Mon.Mar 02, 2020

article thumbnail

The Elephant in the Architecture

Martin Fowler

Last week I gave one of the keynotes at O'Reilly's Software Architecture conference. When I was invited to do this last year, I asked my colleagues at a radar meeting dinner for suggestions on what to talk about. They commented about how they were often asked to do architectural assessments for clients, and almost always discovered that the architects neglected to properly understand the business value of the systems they were looking after.

article thumbnail

The Go-Getter’s guide to diversity hiring in tech

Hacker Earth Developers Blog

Over 47% of millennials want to work at diverse companies but a lack of workforce diversity and unconscious bias are fast becoming a systemic problem in tech. Companies worldwide are looking to tackle the issue of diversity hiring in tech but very few have actually made strides in the right direction. A diverse workforce can give you a competitive advantage and has also impacted productivity and profits in the past.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Beginner’s Basics of Kubernetes

Linux Academy

What is Kubernetes? Using containers makes life simple. You can set up and package everything that you need into an application, and execute that package without the virtual machine overhead that is normally rendered during that process. Containers are amazing and helpful tools, benefitting our machines that make the world a better place, but that is only part of the picture.

Policies 159
article thumbnail

How to Make No-good, Useless Performance Feedback Helpful

Let's Grow Leaders

Don’t let useless performance feedback sap motivation My phone buzzed with a text message from Amena, a young manager. “Just had annual eval – most useless performance feedback ever.” I’d coached this woman—a hardworking, strategic thinker who passionately cared about the company […]. The post How to Make No-good, Useless Performance Feedback Helpful appeared first on Let's Grow Leaders.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Enter the Tangle, a blockchain designed specially for the Internet of Things

CTOvision

Blockchain and other distributed ledger technologies (DLTs) may be interesting ways to track and assure the validity of information as it’s passed between entities or systems, and it has been weighed as a possible data exchange medium for devices and systems within the Internet of Things. But current blockchains and DLTs may have too much […].

More Trending

article thumbnail

How Data Aggregators Are Using Blockchain To Empower Fintech Players

CTOvision

Read Shaan Ray explain how data aggregators are using blockchain in the financial sector on Inc42 : People know their banks and their favorite fintech applications. However, consumers are generally not aware of data aggregators like Plaid and Finicity, which collect consumer data from banks, crunch it and feed it to fintech applications. Blockchain technology […].

article thumbnail

6 Tips to Select the Right DevOps Software

Flexagon

DevOps adoption is growing across businesses in all industries, mainly due to the wide array of benefits that DevOps can provide. A recent study[1] found that among companies that have implemented DevOps: 63% improved quality of deployments 63% release software more frequently 55% have better collaboration between teams DevOps adoption can help a company become.

article thumbnail

Actionable big data: How to bridge the gap between data scientists and engineers

CTOvision

Read Jonathan Salama explain why it is necessary to bridge the gap between data scientists and engineers to fully exploit big data on Venture Beat : The buzz around big data has created a widespread misconception: that its mere existence can provide a company with actionable insights and positive business outcomes. The reality is a bit […].

Big Data 101
article thumbnail

OpsRamp Adds Recommendation Engine to AIOps Platform

DevOps.com

OpsRamp added a recommendation engine to its artificial intelligence for IT operations (AIOps) platform that makes use of predictive analytics to suggest potential actions to either improve performance or avert downtime. The OpsRamp Winter 2020 Release also adds 19 cloud monitoring integrations for Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP), along […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

How To Create A Secure, Low-Cost IoT Network In 2020

CTOvision

Read Don Boxley explain how small and medium businesses can create a low-cost Internet of Things network on Forbes : The internet of things (IoT) has steadily been moving to center stage for the general population, as IoT devices mushroom throughout industries and increase their user applications. The momentum that IoT will gain in 2020 […].

IoT 95
article thumbnail

RSA Conference 2020: 5 key takeaways for security teams

TechBeacon

At this year's RSA Security Conference, product managers continued to tout machine learning (ML) and artificial intelligence (AI) as technologies that could detect compromises, find vulnerabilities, and respond to attacks.

article thumbnail

Palantir: An OODAcon 2020 Future Proof Sponsor

CTOvision

Palantir is a sponsor of Future Proof, our 2020 OODAcon. Thanks to sponsors like Palantir, we are able to bring our community together in an event focused on examining issues of high interest to decision-makers across multiple sectors of the economy and multiple domains of government to discuss issues of strategic concern. As a firm, […].

article thumbnail

How to Choose the Right Server for the Edge?

Dell EMC

Co-author: James Singer – Member Technical Staff, Server and Infrastructure Solutions Office of CTO, Dell EMC The importance of any edge decision starts and ends with data. Using the industry’s build on the historical “V’s” of data (velocity, volume and variety), we highlight the edge’s importance: The velocity, volume and variety of data requires validity to value within a volatility window.

How To 102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Financial sector leading the way on hybrid cloud

CTOvision

Financial services companies are benefitting hugely from embracing hybrid cloud platforms as the industry continues its digitial transformation journey, new research has found. Findings from Nutanix has found that the financial sector is outpacing all other industries in hybrid cloud deployment, with the majority of companies in the industry now on board with such platforms.

Cloud 95
article thumbnail

Modus Create Turns Nine

Modus Create

Whenever my co-founder Pat and I discuss Modus, we describe our company as a platform for success. We feel, as Modus Create hit its ninth birthday on March 1, 2020, that this new model has been proven successful. Whenever we talk about our vision for Modus to the wider team, we get many questions. Usually, these concern the “why”, “how”, and eventually “where” of Modus.

Journal 86
article thumbnail

BMW’s Increasing Investment in AI?-?Insights from an Interview with Sam Huang of BMW iVentures

CTOvision

Read Ronald Schmelzer’s article in Forbes showcasing an interview with Sam Huang of BMW iVentures. BMW iVentures focuses on investing in companies that are at the forefront of creating new and interesting technologies that meet existing business needs. Specifically, the venture fund focuses on investing in companies with technology that is directly or indirectly supportive […].

Meeting 94
article thumbnail

“Data Science Pioneers” Documentary Skyrockets to a Global Sensation

Dataiku

Dataiku’s compelling documentary, “Data Science Pioneers,” has been viewed by more than 6,000 people in over 40 countries globally. Read further for additional highlights from the film.

Film 83
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Whither Goest Thou, Enterprise Workloads?

IDC

Line of Business (LOB) applications or workloads determine the livelihood of enterprises and impact the success of enterprises directly. IDC tracks eighteen types of workloads across seven categories – Business Applications, Content and Collaboration, Data Management & Analytics, Engineering/ Technical, Application Development & Testing, IT Infrastructure, and Web Infrastructure.

article thumbnail

Ransomware Outlook for 2020

Arcserve

According to Cybercrime Magazine, an organization will fall victim to a ransomware attack every 11 seconds by the end of 2021. You know the threat. And, chances are you or someone you know has already dealt with a ransomware attack. But as we look ahead, what will the remainder of 2020 hold? Will ransomware attacks slow. Read more » The post Ransomware Outlook for 2020 appeared first on StorageCraft Technology Corporation.

article thumbnail

10 Reasons to Attend Trajectory Conference 2020

LaunchDarkly

TL;DR. Trajectory is back for year two, and it’s going to be astronomical! We are so excited to bring you some out-of-this-world content, celebrate in our Oakland community, and have some stellar conversations around better development and release practices as an industry. Need some reasons to attend? Here are ten. Learn from industry leaders on how to empower teams.

article thumbnail

Leveraging the Quantum Field: Turn Job Hopping Millennials into an Asset

thoughtLEADERS, LLC

Take a step back from your milliennial frustrations and understand how to leverage the entire Field to your advantage. Today’s post is by John Jay McKey, author of LEVERAGE THE FIELD FOR SUCCESS (CLICK HERE to get your copy). An executive might view the “job hopping” reputation of Millennials as a cause for frustration. Such a position sees the higher costs due to employee turnover and related training costs.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Encryption and Nonprofits

TechSoup

As nonprofits, we often handle sensitive information about those we serve. And in many cases, we handle data of vulnerable or at-risk populations, whether it's refugees, children, homeless individuals, or domestic violence survivors. We work in parts of the world where the safety of vulnerable individuals isn't guaranteed. It wouldn't be a stretch to say that sometimes people's lives depend on our data security.

article thumbnail

Connecting strategy and development with agile coach Dragana Hadzic

Gitprime

Agile coach Dragana Hadzic explains the critical need to align software development and strategy teams.

article thumbnail

Ask the Experts: How can we improve the security of the 2020 election?

Synopsys

What can people involved in elections do right now to improve the security of the 2020 U.S. presidential election? Here’s what some experts had to say. The post Ask the Experts: How can we improve the security of the 2020 election? appeared first on Software Integrity Blog.

article thumbnail

Quality is Job One When it Comes to the HITRUST CSF Assurance Program

Coalfire

The HITRUST CSF® remains an essential security and privacy controls framework that addresses the multitude of security, privacy, and regulatory challenges facing both public and private sector organizations. As framework adoption increases across all industries, maintaining integrity is crucial, and continuous improvement should always be top of mind with any endeavor.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Article: Q&A on the Book Compass for Agility

InfoQ Culture Methods

The book Compass for Agility by Leila Rao describes an approach to create change in complex organizations and realize business agility. The compass consists of five phases: Ideation, identification, intake, in action, and introspection. Iterating with this five-step approach can develop internal capability for adaptability and reinvention. By Ben Linders, Leila Rao.

Agile 58
article thumbnail

Public Sector Day at RSAC 2020: More Threats, Limited Resources

Tenable

Last week, thousands of security-minded professionals descended on downtown San Francisco for the annual RSA Conference. Monday, February 24, featured a Public Sector Day event, which kicked off the big week with a distinct government security focus. The 400-plus crowd of federal/state/local government officials, security specialists and other interested attendees were treated to a number of informative and instructive keynotes, breakout sessions, and panel presentations.

article thumbnail

Certified ScrumMaster (CSM) Training Workshop in Ottawa—May 13-14, 2020

Agile Pain Relief Notes from a Tool User

Agile Pain Relief presents a two-day Certified ScrumMaster Workshop in Ottawa—May 13-14, 2020 taught by certified Scrum Trainer Mark Levison.

SCRUM 64