Wed.Nov 14, 2018

article thumbnail

Visualizing WSJF

Accenture

On a recent Slack conversation with my colleagues, we were discussing Weighted Shortest Job First (WSJF) and alternate prioritization models. It reminded me of a previous job in which my team was tasked with prioritizing a bunch of architectural initiatives. In that instance, we had a lot of trouble expressing the results of our work in the tabular form of an Excel spreadsheet.

article thumbnail

Testing in Production: Canary Releasing with Kubernetes

Daniel Bryant

No code is ever truly proven or tested until it’s running in production. This is particularly true of today’s cloud-native systems; these applications are rapidly evolving, continuously deployed, and have multiple layers of dependencies. As we’ve argued previously , this means that traditional testing strategies such as mocks, staging environments, and integration testing are not sufficient for testing cloud-native applications.

Testing 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The importance of maintaining cyber security in your business

CTOvision

Read why Scott Bordoni says that maintaining cybersecurity is important for any business – big or small on IT Pro Portal : Technology over the past few decades has become an increasingly integral aspect of the workplace. From email correspondence and financial transactions to professional networking and collaborative work documents, businesses rely on technology to be […].

Network 114
article thumbnail

How PMs Can Be Ready for Robotic Process Automation

Toptal

Robotic Process Automation has become a top priority for many companies in the last two years. Project Managers will increasingly have to manage projects developing software used not only by humans but also by bots. This article covers the opportunities and challenges for Project Managers brought forth by Robotic Process Automation.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

13 Tech Experts Share What Facebook Should Do Post-Data Breach

CTOvision

Facebook has had a harrowing 2018. First the Cambridge Analytica data breach scandal and then the issue of selling personal user information to Chinese smartphone companies for profit. And now, the recent data breach which could have affected millions of its users. When a business experiences a security breach, there are a lot of steps […].

Data 99

More Trending

article thumbnail

Ransomware is the most significant cyber threat to SMBs

CTOvision

While the hype around ransomware attacks has died down, it still construes a significant risk to small and medium businesses, especially those who don’t afford high-quality anti-virus solutions and other tools. Ransomware continues to be the leading cyberattack method experienced by small-to-medium sized businesses (SMBs) according to new research from Datto Inc.

Survey 95
article thumbnail

Making Headlines at SC18 with Readers’ and Editors’ Choice Awards

Dell EMC

Dell EMC brings homes three HPCwire awards — for workforce diversity, data analytics and HPC in life sciences. In any business, it’s always gratifying when people in your field take the time to recognize you for some of the good things you are doing. That was the case this week at the SC18 supercomputing conference in Dallas when HPCwire named Dell EMC as the recipient of three awards.

article thumbnail

FTC Launches New Cyber Security Tools for Small Business

CTOvision

The Federal Trade Commission (FTC) has launched a resource to raise awareness about the vital role cybersecurity plays for the 32+ million small businesses in the US. This effort was part of the National Cyber Security Awareness Month (NCSAM) in October, which has been recognized every month since 2003. The NCSAM was established with the collaboration […].

article thumbnail

How to Design Your Website Like a Pro

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

How To 79
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Everyone Should Patch, Always: Microsoft patches Windows zero-day used by multiple cyber-espionage groups

CTOvision

Microsoft has patched a zero-day escalation of privilege bug in Windows after Kaspersky Lab researchers noticed multiple cyber-espionage groups exploiting it. The zero-day, tracked as CVE-2018-8589, impacts the Windows Win32k component. Microsoft classified the issue as an “elevation of privilege” vulnerability and says that before an attacker could use this zero-day to gain elevated privileges, they’ll […].

Windows 74
article thumbnail

EFS: Great, but is Being “Elastic” Enough?

Zadara

Enhance Your AWS Environment with These Ten Enterprise-Grade Features If EFS completely addresses all of your cloud file storage needs, stop reading, go to your AWS portal, and order it. You’re still reading, aren’t you? Thought so. Before we go further, let me be clear: EFS is very good at what it was designed to […]. The post EFS: Great, but is Being “Elastic” Enough?

AWS 75
article thumbnail

Honeycomb and Rookout: An Integration That Finds the Dots to Connect

Honeycomb

This guest blog post is by Or Weis, Co-Founder and CEO of Rookout, the Rapid Debugging Company. He’s a low-level engineer and a CybSec Expert. You probably know that Honeycomb is the most flexible observability tool around. Its powerful high-cardinality search makes working with real raw data quick and easy. But as you may have learned through hard experience, fetching those dots can still be quite a challenge.

DevOps 73
article thumbnail

The Good and the Bad of Flutter App Development

Altexsoft

Without knowing it, you’ve probably already used the apps made with Flutter. Whether you shopped on Alibaba, ran an ad campaign on Google Ads, or used a digital coupon, you’ve likely witnessed the results of Flutter’s still short history. The product has remained beta for a long time. Now, with its Release Preview 2 version, it finally stepped on the finish line before the initial 1.0 release.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Democratization of Education – A Global Frontier

Toptal

Technology is a democratizing force, and improving global access to tech education is a priority for organizations like Mozilla, IBM, and the United Nations. With its inaugural Scholarship for Women being awarded to a worthy candidate in Ghana this year, Toptal is proud to join the growing worldwide effort to help talented individuals and communities gain access to the tools and resources they need.

article thumbnail

How Can A CIO Help To Transform WebMD Into An Action Center

The Accidental Successful CIO

Everyone already knows about WebMD Image Credit: Peter Morville. In this modern age in which we are living, what do you do when you start to feel not so good? If you are like most of us, you think about the symptoms that you are experiencing and then, because you understand the importance of information technology, you go online to try to figure out if what you are dealing with is serious.

article thumbnail

Accelerating OpenStack Deployment with Dell EMC and Red Hat

Dell EMC

Service providers everywhere are challenged by growing CAPEX and OPEX for existing network infrastructure, long time to market for new or updated services, price and margin erosion in existing businesses models and slowing innovation to capture new revenue opportunities. To address these challenges, service providers globally are looking to transform their datacenters from proprietary and rigid architectures to a disaggregated model with open architectures which allows them to increase infrastru

article thumbnail

Go Green This Holiday Season

Symantec

10 little things you can do at home to create a more sustainable holiday

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Penny Glitch That Cost Big

LaunchDarkly

Last month, the night before Halloween, we cohosted a special Test in Production session with Honeycomb.io. We asked speakers to bring their best horror stories of operational outages and other scary events. Marc Devens, Director of Product at BrandVerge, shared two stories. First he spoke about what happened when Appeagle—a company that provides price management software for 3rd party sellers on Amazon, eBay and Walmart—was caught up in a major pricing error.

Testing 49
article thumbnail

CodeSOD: A Profitable Education

The Daily WTF

Today’s anonymous submitter is an experienced Python developer. Their team is significantly less experienced. In the interests of training, someone suggested, “Perhaps we should buy books for everyone.” Our submitter was handed a stack of possible books, and asked to pick the best one to help the team mature. One book spent some time discussing types, and the conversion between them.

article thumbnail

Reeling in the Business Value of the Redfish Standard

Dell EMC

The modern data center never stops. Your infrastructure needs to deliver around the clock, but your staff has limits. If you have followed the IT industry for any length of time, you are familiar with our love of obfuscation. Every discovery must be protected with a code name. Once it’s released to the public, the product name is inevitably shortened to a 3 or 4 letter acronym.

article thumbnail

America’s Sentiment Towards Veterans Goes In and Out Like the Tide

Symantec

Mack T., PMO Director for Symantec's Consumer Business Unit, shares his observations on the changing attitudes towards Veterans over the years.

55
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Four short links: 14 November 2018

O'Reilly Media - Ideas

ML Risk, IGF Session, Feature Engineering, and Solving Snake. Managing Risk in Machine Learning Projects (Ben Lorica) -- Considerations for a world where ML models are becoming mission critical. Transcripts of 2018 IGF -- Internet Governance Forum session transcripts. Featuretools -- open source Python framework for automated feature engineering. Solving Snake -- fun exploration of different algorithms you might use to play the Snake game.

article thumbnail

An introduction to Federated Learning

Cloudera

We’re excited to release Federated Learning , the latest report and prototype from Cloudera Fast Forward Labs. Federated learning makes it possible to build machine learning systems without direct access to training data. The data remains in its original location, which helps to ensure privacy and reduces communication costs. This article is about the business case for federated learning.

article thumbnail

November 2018  – Microsoft Patch Tuesday 

TechTalk

November 2018 – Microsoft Patch Tuesday As we head into November, many of us in the U.S. are getting our first taste this year of colder weather. Even here in Texas, temperatures dropped slightly below freezing last night. But cold or hot, rain or shine (or snow), the security update show must go on. […].

41
article thumbnail

8 Ways to Win at Open Innovation

Planbox

The term, “open innovation,” was coined by Professor Henry Chesbrough. Chesbrough states that open innovation “assumes that firms can and should use external ideas as well as internal ideas, and internal and external paths to market, as they look to advance their technology.”. OI differs from traditional internal corporate innovation strategies such as redirecting resources or crowdsourcing ideas.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Understanding AWS VPC Egress Filtering Methods

Aviatrix

Security in AWS is governed by a shared responsibility model where both vendor and subscriber have various operational responsibilities. AWS assumes responsibility for the underlying infrastructure, hardware, virtualization layer, facilities, and staff while the subscriber organization – that’s you – is responsible for securing and controlling outbound VPC traffic destined for the Internet.

AWS 40
article thumbnail

Stop the binary thinking

Net Objectives

At a conference years ago Don Reinertsen & I were watching from the back of the room together & sometimes making comments between us about the presentations. At one point it was clear that there was a pattern of “this or that.” Don made a funny observation “these folks have been around 1s & 0s … Continue reading "Stop the binary thinking".

article thumbnail

Beijing’s Drive Towards Global Technological Supremacy

The Cipher Brief

This brief is part of The Cipher Brief’s 2018 Annual Threat Report. . Bottom Line: There are three prominent technological security concerns for the United States with a growing Chinese strategic competitor to the east: Beijing’s push toward cyber and electronic warfare, its development of counter-space capabilities that threaten U.S. space infrastructure and the race between the U.S. and China for superiority in artificial intelligence.