Thu.Nov 08, 2018

article thumbnail

Did Software Eat the World? Or was it Data Capital?

Dell EMC

Marc Andreessen coined the phrase “software is eating the world” almost ten years ago. His proclamation was clairvoyant because it predicted the rise of the digital age and its corresponding impact including the advantageous position the companies who were leading the charge would have. It strikes me that we’ve transitioned from software to data – novel data – that now defines the value organizations will have.

article thumbnail

Lessons learned while helping enterprises adopt machine learning

O'Reilly Media - Ideas

The O’Reilly Data Show Podcast: Francesca Lazzeri and Jaya Mathew on digital transformation, culture and organization, and the team data science process. In this episode of the Data Show , I spoke with Francesca Lazzeri , an AI and machine learning scientist at Microsoft, and her colleague Jaya Mathew , a senior data scientist at Microsoft. We conducted a couple of surveys this year— “How Companies Are Putting AI to Work Through Deep Learning” and “The State of Machine Learning Adoption in the E

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Do I Get the Feedback I Crave?

Let's Grow Leaders

Do you crave genuine feedback from your boss about where you stand and what’s getting in the way? How about your peers? If you knew a peer really had your best interest at heart, would you want to hear her feedback, even […]. The post How Do I Get the Feedback I Crave? appeared first on Let's Grow Leaders.

140
140
article thumbnail

AI in the Context of Digital Transformation

CTOvision

In the enterprise, no buzzword is as buzzy as the term “digital transformation”. If you spend any amount of time reading whitepapers, analyst research, or attending webinars you’ll see the term digital transformation used in conjunction with a wide range of enterprise-focused technologies ranging from data centers to application development, to enterprise architecture and AI […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Future-Proof “Eliminates the Risks Associated with Innovation Adoption” – ESG

Dell EMC

In the recent ESG Solutions Showcase report, ESG articulated how IT organizations are facing constant pressure to keep pace and adapt to new infrastructure demands. The volume of data being stored, number and type of applications, investments in analytics, and users’ performance expectations are all evolving and growing at a rapid pace. IT vendors have addressed these developments with modern technologies, however, the risk associated with investing in these modern technologies can be overwhelmi

More Trending

article thumbnail

When it Comes to Ransomware Demands, Just say No

Symantec

While some targets have paid to get back their data, experts say most victims continue to reject extortion demands

Data 107
article thumbnail

5 Effective Ways to Handle Change in the Workplace

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

84
article thumbnail

Object.fromEntries

David Walsh

The Object object has been buffed with useful methods over the past few years. Object.keys , Object.values , Object.freeze , and Object.assign all address frequently desired functionality. One of the new Object methods is fromEntries , which accepts a Map or map-like array nesting and converts it to a useful object literal! Convert Map to Object.

77
article thumbnail

Chaos engineering technique

Apiumhub

One of the biggest motivations to attend Software Crafters Barcelona this year was the open spaces session. In these open spaces, we discussed very interesting topics like “feature branches vs. continuous integration”, “ monoliths vs microservices “, “how to manage diversity in our workplace”, Also, we shared the disastrous experiences we have had in production.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Our Take on The New Stack's Guide to Serverless Technologies

CloudZero

We have read with great interest the recently released The New Stack ebook entitled: Guide to Serverless Technologies. It is a great report with great insights! We encourage you to read it as well (it's free!).

article thumbnail

Symantec Data Strengthens Context for Anomali Threat Platform

Symantec

Threat intelligence firm Anomali enhanced its services by integrating with Symantec's DeepSight security information network.

Data 66
article thumbnail

CodeSOD: A Swift Update

The Daily WTF

Banks are uniquely identified via a “SWIFT Code”. It’s an ISO Standard. Having an accurate SWIFT code for a given bank is of vital importance to anyone doing financial transactions. With mergers, moves, new branches, and so on, the SWIFT codes you do business with won’t change often, but they will change. Thus, Philip wasn’t terribly surprised when he got a request to update a pile of SWIFT codes.

Banking 52
article thumbnail

What is LinkedIn? How does it work?

Rapid BI

What is LinkedIn? Is LinkedIn a social network? Is LinkedIn a professional network? Is it a database, if so of what? In this video Mike explores what LinkedIn actually is, and it might not be as obvious as you thing. When you understand what LinkedIn actually is, it will change the way you look at […]. The post What is LinkedIn? How does it work?

Video 56
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Four short links: 8 November 2018

O'Reilly Media - Ideas

Approximate Graph Pattern Mining, Ephemeral Containers, SaaS Metrics, and Edge Neural Networks. ASAP: Fast, Approximate, Graph Pattern Mining at Scale (Usenix) -- we present A Swift Approximate Pattern-miner (ASAP), a system that enables both fast and scalable pattern mining. ASAP is motivated by one key observation: in many pattern mining tasks, it is often not necessary to output the exact answer [.] an approximate count is good enough.

Metrics 46
article thumbnail

The Great Cloud Migration – The Where?

Hypergrid

Where, Which Cloud? This is literally the million-dollar question, since it has huge implications for the overall IT cost in the short- and long-term. A significant portion of these are the cloud costs, which can vary in value and structure significantly among public cloud providers and, even in the same public cloud based on region, generations, service choices, instance choices, promotions being applied etc.

Cloud 45
article thumbnail

Ladies and Gentlemen, Start Your Engines: The Race to SC18 is On!

Dell EMC

SC18 is always a showcase for the latest and greatest technology for high-performance computing applications. And that’s what you’ll find in the Dell EMC booth. If you’re coming to SC18 in Dallas (Nov. 11–16), you’ll definitely want to spend some time in the Dell EMC booth. We’ve got some ultra-cool things happening there, from demos of the Dell EMC PowerEdge server version of muscle cars to — shhhhh now — a whisper suite.

article thumbnail

The Wonder of Human Intelligence

Professor Beekums

There’s a lot of fear about AI replacing us humans, much of it around jobs specifically. History is filled with examples of jobs being lost to automation in general. While there was some suffering, society overall improved. Would you prefer to live in a world where a human has to operate an elevator for you? How many of you remember the long lines in the cash lane at toll booths?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Octoverse regional spotlight on Nigeria

Github

This article is the first in a series based on The State of Octoverse—trends and insights into GitHub activity, the open source community, and more from the GitHub Data Science Team. In February, we reflected on a trip to Nigeria and everything we learned about its growing tech community. Economic changes, expanding educational opportunities, and wider internet access are mobilizing a talented and entrepreneurial community.

article thumbnail

How to Keep Your Mobile Device Secure

Arcserve

Smartphones and other connected devices have become the ultimate work accessories. Whether your company is 100 years old or celebrating its first birthday, the majority of your employees likely use these devices at the office and to work remotely. They have revolutionized the workforce in so many ways, and we can all agree that they’re. Read more » The post How to Keep Your Mobile Device Secure appeared first on StorageCraft Technology Corporation.

Mobile 40
article thumbnail

Planbox - Untitled Article

Planbox

This article appears in the Winter issue of Pointers – Innovation Leader ‘s bi-annual compilation of the most useful and compelling expert advice. Expand Your Innovation Funnel. Ludwig Melik, Planbox CEO. It is getting a lot more interesting to innovate as the innovation funnel is expanding on both ends. Organizations are realizing that there is more upfront work that must be done before they can even think about generating new actionable ideas.

article thumbnail

Yotascale puts predictive analytics into cloud ops

Yotascale

Paul Krill, Editor at Large, InfoWorld. Tackling increased complexity in the cloud space, startup Yotascale offers a predictive-analytics-driven platform for optimizing and managing cloud application operations. The Yotascale Platform offers insights into cloud operations, so IT can take changing application needs into account. Services include anomaly detection, continuous optimization, predictive capacity planning, and contextual analytics such as for usage.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Security Predictions for 2019.

ProtectWise

Gene Stevens, ProtectWise co-founder and CTO, and Tom Hegel, ProtectWise Director of Threat Research & Analysis, teamed to examine the year behind us in security — new or evolved attacks, and the technologies and strategies that began emerging in defense — and identified nine trends we can expect to see in 2019. Here are their predictions: The amount of publicly announced supply chain attacks will continue to climb, becoming much more common against small and large organizations

IoT 40
article thumbnail

Level Up With Derived Columns: Wibbly-Wobbly Timey-Wimey Manipulation

Honeycomb

When we released derived columns last year, we already knew they were a powerful way to manipulate and explore data in Honeycomb, but we didn’t realize just how many different ways folks could use them. We use them all the time to improve our perspective when looking at data as we use Honeycomb internally, so we decided to share. So, in this series, Honeycombers share their favorite derived column use cases and explain how to achieve them.

Windows 40
article thumbnail

Achieving Business Agility to Survive and Thrive

Agile Alliance

This session shows when you understand business dynamics and the prevailing bias toward stability you will achieving appropriate levels of business agility.

Agile 35
article thumbnail

Xi Leap – The First No-Install DR

Nutanix

Today we proudly announced the availability of Xi Leap, a Disaster Recovery (DR) service delivered from Xi Cloud.

article thumbnail

Embedded Analytics: A Force Multiplier for Business

The possibilities for embedded analytics to drive real value for businesses, end users, and society are as fascinating as they are limitless. No matter the industry, brand after brand is finding that analytics can be the solution to a multitude of business challenges. Go deep with five insightsoftware customers as they share the details of their analytics journeys and discuss the transformative power of data.

article thumbnail

FASTCash: How the Lazarus Group is Emptying Millions from ATMs

Symantec

Symantec uncovers tool used by Lazarus to carry out ATM attacks.

Groups 22
article thumbnail

Kanban - cementing the flow?

Marcusoft

I got another email from a former client that I wanted to answer here on the blog. In fact, in this instance, I also got the same question during a Lean Coffee discussion at a current client too. Without stating the whole email the questions were a little bit like this: With kanban - isn’t there a risk that you lock in and cement the different parts of the board?

article thumbnail

Leading and Lagging Indicators: What is the right way to measure performance?

Agile42

“If you can’t measure it, you can’t improve it.” - Peter Drucker The reason why we measure our own performance stems from the believe that there is room for improvement. Knowing that you are “doing something” is not enough. Instead, you need to know what you are “doing wrong” and what you are “doing right”. If it’s wrong, stop. If it’s right, continue.