Wed.Mar 07, 2018

article thumbnail

Defining responsible data practices: A community-driven approach

O'Reilly Media - Data

Natalie Evans Harris discusses the Community Principles on Ethical Data Practices (CPEDP), a code of ethics for data collection, sharing, and utilization. Continue reading Defining responsible data practices: A community-driven approach.

Data 112
article thumbnail

Follow Rudolf and the Learning Angular newsletter On Twitter and Facebook

NeverFriday

I have been making more time for conversations on Twitter and Facebook, feel free to reach out to talk about leadership in the tech industry, software or web development, ecommerce and SEO and digital marketing. Check out the NeverFriday Facebook page. If you’re interested in team training in Angular, Elm or Ruby on Rails you can send me a message on Facebook Messenger through the NeverFriday page.

eCommerce 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Highlights from the Strata Data Conference in San Jose 2018

O'Reilly Media - Data

Watch highlights covering machine learning, business intelligence, data privacy, and more. From the Strata Data Conference in San Jose 2018. Experts from across the data world came together in San Jose, California for the Strata Data Conference. Below you'll find links to highlights from the event. Hilary Mason looks at practical applications for intelligent machines and outlines the tools and processes needed to implement machine learning successfully.

article thumbnail

How Well Does Agile Function for Large Organizations

SCRUMstudy

The success of today’s organizations depends on how well they can adapt to the hurricane of changes sweeping across their industry. How can they do this? Many organizations are looking to Agile as the answer. In spite of its popularity, Agile has not been warmly embraced by large organizations. One of the obvious reasons for this is that large organizations do not undertake major changes unless absolutely necessary.

Agile 85
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Privacy in the age of machine learning

O'Reilly Media - Data

Ben Lorica explores emerging security best practices for business intelligence, machine learning, and mobile computing products. Continue reading Privacy in the age of machine learning.

More Trending

article thumbnail

Merging human and machine learning for everyday solutions

O'Reilly Media - Data

Li Fan shows how Pinterest is using AI to predict what’s in an image, what a user wants, and what they’ll want next. Continue reading Merging human and machine learning for everyday solutions.

article thumbnail

The Death of Moore’s Law.  The Birth of Software-Defined Servers.

TidalScale

It has been over 50 years since Gordon Moore saw that transistor density doubles every two years. Over the decades, the interpretation of “Moore’s Law” has evolved to represent that the performance of microprocessors, and computers in general, is doubling every 18 months.

article thumbnail

Operationalizing machine learning

O'Reilly Media - Data

Dinesh Nirmal explains how real-world machine learning reveals assumptions embedded in business processes that cause expensive misunderstandings. Continue reading Operationalizing machine learning.

article thumbnail

Internet-connected Product Bans: How Do You Avoid Future Issues?

CTOvision

Recent actions by DHS signal a closer monitoring of technology being purchased by the U.S. government, especially technology created and or controlled by foreign governments. In some cases Internet-connected products controlled by foreign governments have already been banned, and there are indications more may be coming. For cybersecurity personnel the product bans will require a […].

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

To a hammer, everything is a nail: Choosing the right tool for your business problems

O'Reilly Media - Data

Tobias Ternstrom explains why you should objectively evaluate the problem you're trying to solve before choosing the tool to fix it. Continue reading To a hammer, everything is a nail: Choosing the right tool for your business problems.

Tools 101
article thumbnail

Introduction to microservices for IBM i

Zend

While there is no standard or formal definition of the term “microservice,” one can essentially view microservices as a method of developing software systems as a suite of independently deployable, small, modular services that work together. Each service performs a specific process and communicates via a well-defined, typically lightweight mechanism to satisfy a particular b­­­usiness […].

article thumbnail

Data science in the cloud

O'Reilly Media - Data

Alex Smola shares lessons learned from AWS SageMaker, an integrated framework for handling all stages of analysis. Continue reading Data science in the cloud.

Cloud 101
article thumbnail

How malware abused Sixt.com and Breitling.com for covert Command & Control communication

Darktrace

Last month Darktrace identified an advanced malware infection on a customer’s device, which used a sophisticated Command & Control (C2) channel to communicate with the attacker.

Malware 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Crisis Text Line data usage and insights

O'Reilly Media - Data

Nancy Lublin and Bob Filbin explore findings from crisis data. Continue reading Crisis Text Line data usage and insights.

Data 101
article thumbnail

Industry 4.0: What Could Possibly Go Wrong?

Kentik

This series of blog posts will examine many aspects of ensuring application performance in cloud-scale enterprise WANs utilizing a hybrid of public and private networks. However, in this post and the next, I’d like to take a closer look at the unique challenges of managing network performance inside the new generation of hyperscale data centers supporting the delivery of cloud-scale applications.

article thumbnail

The Cloud Center of Excellence: The Secret Ingredient Your Enterprise is Missing

Blue Sentry

The post The Cloud Center of Excellence: The Secret Ingredient Your Enterprise is Missing appeared first on Blue Sentry.

article thumbnail

Nutanix Technical Account Managers: Enterprise Cloud Value Drivers

Nutanix

Businesses deploying Enterprise Cloud can benefit from a strategy for maximizing the ROI on their investment: every dollar spent needs to drive genuine operational efficiencies.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.