Mon.Jan 28, 2019

article thumbnail

Rethinking informed consent

O'Reilly Media - Ideas

Consent is the first step toward the ethical use of data, but it's not the last. Informed consent is part of the bedrock of data ethics. DJ Patil, Hilary Mason, and I have written about it , as have many others. It's rightfully part of every code of data ethics I've seen. But I have to admit misgivings—not so much about the need for consent, but about what it means.

article thumbnail

Why You Should Adopt the Internet of Things

CTOvision

Read why Charles Darling says that we should embrace the Internet of Thing connected devices with open arms on IOT Evolution World : You approach your front door, you tap the screen of your smartphone and hear the door unlock. When you walk into your house, your home is illuminated by your favorite shade of blue. […].

Internet 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Challenges and Tips for Taking Legacy Systems to the Cloud

DevOps.com

Normalization of infrastructure through open source technologies is one way to make the move to the cloud an easier process for organizations. For many modern companies, growth often means growing through acquisition. As organizations become larger, it often makes sense to acquire existing companies who are already creating the solutions they need than try to […].

System 107
article thumbnail

Blockchain can help enterprises improve multi-cloud network management

CTOvision

A study last year reported that 81 percent of enterprises now have a multi-cloud strategy, and a majority have a hybrid of private and public clouds. That’s a significant number of companies struggling to manage complex existing networks and multiple clouds as well as the associated security strains. Blockchain technology may still be the new […].

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

SauceCon 2019 Speaker Profile: Melissa Benua

DevOps.com

This is the second in a series of articles highlighting speakers at SauceCon 2019. SauceCon brings together the global community of Sauce Labs users and continuous testing experts to learn from each other and level up their automated testing and continuous delivery skills. This year’s event will be held April 23-25 in Austin, Texas. SauceCon […].

More Trending

article thumbnail

A Hybrid Cloud Approach from FraudGuard.io that Handles 50M Requests a Day

High Scalability

div align="center">. This is a guest post from Ryan Averill at FraudGuard.io. At FraudGuard.io we are a team of just a few developers; all working with our customers to try to make their applications as safe as possible. We have been working on FraudGuard for about 3 years and we’ve had paying customers for more than 2 years now. The main idea behind FraudGuard is for us to get attacked so you don’t have to.

Cloud 94
article thumbnail

What is 5G, and what can we expect from it?

CTOvision

The world’s first 5G networks switch on this year, promising faster data speeds and lower latency to consumers. In addition, 5G opens up avenues to new industrial applications and is a critical element to build widely connected “smart cities.” 5G is the next step to provide better networking in our increasingly technological world. Around the world, […].

Network 83
article thumbnail

Feel the Fear

Edge Perspectives

I perceive that fear is becoming pervasive and increasingly intense around the world. When I share this perception with others, I often get the response: “What fear? I don’t know many people who are afraid.”. That’s part of the problem. The fear is often not visible unless we know where and how to look for it. Why is that the case? Emotions are suspect As I’ve written elsewhere , our institutions are organized on a scalable efficiency model that views emotions as deeply suspect.

article thumbnail

China created a unicorn every 3.8 days in 2018

CTOvision

China fostered 97 unicorns – start-ups valued at least US$1 billion – last year, despite an economic slowdown and a prolonged trade war with the United States, according to the Shanghai-based research firm Hurun Report. The world’s second-largest economy had a total of 186 unicorn start-ups last year, with a combined valuation of more than 5 […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Effectively Manage Construction Projects With a Large Workforce

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

Six IoT predictions for 2019

CTOvision

Read Fredric Paul make six Internet of Things predictions for 2019 on Network World : This time of year, it can seem like the world is swimming in predictions for the new year, and the Internet of Things (IoT) is no exception. In fact, in fast-evolving areas like IoT, multitudes of trends and opportunities and […].

IoT 82
article thumbnail

What is BDD and What Does it Mean for Testers?

Abstracta - Software Development

A software development strategy that makes sense for both your business team and tech team Behavior Driven Development (BDD), as its name indicates, is not a testing technique, but rather a development strategy (as well as TDD, which is test driven development). What it proposes. The post What is BDD and What Does it Mean for Testers? appeared first on Abstracta Software Testing Services.

article thumbnail

Roadmap to Securing Your Infrastructure: Intro

Linux Academy

Holy cow — it’s 2019! This is the year we take information security to the next level. What is this “next level,” you ask? The next level is taking a journey with me throughout 2019 to discuss many different ways you can increase the security of your infrastructure. Each week, we’ll be posting about options to secure your infrastructure, and once monthly we’ll be posting a video to go along with one of the months topics.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Panning for gold in your data stream

Enterprise.nxt

Analytics engines can be powerful tools when you have a mountain of data and you know what valuable content you want to get out of it. But what happens when you don’t know what you’re looking for?

Data 65
article thumbnail

The Rise OF The App Economy, Thanks To E-Commerce

KitelyTech

It’s reported that in five years’ time, the app economy will be worth a whopping $6.3 trillion. More and more people are spending time and money on apps. While, on average, the number of apps people download isn’t trending up, global user-ship is expected to double to 6.3 billion people in a five-year period, while the time spent on an app will more than double.

article thumbnail

The Mega-Guide to Trends in 2019

J.D. Meier's Blog

The Mega-Guide to Trends in 2019 is here: Trends in 2019. Each year, I like to take a balcony view of what’s going on around the world in terms of consumers, technology, and more. I find that if I take the time to really take a look around, that I will be surprised less and disrupt more. Taking a broad view of the key trends also helps me innovate, especially as I learn how the combo of technologies are being used in new ways to create and capture value.

Trends 63
article thumbnail

Why Apparel Brands Should Implement a Next-Generation ERP Solution Today – and How to Achieve It, Part 2

Capgemini

This three-part blog series explores the advantages of a modern ERP solution for apparel companies. Part 1 examined industry trends. In Part 2, we describe the features of SAP S/4HANA ® Fashion. A version of the series originally appeared in Apparel Magazine. SAP has introduced an industry-specific variant of its SAP S/4HANA next-generation ERP software: SAP S/4HANA for fashion and vertical business and SAP S/4HANA Retail for merchandise management – or, as we refer to them collectively, SAP S/

Apparel 60
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AI reveals 2018’s biggest cyber-threats: Part one — the rise of nontraditional IT

Darktrace

In the first installment of a two-part series, Darktrace’s Max Heinemeyer reviews the IoT, Cloud, and SaaS trends of last year and forecasts what he expects to see in 2019.

IoT 58
article thumbnail

AI & Accuracy: How to Keep Systems Honest

Perficient

Earlier this year, Stanford and Google found that a machine learning agent designed to transform aerial images into street maps and back was cheating. Turns out it was hiding information it would later need in an almost undetectable high-frequency signal that developers didn't immediately catch, and was only suspected because the results seemed a.

System 56
article thumbnail

Expanding the Conversation about Confidentiality and Data Privacy

Symantec

Security practitioners face new questions about whether traditional approaches to access control are enough to meet heightened demands around privacy

Data 61
article thumbnail

Why Apparel Brands Should Implement a Next-Generation ERP Solution Today – and How to Achieve It, Part 3

Capgemini

This three-part blog series explores the advantages of a modern ERP solution for apparel companies. Part 1 examined industry trends. Part 2 described the features of SAP S/4HANA ® Fashion. In Part 3, we offer guidance on ERP implementation. A version of the series originally appeared in Apparel Magazine. SAP’s new ERP suite for the apparel industry, SAP S/4HANA Fashion, can propel fashion brands into the digital future.

Apparel 53
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Write a Product Requirements Document (PRD)

VironIT

Whether you create a mobile app, a game or a website, give it a little time and you may find your project looking like a mess. It started out simple but evolved into something completely different. But what exactly has happened? You have lost clarity. To ditch the chaos and give a clear outline to […].

How To 49
article thumbnail

Think Privacy. Think Security

Symantec

Data breaches compromise privacy, security and economic well-being.

Data 79
article thumbnail

Angular Components - Best Practices (Part 1)

Trigent

Angular is a popular framework for creating front-ends for web and mobile applications. Components are an important part of any Angular application.

Mobile 53
article thumbnail

You Are the Author of Your Life Story

Symantec

Liza D. shares how challenging circumstances as a child led her to view the world with a growth mindset as an adult, including teaching others to do the same.

51
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

It Isn't Home Runs! More At Bats = More RBIs

Mills Scofield

Hank Aaron ~ All time MLB RBI Hitter (2,297) Picture Credit USBData. Opening day is March 28th. The media, fans, and managers will be focused on key stats like on-base and slugging percentages, defensive runs saved, walks/hits per inning pitched and ERA … and of course Grand Slams and Home-Runs! Guess what, companies love those big sexy stats too - especially for innovation.

article thumbnail

Minimize Your Chance of Network Disruption: Three Questions You Need to Ask

Zayo

If you manage a network of any scale, you know that network disruptions come with the territory. Whether it’s an errant construction crew, animals chewing through lines, weather issues or hardware/software glitches, there are many potential sources of trouble. At Zayo, our top priority is to keep our customers’ data safe, their network secure and their businesses connected.

Network 45
article thumbnail

Leading After the Shutdown

Next Level Blog

Last week I flew from Los Angeles to Baltimore and back and, like just about every other American who flies, was so grateful for the professionalism of the TSA agents and air traffic controllers whose job it is to keep travelers safe and alive. And, of course, last week they were in their fifth week of doing their vital jobs without pay because of the government shutdown.