Thu.Aug 01, 2019

article thumbnail

How Managers Can Reclaim Their Lost Soul

Let's Grow Leaders

In a recent leadership development program, we talked about “manager soul loss” – the isolation, bitterness, and despair that seeps into many leaders’ hearts. We share the stages of soul loss and symptoms to look out for to help leaders identify and prevent them […]. The post How Managers Can Reclaim Their Lost Soul appeared first on Let's Grow Leaders.

article thumbnail

Software Compliance Teams Can Learn a Lot from DevSecOps

DevOps.com

Many argue that application security should be the responsibility of a security team. However, while security professionals can contribute, developers are usually the only ones with the technical ability to fix software security vulnerabilities. The same goes for software compliance. When it comes down to it, only developers are equipped to build applications in compliance […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why choose Puppet for DevOps?

Linux Academy

If you’re like most in the DevOps world, you’re always interested in automating tasks and securing your infrastructure. But it’s important to find ways that won’t sacrifice the quality or lose efficiency. Enter Puppet for DevOps. Forty-two percent of all DevOps businesses currently use this handy tool, for good reason. Puppet for DevOps is unique because it allows you to enforce automation, enhance organization, boost security measures, and ramp up the overall speed acros

DevOps 65
article thumbnail

When It Comes to Leading Your Business, Should You Lean on Data or Instinct?

CEO Insider

For every business that is buoyed by the power of big data, countless others are drowning in it. According to Forrester, about 60% to 73% of enterprise data goes unused. It’s no wonder that Debra Bass, president of global marketing services for Johnson & Johnson, argues that many marketers should be diagnosed with “InfoObesity.” Instead […].

Data 76
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Getting to the Heart of Digital Accessibility

A List Apart

121
121

More Trending

article thumbnail

Kubernetes Pod Escape Using Log Mounts

Aqua Security

Kubernetes has many moving parts, and sometimes combining them in certain ways can create unexpected security flaws. In this post you’ll see how a pod running as root and with a mount point to the node’s /var/log directory can expose the entire contents of its host filesystem to any user who has access to its logs. We’ll also talk about your options to mitigate this issue in your cluster.

55
article thumbnail

Qualities Patterns Share: Robust Encapsulation

Net Objectives

Much of the literature on object-orientation defines encapsulation as “data hiding.” While this is true, it is far too limited as a definition. Data hiding is encapsulation but not all encapsulation is data hiding. Encapsulation is the hiding of anything. Here are some examples. Interfaces, abstract classes, and concrete base classes can be used to … Continue reading "Qualities Patterns Share: Robust Encapsulation".

article thumbnail

Authentic Feedback

Marcus Blankenship - Podcasts

Episode 14. We’ve all experienced feedback that was unhelpful — but why was it that way? Supervisors want to motivate us and bring out our best, but perhaps they don’t always think about the feedback they’re giving. Is it really helpful? Is it addressing the real problem? What’s the context? In this episode, we’ll look at how our perceptions can change how we respond, and why authentic feedback is genuinely helpful.

article thumbnail

Staff and IT leadership at odds over data security

DXC

It’s no secret that employees and contractors are one of the primary causes of enterprise security events. It’s not that most insiders who cause data breaches are malicious. They’re not. They may carelessly send a cleartext email that contains sensitive information, reuse the same password across applications, or lose an unencrypted notebook or portable storage […].

Data 45
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Predicting Churn: How Data Can Help with Customer Retention

DataRobot

Customer retention is a big concern for companies. The cost of acquisition is typically 5 to 25 times more expensive than the cost of retaining a customer. However, you don’t want to put all of your customers through retention programs. You may end up driving customers away who don’t want to be bothered. On the other hand, some customers may want to leave regardless of what you offer them.

Data 41
article thumbnail

Data Architecture Crash Course: Key Terms

Dataiku

Not sure what Hadoop actually is? A little fuzzy on what the difference is between cloud and on-prem storage? We’ve set out to demystify the jargon surrounding data architecture to enable every team to understand how it impacts their objectives.

article thumbnail

5 Lessons from Gartner Security and Risk 2019

Saviynt

With the 2019 Gartner Security and Risk Management Summit slowly fading in the rear-view mirror, identity and access management professionals need to start looking toward the future. While no one has a crystal ball, the not-too-distant future seems to be focused on securing the cloud by securing identity. With a look to the cloud-enabled future, this year’s Gartner Security and Risk Management Summit tackled themes such as regulatory compliance, metrics, and Identity and Access Management.

Metrics 36
article thumbnail

How to read a privacy policy

The Parallax

If you’ve never read an app’s privacy policy before downloading it, you’re far from alone. If you’re American, according to a report from Deloitte, you would be part of a 91 percent national supermajority. In this club, you’d undoubtedly find yourself plenty of good company. But you should probably start looking for the exit sign. Those verbose documents that no one reads—the privacy policy, terms and conditions, or terms of service—typically detail important legal information about your data, i

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Taming chaos: Preparing for your next incident

O'Reilly Media - Ideas

Tim Craig and Gustavo Franco on establishing robust and well-supported incident response processes. Incident response is like security: when you do it well, no one notices because everything just works the way it should. With both incident response and security, the costs are obvious to the organization while the benefits remain amorphous. And as with security, a lack of attention to incident response could be regretted—you can lose a good deal of money while your systems are non-functional.

article thumbnail

Boost Student Success with Quality Substitute Teachers

PowerSchool

52
article thumbnail

5 Ways to Make Innovation a Reality in Software Development Outsourcing

Perficient

When working with an outsourcing partner, innovation is often an afterthought to the day to day insights and challenges that come with developing software. However, with the amount of value innovation can add to a software development outsourcing eng.

article thumbnail

The Titan Release of Palantir Gotham

CTOvision

At this point most everyone in the technology world has heard of Palantir. Their solutions are in use across multiple industries and government agencies. But Palantir continues to evolve in capability and with the current release of their platform they are bringing together data, analytics and visualizations in ways that can add significant value to […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Is Shadow IT Still a Problem?

ParkMyCloud

Shadow IT: you’ve probably heard of it. Also known as Stealth IT, this refers to information technology (IT) systems built and used within organizations without explicit organizational approval or deployed by departments other than the IT department. . A recent survey of IT decision makers ranked shadow IT as the lowest priority concern for 2019 out of seven possible options.

Survey 23
article thumbnail

How to improve a company’s performance with crm software?

OTS Solutions

How to Improve a Company’s Performance with CRM Software? Good relationships lead to increased customer satisfaction and loyalty. Consequently, they lead to sales growth, reduced transaction costs, and profitability. Customer relationship management software provides a framework that helps organizations consistently create and nurture good relationships with customers.

article thumbnail

Nutanix and HPE Deliver Integrated Hyperconverged Infrastructure Appliance

Nutanix

Today, we proudly take the next step in this journey with the general availability of the HPE ProLiant DX Gen10, a range of Nutanix-integrated HPE appliances based on the most secure industry standard servers.

article thumbnail

FASTER Fridays – Prioritization and Sequencing

Cory Foy

Happy Friday! This week I started a new series around Mapping and Strategy and I’m excited to announce the start of a second series I’m calling #fasterfridays. FASTER is an acronym for a method I developed to help organizations deliver faster (it stands for: Form, Align, Sequence, Test, Execute, Realize). The heart of it is […].

Testing 20
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

7 Things.NEXT Does Differently

Nutanix

On top of linking you up with thousands of brilliant, network-worthy peers, delivering world-class speeches from world-class brainiacs, and setting you up for datacenter success both now and for the future,NEXT sets itself apart from the pack in myriad ways.

Network 20
article thumbnail

Removing Blockchain Adoption Barriers: Stabilizing Costs & Transparent Security

Security Innovation

I recently had the opportunity to lead a team that conducted a security audit of Metacash, a mobile wallet and set of smart contracts designed to improved UX when sending DAI, a stable cryptocurrency that is pegged to the US Dollar. Unlike other cryptocurrency wallets, Metacash simplifies new user onboarding by hiding the complex technical bits of the Ethereum blockchain by removing the need for the native Ether currency when covering transaction fees.

article thumbnail

DevOps India Summit 2019 (DOIS19)

DevOps.com

DevOps India Summit 2019 (DOIS19) is a platform provided by Xellentro in India to meet and learn from the top technology and business leaders from across the globe for two days of immersive learning. Experience the DevOps journey from these leaders who are helping to drive this transformation in organizations of various sizes at various […]. The post DevOps India Summit 2019 (DOIS19) appeared first on DevOps.com.

DevOps 18
article thumbnail

Linux Academy Monthly Update for August

Linux Academy

During the last week of July, we brought Azure home to Cloud Playground. In this blog, we’ll be talking about that new addition along with a ton of new course announcements and a special giveaway we’re holding on our YouTube channel. The New Stuff. We’ve already mentioned the new Azure Cloud Playground, but that’s not the only new thing we have going on.

Linux 16
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

How to Get a Better Credit Score

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

How To 17
article thumbnail

Announcing the CloudBees Jenkins X Distribution

DevOps.com

Today we are announcing the first release of the CloudBees Jenkins X Distribution. It’s a battle-tested, preconfigured ready-to-go package for Jenkins X that you can count on today. We’ll vouch for it with support and documentation, and evolve it at a predictable and well-tested cadence. That’s a big deal for us and for the Jenkins X community, and […].

Testing 17
article thumbnail

Make data science more useful

O'Reilly Media - Ideas

The O’Reilly Data Show Podcast: Cassie Kozyrkov on connecting data and AI to business. In this episode of the Data Show , I speak with Cassie Kozyrkov , technical director and chief decision scientist at Google Cloud. She describes "decision intelligence" as an interdisciplinary field concerned with all aspects of decision-making, and which combines data science with the behavioral sciences.

Data 16