Mon.Dec 30, 2019

article thumbnail

Best of TechBeacon 2019: Security is in the hot seat with privacy laws

TechBeacon

New laws such as the California Consumer Privacy Act (CCPA) and the European Union's General Data Privacy Regulation (GDPR) have put substantial pressure on organizations to bolster their security practices this year. Adding to the urgency were the near-constant reports of data breaches, an ever-evolving threat landscape, and a growing volume of attacks.

Report 59
article thumbnail

The power of pause in leadership

Lead on Purpose

The most effective leaders know there’s only one thing they have complete control over: “the way in which I respond and react to another human.” They know their success depends on the unity and determination of their team members.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Start Building Your Leadership Fitness Today

thoughtLEADERS, LLC

Leadership is an endurance activity. Achieving peak leadership fitness requires self-awareness, goal setting, following a game plan, and overcoming challenges. Today’s post is by Timothy Tobin, author of Peak Leadership Fitness (CLICK HERE to get your copy). As an endurance athlete and someone who has devoted his professional career to leadership development, I have realized some amazing parallels between physical fitness and leadership fitness.

article thumbnail

Article: Candy Crush QA AI Saga

InfoQ Culture Methods

To be able to improve features in games which are constantly evolving, the challenge will be to scale tests to be on a par with new feature development. Automated tests are vital for King to keep up testing Candy Crush, therefore they are constantly looking for new improved ways to test. By Alexander Andelkovic.

Testing 52
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Digital Transformation Trends: Top Picks for 2020

Newgen Software

Gain insights into our top 3 picks that you should consider while driving digital in 2020. The post Digital Transformation Trends: Top Picks for 2020 appeared first on Newgen Software. Related posts: Accelerate your Digital Transformation Journey with Nigel Fenwick, Forrester. The Shift from BPM to Digital Process Automation. 4 Trends That Will Shake Up The ECM Market In 2016.

Trends 101

More Trending

article thumbnail

FedScoop Reports Palantir’s support of the Army’s massive data problem

CTOvision

The federal government’s leading tech media brand FedScoop has just published an insightful look inside Palantir’s support to some of the Army’s most critical mission needs. The report dives into a recent contract award that aims to bring together a wide range of disparate data from unique and often totally disjointed systems to provide decision-makers […].

Report 78
article thumbnail

Cybersecurity Canon Candidate Book Review: Defensive Security Handbook – Best Practices for Securing Infrastructure

Palo Alto Networks

Cyber Canon Book Review: “Defensive Security Handbook – Best Practices for Securing Infrastructure” (2017), by Lee Brotherston and Amanda Berlin. Book Reviewed by: Helen Patton, The Ohio State University CISO. Bottom Line: I recommend this book for the Cybersecurity Canon Hall of Fame. Review: Lee Brotherston and Amanda Berlin wrote the “Defensive Security Handbook: Best Practices for Securing Infrastructure” to help newly appointed security practitioners and those in management roles.

article thumbnail

Citrix Vulnerability Puts 80K Companies at Risk

CTOvision

A critical flaw has been discovered in two Citrix products, placing 80,000 companies in 158 countries at risk. The easily exploitable vulnerability could allow attackers to obtain direct access to a company’s local network and to access a company’s credentials. It could also be used to launch denial of service and phishing attacks and to implant malware […].

Company 61
article thumbnail

AWS Amplify or Kinvey for External Databases, Identity Providers and DevOps

Progress

Selecting a cloud service is an increasingly complex decision ideally based on individual app requirements. Based on my interactions with thousands of developers in the Progress / Telerik developer tools ecosystem, I wrote a separate article contrasting Kinvey with Firebase. Another cloud service I’m asked about is AWS Amplify from another popular cloud giant.

AWS 52
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Future Returns: How to Invest in Industrial Internet of Things

CTOvision

Read Rob Csernyik’s article about how to invest in the Industrial Internet of Things on Barrons : Smart home products like Google Nest, Ring, and smart refrigerators have kept consumers ahead of the curve of the Internet of Things (IoT), which refers to the interconnection of everyday objects via the internet. As household and commercial […].

article thumbnail

AWS Amplify or Kinvey for External Databases, Identity Providers and DevOps

Progress

Selecting a cloud service is an increasingly complex decision ideally based on individual app requirements. Based on my interactions with thousands of developers in the Progress / Telerik developer tools ecosystem, I wrote a separate article contrasting Kinvey with Firebase. Another cloud service I’m asked about is AWS Amplify from another popular cloud giant.

AWS 52
article thumbnail

Research Report: How Data Breaches Affect the Enterprise

CTOvision

Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report, one of three to come out of Dark Reading’s annual Strategic Security Survey, […].

Report 60
article thumbnail

Best of…: Best of 2019: The Internship of Things

The Daily WTF

Did you get some nice shiny new IoT devices for the holidays this year? Hope they weren't the Initech brand. Original -- Remy. Mindy was pretty excited to start her internship with Initech's Internet-of-Things division. She'd been hearing at every job fair how IoT was still going to be blowing up in a few years, and how important it would be for her career to have some background in it.

IoT 49
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

10 tech startups for 2020 that will help the world build more resilient, secure, and observable software

Honeycomb

Co-editor of the Packt Hub, Richard Gall, names Honeycomb as one of ten tech startups to keep an eye on in 2020. Gall’s article provides a brief description of Honeycomb and its message of ownership. Charity Majors is quoted on the topic: “Ownership gives you the power to fix the thing you know you need to fix and the power to do a good job.” The post 10 tech startups for 2020 that will help the world build more resilient, secure, and observable software appeared first on Honeycomb

article thumbnail

Stay Secure: How to Do an IT Risk Assessment

Strategy Driven

There is no question that IT security is a high priority for businesses and government organizations around the world. It seems like there’s a new major story of a security breach every day. Universities and even the U.S. Coast Guard were attacked with ransomware. You may think that your business is small so it won’t be targeted. Every organization that has a network connection is at risk of an attack.

How To 27
article thumbnail

Hiring always means tradeoffs

Erik Bernhardsson

The title of this blog post makes a claim that seems pretty obvious, but there’s some real “statistical” reasons why it’s true. Let’s consider a toy model where you’re hiring for two things and that those are equally valuable. It’s not very important what those are, so let’s just call them “thing A” and “thing B” Candidates have abilities with those things that are drawn randomly and independently from a distribution, and to

article thumbnail

Learn from the Best: 5 of the Best Marketing Campaigns in History

Strategy Driven

There are certain things that stick in our memories and sometimes we don’t even know where they came from. Maybe we don’t even how we remember but they stick with us. Many of the best marketing campaigns have had a similar effect on us. Sometimes, their effect can be so profound that it seemed ingrained into our culture. Aside from memorable, however, the best ad campaigns can make us feel a certain way or inspire us.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Top 3 Benefits of Framework Based Assessments

CodeSignal

This blog post is based on the twenty-first episode of the data-driven recruiting podcast hosted by CodeSignal co-founders Sophia Baik and Tigran Sloyan. You can find and listen to this specific episode here or check out the video version embedded below. Before we dive into the benefits of framework based assessments, we should first define them for you.

article thumbnail

Internet Marketing Failing? Let’s Take a Look at What You’re Doing Wrong

Strategy Driven

Even the strongest businesses in the world have had their weak moments. Maybe things aren’t going so well with your business at the moment. Perhaps it’s just one factor of your business that isn’t performing as well as it should be. If we look at the most common elements that come into play when things aren’t going amazingly for any given business, it quite often has to do with poor Internet marketing.

article thumbnail

Power of Customer Success: Nutanix Education and Residency Service

Nutanix

The latest IDC survey found organizations using Nutanix cut down the time spent on daily infrastructure and virtualization management tasks by 58% (average).

article thumbnail

5 Compelling Reasons Your Company Should Invest in Small Business Jets

Strategy Driven

It’s no secret that succeeding in business requires using every competitive advantage at your disposal. From pricing to identifying and reaching new customers to delivering the best product in the marketplace. Another tool that can provide a competitive edge is transportation. After all, the faster and more conveniently you can get from place to place, the better.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Power of Customer Success: Nutanix Education and Residency Service

Nutanix

The latest IDC survey found organizations using Nutanix cut down the time spent on daily infrastructure and virtualization management tasks by 58% (average).

article thumbnail

The Best Leadership Articles of 2019 (based on your votes)

Let's Grow Leaders

Each year, it’s fun to review the stats and determine what our readers found to be the best leadership articles of the year. The best leadership articles of 2019 covered a range of topics including culture, meetings, performance appraisals, leading courageously, and […]. The post The Best Leadership Articles of 2019 (based on your votes) appeared first on Let's Grow Leaders.

article thumbnail

Celebrating 1,000 Employees and Looking Towards the Path Ahead

Confluent

During the holiday season, it’s a particularly relevant time to pause, reflect, and celebrate, both the days past and those ahead. Here at Confluent, it’s a noticeably nostalgic moment, given […].

Company 19
article thumbnail

7 signs your cybersecurity is doomed to fail in 2020

CTOvision

Read Marcus Chung list seven signs which will tell you if your cybersecurity strategy is failing on Helpnet Security : While most enterprises have come to terms with the fact that a security incident is not a factor of “if,” but rather “when,” many are still struggling to translate this into the right security architecture […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Tomcat Configuration for CyberArk Integration

Flexagon

Although this blog post is setup in context of a FlexDeploy installation, it will be useful for anyone using Java web applications on Tomcat who wants to integrate Tomcat with CyberArk for data source passwords. As you can see on FlexDeploy installation, the password for database is defined in context.xml file and is in clear. The post Tomcat Configuration for CyberArk Integration appeared first on Flexagon.

article thumbnail

The Fashion Industry Is Getting More Intelligent With AI

CTOvision

Read Ronald Schmelzer’s article in Forbes about the ways in which the fashion industry is using AI: The fashion industry is just as much about creating demand and brand awareness as it is about the manufacturing of fashion products. Clothing and apparel brands are constantly looking for new ways to get their goods in front […].

Fashion 16
article thumbnail

Fueling Growth with Machine Learning and Predictive Analytics

Dell EMC

Drawing on the power of machine learning, predictive analytics and the Apache Hadoop platform, Epsilon helps some of the world’s top brands get the right message to the right person at the right time. Although you probably don’t realize it when you are interacting with some of the world’s most admired brands, their communications are often coming to you through a company called Epsilon.