Thu.Sep 20, 2018

article thumbnail

To prevent EHR breaches, stop using them (Q&A)

The Parallax

The idea behind electronic health records seems sound: Bring a patient’s paper chart into the Digital Age. But the reality, says Twila Brase, a public-health nurse who is also the president and co-founder of the patient advocacy group Citizens’ Council for Health Freedom, is that EHRs are a disaster for patients and doctors alike—and in more ways than we might suspect.

article thumbnail

A guide to modern mobile app development strategy

OTS Solutions

A guide to modern mobile app development strategy. Digital communication and marketing have been changing a lot over the past decade. One of the areas that a lot of focus has been laid on is mobile application development. This is informed by the fact that close to 90 percent of the population, which translates to 6 billion people, have access to mobile phones.

Mobile 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Practical Ideas for Fostering True Collaboration: A Frontline Festival

Let's Grow Leaders

This months topic, collaboration, is particularly poignant for me, as the Frontline Festival has now been an active collaborative adventure including thought leaders around the world for five-and-a-half years. In March of 2013, while still working at Verizon and having been blogging […]. The post Practical Ideas for Fostering True Collaboration: A Frontline Festival appeared first on Let's Grow Leaders.

150
150
article thumbnail

Splunk.conf 2018: The Top 7 Sessions You Can’t Miss

OverOps

Splunk conference is just around the corner, and we’ve got your back with the top news and sessions you won’t want to miss out on. Splunk Conference 2018 is opening its gates in the most magical place on earth: Disney World. While Mickey and Minnie are attractions on their own, Splunk is offering some worthy contenders that’ll catch your attention, and teach you a thing or two about your application, workflow, logs and much more.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Django Project Tour

The Crazy Programmer

In this tutorial, we’re going to take a look on each file that exists in our django project folder. Let’s say, we’ve created a project named as my_website on our desktop. Now open that folder you can see another folder (directory) with the same name inside our project folder. Along with this directory, we’ve other two files db.sqllite3 and manage.py.

Internet 113

More Trending

article thumbnail

How to Survive Your First Year in Business

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

How To 92
article thumbnail

Unearthing ClojureScript for Front-end Development

Toptal

ClojureScript and its multiparadigm approach (with an emphasis on functional programming) may sound esoteric to some front-end developers. But it's amazing to work with, and getting started with it is far simpler than one might imagine. In this tutorial, Toptal Freelance Clojure Developer Luke Tomlin shows off some key features, getting straight into a React demo using Reagent and the Hiccup syntax.

article thumbnail

Ausar McGruder; Coding Dojo Graduate, Now a System Analyst and Software Developer

Coding Dojo

I love how there are very little limitations when it comes to coding… If you have an idea, then just. … Read more >>. The post Ausar McGruder; Coding Dojo Graduate, Now a System Analyst and Software Developer appeared first on Coding Dojo Blog.

article thumbnail

Working Capital Optimization: Practical Tips from a Pro

Toptal

A decidedly less sexy, albeit critical, part of a CFO’s job description is working capital management and optimization. There are countless examples of companies that are forced to incur unnecessary debt and other financial obligations to meet their short-term financing needs, when in fact ample cash is sitting idly stuck in working capital. But working capital optimization is hard to get right and often requires significant cross-functional efforts to execute effectively.

Meeting 78
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

The T-Mobile data breach and mitigating API security risks

Akana

In late August, T-Mobile announced that data for more than two million T-Mobile customers was accessed in a coordinated exploitation of an improperly secured API. While they state that no banking or social security numbers were exposed, the following types of personally identifiable information (PII) were breached: name, billing zip code, phone number, email address, Continue reading → The post The T-Mobile data breach and mitigating API security risks appeared first on API Management Blog

Mobile 68
article thumbnail

Honeycomb vs Elastic Stack: It’s about priorities

Honeycomb

If you’ve been paying attention, you know that although collecting and reviewing metrics and logs is a core part of running a stable and successful service, access to raw events and the ability to search and pivot on any dimension of your production environment, no matter how high-cardinality, is what will help your team debug and troubleshoot new problems and outages more quickly.

article thumbnail

How We Use Hygger.io for Product Management

VironIT

We often learn about the best ideas, quality services or interesting products from other people who are not involved in our internal processes. We get used to what’s around us, although the teams in a nearby building may use much more powerful products and services. This article is about how we’ve recently learned about the […].

article thumbnail

The Real World, Enterprise Road to Continuous Delivery

LaunchDarkly

Guest post by Jason Bloomberg , of Intellyx LLC. For many large enterprises, the promise of DevOps seems like pie-in-the-sky wishful thinking. Small, collaborative teams iterating quickly on modular bits of code, leveraging the latest in automation tooling, deploying to production perhaps several times a day? At a web-scale company or some cloud-native startup, perhaps, but not here.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Do You Embrace Agility?

Cutter Consortium

Traditional business and operating models are being digitally disrupted, forcing companies to quickly transition to new ways of doing business. And while not all businesses are equally at risk, every business is exposed to the new order digitization is bringing. In the midst of this turbulence, leading-edge firms, from startups to the Fortune 10, are recognizing that business agility is an essential part of survival.

Agile 49
article thumbnail

CodeSOD: Flip to a Blank Page

The Daily WTF

You have a web application, written in Spring. Some pages live at endpoints where they’re accessible to the world. Other pages require authentication, and yet others require users belong to specific roles. Fortunately for you, Spring has features and mechanisms to handle all of those details, down to making it extremely easy to return the appropriate HTTP error.

article thumbnail

There’s still time to implement BYOD this year

TechTalk

The year is more than half done, and there is still time to implement initiatives to keep your business moving. In fact, organizations of all sizes are expecting to see more ransomware attempts, as well as digital currency scams trying to steal an owner’s unique passcode or stealing computing power for currency mining in years […].

article thumbnail

Essential SAFe for Large-Scale Companies – Countdown #11

Net Objectives

Many dev groups in large companies start with Essential SAFe because they are the only group starting SAFe. This is not a bad way to start. However, many of the concepts needed for such groups are described at levels above the Essential SAFe level. This can be confusing. We suggest adding the MBI concept as … Continue reading "Essential SAFe for Large-Scale Companies – Countdown #11".

Company 40
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

The T-Mobile data breach and mitigating API security risks

Akana

In late August, T-Mobile announced that data for more than two million T-Mobile customers was accessed in a coordinated exploitation of an improperly secured API. While they state that no banking or social security numbers were exposed, the following types of personally identifiable information (PII) were breached: name, billing zip code, phone number, email address, Continue reading → The post The T-Mobile data breach and mitigating API security risks appeared first on API Management Blog

Mobile 40
article thumbnail

Essential SAFe for Large-Scale Companies – Countdown #11

Net Objectives

Many dev groups in large companies start with Essential SAFe because they are the only group starting SAFe. This is not a bad way to start. However, many of the concepts needed for such groups are described at levels above the Essential SAFe level. This can be confusing. We suggest adding the MBI concept as … Continue reading "Essential SAFe for Large-Scale Companies – Countdown #11".

Company 40
article thumbnail

Cloud Native Patterns: Canary Release

Daniel Bryant

In order to effectively build cloud native applications, your engineering organization has to adopt a culture of decentralized decision-making to move faster. In this series, we’ll discuss key patterns in cloud native application development, why they’re effective, how to implement them in your organization, the consequences of doing so, and provide examples using popular cloud native tools.

Cloud 40
article thumbnail

The Pentagon’s Cyber Strategy: What’s New and What it Means

The Cipher Brief

On Wednesday, the Department of Defense (DoD) quietly released an unclassified summary and fact sheet on its 2018 Cyber Strategy, which replaces the 2015 DoD Cyber Strategy. Here are ten things you need to know about the new strategy: Cipher Brief Level I Members can access this article via login or by signing up to become a Cipher Brief Member. Joining this high-level, security-focused community is only $10/month (for an annual $120/yr membership).

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

3 Ways of Taking Better Care of Your Team

Strategy Driven

As a business owner, it’s up to you to make sure that your employees thrive. Without them, your business would certainly not be where it is today – and, unless you take proper care of them, you might see them move elsewhere. They could end up with one of your competitors instead, for example, which ensures them the kind of success that you could have enjoyed.

Video 28
article thumbnail

Configuring TeamForge Git Integration with Git LFS using AWS S3

CollabNet VersionOne

Welcome to the third blog in the series on how to configure TeamForge with Gerrit replication enabled. In the first blog post , I have explained the problem of Git LFS data in context of replication and proposed a solution with AWS S3 Bucket Cross Region Replication (CRR). In the second blog post we went through the process of setting up the CRR between two regions.

AWS 40
article thumbnail

Essential Elements Of An Awesome Landing Page

Strategy Driven

When you sit down to think of a new way to market for your business this year, one of the first things which might come to mind is creating a website which will share your story, your products and show people who you are. A website is a window to your business and many people upon hearing your name will search for you online in the hopes of getting a better understanding of your business.

Video 20
article thumbnail

Top Benefits of hiring web development company for your business

Xicom

A web developer has the power to change an ordinary business into a successful one with the help of building a website that has some extraordinary features. A website is the reflection of the business so a business owner must invest into a website as a long-term investment. As the world goes digital and the people around the world getting more and more high-tech as well as using smartphones for just everything, your business also deserves to be on the global digital world for sure.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

K8S will not solve your storage problems

ProdOps

And it shouldn’t, so don’t let it At ProdOps , we get to see and work with a wide range of clients. A general assumption about k8s, is that you can scale anything, to solve any problem. Yes, even if you’re running databases as pods. It’s important to stress the fact that while k8s is a great orchestrator that can manage your applications with resiliency, speed and agility; however, locking mechanisms, sharding or data replication are not among its features.

Storage 45
article thumbnail

Data Science and the Pursuit of the 6 Ideal States

StubHub

By Yao H. Morin , Chief Data Officer I like to joke that I am one of the original data nerds?—?I was into it before data was cool. In grad school, I studied operations research and convex optimization, which back then was basically a more clinical way of saying “data science.” My studies and the professional experience that followed?—?jobs with a law firm, the Department of Defense and a handful of top tech companies?

Data 40
article thumbnail

Responsive Images

A List Apart

I come here not to bury img , but to praise it. Well, mostly. Historically, I like img just fine. It’s refreshingly uncomplicated, on the surface: it fires off a request for the file in its src attribute, renders the contents of that file, and provides assistive technologies with an alternative narration. It does so quickly, efficiently, and seamlessly.

Mobile 71