Tue.Nov 14, 2023

article thumbnail

Creativity Isn’t Just Remixing

O'Reilly Media - Ideas

This is not the first time that I’ve written about AI creativity, and I doubt that it will be the last. It’s a question that comes up repeatedly, and that is very much in the current mind, with events like the strikes by the Writers’ Guild of America and the Screen Actors Guild , in which the use of AI to create scripts and to generate images of actors was an issue.

article thumbnail

Reimagine Agile: Back to Basics, Forward to the Future

Agile Alliance

Help us reimagine and update Agile. We invite you to join our journey in modernizing and reshaping Agile's future. The post Reimagine Agile: Back to Basics, Forward to the Future first appeared on Agile Alliance.

Agile 250
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Securing Azure Service Bus

Xebia

Security should be considered from the initial stages of designing a product rather than as an afterthought. This is particularly important for Service Bus as it often forms a part of a larger system. Security requirements may vary depending on the use case; for instance, a banking solution would have different security needs compared to a solution for a local bakery.

Azure 162
article thumbnail

How does Digital Technology help build the Next Generation of Dental Practices?

OTS Solutions

Introduction to the Digital Transformation for Dental Practices Dental practices are transforming as digital technology is reshaping oral healthcare. From streamlined workflows to enhanced patient experiences, digital IT services and tools are revolutionizing the next generation of dental practices. In this article, we explore how digital technology is helping to advance dental care, improve efficiency, and empower dental professionals and patients alike.

article thumbnail

LLMs in Production: Tooling, Process, and Team Structure

Speaker: Dr. Greg Loughnane and Chris Alexiuk

Technology professionals developing generative AI applications are finding that there are big leaps from POCs and MVPs to production-ready applications. They're often developing using prompting, Retrieval Augmented Generation (RAG), and fine-tuning (up to and including Reinforcement Learning with Human Feedback (RLHF)), typically in that order. However, during development – and even more so once deployed to production – best practices for operating and improving generative AI applications are le

article thumbnail

All the Small Things: Azure CLI Leakage and Problematic Usage Patterns

Prisma Clud

At the beginning of July 2023, I took a stroll around the azure/login GitHub Action repository. Looked through the repository’s issues section, I immediately noticed issue number 315. The issue was titled “ SECURITY: Azure/login in some cases leaks Azure Application Variables to the GitHub build log ”. And don’t you just love when things leak stuff?

Azure 143

More Trending

article thumbnail

November 2023 Patch Tuesday

Ivanti

November 2023 Patch Tuesday has arrived and has a lower overall CVE count than previous months, but includes some urgent fixes that organizations will want to take note of. This month is also the first patch cycle for Server 2012 and 2012 R2 extended support (ESU). On the third-party side, Adobe has released updates and an update from Google Chrome Stable Channel has been updated.

Windows 119
article thumbnail

1. Streamlining Membership Data Engineering at Netflix with Psyberg

Netflix Tech

By Abhinaya Shetty , Bharath Mummadisetty At Netflix, our Membership and Finance Data Engineering team harnesses diverse data related to plans, pricing, membership life cycle, and revenue to fuel analytics, power various dashboards, and make data-informed decisions. Many metrics in Netflix’s financial reports are powered and reconciled with efforts from our team!

article thumbnail

Troubleshooting Sitecore Image Update Issue

Perficient

Troubleshooting image update issues in Sitecore can prove to be a complex task, as various factors could contribute to the problem. We recently encountered an issue where, after updating the “Sitecore Images,” our local project instance stopped working. In order to resolve the issue, we attempted multiple possible solutions, including those available on the internet, but initially were not able to identify the root cause of the problem.

article thumbnail

Exploring IBM App Connect Enterprise 12.0.10.0

Dzone - DevOps

We'll explore seven of the features released in IBM App Connect Enterprise 12.0.10.0 and provide a high-level overview of each; Toolkit: Simple JSON Mapping within the Discovery Connector Request nodes. New button to open workspace file system location. WebUI: New Record and Replay views with Hex and Base64 encoding. Resource Manager views. New Change Data Capture node for integrating with PostgreSQL and DB2.

article thumbnail

Use Cases for Apache Cassandra®

There’s a good reason why Apache Cassandra® is quickly becoming the NoSQL database of choice for organizations of all stripes. In this white paper, discover the key use cases that make Cassandra® such a compelling open source software – and learn the important pitfalls to avoid. From understanding its distributed architecture to unlocking its incredible power for industries like healthcare, finance, retail and more, experience how Cassandra® can transform your entire data operations.

article thumbnail

SASE Converge ‘23 Showcases the Potential and Impact of AI-Powered SASE

Palo Alto Networks

The strong force of distributed resources is shaping today’s organizations – workers are hybrid and applications are increasingly moving to the cloud. While this creates an opportunity for businesses to innovate and scale faster, it exposes them to a new generation of evasive and unique attacks. Organizations have been adopting Secure Access Service Edge (SASE) at an unprecedented pace to address this new reality of work.

WAN 99
article thumbnail

Consent Management for Compliance and Customer Experience Benefits 

Perficient

Data privacy has become an increasingly complex subject, especially with the introduction of the California Consumer Privacy Act (CCPA) and similar regulations emerging in other states. Non-compliance with these regulations can result in hefty fines, as seen with Sephora’s recent $1.2 million penalty. The Growing Need for Consent Management The proliferation of privacy laws and regulations worldwide has led to a multitude of compliance deadlines.

article thumbnail

Redefine IR with the Unit 42 Incident Response Retainer for No Cost

Palo Alto Networks

In an era where the cost of cybercrime has skyrocketed to a staggering $8 trillion , the threat landscape is more treacherous than ever. 96% of companies experienced a cybersecurity incident in 2022, and 24% suffered ten or more incidents or breaches. Having a strong cybersecurity partner is critical. This partner should be equipped to respond to incidents, assist in the investigation, as well as remediate and contain potential attacks.

Network 96
article thumbnail

3. Psyberg: Automated end to end catch up

Netflix Tech

By Abhinaya Shetty , Bharath Mummadisetty This blog post will cover how Psyberg helps automate the end-to-end catchup of different pipelines, including dimension tables. In the previous installments of this series, we introduced Psyberg and delved into its core operational modes: Stateless and Stateful Data Processing. Now, let’s explore the state of our pipelines after incorporating Psyberg.

Data 96
article thumbnail

Addressing Top Enterprise Challenges in Generative AI with DataRobot

The buzz around generative AI shows no sign of abating in the foreseeable future. Enterprise interest in the technology is high, and the market is expected to gain momentum as organizations move from prototypes to actual project deployments. Ultimately, the market will demand an extensive ecosystem, and tools will need to streamline data and model utilization and management across multiple environments.

article thumbnail

New Relic Adds Ability to Monitor AI Models to APM Platform

DevOps.com

New Relic is extending its APM platform to make it simpler to monitor the behavior of AI models within the context of an application.

article thumbnail

2. Diving Deeper into Psyberg: Stateless vs Stateful Data Processing

Netflix Tech

By Abhinaya Shetty , Bharath Mummadisetty In the inaugural blog post of this series, we introduced you to the state of our pipelines before Psyberg and the challenges with incremental processing that led us to create the Psyberg framework within Netflix’s Membership and Finance data engineering team. In this post, we will delve into a more detailed exploration of Psyberg’s two primary operational modes: stateless and stateful.

Data 88
article thumbnail

Elevating Quality Engineers in an AI-Driven Landscape

DevOps.com

Artificial intelligence is creating new opportunities for AI-savvy test engineers. But that doesn’t mean that you can set it and forget it.

article thumbnail

From Oops to Ops: SLOs Get Budget Rate Alerts

Honeycomb

As someone living the Honeycomb ops life for a while, SLOs have been the bread and butter of our most critical and useful alerting. However, they had severe, long-standing limitations. In this post, I will describe these limitations, and how our brand new feature, budget rate alerts, addresses them. We usually don’t have SREs writing product announcements, but I’m so excited about this one that I said, “Screw it, I’m doing it!

Budget 84
article thumbnail

Lessons Learned in PostgreSQL®

In today's digital landscape, the threat of ransomware demands proactive defense. This paper, inspired by a real PostgreSQL® database incident, offers vital strategies for effective mitigation. Instaclustr expert Perry Clark outlines immediate actions to minimize risks, ensuring a swift response to ransomware threats and protecting critical data assets.

article thumbnail

Grafana Labs Acquires Asserts.ai to Bring AI to Observability

DevOps.com

At its ObservabilityCON event, Grafana Labs announced it acquired Assert.ai to automate configurations and customization of dashboards.

article thumbnail

Are You Improving Upon the Silence?

Next Level Blog

One of the most powerful quotes I’ve ever read has stuck with me for years. It’s from Robert Greenleaf in his book, Servant Leadership , where he wrote, “The most difficult question to ask oneself is, ‘Does what I have to say improve upon the silence?’” The fact of the matter is that a lot of people in leadership roles talk too much. The impact of that is multi-faceted.

article thumbnail

Canonical Automates Provisioning of Cloud Environments Anywhere

DevOps.com

Canonical's MicroCloud framework leverages Linux containers and Snap to automatically orchestrate the provisioning of cloud environments.

Cloud 96
article thumbnail

It’s time to rethink the gender negotiation game

CEO Insider

It is 2023, and to our chagrin, men still achieve better economic results in negotiations than women. The research shows this, but as a career advisor, I also know it to be true. It is evident when coaching women on salary negotiations and career advancements, and sadly, despite knowing better, I, too, have fallen prey […] The post It’s time to rethink the gender negotiation game appeared first on CEOWORLD magazine.

Games 83
article thumbnail

Innovation Systems: Advancing Practices to Create New Value

As technology transforms the global business landscape, companies need to examine and update their internal processes for innovation to keep pace. Ultimately, organizations will have to improve the velocity of innovation by creating repeatable processes that support ideation, exploration, and incubation, essential to capturing an idea’s full value.

article thumbnail

Leveraging Crowdtesting in DevOps to Enhance Quality Assurance (QA)

DevOps.com

There are still challenges for QA teams within DevOps, including the need to "shift left." Crowdtesting can help.

article thumbnail

Anatomy of a High Availability Kubernetes Cluster

Dzone - DevOps

In my previous article , I hinted at explaining how Ansible can be used to expose applications running inside a high availability K8s cluster to the outside world. This post will show how this can be achieved using a K8s ingress controller and load balancer. This example uses the same setup as last time around: virtual machines running under the default Windows Hypervisor (Hyper-V).

article thumbnail

Data and AI as the Key to Unlocking Financial Inclusion

Cloudera

Of the many things one might take for granted, access to banking and financial services may not immediately come to mind. But as a thought experiment, imagine trying to buy a home or a car without the ability to take out a loan. Try depending on cash payments from your employer, or relying on alternative banking solutions like short-term payday loans, check-cashing services, and prepaid debit cards.

Data 75
article thumbnail

Microsoft’s November 2023 Patch Tuesday Addresses 57 CVEs (CVE-2023-36025)

Tenable

Microsoft addresses 57 CVEs, including three zero-day vulnerabilities that were exploited in the wild. 3 Critical 54 Important 0 Moderate 0 Low Update November 14: This blog has been updated to note the availability of fixes for Windows and Windows Server for CVE-2023-38545, a heap buffer overflow vulnerability in curl. View Change Log Microsoft patched 57 CVEs in its November 2023 Patch Tuesday release, with three rated critical and 54 rated important.

Windows 70
article thumbnail

From Whims to Wins: How a Customer-Centric Portfolio Transforms Product Strategy

Speaker: John Mansour - President, Product Management University

You know that sinking feeling. You’ve come up with a winning product strategy, everyone’s on board and energized, and you’re halfway down the path to execution only to have it submarined by something someone convinced your leadership was more strategic! It’s a scenario that’s all too familiar, and it exemplifies one of the biggest struggles with individual product strategies.

article thumbnail

Introducing a new approach to code security

Lacework

In many ways, software is the lifeblood of modern companies, which makes the security of its code paramount. However, code sprawl is a very real and daunting problem. With millions of lines of code that are constantly being reused, forked, and updated, how can teams effectively secure their code and protect their systems, data, and reputations? While code security tools have been around for over a decade, they are highly fragmented, generate excessive noise, lack the context necessary to underst

article thumbnail

Drive Towards Preventing Breaches and Pipeline Attacks with Prisma Cloud

Prisma Clud

In today’s dynamic software development landscape, the agility of engineers and their tools evolve at an unprecedented rate, calling for a paradigm shift in our security approach. Modern developers prioritize moving fast, using a diverse range of tools and technologies to enhance and hasten their projects. But the fallout of continuously adapting their tooling to fit their needs and automate more deployment processes leaves security lagging, struggling to grasp the changes in their environment,

Cloud 64
article thumbnail

Modernize Payments Architecture for ISO 20022 Compliance

Confluent

Learn how Confluent helps financial services modernize payment platforms. Ensure interoperability between legacy payments messaging data while standardizing on the new ISO 20022 format.