Tue.Apr 09, 2019

article thumbnail

How To Find Your Balance On The Leadership Seesaw

Terry Starbucker

Leaders are constantly riding a leadership seesaw, swaying back and forth between seeming contradictions that hover over our daily decisions and interactions. How we deal with these contradictions and find our balance on the seesaw can be the difference between good and great. There are six in particular that require a delicate balancing act on the seesaw: 1) Process vs.

article thumbnail

Automating Machine Learning for Time Series – Navigating in the Valley of the Blind

DataRobot

Guest post by Dr. Chris Marshall, Associate Vice President, Big Data and Analytics, Cognitive Computing, IDC Asia/Pacific.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Other implementations for domain-oriented observability

Martin Fowler

Pete completes his discussion of domain-oriented observability by comparing domain probes to using events and aspect-oriented programming. more….

article thumbnail

Monitoring AWS EKS audit logs with Falco

Xebia

Background AWS recently announced the possibility to send control plane logs from their managed Kubernetes service (EKS) to CloudWatch. Amongst those logs are the API server audit events, which provide an important security trail regarding interactions with your EKS cluster Sysdig Falco is an open-source CNCF project that is specifically designed to monitor the behavior […].

AWS 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Partners in Design – A Guide to Client Empathy

Toptal

Being empathetic is not a selective practice. Designers know how to use empathy to uncover the behaviors and needs of a user. Those same methods and techniques can be used in client relationships.

How To 108

More Trending

article thumbnail

Angular Components 101 — an Overview

Toptal

While components have been available in Angular since the beginning, they’re still easy to mess up with common mistakes like people not using them at all, creating components instead of attribute directives, and more. In this article, Toptal Freelance JavaScript Developer Valters Valdersteins differentiates the correct and incorrect ways to use Angular components and illustrates them with examples.

Examples 104
article thumbnail

Announcing Confluent Cloud for Apache Kafka as a Native Service on Google Cloud Platform

Confluent

I’m excited to announce that we’re partnering with Google Cloud to make Confluent Cloud, our fully managed offering of Apache Kafka ® , available as a native offering on Google Cloud Platform (GCP). This means you will have the ability to use Confluent Cloud’s managed Apache Kafka service with familiar Google tools and processes, including integration into the Google Cloud Console and GCP Marketplace to provide a seamless sign-up experience, and integrated billing and first-line support provided

article thumbnail

How to Make the Most of Tech Conferences and Meetups

UruIT

Tips to have productive experiences in tech conferences and similar events. Tech and professional communities provide great value to developers. In Medellín, Colombia, there’s a large number of these communities with different approaches but all are very well-received. Some examples are Medellín JS, Python Medellín, MDE.Net, Robótica Medellín, among many others.

article thumbnail

Two in Three Hotel Websites Leak Guest Booking Details and Allow Access to Personal Data

Symantec

Hospitality services’ websites may leak your booking details, allowing others to view your personal data or even cancel your reservation.

Hotels 112
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Google Revamps Hybrid Cloud Strategy

DevOps.com

At the Google Cloud Next 2019 conference, Google announced it will make available cloud services based on Kubernetes under the brand name Anthos on its own cloud and on-premises platforms, as well as on third-party cloud services. such as Amazon Web Services (AWS) and Microsoft Azure. Google also announced a tool dubbed Anthos Migrate that […].

Strategy 100
article thumbnail

Sometimes Threat Hunting Isn’t Enough

Symantec

Proactively searching for threats is critical, but organizations trying to stop advanced threats need to understand that threat hunting is only one piece of the protection profile

article thumbnail

Epic DevSecOps fails: 6 ways to fail the right way

TechBeacon

No one likes to fail; we'd much rather succeed than not. Failure, though, is part of the human condition—and, as a new book says, maybe we're better off because we can't avoid it, wrote Mark Miller, editor of a new 180-page book from DevSecOps Days Press titled Epic Failures in DevSecOps.

DevOps 95
article thumbnail

xMatters Looks to Meld DevOps and ITIL

DevOps.com

With the launch today of a flow design tool from xMatters, the divide between DevOps and ITIL-based approaches to managing IT is narrowing. xMatters Flow Design is a drag-and-drop graphical tool that either developers or IT operation teams can employ to create incident management workflows on top of xMatters incident management software. Doug Peete, chief […].

DevOps 98
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to recruit for your key DevOps roles

TechBeacon

Around the time that Alex Bonassera decided to move on to another DevOps position, he saw a job posting to run a systems engineering team at CarGurus, a research and shopping website for new and used cars.

DevOps 94
article thumbnail

The problem with AI ethics

CTOvision

Many AI critics say big tech companies are formulating AI ethics boards and principles as a strategy for avoiding the possibility of government regulation. Read more on The Verge : Last week, Google announced that it is creating a new external ethics board to guide its “responsible development of AI.” On the face of it, […].

article thumbnail

Flutter Tutorial: How to Create Your First Flutter App

Toptal

Google’s Flutter mobile SDK only recently made it to version 1.0, but it is already catching up with React Native in terms of market share. Flutter is also used to develop apps for Google’s upcoming Fuchsia OS. In this article, Toptal Java Developer Nemanja Stosic demonstrates how to create a simple messaging app using Flutter and Firebase.

How To 89
article thumbnail

The Google AI Ethics Board With Actual Power Is Still Around

CTOvision

Two weeks ago, Google established an external panel of experts to review thorny ethical issues related to artificial intelligence. It quickly imploded. After a staff revolt over the panel’s members, the company disbanded the panel on Thursday afternoon. Its members never even got the chance to meet. The episode illustrates the difficulty Google is having as […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

TypeFox Ties Cloud-Based IDE to GitHub

DevOps.com

TypeFox has launched a GitPod.io service that melds the integrated development environment (IDE) based in the cloud from TypeFox with the open source GitHub repository. Sven Efftinge, co-founder of TypeFox, said this level of integration will make it easier for developers to navigate multiple projects from which they pull code from GitHub into an Eclipse-based […].

Cloud 90
article thumbnail

AI technology: When to build, when to buy

CTOvision

Read Maria Korolov’s guide for businesses to shop for AI tech goods on CIO : Artificial intelligence is fast becoming a business imperative. Whether it’s to improve efficiency, find new business opportunities, or keep up with — or get ahead of — the competition, companies across all industries are exploring the business benefits of AI, […].

article thumbnail

Bacula Announces Fully Integrated Backup and Recovery for Docker

DevOps.com

Delivers world’s first fully automated backup and recovery solution for containers April 9, 2019, Wilmington, DE – Increasing its leadership in high performance backup and recovery for enterprises and managed services providers, Bacula Systems today announced its Docker Container module, making it the first backup and recovery software vendor to offer fully automated, integrated and […].

Backup 90
article thumbnail

AI systems should be accountable, explainable, and unbiased, says EU

CTOvision

The European Union today published a set of guidelines on how companies and governments should develop ethical applications of artificial intelligence. These rules aren’t like Isaac Asimov’s “Three Laws of Robotics.” They don’t offer a snappy, moral framework that will help us control murderous robots. Instead, they address the murky and diffuse problems that will […].

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Piecing together build and test results with artifacts

CircleCI

Picture this: You’re in a remote desert area where there’s been a historic archaeological settlement found. Through the initial investigations, it appears this band of people didn’t have the greatest luck surviving. This is why you’re there. You’re looking for clues to see if you can put together an accurate picture of why their luck ran out. Through your searching and searching you’re not uncovering much that’s helpful when suddenly- bam!

Testing 85
article thumbnail

Facebook creates an AI-based map of Africa to help with crisis relief

CTOvision

Facebook has created AI-based population maps before, but it’s now generating them on a truly massive scale. The social site is releasing new, ultra-detailed population density maps that cover the “majority” of Africa, helping relief agencies know where to go when providing aid. The technique is similar to what Facebook has used before, but tweaks […].

Social 77
article thumbnail

Why Do Share Buybacks Fail? Some Suggested Remedies

Toptal

Share buyback schemes, if executed poorly, can be disastrous for shareholders and company stakeholders. Using three examples from the UK market, reasons for failure are explored with some suggested remedies for managers making capital allocation decisions.

article thumbnail

How to prepare your enterprise for the arrival of artificial intelligence

DXC

Is your enterprise machine ready? If it isn’t, you need to act. Make no mistake, artificial intelligence (AI) technologies – such as machine learning (ML) and robotic processing automation (RPA) – are coming and coming fast. In this article and the two that follow, I will provide some thoughts about the impacts these new technologies […].

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Verizon Fios Quantum Gateway Routers Patched for Multiple Vulnerabilities

Tenable

Tenable Research discovered multiple vulnerabilities in Verizon’s Fios Quantum Gateway routers. Background. Tenable Research has discovered multiple vulnerabilities in the Verizon Fios Quantum Gateway (G1100) router. Verizon has released firmware version 02.02.00.13 to fix these vulnerabilities. Analysis. There is a sticker on the side of the routers.

article thumbnail

The Death Metal Suite

Coalfire

Intel Active Management Technology (AMT) is a feature provided by Intel for remote administration. If you happen to have a corporate laptop, odds are you too have AMT built into your system. To a sysadmin, AMT eases access to machines for the sake of assisting employees with technical issues, even if the hard drive has failed or been affected by ransomware.

article thumbnail

Bohemian Rhapsody and the Art of Delivering a Good Security Talk

Edgewise

TV and movie awards season has recently come to a close as information security conference season has just begun. Like many people, I keep an ear out for which TV shows and movies are deemed “the best” by critics so I can plan for rainy days. For the latest batch of critically-acclaimed movies, I had only seen one of the favorites but had several others on “the list.