched national initiative to educate small business owners about cybersecurity threats and defenses began with a “listening tour” last year. What it learned became the foundation for the agency’s new Cybersecurity for Small Business website and related resources, which […].

article thumbnail

Open for Business: SONiC brings an Open Source Approach to Open Networking

Dell EMC

When Dell introduced its Open Networking initiative nearly five years ago, we did so with a very simple premise in mind: Give the customer choice. By eliminating the monolithic, proprietary networking stack through hardware and software disaggregation, we would give the customer the ability to build the network they need today, with the agility and flexibility to go wherever tomorrow leads them.

article thumbnail

Getting from Seed to Series A: Insider Tips from Tech’s Top Early-Stage Funders

Battery Ventures

What are the secrets to raising a Series A round, if you’re a seed-stage company, in today’s fast-paced but still discerning market? In this podcast—taped at a dinner in San Francisco hosted by Battery Ventures in Sept. 2018—some of the industry’s most prominent early-stage investors tackle this topic and offer insights for founders hoping to make the jump to their first institutional round of financing.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New 200TB Fast Track Solution Proves Dell EMC is the Go-To Platform for SQL Server Success

Dell EMC

Dell EMC now offers the LARGEST, SMALLEST and MOST array-based solutions in Microsoft’s SQL Server Fast Track catalog – what else would you expect from the leader in midrange storage? Today’s business thrives on a steady diet of data – and Microsoft SQL Server is one of the premier technologies helping companies of all sizes capitalize on the value of that data, delivering real-time operational intelligence to create competitive advantage in nearly every industry.

Storage 63
article thumbnail

How Atlassian Uses Feature Management to Continuously Deliver

LaunchDarkly

Originally published on The New Stack , on Sept 28, 2018. To remain competitive with other developer tools and collaboration platforms, Atlassian pushes teams to constantly improve existing functionality and release new features on a regular basis. So dev and ops teams are using feature management as a best practice to meet these goals. Atlassian is a well-known software company that that aims to unleash the potential of every team.

article thumbnail

4 Ways PowerEdge MX Simplifies IT for VMware Environments

Dell EMC

Every day, we hear about the need for IT modernization and transformation, but what high-tech companies today are providing meaningful solutions to drive IT simplification, efficiency, scalability, and automation for the software-defined data center? Dell EMC and VMware. Sure, PowerEdge is the world’s #1 server1, and when paired with the world’s #1 vendor of enterprise virtualization2 and HCI software,3 the duo sounds promising.

article thumbnail

What Are VPC Flow Logs and How Can They Improve Your Cloud?

Kentik

The Need for Visibility in the Cloud. The cloud is science, not magic. By now, we should all appreciate that cloud providers take away the huge overhead of building, maintaining, and upgrading physical infrastructure, and allow organizations to better focus on their own core competencies. However, with public clouds abstracting organizations’ underlying physical layers, only showing the logical/virtualized views, and with distributed systems across on-prem and multiple public clouds, system oper

Cloud 53
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cloud Marketplace: Why Consumption is King

Dell EMC

Products, platforms, service offerings—such is the typical news stream coming out of big tech events like VMworld Las Vegas and its EMEA twin, held this week in Barcelona. For Dell EMC, it’s a different story. In August, we used our VMworld Vegas presence to make a different kind of announcement, one that we call The Cloud Marketplace. The Cloud Marketplace is not a product, group of products or even a place to purchase products.

Cloud 59
article thumbnail

What Can A CIO Do About The Problem Of Airline Overbooking?

The Accidental Successful CIO

United’s CIO needs to solve their overbooking problem Image Credit: Teka England. Times have been tough for United airlines in the past. There was that event where a passenger was removed from a flight forcibly and everyone filmed it and put it on social media. A bit before that the airline had had to delay 500 of their flights because of a second glitch in two weeks of the computer systems that run the airline.

article thumbnail

Oracle OpenWorld 2018: A Dell EMC Storage Perspective

Dell EMC

Dell EMC’s storage teams were well represented this year at Oracle OpenWorld 2018 with a heavy focus on enabling Oracle DBAs and application owners to take advantage of Dell EMC’s modern infrastructure solutions. On the show floor, the Dell EMC booth contained both PowerMax and XtremIO X2 arrays with OLTP simulations taking place to highlight the powerful capabilities of our platforms.

Storage 52
article thumbnail

CodeSOD: Hitting Your Skill Ceiling

The Daily WTF

Clia was handed a pile of legacy code and told to upgrade it, but with a very important rule attached: the functionality couldn't change. Any change could break someone's workflow, and thus in the upgraded system, even the bugs had to be reproduced. Unlike most "legacy" code , this wasn't all that old- it was written in C#. Then again, C# is old enough to drive, so maybe it is old.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Presenting at the Regional Scrum Gathering South Africa 2018

Agile42

The South African Agile community meet once again in Durban on November 8-9. agile42 is happy to sponsor and support SUGSA, the Scrum User Group of South Africa that organizes this and other wonderful events. I will present the talk Leading in Complexity together with Don Gray on Thursday 8th and Breaking Bad Scrum with Faye Thompson on Friday 9th.

SCRUM 48
article thumbnail

Four short links: 7 November 2018

O'Reilly Media - Ideas

Summarizing Text, Knowledge Database, AI Park, and Approximate Regexes. Fast Abstractive Summarization with Reinforce-Selected Sentence Rewriting -- Inspired by how humans summarize long documents, we propose an accurate and fast summarization model that first selects salient sentences and then rewrites them abstractively (i.e., compresses and paraphrases) to generate a concise overall summary.

article thumbnail

Splunk: Integrating for Better Threat Recognition

Symantec

With security operations centers drowning in data, Splunk looks for better ways to reduce the security-event workload for companies

Data 56
article thumbnail

Certified ScrumMaster (CSM) Training Workshop in Ottawa—January 24-25, 2019

Agile Pain Relief Notes from a Tool User

Agile Pain Relief presents a two-day Certified ScrumMaster Workshop in Ottawa—January 24-25, 2019 taught by certified Scrum Trainer Mark Levison.

SCRUM 48
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Helping People Through the Most Trying Times

Symantec

Celebrating Symantec’s Volunteer of the Quarter Marcelo Oliveira

74
article thumbnail

Beware What You Don’t Measure

xmatters

When there’s an IT outage, businesses suffer. The faster you can get the business back up and running, the better it is for all involved. Let’s take a look at some of the best practices for automating major incident management, and place the focus on the importance of measuring time to restore service properly. Let’s take a look at some common metrics, and remember to beware what you don’t measure.

Survey 40
article thumbnail

Serverless Secrets: The Three Things Teams Get Wrong

Stacks on Stacks

Database passwords, account passwords, API keys, private keys, other confidential data… A modern cloud application with multiple microservices is filled with confidential data that needs to be separated and managed. In the process of researching how we would improve and automate secrets management for Stackery customers, I found much of what you find online is bad advice.