Mon.Apr 20, 2020

article thumbnail

Patterns for Managing Source Code Branches

Martin Fowler

In my conversations with software developers, a regular topic of controversy is how manage source code branching. Tools like git make it easy to create branches, but managing them to improve coordination and minimize the costs of integration unearths plenty of difficulties. I find it useful to think of the trade-offs around branching as a series of patterns, and have spent the last couple of months writing these patterns into a coherent shape.

article thumbnail

The Future of Customers and Consumers: Creating Loyalty through Digital Transformation

IDC

Learn how the Future of Customers and Consumers creates loyalty through digital transformation, forging partnerships between customers and brands using Empathy at Scale.

Strategy 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Agile2020 Update

Agile Alliance

In March, the World Health Organization officially declared the novel coronavirus COVID-19 a pandemic. This global health crisis presents vast unique challenges that have impacted many members of the Agile community. We would like to express our concern and support for all of our members, staff, families, and colleagues throughout the world and all others … Continued.

Agile 235
article thumbnail

How to Be a Better Leader as Your Responsibilities Scale

Let's Grow Leaders

Transitions in scope and scale are tricky. If you continue to approach your work exactly the same as you did at the last level, you will surely fail. On the other hand, if you abandon all your best characteristics and approaches that […]. The post How to Be a Better Leader as Your Responsibilities Scale appeared first on Let's Grow Leaders.

How To 165
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Creating A Successful Pricing Strategy As An IoT Business

CTOvision

Read Nathan Shinn explain how you can implement a successful pricing strategy for the Internet of Things business on Forbes : The appeal of the internet of things (IoT) remains strong for businesses. And while a great business idea is an essential initial component of your IoT strategy, an equally creative pricing and monetization strategy […].

IoT 132

More Trending

article thumbnail

7 Quick and Easy Ways to Prioritize Your Mental health & Wellbeing

Career Advancement

“It’s up to you today to start making healthy choices. Not choices that are just healthy for your body, but healthy for your mind.” ? Steve Maraboli. The spread of COVID-19 has brought dramatic changes upon workplaces around the world. Every day, I’ve been working with my coaching clients to help illuminate the best course of action. While I’ve been sharing a lot of advice on how to lead people remotely and engage in strategic planning, I can’t emphasize the importance of prioritizing your

article thumbnail

The Way Forward: Digital Resiliency Wins

DevOps.com

As we wrote in Digital Transformation: Digitally Resilient Organizations, digitally resilient enterprises have built themselves business-technology platforms that are elastic, agile and can correctly position themselves to securely meet current business demands. These enterprises are also constantly learning from their data and adjusting as markets, workforce and customers demand.

Agile 129
article thumbnail

Microsoft, Cisco Integrate Their Cloud and IoT Services

CTOvision

Microsoft and Cisco this week announced the “seamless integration” of the two companies’ Internet of Things (IoT) and cloud products, enabling more edge computing scenarios. According to a blog post Tuesday by Tony Shakib, an IoT business acceleration leader for Microsoft Azure, the integration will be beneficial for IT and operations personnel who are trying to set […].

IoT 112
article thumbnail

How to Implement a Data Self-Service Program

DevOps.com

Data self-service is a hot topic these days. By giving different people across an organization–marketers, technologists, business leaders, etc.–access to available data and analytics tools, you empower business users and decision makers to do their jobs effectively. But data self-service is still a work in progress at most organizations. According to a recent survey by IDG […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

How Blockchain is Reshaping Market Research

CTOvision

Read Jasal Shah’s article about how blockchain is reshaping the market research sector on CXO Today : The most significant fallout of cryptocurrency crash of 2018 was that decision-makers across industries sat up to take notice of the blockchain technology. As the fundamental concepts of blockchain — keeping a verified ledger account of all transactions […].

article thumbnail

What you need to know about 'bring your own key' in the cloud

TechBeacon

Enterprises across industry segments are moving IT workloads and functions to the cloud, frequently ahead of any strategy or consistent capability to secure sensitive data. The advantages of cloud migration, such as scale, agility, and consumption-based pricing, are compelling and seem to outweigh the risks in the short term.

Cloud 122
article thumbnail

Top iOS Security Gotchas

DevOps.com

Ensuring the security of user data within your app is critical to building trust in your business and contributing to the online safety of customers. Here’s a list of the top 10 essential security mechanisms that Apple offers to up the security posture of your iOS applications. Adopting these technologies and APIs within your products […]. The post Top iOS Security Gotchas appeared first on DevOps.com.

article thumbnail

Cloud Security Risks Rise During the Coronavirus Pandemic: Survey

CTOvision

As several organizations are forced to shift to work from home to curb the spread of COVID-19, IT and cloud security professionals are concerned about the security of their cloud environments, according to the “State of Cloud Security” survey conducted by Fugue. The survey revealed that 96% of cloud engineering teams are at present 100% working […].

Survey 95
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DevOps Deeper Dive: Git Turns 15

DevOps.com

Git, the version control system that arguably has enabled many DevOps advances over the last decade, is turning 15 this month. Git was developed by Linus Torvalds, best known for his contributions to Linux, and was so-named after he and the rest of the Linux community referred to it as “that stupid content tracker.” The […]. The post DevOps Deeper Dive: Git Turns 15 appeared first on DevOps.com.

DevOps 109
article thumbnail

How to Play Retro Game ROMs on Windows

David Walsh

Video games are always a fun time, something we desperately need during our COVID lockdown. A few years back I shared how to play retro games on Mac , as well as how to patch games to play popular ROM hacks like Grand Poo World and Invictus. One disadvantage that Macs have, however, is performance — your typical gaming PC has much more power, and thus, much better gameplay.

Windows 106
article thumbnail

Open Source Vulnerabilities Were Up 50% in 2019 — How Will It Impact Software Development in 2020?

DevOps.com

Open source vulnerabilities have been on the rise in recent years, but 2019 was truly one for the record books with a spike of nearly 50% over the previous year. According to the recently released State of Open Source Security Vulnerabilities report by the WhiteSource research team, the number of vulnerabilities jumped from 4,100 in […]. The post Open Source Vulnerabilities Were Up 50% in 2019 — How Will It Impact Software Development in 2020?

article thumbnail

Must-watch technology courses

Gitprime

Using insights from the Pluralsight Tech Index—which shows the relative popularity of the world’s top technologies—we’ve curated some of Pluralsight’s must-watch courses in one easy-to-navigate place so you can get started on the most in-demand skills.

Course 98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Five Remote Access Security Risks And How To Protect Against Them

Palo Alto Networks

COVID-19 has upended our way of life, and in doing so, has unleashed a Pandora’s box of new cyber threats. Security teams not only face the universal challenges imposed by this crisis, but must also overcome unique obstacles such as protecting a newly remote workforce and stopping pernicious attacks targeting remote users. Here are five top security risks that teams must deal with, as well as technology and user education best practices to keep users and data safe: 1.

Malware 98
article thumbnail

How Netflix brings safer and faster streaming experience to the living room on crowded networks…

Netflix Tech

How Netflix brings safer and faster streaming experience to the living room on crowded networks using TLS 1.3 By Sekwon Choi At Netflix, we are obsessed with the best streaming experiences. We want playback to start instantly and to never stop unexpectedly in any network environment. We are also committed to protecting users’ privacy and service security without sacrificing any part of the playback experience.

Network 95
article thumbnail

Webify Event Streams Using the Kafka Connect HTTP Sink Connector

Confluent

The goal of this post is to illustrate PUSH to web from Apache Kafka® with a hands-on example. Our business users are always wanting their data faster so they can […].

article thumbnail

Reduce Security Risk With Automated Third-Party Patching

Kaseya

It’s been more than a week since Zoom Video Communications’ significant security flaws became the talk of the town. The cybersecurity attack echoed another third-party application attack when nearly 7.5 million Adobe Creative Cloud user records were exposed in a data breach in 2013. While Zoom is a SaaS application, there are vulnerabilities in the Windows and macOS clients that run on the user’s computer.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Deploying Nx monorepos to Netlify

Netlify

We’re excited to have a guest post from our friend, Rare? Matei, a talented JavaScript Architect from Nrwl ??. Rare? was working on helping devs deploy their monorepos with this super thorough blog post and we thought it would be a great fit on the Netlify blog. If you were looking for different strategies to deploy only the changed files on your monorepo, whether with Netlify build plugins , builders in the Nx workspace , or with CI strategies, this post can help you out.

Testing 84
article thumbnail

What Does Enterprise Risk Mean During the COVID-19 Pandemic?

Battery Ventures

COVID-19 has upended our world. In our ongoing conversations with senior executives in our network, we learned recently about how the crisis is impacting corporate IT spending priorities. Interestingly, we noticed a broader theme of enterprise risk—and how to manage it–in these conversations, so we decided to explore this further. During good times, evaluating risk for businesses is fuzzy.

article thumbnail

Article: Data-Driven Decision Making – Optimizing the Product Delivery Organization

InfoQ Culture Methods

The Data-Driven Decision Making Series provides an overview of how the three main activities in the software delivery - Product Management, Development and Operations - can be supported by data-driven decision making. Applying Hypotheses, CD Indicators and SRE’s SLIs / SLOs enables a software delivery organization to optimize for effectiveness, efficiency and service reliability.

article thumbnail

The Missing Piece in Leadership: External Mastery and Results

thoughtLEADERS, LLC

Leaders need both personal mastery and situational awareness to make the right call at the right time. Six mindsets ensure they grasp their realities to ensure success. Today’s post is by Dr. Mary Lippitt, author of Situational Mindsets (CLICK HERE to get your copy). How would you define leadership? Most people would answer that a leader possesses an effective leadership style, impressive skills, and stellar character.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Article: Failover Conf Q&A on Building Reliable Systems: People, Process, and Practice

InfoQ Culture Methods

One of the biggest engineering challenges associated with maintaining or increasing the reliability of a system is knowing where to invest time and energy. InfoQ recently sat down with several engineers and technical leaders that are involved with the upcoming Failover Conf virtual event, and asked their opinion on the best practices for building and running reliable systems.

System 77
article thumbnail

The DevOps Trends Forecast for 2020

RapidValue

‘DevOps’, a term that was coined a decade before has grown to become a household name in the IT industry. A recent Markets and Markets Research Report suggests that the DevOps Market Size is expected to grow to USD 10.31 Billion by 2023. Furthermore, the statistics surrounding the DevOps market and its adoption leads to a conclusion that confirms its bright future.

DevOps 69
article thumbnail

Preparation Is the Best Defense: 5 Internal Training Tips for Fighting Ransomware

Arcserve

It’s no surprise that ransomware attacks are on the rise. In fact, Malwarebytes reports that their users saw a 363% year-over-year increase in ransomware attacks between the end of Q2 2018 and Q2 2019. Along with an increase in number of attacks, the average ransom jumped to more than $190K in December, 2019. Cybercrime Magazine. Read more » The post Preparation Is the Best Defense: 5 Internal Training Tips for Fighting Ransomware appeared first on StorageCraft Technology Corporation.