Tue.May 14, 2019

Domain-driven data architecture

Martin Fowler

Zhamak explains the first part of the data mesh concept - using the ideas behind Domain-Driven Design to structure the data platform. more…. skip-home-page

How to Overcome Monitoring Challenges with Kubernetes


As more and more companies pivot to providing software as a service, end users have come to expect that ‘service’ to always be available, fast, responsive, error-free, and to be continuously updated with new features.

Saying No - Tips for the Product Owners


Saying No is an integral part of any Product Owner's job. In this short video, I explore the reasons why we might be saying Yes when No is a more appropriate answer (these reasons are from a great book by Dominica DeGrandis Make Work Visible ) and how to say No when you need to.

Video 201

How to use your Android as a 2FA key

The Parallax

MOUNTAIN VIEW, Calif.—Google Google just made it much, much easier for Android device owners to protect themselves with one of the safest extra security layers available to consumers. If you have a phone or tablet running Android 7.0

How To 139

Innovation: Five Signs You Might Be Faking It

Every company wants to be a leader in innovation, but how can you tell if your company is really innovating or just going through the motions? See the 5 signs you might be faking innovation and what to do if you are.

How AI and machine learning are improving customer experience

O'Reilly Media - Ideas

From data quality to personalization, to customer acquisition and retention, and beyond, AI and ML will shape the customer experience of the future. What can artificial intelligence (AI) and machine learning (ML) do to improve customer experience?

More Trending

Making Facebook a scapegoat is a mistake

O'Reilly Media - Ideas

Breaking up Facebook won't solve the disinformation or privacy problems. It might well make it harder for Facebook to work on those problems. Chris Hughes, a co-founder of Facebook, recently wrote an opinion piece for the New York Times presenting an argument for breaking up Facebook.

The Choice Has Never Been Clearer


I am very excited about our next-generation R3 Series routing platforms, which are setting new standards for throughput, density, power efficiency and price performance.

Cloud 88

Real-World Enterprise Security Experience at KubeSec Summit

Aqua Security

For the second time, Aqua will host the KubeSec Enterprise Summit next week, together with our co-hosts AWS, Google Cloud, Microsoft Azure, and Red Hat. The event is co-located with KubeCon/CloudNativeCon in Barcelona and will take place on Monday, May 20th.

Azure 82

Using Array reduce

David Walsh

Every developer who specializes in any programming language will tell you there’s a powerful tool the language provides that they rarely use and wish they knew more about. For me, it’s Array.prototype.reduce. I quite enjoy the other Array methods like map , filter , and find , but reduce is one that I knew was powerful but never really had much use for.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Google Cloud Sandbox Environments On Demand with Playground

Linux Academy

We’ve been talking about it for a while now during our Weekly Updates, and we’re finally ready to reveal our Google Sandbox Environment! Like our AWS environments, our Google environments are created on demand and allow you to work in a hassle-free, and compliance-friendly environment.

Automated App Testing Made Easy with Appium and AWS Device Farm

Cabot Solutions

Improved Application Testing through automated Appium testing and AWS Device Farm Appium testing with AWS Device Farm gives you more control over the testing environment and how apps would perform on real mobile devices Check out this blog to know more

AWS 79

The 3 Types of Nonprofit Dashboards — and How to Build Each One


So much data is available to your nonprofit — through your CRM, Google Analytics, social media analytics, email analytics, and beyond. When you make a dashboard, the goal should be to deliver the right data from the right time frame to the right people so that a business decision can be made.

How to Treat Your Kubernetes Clusters Like Cattle, Not Pets

The New Stack

The Cloud Native Computing Foundation sponsored this post. Michael Dell , founder, chairman and CEO of Dell Technologies, defined cloud not as a place, but “as a way of doing IT.”.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

DataRobot Named Qlik Global Technology Partner of the Year


DataRobot was honored to be named the 2019 Global Technology Partner of the Year by Qlik at their annual customer and partner event, Qonnections 2019.

How to Throw an Exception


The post How to Throw an Exception appeared first on DevOps.com. Blogs ROELBOB

How To 108

Artificial Intelligence Needs Data Diversity


Read why Naga Rayapati says that artificial intelligence needs data diversity on Forbes : Artificial intelligence (AI) algorithms are generally hungry for data, a trend which is accelerating. A new breed of AI approaches, called lifelong learning machines, are being designed to pull data continually and indefinitely. But this is already happening with other AI […].

Thrangrycat: Vulnerabilities in Cisco Secure Boot and Cisco IOS XE (CVE-2019-1649, CVE-2019-1862)


Researchers identify vulnerabilities in Cisco Secure Boot process and Cisco IOS XE devices that could reportedly be chained together for significant impact. Background. On May 13, Cisco published two security advisories for vulnerabilities in Cisco Secure Boot and Cisco IOS XE.

11 Proven Ways to Turn Your Culture into a Culture of Innovation

Learn the 11 proven strategies that you can implement quickly to get every employee innovating and contributing to the growth of your company.

Intel Releases Cloud Hypervisor Based on Same Components as Amazon’s Firecracker

The New Stack

Intel today announced a new special-purpose Linux hypervisor for cloud native workloads built on the Rust virtual machine manager, or rust-vmm — the open source set of hypervisor components that Amazon’s Firecracker micro virtual machine is built on.

Google says it will address AI, machine learning model bias with technology called TCAV


How to Achieve Multi-Cloud Visibility


Multi-cloud is quickly becoming a “new-normal” deployment scenario as organizations of all types leverage an ever-increasing variety of cloud computing services.

Azure 103

Four short links: 14 May 2019

O'Reilly Media - Ideas

Designing for AI, Opinions, Data Moats, and Trans-inclusive Design. People + AI Guidebook (Google) -- Designing human-centered AI products. Strong Opinions Loosely Held Might Be The Worst Idea in Tech -- What really happens?

Data 72

Quantifying a Culture of Innovation

Examining five years of anonymous data from over 6 million users in 170+ countries, Spigit has discovered that a culture of innovation can be measured – with a 99% statistical confidence level – by a metric called "ideation rate." Download the eBook now for an in-depth look at this groundbreaking study.

The Bug in Production: What You Don’t Know Can – and Will – Harm You


Despite the risk of unplanned downtime, many organizations that develop software and services push them live without adequately testing for bugs that will manifest against production traffic. This is a huge gamble: Those bugs could lead to errors that bring down the service altogether.

Cloud Security Alliance DC Update: Explore The Boundary of Security & Privacy on 13 June Cruise


The Boundary of Security & Privacy Privacy is becoming an ever increasing concern in our world today. Social Networks today are now focusing on users’ privacy given the inherent security risks posed by organizations’ access to personally identifiable information. The European Union has enacted GDPR valuing privacy whereas on the opposite end of the spectrum, […]. Cloud Computing Cyber Security News

Larry Peterson Identifies How Service Mesh Can Help Telcos as They Move into Microservices

The New Stack

In this episode of The New Stack Makers, TC Currie is joined with industry veteran Larry Peterson , now CTO of the Open Networking Foundation (ONF) and Professor Emeritus at Princeton University.

A Problem in the Backend

The Daily WTF

Gary works at a medium company. Big enough that workers are specialized in their duty, but small enough to know people in other departments and to make turf wars a little more close and personal: danger close.

Encouraging Innovation in an Established Product Culture

Speaker: Richard Cardran, Chief Creative Officer and VP Strategy, HIA Technologies

Innovation is both a process and an outcome. The best way to begin innovating your products is by innovating your internal process. We'll explore the challenges, solutions, and hands-on techniques for becoming a successful "agent of change" within a well-established product culture. We'll examine the importance of UX and user-centric feature analysis, the adaptation of Agile Methodologies to the creative process, as well as a way to drive successful culture change for setting expectations and winning approvals with cross-functional stakeholders. Innovation and Leadership go hand in hand. Join Richard Cardran, Chief Creative Officer and VP Strategy, HIA Technologies, as we assess some case studies to see how to lead with a clear strategy well-defined tactics, and an unbiased understanding of the fundamental question: "why are you innovating?"