Mon.Dec 10, 2018

article thumbnail

5 Ways KPI Analysis Helps DevOps

DevOps.com

Four Vs drive big data solutions: volume, velocity, variety and veracity. Volume and velocity are technical considerations usually receiving a healthy dose of attention among architects and coders. However, variety and veracity often determine success or failure, and they tend to sneak up on teams who haven’t fully considered them. Key performance indicator, or KPI, […].

KPI 103
article thumbnail

Is Gmail’s Confidential Mode a safe bet?

The Parallax

When email goes boom, it’s usually because somebody’s account got hacked, and his dirty laundry has exploded all over the Internet. But Google now offers a feature in Gmail that can help prevent the private contents of your messages from leaking out. It’s called Confidential Mode, and you can think of it as self-destructing email. Confidential Mode, which is available in Web browsers, as well as Gmail apps on iOS and Android, offers several privacy-forward features.

Windows 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California imposes new regulations on ‘internet of things’ devices

CTOvision

As people shop for loved ones this holiday season, internet-enabled gadgets are often at the top of the list. These gifts may be an automated vacuum cleaner, a doorbell with a camera or a Furbacca, a toy that combines Furby and Chewbacca and interacts with a smart device. These contraptions—collectively referred to as the “internet […].

Internet 100
article thumbnail

Culture, Not Changing Much in DevOps

DevOps.com

One of the things that has bemused me from day one of the DevOps movement is how culture is viewed with an odd dichotomy. It is simultaneously DevOps’ greatest strength and its greatest weakness. Of course, there is a simple and reasonable explanation for this phenomenon. DevOps wants to change culture. Cultures that are resistant […]. The post Culture, Not Changing Much in DevOps appeared first on DevOps.com.

Culture 101
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

QA Engineering Roles: Skills, Tools, and Responsibilities in a Testing Team

Altexsoft

The quality assurance engineer is vital to every tech product release. Depending on team size and structure, QA is viewed and utilized differently, but tailored to specific organization needs. Most often, software testing job titles are designated QA (Quality Assurance) or Tester. They may also include the following specifications: technology: Selenium Tester. domain: Healthcare QA. expertise: Senior QA Testing Specialist.

More Trending

article thumbnail

Istio Security: Zero-Trust Networking

Aqua Security

This is the second in our series of blog posts on Istio, and will focus on Istio’s security features: what they are, how they work and how they help protect your workloads and your data. Building, deploying and maintaining secure, cloud native software requires multiple overlapping solutions at different stages of the software development lifecycle.

Network 85
article thumbnail

AT&T is the first major US carrier to support eSIM on iPhone

CTOvision

eSIMs are finally getting a foot in the door in the US. Alongside the news that Apple has officially released iOS 12.1.1 to the public, which includes eSIM support, AT&T has become the first major US carrier to support eSIM for iPhone. The eSIM is designed to mitigate the faff and frustration associated with traditional SIM […].

79
article thumbnail

JavaScript waitForever

David Walsh

Writing mochitests for new features in DevTools can be difficult and time-consuming. There are so many elements interacting in an async manner that I oftentimes find myself using the debugger to debug the debugger! In the case where it’s unclear what interaction isn’t working properly, I find myself going to a neat utility function: waitForever.

article thumbnail

5G: What to know, why you should be excited, and how it will impact you

CTOvision

5G is coming soon. And although it seems pretty clear Apple is going to skip the next-gen wireless service in the 2019 iPhone, most Android manufacturers have made one thing certain: they’ll have at least one 5G offering as early as summer 2019. We’ve been hearing about how 5G is bringing the next-generation of wireless service […].

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms

Symantec

Group remains highly active with more than 130 victims in 30 organizations hit since September 2018.

Groups 110
article thumbnail

What DevOps Can Learn from High Reliability Organizations

DevOps.com

High reliability organizations are organizations that work in areas that are very hazardous or complex, and yet manage to have a lower accident rate than what would be normal for that environment. So what can DevOps and DevOps practitioners learn from the research of high reliability organizations? David Woods and Sidney Dekker both have done […].

DevOps 77
article thumbnail

Getting Started with the Haskell AWS Lambda Runtime

The Agile Monkey

By The Agile Monkeys Introduction We were there when Werner Vogels announced the new custom lambda runtimes on stage, and we couldn’t have been more excited. It was definitely one of our favorite announcements that morning. We have been trying Haskell (and other flavors of Haskell, like Eta and PureScript) on AWS lambda since we started working on Serverless more than a year ago.

Lambda 76
article thumbnail

Qualcomm announces the Snapdragon 8cx, an “extreme” processor for Windows laptops that it says is the first 7nm chip for a PC platform

CTOvision

Intel has been dominating PC and laptop chips market ever since it launched the 386 chips way back in 1990s. Similarly, Qualcomm has been the dominating smartphone chip market ever since Android smartphones became popular. Now Qualcomm intends to take on Intel in PC and laptop arena with its latest Snapdragon 8cx chip. In Snapdragon […].

Windows 61
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AQUA CONTAINER SECURITY PLATFORM AWARDED CIS BENCHMARK CERTIFICATION

DevOps.com

Industry’s first commercial solution to be certified for the CIS Kubernetes Benchmark Seattle, WA – 10 Dec. 2018 –KubeCon/CloudNativeCon – Aqua Security announced today that its Aqua Container Security Platform (CSP) has been certified by CIS Benchmarks™to compare the configuration status of Kubernetes clusters against the consensus-based best practice standards contained in the CIS Kubernetes […].

67
article thumbnail

Snap Decision: How Digital Transformation Helps Us Get There First

Dell EMC

We are engaged in a war of algorithms; a battle fought in cyber space that also plays out across air, land, and sea every day. Digital transformation is the key to winning because it gives us a critical advantage: the ability to execute before the adversary can. This “decision advantage” comes, in part, from embedding technology into the mission at the service of the warfighter.

article thumbnail

Let's Stand up for Equality, Justice and Human Dignity

Symantec

Symantec celebrates International Human Rights day with a look at our support of the United Nations Global Compact and Sustainable Development Goals

article thumbnail

Twistlock Introduces Hybrid Cloud Service Discovery and Expands Istio, Kubernetes, and Serverless Functions Support

DevOps.com

In Addition, the 15th Release of Twistlock Expands Monitoring with Prometheus and Alerting with PagerDuty, AWS Security Hub, and IBM Security Advisor PORTLAND, OR, December 10, 2018–Twistlock, the leader in container and cloud native security, today announced the release of Twistlock 18.11. This substantial update now enables customers to easily discover cloud native services to […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Creating a Welcoming Culture for Women In STEM

Symantec

Connie G, a former Software Engineer Intern at Symantec, shares her perspective on being a woman in tech, and why we need to cultivate a culture of collaboration.

Culture 49
article thumbnail

Four short links: 10 December 2018

O'Reilly Media - Ideas

Language Zoo, VS AI, Advertising Plus, and Minecraft Scripting. The Programming Languages Zoo -- a collection of miniature programming languages that demonstrates various concepts and techniques used in programming language design and implementation. AI in Visual Studio Code -- good to see IDEs getting AI-powered features to augment coders. In some small way, Doug Engelbart would be proud.

article thumbnail

Cigars, Schnapps, and ShadowXafe

Arcserve

So, the family deserted me this evening, and I found myself sitting here enjoying some Enzian with a Partagás cigar. Yes, Dad’s night out at home. Gotta make it worthwhile, right? Now this cigar, liqueur, tech stuff is not all that disjointed as some may initially think. First, let’s talk about Partagás and Enzian. The Partagás. Read more » The post Cigars, Schnapps, and ShadowXafe appeared first on StorageCraft Technology Corporation.

article thumbnail

KitelyTech’s Scintillating Software Development Services Featured at GoodFirms

KitelyTech

KitelyTech has been delivering innovative software along with a host of other IT services — including web design, web development, SEO, mobile apps, branding, AI, and AR — since 2009. Third-party review firm GoodFirms has taken notice. GoodFirms’ Research Process. GoodFirms is a review and research firm that analyzes and evaluates IT firms across the world and lists them according to experience amassed, market penetration, portfolio, and references.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What You Should Know About the Changing Nature of Telephone-Based Payments

Coalfire

In March 2011, the PCI SSC released the initial version of the “Protecting Telephone-Based Payments Card Data” Information Supplement as a guide to help assessors assess environments where cardholder data was stored, processed, and/or transmitted over the telephone. It was a pivotal guidance document at the time that set the stage for a broader focus on telephony technologies.

VOIP 40
article thumbnail

Wireframing for Non-Designers – A Crash Course

Atomic Spin

Wireframes are not just for designers! As a software maker, you can and should be using them to eliminate risk and validate concepts. These tools benefit the entire team, and they can be created by any member of the team. This crash course will teach you why wireframes are important, when you should utilize them, and how to best present them to your stakeholders.

Course 40
article thumbnail

Top Mobile App Development Trends to Watch Out in 2019

Xicom

There is huge demand for iPhone App Development Services and Android App Development Services. This is due to the fact that we are now living in the age of mobility and everything around us is being digitized. Now more people access the internet from their mobile phones than from desktop computers and laptops. With this incredible change taking place around us demand for smartphones is increasing at an unprecedented pace.

Mobile 40
article thumbnail

CodeSOD: The Key to Using Dictionaries

The Daily WTF

It's easy to use dictionaries/maps to solve the wrong kinds of problems , but deep down, what's more elegant than a simple hashed map structure? If you have the key, fetching the associated value back out happens in constant time, regardless of the size of the map. The same is true for inserting. In fact, hash maps only become inefficient when you start searching them.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How symlinks pwned Kubernetes (and how we fixed it)

TechBeacon

Michelle Au, software engineer at Google, co-wrote this article.

article thumbnail

Face to Face with the Book

Martin Fowler

The books arrived at my house a couple of weeks ago, but I missed them as I was on the road.

55
article thumbnail

Handling Combo Box Selection Change in ViewModel (WPF MVVM)

Trigent

Windows Presentation Foundation offers various controls and one of the basic control is the combo box.

Windows 40