Thu.Oct 17, 2019

article thumbnail

Highlights from the O’Reilly Artificial Intelligence Conference in London 2019

O'Reilly Media - Data

People from across the AI world came together in London for the Artificial Intelligence Conference. Below you’ll find links to highlights from the event. When flying is cheaper than standing still. Raffaello D’Andrea presents his vision of how autonomous indoor drones will drive the next wave of robotics development. Watch “ When flying is cheaper than standing still “ When to trust AI.

article thumbnail

Best Practices in Employee Engagement: A Frontline Festival

Let's Grow Leaders

Welcome to the Let’s Grow Leaders Frontline Festival! This month, our contributors share their best practices in employee engagement. Thanks to Joy and Tom Guthrie of Vizwerx Group for the great pic and to all our contributors! The November Frontline Festival will be […]. The post Best Practices in Employee Engagement: A Frontline Festival appeared first on Let's Grow Leaders.

Groups 99
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When to trust AI

O'Reilly Media - Data

This is a keynote highlight from the O’Reilly Artificial Intelligence Conference in London 2019. Watch the full version of this keynote on the O’Reilly online learning platform. You can also see other highlights from the event.

article thumbnail

5 More Ways to Improve the Security of Your Business

Kaseya

Small and midsize businesses (SMBs) have become a common target of cybercriminals, mainly because of their lack of resources and limited IT budgets. In fact, the Verizon 2019 Data Breach Investigations Report (DBIR) found that 43 percent of security breaches affect small businesses — that’s a pretty big number. According to the 2019 Kaseya State of IT Operations Report for SMBs , 32 percent of the participants have experienced a security breach in the past five years and 10 percent of re

Malware 91
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

The quest for high-quality data

O'Reilly Media - Data

This is a keynote highlight from the O’Reilly Artificial Intelligence Conference in London 2019. Watch the full version of this keynote on the O’Reilly online learning platform. You can also see other highlights from the event.

More Trending

article thumbnail

Accelerate with purpose

O'Reilly Media - Data

This is a keynote highlight from the O’Reilly Artificial Intelligence Conference in London 2019. Watch the full version of this keynote on the O’Reilly online learning platform. You can also see other highlights from the event.

article thumbnail

8 Ways Businesses Unknowingly Help Hackers

CTOvision

Most of your employees likely know better than to send a password via email or open a strange attachment from someone they don’t know. But do they know better than to post photos of their badges on social media or include details about internal software in job descriptions? “I see this all the time, and this […].

Media 63
article thumbnail

Machine learning challenges at LinkedIn: Spark, TensorFlow, and beyond

O'Reilly Media - Data

This is a keynote highlight from the O’Reilly Artificial Intelligence Conference in London 2019. Watch the full version of this keynote on the O’Reilly online learning platform. You can also see other highlights from the event.

article thumbnail

Ready for AI? Start With AI Ethics

DataRobot

In the past 12 months, artificial intelligence has become headline news, and not always for the right reasons. We’ve heard stories of sexist AI hiring algorithms , racist face detection algorithms , and AIs using your private social media data to influence elections. Embarrassing AI failures such as these can damage your reputation, incur regulatory penalties, and even negatively impact a company’s stock prices.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

When flying is cheaper than standing still

O'Reilly Media - Data

This is a keynote highlight from the O’Reilly Artificial Intelligence Conference in London 2019. Watch the full version of this keynote on the O’Reilly online learning platform. You can also see other highlights from the event.

article thumbnail

What To Do If Your Data Was Breached

CTOvision

Read Nicole Martin explain what you can do if your data was breached on Forbes : Data breaches seem to be everywhere in today’s society. Just this week it was announced that a massive data breach exposed sensitive data of nearly every individual in Ecuador. The breach impacted an estimated 20 million people, 6.7 million […].

Data 61
article thumbnail

What is so Special About AIOps for Mission Critical Workloads?

DevOps.com

As the wave of digitization sweeps more enterprises with each passing day, the threats posed to organizations, particularly IT organizations, have never been more complex and pressing. With cybercrime statistics, including those for more targeted crimes (such as phishing) pointing towards an alarming frequency of attacks, the stakes for securing enterprises have been higher.

article thumbnail

Industry Calls for Standardization of CISO Role

CTOvision

Professionals from the cybersecurity industry have called for clarity regarding the role of Chief Information Security Officers (CISOs). Research from Cyber Security Connect UK (CSCUK), a forum for cybersecurity professionals, has stated that CISOs are being pulled into job requirements outside their jurisdiction and that there is a lack of transparency about the responsibilities of cybersecurity […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Apple leaks Safari history fingerprints to China

TechBeacon

At first, people were worried that China recorded Safari users’ IP addresses. But as the dust settles, things seem much worse than that.

Data 77
article thumbnail

Malware Uses Your PC to send 30K Sextortion Emails Per Hour

CTOvision

The Phorpiex (aka Trik) botnet has existed for almost 10 years. First developed to distribute various malware like Gandcrab, Pony, and Pushdo to email users for the purpose of turning victim accounts into hosts for fraudulent cryptomining operations, Phorpiex now has a new trick up its sleeve. Researchers at the Tel Aviv-based Check Point confirmed […].

Malware 60
article thumbnail

Building Hybrid and Multi-Cloud Architectures for Analytics and AI

DevOps.com

We are in the early stage of the data revolution. Today’s conventional wisdom states that hybrid latency prevents you from running analytic and machine learning workloads in the cloud with the data on-prem. As a result, most companies either do not burst their workloads into the cloud or have to copy their data into a […]. The post Building Hybrid and Multi-Cloud Architectures for Analytics and AI appeared first on DevOps.com.

article thumbnail

Announcing A New CTOvision Study: Build vs Buy in the Government Sector

CTOvision

For decades government leaders have had to wrestle with questions of building solutions vs buying existing solutions. The needs of government enterprises have shifted over the decades, but so have the capabilities of commercially available products. It is critically important that executives in government frame their build vs buy/COTS vs GOTS questions correctly so they […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Zoho Opens Up Its Infrastructure and Launches Catalyst, a New Full-Stack Serverless Developer Platform

DevOps.com

Accessing Zoho’s Deep Tech Stack, Developers Can Easily Build Microservices and Apps With Capabilities Inherited Directly From Zoho’s Expansive Business App Portfolio Austin, Texas — October 17, 2019 — Zoho Corporation, a global, privately held company that offers the most comprehensive suite of business software applications in the industry, today announced the release of Catalyst, the company’s visionary full-stack serverless platform for […].

article thumbnail

Business Models and Trust

Edge Perspectives

Three years ago I sketched out three dimensions of business model evolution in response to the mounting performance pressure of the Big Shift. In this blog post, I want to highlight the role of this business model evolution in restoring trust in our corporations. A growing number of surveys around the world highlight the continuing erosion of trust in all our institutions.

article thumbnail

Five Ways to Get Out of the Way of Innovation

CEO Insider

Your record as a CEO, whether of a private or public company, will hinge on how much value you create during your tenure. Where do you look for that value? While acquisitions, new products, and new markets might be tempting places to obtain value, a fourth option offers far more potential: organic innovation from within. […].

article thumbnail

A Personal Look Back at 25 Years in Software Testing in Silicon Valley

Dzone - DevOps

I’ve worked around the world in cities throughout North America, Asia, and Europe, and I’ve been inspired by them all in different ways. But, it’s here in Silicon Valley where I feel that anything is possible. Whether it’s driving down 101 towards San Jose and seeing driverless cars changing lanes, or seeing VR stores crop up in San Mateo , these serve to remind me of the opportunity the Valley has afforded me and my peers here and around the world to be tech leaders.

Testing 47
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CCPA: What You Need to Know for Public Cloud

Palo Alto Networks

We live in a data-driven world. From the information we collect to authenticate consumers to the data we use to target advertisements, organizations store personal information to make important business decisions, gauge appropriate pricing, and improve customer experience. But many companies also sell this data without consumer knowledge or consent.

Cloud 47
article thumbnail

This Is Why Your DevOps Meetings Fail Every Time

Dzone - DevOps

Here's why your DevOps meetings aren't going so well. It’s a beautiful day and you have enough passion to enter the room, have a Hollywood-look at the crowd, and manage a DevOps meeting like a pro. But (unfortunately) things may not proceed like the scene form the Iron Woman—with you being the Meryl Streep of the scene. We all remember the moment when she hit the men hard, claiming they “don’t have the courage to fight for a cause because they never had to fight hard for anything in their lives.

Meeting 44
article thumbnail

Nutanix AOS 5.11 is Here!

Nutanix

The Nutanix AOS releases together enhance the core AOS storage performance, storage capacity, data protection, security, and cluster lifecycle management. We are highlighting a few key capabilities in this blog.

Storage 50
article thumbnail

How well does your organization do with diversity and inclusion?

thoughtLEADERS, LLC

Our reader poll today asks: How well does your organization do with diversity and inclusion? We’re great. We’re very diverse and inclusive: 34% We’re okay. We actively manage D&I but have some opportunities: 35% We’re fair. We know we have issues and are working on them: 18% We’re poor. We hardly know what D&I stands […]. This is only the beginning of the thought.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

UruIT Launches Its Second Office in Colombia

UruIT

The company’s new location is Bogotá, capital of the country and home to more than 80,000 computer science graduates. At a sunny and cheerful WeWork in the Chicó Norte region of Bogotá is located the new UruIT office in Colombia. The main reason why we d ecided to expand to Bogotá is due to the city’s size and its vast pool of talented professionals. “During these years working with nearshore software development in Colombia, we’ve had the opportunity of receiving job candidates from

article thumbnail

The Observer

Net Objectives

Intent Define a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically. (GoF) Example An object is created to represent the current session of a logged-in user at a webservice. Other parts of the system need to know when the session ends, whether that is … Continue reading "The Observer".

article thumbnail

Prioritizing and sequencing are not the same things

Marcusoft

Having an (any) work in process (WIP) limit to your workload is the best way I know to improve speed, quality and focus on value in what we do. This goes for individuals, teams and whole organizations alike. As you apply a limit of how many things you will work on at the same time, you very soon will start to prioritize among your work. (Psst - I’ll let you in on a secret: if you don’t have limit you still prioritise, because at any one given time you are only working on a thing … but that is a