Wed.Nov 20, 2019

article thumbnail

5 guerrilla tactics for a DevOps-resistant organization

TechBeacon

So your development team wants to start using DevOps, but the ops team has dug in its heels, the infrastructure team is throwing up roadblocks left and right, and management is oblivious to the whole disagreement?

DevOps 98
article thumbnail

Great Leaders Give Direction Not Directions

Next Level Blog

A few weeks ago, I opened a post with a story about one of my favorite questions for leaders, “What is it that only you can do?” Since then, I’ve asked that question again in one of my last keynotes of the year and got an answer back that was so clear and succinct that I just had to share it with you. The answer I received back from an executive in the room is actually the title of this post, “Great leaders give direction, not directions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Introducing ksqlDB

Confluent

Today marks a new release of KSQL, one so significant that we’re giving it a new name: ksqlDB. Like KSQL, ksqlDB remains freely available and community licensed, and you can […].

article thumbnail

The Phoenicorn Project

DevOps.com

The Unicorn Project is the sequel to the ground-breaking book The Phoenix Project. Most people know the story about Bill the IT manager at Parts Unlimited, who is tasked with fixing a derailed IT project or having his IT department outsourced. The Unicorn Project takes it a step further, with developer and architect Maxine in […]. The post The Phoenicorn Project appeared first on DevOps.com.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

7 Arguments Against DevOps

Dzone - DevOps

Here are some of the arguments (or excuses) against DevOps. Is DevOps a Bad Idea? Countless articles and blogs boast the many benefits of automating changes and processes through DevOps. However, adopting automation and full Continuous Integration and Continuous Delivery can be an intimidating transition for organizations. Some IT leaders are hesitant to pull the trigger and make the switch.

DevOps 96

More Trending

article thumbnail

OODA and Bastille Webinar: Finding phones, wearables and gadgets through Cellular, Bluetooth, Bluetooth Low Energy and Wi-Fi device detection

CTOvision

You can watch this webinar on demand at: [link] The webinar features insights on how to find phones, wearables and gadgets through Cellular, Bluetooth, Bluetooth Low Energy and Wi-Fi device detection. In the webinar Dr. Bob Baxley, CTO at Bastille and Bob Gourley, co-founder of OODA LLC and former CTO at the Defense Intelligence Agency […].

Energy 62
article thumbnail

DevOps 2020: The Top Nine Trends to Watch Out For

Dzone - DevOps

Here's what the future of DevOps holds. Software development has come a long way. The culture of DevOps is continuously evolving and refining itself. From the waterfall method of yesteryears through the eventual upgrade to agile delivery to the revolutionary culture shift called DevOps, the picture is changing every day. For example, Kubernetes, which is one of the helpers of DevOps, has improved itself remarkably in recent years when the option of adding a multi-master cluster was incorporated

DevOps 67
article thumbnail

What’s in Store for Retail in 2020?

Beyond B2B

In 2020, retailers will look to embrace new partners/channels, the Internet of Things and other critical technologies, as the industry continues to get the sharp end of the digital-disruption stick.

Retail 67
article thumbnail

Staffers gone bad or bad decisions — which should you worry about more?

DXC

Insider threats have been in the news quite a bit recently, but insider threats don’t always present themselves as a staffer who has gone bad and is stealing and selling secrets to competitors or other nations. While that does happen, a good portion of the insider threat manifests in insiders who make bad decisions with how […].

60
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Securing Google Cloud Run with Prisma Cloud

Palo Alto Networks

Organizations can be challenged by the complexity of Kubernetes and its potentially large attack surface. As Kubernetes adoption increases, enterprise architects and security professionals are looking for new compute offerings to better power this modern application, while also offering a seamless developer experience. . Earlier in 2019, Google Cloud announced Cloud Run , a new serverless platform designed to run containers in an event-driven way.

article thumbnail

Thinking in different innovation horizons How to secure the existing business without missing out on future opportunities

CEO Insider

There is not a day the pressure of making the numbers isn’t present. Each day sometimes feels like an endless fight. Customers have growing needs and no sooner than these are met, new needs emerge. Securing the existing business seems like a relentless race against time and ever-present competitors. In addition to taking care of […].

article thumbnail

A HIPAA Compliance Checklist for 2020

AlienVault

Five steps to ensuring the protection of patient data and ongoing risk management. Maintaining security and compliance with HIPAA, the Health Insurance Portability and Accountability Act, is growing ever more challenging. The networks that house protected health information (PHI or ePHI) are becoming larger and more complex — especially as organizations move data to the cloud.

article thumbnail

What’s Driving Where You Run Your IT Applications and Services

Nutanix

Supply chain functions are similar to IT applications, workloads, and services—each with their own set of attributes. These attributes can help determine where to place and run these IT applications.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

RPA Journey : 4 Stages to Successful RPA Implementation

Daffodil Software

Quite similar to the software development cycle, robotic process automation (RPA) is a strategic approach to automation. It requires thorough planning, defining timelines, managing resources, understanding compliances, and a lot more. That is why, RPA is considered as a journey, which comprises of 4 major steps for its successful implementation.

article thumbnail

Employee Benefits: What You Should Know As An Employer

Strategy Driven

As an employer, one of the smartest things you can do is offer employee benefits in the workplace. Some employee benefits are pretty self explanatory and should come as a standard – such as water, tea, and coffee. Your team shouldn’t have to bring in their own basic refreshments. However, you should offer more than the bare minimum. You want your workplace to be set apart from others, and your benefits to be a little competitive at least.

article thumbnail

What’s Driving Where You Run Your IT Applications and Services

Nutanix

Supply chain functions are similar to IT applications, workloads, and services—each with their own set of attributes. These attributes can help determine where to place and run these IT applications.

article thumbnail

Keeping Your Customers Happy Throughout The Festive Period

Strategy Driven

Running an online business is a fantastic way to earn a living. Online shopping remains popular and the coming weeks are likely to be your busiest of the year. The festive period can be make or break for your business, as how you cope with the extra demand can have a significant impact on customers’ perceptions. Word of mouth travels quickly, so the service you provide at this time should make a great impression.

Media 20
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Embrace Automation to Pull Security Teams Together

Firemon

If you’ve ever attended a regatta, it’s impossible not to notice how synchronized the boat crew is — everyone knows their exact responsibilities that will produce the greatest strengths in the total racing effort. But when it comes to security in many organizations, there’s much less unity and little automation of security controls. FireMon’s 2019 State of the Firewall report shows there’s much fragmentation when it comes to managing security.

article thumbnail

Departmental Culture Tribes Can Be Great Motivators

Strategy Driven

Departmental cultures are a big thing and always have been. The strange thing is, they don’t often get talked about openly among leaders in public. However, they are talked about and encouraged behind closed doors. It’s kind of like the armed forces. The best generals all throughout history, have fanned the flames of internal rivalries in their units.

Culture 20
article thumbnail

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

CTOvision

The security research team at Checkmarx has made something of a habit of uncovering alarming vulnerabilities, with past disclosures covering Amazon’s Alexa and Tinder. However, a discovery of vulnerabilities affecting Google and Samsung smartphones, with the potential to impact hundreds of millions of Android users, is the biggest to date. What did the researchers discover?

article thumbnail

9 Tips to Maximize Your Giving Tuesday

TechSoup

Thanksgiving, Black Friday, Cyber Monday … Giving Tuesday! That's how annual traditions are created, and this one is apparently here to stay. Giving Tuesday has grown into a global day of giving. It is a unique opportunity for your organization to engage with your donors, supporters, and volunteers — and raise some money!

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Why Salesforce?

DevOps.com

Over the past 20 years, Salesforce has become the fastest growing enterprise software platform, and a market leader in sales, service, marketing, integration and custom application development among other areas. Although there are many reasons why a company might adopt or consider using Salesforce, the overriding value proposition is that it provides tons of capabilities […].

article thumbnail

Getting Started with GraphQL

David Walsh

GraphQL was developed by Facebook in 2012 to power up its mobile apps. Since open-sourcing GraphQL specification in 2015, it gained a lot of popularity and is now used by many development teams, including giants like GitHub, Twitter or Airbnb. Why so? And what exactly is a GraphQL? Let's take a look. What's GraphQL. GraphQL is a query language for APIs and a runtime for fulfilling those queries with your existing data.

Mobile 19
article thumbnail

Macy’s Suffers Data Breach by Magecart Cybercriminals

CTOvision

The department store Macy’s is warning that web skimmer malware was discovered on Macys.com collecting customers’ payment card information. The attack has been linked to Magecart, a notorious umbrella group made up of various cybercriminal affiliates that is known for injecting payment card skimmers into ecommerce websites. According to a data breach notice sent to customers, […].

article thumbnail

DevSecOps with Trivy and GitHub Actions

Aqua Security

The premise of DevSecOps is that in the Software Development Life Cycle (SDLC), each member is responsible for security. This unifies the operations and development teams in terms of security operations. DevSecOps’ goal is to add security to each step of the development process by integrating security controls and processes as early as possible in the DevOps process.

SDLC 18
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

DevOps Institute Announces ‘Global SKILup Day’ Agenda For December 10

DevOps.com

New speakers confirmed to lead ‘how-to’ DevOps sessions on SRE, BizDevOps, Agile service management, soft skills and much more at the world’s first continuous learning virtual upskilling event BOCA RATON, Fla. – November 20, 2019 – DevOps Institute, a global member-based association for advancing the human elements of DevOps, has finalized the agenda for Global […].

DevOps 17
article thumbnail

4 Ways to Minimize the Risk of a Third-Party Data Breach

CTOvision

Read Brian Thomas list four ways in which you can minimize the risks of a third-party data breach on Bitsight Blog : Today, 59% of data breaches originate with third-party vendors. And, as globalization brings more interconnected supply chains, that number is anticipated to grow. Yet, even with vigorous security controls in place, the vast majority […].

Data 15
article thumbnail

DevOps Chats: InfluxDB Cloud 2.0 Managed Service for Time Series Data

DevOps.com

We can’t seem to generate enough data. And as they say, you haven’t seen anything yet! Cloud-based managed services are a natural solution to ingest, store and access large amounts of data from a variety of sources across private and cloud locations. An enterprise solution hosted in the cloud is good, but a developer-friendly, API-based […]. The post DevOps Chats: InfluxDB Cloud 2.0 Managed Service for Time Series Data appeared first on DevOps.com.

DevOps 15