Mon.Mar 04, 2019

article thumbnail

How is software developed at Amazon?

High Scalability

How is software developed at Amazon? Get a couple of prime pizzas delivered and watch this excellent interview with Ken Exner, GM of AWS Developer Tools. It's notable Ken is from the tools group, because progress in an industry is almost always made possible by the development of better tools. The key themes from the talk: decomposition, automation, and organize around the customer.

article thumbnail

7 Talks to Add to Your Schedule at DevNexus 2019

OverOps

It’s hot, it’s relevant, and it’s the second largest Java conference in the nation. It’s DevNexus, the conference by developers for developers. Hosted this year in the bustling hub of Atlanta from March 6-8, this is where developers come to see what others are developing, learn about the latest technologies and find out what’s coming down the pike. This sold out event has it all: It’s interactive, it’s fun and developers love it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Full-Time Employment in the Age of Automation

DevOps.com

Back in 1930, the economist John Maynard Keynes wrote a short essay, “Economic Possibilities for our Grandchildren,” in which he predicted that in a hundred years the 15-hour work week will be commonplace. Keynes made this assertion based on two factors: first, the increase in capital due to extraordinary yields from the compound interest that […].

article thumbnail

Instill Confidence in Employees

Career Advancement

“Trust is a core currency of any relationship. Sometimes our need to control and micromanage everything erodes our confidence in ourselves and others. The truth: People are much more capable than we think. A hearty dose of trust is often what’s needed to unlock the magic. Go ahead, have faith.”. ~Kris Carr~. Client Gerald asks: Some of the employees I supervise really seem to self-sabotage at work a lot.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Zero Downtime Jenkins Continuous Deployment with Terraform on AWS

Toptal

When your app’s next iteration is ready to deploy, you have two choices: either stop the entire application and deploy the new version manually every time or build an automated zero downtime CI/CD deployment pipeline once. In this article, Toptal Freelance DevOps Engineer Gaurav Kohli demonstrates the latter using the Jenkins-powered continuous deployment pipeline of a three-tier web application built in Node.js, deployed on AWS Cloud, and using Terraform as an infrastructure orchestrator.

AWS 109

More Trending

article thumbnail

Agile Retail: Using Scrum to out Amazon, Amazon

scruminc

Agile Retail: Using Scrum to out Amazon, Amazon. by Joe Justice. The dominance of online retailers like Amazon, Jet and, Zappos, has disrupted tradition brick and mortar retail companies far and wide. Payless, Gymboree and Victoria's Secret are just some of the well-known companies closing stores in 2019. This trend is accelerating. . So how do retail companies survive?

SCRUM 96
article thumbnail

IoT Future-Proofing for the Long Haul

DevOps.com

Think about this: The IoT application your DevOps team is developing right now, if successful at scale, will likely be the longest-living application in your shop. It may even outlive the tenure of many of your team members with your company. Is IoT future-proofing possible over a life cycle of 10 years or more? Yes, […]. The post IoT Future-Proofing for the Long Haul appeared first on DevOps.com.

IoT 102
article thumbnail

W3C approves WebAuthn as the web standard for password-free logins

CTOvision

The World Wide Web Consortium (W3C) today declared that the Web Authentication API (WebAuthn) is now an official web standard. First announced by the W3C and the FIDO Alliance in February 2016, WebAuthn is now an open standard for password-free logins on the web. It is supported by W3C contributors, including Airbnb, Alibaba, Apple, Google, […].

article thumbnail

Women as Ethical Hackers – Seize This Growing Career Opportunity

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Regarding Facebook’s cryptocurrency

CTOvision

If Bloomberg and the New York Times are to be believed, later this year Facebook will introduce a cryptocurrency which will allow WhatsApp users to send money instantly. Yes, that’s right: Facebook. Cryptocurrency. Earthquake! Revolution! The world is tilting on its axis! The end times are cometh! Except – um – what exactly are people going […].

85
article thumbnail

Akamai Extends Scope of DevOps Reach

DevOps.com

Akamai today moved to further extended the number of capabilities it exposes via its content delivery network (CDN) that are designed to appeal to DevOps teams. Those enhancements include HTTP/2 performance optimizations and the ability to automatically load font libraries, as well as providing access to “middle-mile” logs that will enable DevOps teams to more […].

DevOps 84
article thumbnail

IoT Future-Proofing for the Long Haul

CTOvision

Read Don Dingee’s article about how to future-proof Internet of Things connected devices on Dev Ops : Think about this: The IoT application your DevOps team is developing right now, if successful at scale, will likely be the longest-living application in your shop. It may even outlive the tenure of many of your team members […].

IoT 79
article thumbnail

Survey Finds Mixed Progress on DevSecOps

DevOps.com

A survey of 5,558 IT professionals published today by Sonatype in collaboration with CloudBees, Carnegie Mellon’s Software Engineering Institute, Signal Sciences, 9th Bit and Twistlock finds 27 percent of organizations have mature DevOps practices in place, while another 48 percent are still working on improving them. Despite the DevOps works that remains to be accomplished, […].

Survey 77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What Do Wyoming’s 13 New Blockchain Laws Mean?

CTOvision

Wyoming has now enacted a total of 13 blockchain-enabling laws, making it the only US state to provide a comprehensive, welcoming legal framework that enables blockchain technology to flourish, both for individuals and companies. These laws enable innovation and creativity and are meant to bring capital, jobs, and revenue into Wyoming. Law and technology are discrete […].

article thumbnail

DevOps Chat: AppSec and DevSecOps with Contrast Security’s Jeff Williams

DevOps.com

I have known of Jeff Williams in the security industry for more than several years. He is a well-respected thought leader in AppSec and OWASP. I finally got a chance to catch up with Jeff and talk with him about Contrast Security, the company he co-founded and how it is helping. In this DevOps Chat, […]. The post DevOps Chat: AppSec and DevSecOps with Contrast Security’s Jeff Williams appeared first on DevOps.com.

DevOps 68
article thumbnail

5G is still a little magic, a little smoke and mirrors

CTOvision

Read why Shara Tibken says that 5G is still smokes and mirrors on Cnet : The scene on the big display in front of me looks like something from Grey’s Anatomy. A team of doctors and nurses lean over a patient who’s draped with a white cloth, while a TV screen beside the operating table […].

77
article thumbnail

The State of DevSecOps in 2019

Perficient

In recent years there has been significant progress integrating security into software development lifecycles. However, software security is necessarily dynamic and evolving, which inevitably results in some fallbacks, too. The good news is that, as with any challenge, there are some positive lessons that can give us foresight into where DevSecOps.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Devs are the key to app sec: Make training a priority

TechBeacon

In a digital world where we're constantly bombarded by distractions, quality time spent focused on the task at hand is hard to come by. Errors are a common part of life, especially if you're distracted or lack some of the key skills for delivering a task.

article thumbnail

Securing Serverless Functions with Aqua

Aqua Security

Serverless is generating significant interest and hype, backed up by real-world adoption, and creating a need for better security controls. I've been working with our customers to create the right approach and tooling to protect their FaaS environments ,and from this research, given the extremely short duration of function execution (in many cases, sub-second) and their external triggering, adopted the approach of focusing on mitigating risk in serverless using preventative measures that precede

article thumbnail

A Conversation with Flexagon’s Intern

Flexagon

At Flexagon, we have internship opportunities year-round. While our summer internship pulls students from around the country, our school-year internships draw from local colleges, looking for students going for degrees in Computer Science, Math, and Engineering. We pride ourselves on bringing on interns to do more than the low-level work so many interns are typically.

article thumbnail

March Intro | Roadmap to Securing Your Infrastructure

Linux Academy

March is upon us as we continue with our roadmap to securing your infrastructure. Hopefully, February’s posts reignited your passion for security. This month, we’ll discuss some topics that are typically overlooked or taken for granted. We often wear many hats in our jobs and tend to get busy, but we must stay vigilant in our efforts. In the information security industry, one thing we cannot do is become stagnant.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Avoiding Human Error When Building Artificial Intelligence

DataRobot

Can You Trust That Your AI Was Built Correctly? It has been more than three years since the last time I competed in a data science competition, and yet there’s one memory about that competition that remains vivid in my mind. I had spent a busy week at my computer coding up a cool-looking solution, and I was ready to submit my first entry to the competition.

article thumbnail

Aqua Security Introduces Industry’s First Serverless Function Assurance for Securing Serverless Environments

DevOps.com

Aqua 4.0 release also tightens Linux host protection and compliance on the heels of recent vulnerability disclosures Boston, MA – 4 March 2019 – Aqua Security, the leading platform provider for securing container-based and cloud native applications, announced today the availability of version 4.0 of the Aqua cloud native security platform, introducing new security and […].

article thumbnail

Get to Know ARIS Connect

Beyond B2B

Sometimes you think you know about something really, really well, only to find out that it has changed. This could be the case with ARIS Connect; its newer qualities might be hiding in plain sight. So I thought I’d reintroduce you!

63
article thumbnail

Is Security Token Offering Going to Replace Other Fund Raising Methods?

Daffodil Software

Before the concept of crowdfunding, the only way for the early stage startups and founders with new ideas was to approach angel investors to get seed funding or go for VC (Venture Capital). On the other hand, established businesses opt for IPO (Initial Public Offering) to raise a huge amount of capital.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Can't-Miss Sessions at the Nonprofit Technology Conference

TechSoup

Hosted by NTEN, the Nonprofit Technology Conference (NTC) is the premier annual event for nonprofit techies. It's where our sector gathers to keep on top of emerging trends and best practices. So of course TechSoup will be there, along with 2,000 of our fellow geeks. We are sending several of our best representatives to host sessions, listen to the needs of nonprofits, and answer your TechSoup questions.

article thumbnail

A Better RSA Conference

Symantec

Assemble a hygiene kit for someone in need, send $100 to Year Up, and make a difference by visiting Symantec’s CR Corner

article thumbnail

Is Your Data Scientist Team Contributing to Your Company’s ROI?

Teradata

Find out how data scientists can contribute to solving real-life business problems, as well as how Teradata Vantage can help data scientists enable a better ROI for their company.

Data 49