Mon.Apr 15, 2019

article thumbnail

Focusing on the True DevOps North Star: Continuous Improvement

DevOps.com

When we look beyond the fundamentals of tearing down silos and establishing greater collaboration, communication and transparency, DevOps is a label assigned to a framework of best practices and technologies that organizations leverage to deliver systems faster, more efficiently and without sacrificing quality. The best practice within that framework is continuous improvement, which provides stakeholders […].

DevOps 105
article thumbnail

Passwords and Policies | Roadmap to Securing Your Infrastructure

Linux Academy

Welcome back to our weekly blog post as we look at how to better secure your infrastructure. Last week, we discussed the use of password managers and multi-factor authentication (MFA). Those tools were meant to help with the problem of password reuse and password weaknesses. This week, we’re going to continue chipping away at these problems with additional layers of protection, including a password policy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Take Charge of Your Remote Meetings

Let's Grow Leaders

Lead remote meetings that get results and build relationships Tired of shadowy silhouettes, screechy feedback, and multitasking participants? It doesn’t have to be that way. Remote meetings are a daily fact of life for most leaders. When you lead them well, they […]. The post How to Take Charge of Your Remote Meetings appeared first on Let's Grow Leaders.

Meeting 129
article thumbnail

Asynchronous workflow pattern

Xebia

The asynchronous workflow pattern, also known as the publish-subscribe pattern, is an architecture pattern which is typically used to asynchronously perform resource intensive and time consuming tasks. To separate the request from the task itself we can use a queue where the sender puts messages that another service can pick up. This pattern is a subset of the […].

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Infographic: AI powered Chatbots

CTOvision

Chatbots are rapidly becoming part of our every day lives and proving to be a very valuable tool for companies across a wide range of industries. As such, AI-enabled chatbots are increasingly being used on the front line of customer engagement. They can be integrated into customer support service teams to answer common or basic […].

Industry 103

More Trending

article thumbnail

Machine learning models can’t always handle reality (but most humans can)

DXC

A growing number of enterprise leaders view artificial intelligence (AI) and machine learning (ML) as transformational technologies that can enable better decision-making, increase efficiency, eliminate human error, and lower costs. For many enterprise workers, however, the relentlessly consistent performance promised by intelligent machines looms as a threat to their jobs.

article thumbnail

3 Ways Employers Can Help Improve a Woman’s Confidence in the Workplace

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

94
article thumbnail

6 Steps to a Greener Office

TechSoup

Small changes add up to big impacts. Whether at home, in the community, or at work, each step in the right direction can move us toward a brighter, greener future. So, in honor of Earth Day 2019, we've gathered some tips to make your workplace more eco-friendly, one small step at a time.

92
article thumbnail

5 Practical Ways to Deliver Secure Software That Could Actually Work

DevOps.com

Almost every aspect of modern life is dependent on technology. As technology becomes even more advanced and pervasive, so, too, does the need for secure software. Today, even the tiniest breach at an organization could result in major loss of sensitive data. Therefore, it is crucial for both the reputation and proper functioning of the […]. The post 5 Practical Ways to Deliver Secure Software That Could Actually Work appeared first on DevOps.com.

article thumbnail

“Build vs Buy Analytics?” The Question ALL SaaS Leaders Need to Answer in 2024

As a SaaS leader, you know that the more metrics, insights, and analytics you add to your products, the more engagement you’ll have – and the stickier your product will become with customers. At what point do you decide to keep building your analytics in-house or invest in an embedded analytics solution? Read our Build vs. Buy Analytics guide to learn: Top 4 benefits of embedded analytics A quick cost comparison of in-house analytics development vs embedded analytics 10 considerations to help yo

article thumbnail

Driving Global Connectivity Well Beyond Cable Technology

CableLabs

CableLabs participates in more than 30 unique standards organizations, industry consortia, and open source efforts. . CableLabs is focused on developing innovative technologies, not only in the performance of cable’s hybrid fiber coax (HFC) networks, but also in many areas that extend beyond the traditional cable network, including wireless (both licensed and unlicensed), cybersecurity, network function virtualization (NFV), optical technologies for access networks, and the application of artifi

article thumbnail

IT??????????????????????

DXC

???????????????????????????????????????????????????? DXC??????????????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????IT????????????????????????????? ??????????????????????????????????????????????????????????????????????????????????????????

75
article thumbnail

Partner Spotlight: DC Blox

Megaport

“DC BLOX is pleased to partner with Megaport to expand our rich connectivity solutions to enable digital business. Offering secure, private connections from every DC BLOX data center to Amazon Web Services, Microsoft Azure and a host of other cloud providers meets a growing market need for hybrid cloud environments. And with Megaport’s Software Defined Network, DC BLOX can offer customers.

Azure 74
article thumbnail

Customer Question of the Month: Boundary Systems and SAP Migration

Protera

Your SAP system isn’t an island — if it were, it would be no use to you. To power your business, it needs to serve as the hub of a complex web of interconnected services and platforms. There’s information flowing into it — like customer orders and supply tracking data — and information flowing out of it, such as invoices, orders for vendors and reports.

System 70
article thumbnail

Monetizing Analytics Features

Think your customers will pay more for data visualizations in your application? Five years ago, they may have. But today, dashboards and visualizations have become table stakes. Turning analytics into a source of revenue means integrating advanced features in unique, hard-to-steal ways. Download this white paper to discover which features will differentiate your application and maximize the ROI of your analytics.

article thumbnail

Digital + Water = Operational Transformation

Beyond B2B

Water management may not be one of your typical “top ten” conservation topics around the dinner table, but it should be.

article thumbnail

How U.S. Bank Uses A.I. and Machine Learning to Deeply Personalize Your Banking Experience

Teradata

Katherine Knowles-Marchione explains how US. Bank is using AI to improve and personalize the banking experience.

Banking 85
article thumbnail

Why the Principle of Least Privilege is Important for SaaS-based Cloud Management

ParkMyCloud

The principle of least privilege is important to understand and follow as you adopt SaaS technologies. The market for SaaS-based tools is growing rapidly, and can typically be activated much more quickly and cheaply than creating a special-purpose virtual machine within your cloud environment. In this blog, I am focusing specifically on the SaaS cloud management tool area, which can include services like cloud diagramming tools, configuration management tools, storage management and backup tools

Cloud 60
article thumbnail

Tackle Serverless Observability Challenges with the New Stackery-Epsagon Integration

Stackery

Stackery is a tool to deploy complete serverless applications via Amazon Web Services (AWS). Epsagon monitors and tracks your serverless components to increase observability. Here’s how they can not only work together but improve each other. Let’s start with a scenario: it’s late in the day on Thursday, traffic to your site is way up, and you have reports of problems.

article thumbnail

Addressing Top Enterprise Challenges in Generative AI with DataRobot

The buzz around generative AI shows no sign of abating in the foreseeable future. Enterprise interest in the technology is high, and the market is expected to gain momentum as organizations move from prototypes to actual project deployments. Ultimately, the market will demand an extensive ecosystem, and tools will need to streamline data and model utilization and management across multiple environments.

article thumbnail

OpenAI Five Finals Intro

Greg Brockman

The text of my speech introducing OpenAI Five at Saturday’s OpenAI Five Finals event, where our AI beat the world champions at Dota 2: “Welcome everyone. This is an exciting day. First, this is an historic moment: this will be the first time that an AI has even attempted to play the world champions in an esports game. OG is simply on another level relative to other teams we’ve played.

Games 52
article thumbnail

La course aux talents technologiques

DXC

Les entreprises peinent de plus en plus à trouver les talents dotés des compétences nécessaires qui les aideront à réussir leur transformation digitale. Ce déséquilibre entre l’offre et la demande crée une situation imparfaite pour les entreprises, qui, pour rester compétitives, sont obligées d’investir considérablement dans la gestion et l’acquisition des compétences.

Course 52
article thumbnail

Representative Line: Tern Your View

The Daily WTF

We all just love ternaries around here. So much. A powerful form of code golf, they can clarify and they can confound, but usually it’s just confounding. Christopher sends us this example, saying, “This is an accurate indicator of the rest of the code.”. not_mobile = viewport().width > 400 ? true : false; Representative indeed, and there’s a lot packed into this beyond the ternary abuse.

article thumbnail

Four short links: 15 April 2019

O'Reilly Media - Ideas

Making a Group, Robot Arms, Human Contact, and a Personal Archive. You Should Organize a Study Group/Book Club/Online Group/Event! Tips on How to Do It (Stephanie Hurlburt) -- good advice on how to get people together. Berkeley Open Arms -- Berkeley Open Arms manufactures the BLUE robot arm that was developed at UC Berkeley's Robot Learning Lab. Paper ( arXiv link ).

article thumbnail

How To Package & Price Embedded Analytics

Just by embedding analytics, app owners can charge 24% more for their product. How much value could you add? This framework from Software Pricing Partners explains how application enhancements can extend your product offerings. You’ll learn: How to take a disciplined approach to pricing The three elements of the Packaging Decision Framework Ways to structure your new embedded analytics offering Download the White Paper to learn about How To Package & Price Embedded Analytics.

article thumbnail

Saviynt Identity 3.0 Modernization: Tidy Up Your Governance

Saviynt

Marie Kondo’s The Life-Changing Magic of Tidying Up seems to focus on pack rats. People buy new technologies and gadgets in their personal lives, which end up cluttering their homes, the same way that enterprises add new technologies to enable their businesses. However, instead of creating a physical clutter of objects, these new technologies create an identity governance clutter filled with digital and human users who no longer need access.

article thumbnail

Latest Hacks: Microsoft’s Hotmail, MSN Compromised With User Credentials

Lacework

Microsoft has admitted that email accounts for MSN.com and Hotmail, both services owned and managed by Microsoft, have had their accounts compromised sometime between January 1 and March 28, 2019. It appears that attackers were able to identify user’s email addresses, email folder names, email subject lines, and the email addresses of those with whom [.].

45
article thumbnail

3 Data Classifications and What They Mean

Arcserve

Hacks happen all the time. The Global Threat Report released by Carbon Black estimates that in 2018, about 1 million cyberattacks per day were attempted. All businesses are at risk on a daily basis and need to take proper data security precautions. How you do so and which data you protect should all depend on. Read more » The post 3 Data Classifications and What They Mean appeared first on StorageCraft Technology Corporation.

Data 40
article thumbnail

Partner Spotlight: DC Blox

Megaport

“DC BLOX is pleased to partner with Megaport to expand our rich connectivity solutions to enable digital business. Offering secure, private connections from every DC BLOX data center to Amazon Web Services, Microsoft Azure and a host of other cloud providers meets a growing market need for hybrid cloud environments. And with Megaport’s Software Defined Network, DC BLOX can offer customers.

Azure 40
article thumbnail

Innovation Systems: Advancing Practices to Create New Value

As technology transforms the global business landscape, companies need to examine and update their internal processes for innovation to keep pace. Ultimately, organizations will have to improve the velocity of innovation by creating repeatable processes that support ideation, exploration, and incubation, essential to capturing an idea’s full value.

article thumbnail

The alternative for IT talent sourcing – Distributed Agile Delivery

Capgemini

Advantages are, for example, ease of staffing IT projects, and faster ramp-up of projects, with guaranteed quality and productivity. These advantages contribute to a shorter time-to-market for software products and services. Without a doubt, our dependence on software products and services will increase. The shortage of IT talent is structural and requires structural solutions.

Agile 40
article thumbnail

Cryptojacking Campaign Targets Exposed Kubernetes Clusters

Lacework

Reports on in-the-wild attacks on Kubernetes clusters are somewhat sparse. This coupled with multiple attack vectors prompted us to deploy Kubernetes honeypots with very loose security controls to catch real-world attacks. Our hypothesis was that an attack would happen quickly through the insecure API and that the attacker would abuse the cluster to deploy coinminers. [.].

Report 40
article thumbnail

TDD and Naming Part 3: Customized Assertions

Net Objectives

Unit testing frameworks, which are the most common tools used by developers to conduct TDD, come with pre-made assertions that can be used to verify the behaviors being specified. Typically, these include assertions such as: “areEqual()” (value comparison) “areSame()” (entity comparison) “isNotNull()” “contains()” Developers should not limit themselves to these pre-made assertions.

TDD 40