Sun.Oct 20, 2019

How Do You Know Something Is A Bug? – Using Mental Models and Oracles in Testing

Xebia

Did you ever find a problem of which you weren’t sure it was a bug? You probably thought it over, looked up the requirements or discussed with a team member. Perhaps you figured it out by yourself, the requirements made things clear or your team member could help you out. Either way, you needed some […]. The post How Do You Know Something Is A Bug? – Using Mental Models and Oracles in Testing appeared first on Xebia Blog. Testing Mental Model Oracle

Liberating Structures for Scrum (5): Strategy w/ Critical Uncertainties

Scrum.org

TL; DR: The Liberating Structures Strategy Meetup. During this Liberating Structures strategy for Scrum meetup we addressed dealing with uncertainty — a particularly useful skill in highly competitive markets.

SCRUM 189

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Rethinking Data Management in a DevOps Environment

DevOps.com

You often hear data is the new oil. This valuable, ever-changing commodity has begun to play a starring role in many cloud-native applications.

Why Can’t AI Beat Humans at Angry Birds?

The New Stack

For seven years, AI researchers have been struggling with an unusual challenge: shooting cartoon birds at cartoon pigs. An annual competition tests their ability to craft an AI agent that can play the popular videogame Angry Birds.

Games 83

How AI Can Radically Change Your Business

AI is quickly becoming mainstream, thanks to its value-driving capabilities. Yet, even with such widespread attention, it still is one of the most misunderstood technologies out there. Here's how to make the most out of it and bring a positive change to your company.

A Breach is Just One Click Away – How to Use Training and Technology to Mitigate Risk

SecureWorks

A Breach is Just One Click Away – How to Use Training and Technology to Mitigate Risk Arming your employees with tools to help prevent attacks is a start, but it has to be done effectively and it isn’t enough to secure your information. Leadership

More Trending

5 Reasons Employees Are Your Biggest Security Threat

SecureWorks

5 Reasons Employees Are Your Biggest Security Threat Tactics and Methods Used To Exploit Human Behavior and The Policies Needed To Increase Protection Employees still remain the greatest security threat despite organizations implementing stricter security policies and start-of-the-art technology

Survey: Success of Global Enterprise Depends on Adaptation to Hyper-Digitization

Teradata

A new study by Teradata and research firm, Vanson Bourne, shines a light on the market forces impacting the world's largest companies. Find out more

Study 52

Strengthening the Human Firewall

SecureWorks

Strengthening the Human Firewall Security Awareness Training: Change Employee Behavior and Reduce Risk The right people must be organized to make security programs work. Learn how a culture of vigilance can strengthen your security posture. Leadership

Seems accurate

I'm Programmer

Software Engineer Humor. 1 of 3. 2019 gonna be an interesting year for the EU 2019 gonna be an interesting year for the EU. Life of Software Engineer Life of Software Engineer. the joy of programming the joy of programming. The post Seems accurate appeared first on I'm Programmer.

Indistractable: How to Control Your Attention and Choose Your Life with Nir Eyal

Speaker: Nir Eyal

Ever get the feeling the world is full of too many distractions? Research shows the ability to stay focused is a competitive advantage, in work and in life. However, in an age of ever-increasing demands on our attention how do we stay productive and stay sane? In this webinar, Nir provides research-backed, practical advice, and memorable strategies for managing distraction and our time. Nir Eyal shares findings of his five years of research into how to master what he calls, "the skill of the century," the power to be "Indistractable."

10 Tips for Managing Security in the Cloud

SecureWorks

10 Tips for Managing Security in the Cloud Businesses Concerned About Data Security in the Cloud Should Consider These Recommendations This paper offers 10 tips that businesses should implement in order to reduce the security risks in the cloud. Threats & Defenses

Data 52

Best Practices, Part 1

DevOps.com

The post Best Practices, Part 1 appeared first on DevOps.com. Blogs ROELBOB

16

Protecting Yourself Against Identity Theft

SecureWorks

Protecting Yourself Against Identity Theft Learn About Identity Theft and How You Can Help Protect Yourself The SecureWorks CISO team addresses some common identity theft scenarios in this Protecting Yourself Against Identity Theft article

52

Gaining altitude: How to deliver higher value to airline customers

DXC

By Tim West & Derek Janu-Chossek If booking an overseas trip fills you with trepidation, you are not alone.

Building Healthy Innovation Ecosystems for Your Projects

Speaker: Nick Noreña, Innovation Coach and Advisor, Kromatic

In this webinar, Nick Noreña will walk through an Innovation Ecosystem Model that he and his team at Kromatic have developed to help investors, heads of product, teachers, and executives understand how they can best support innovation in their own ecosystem. He'll also go over metrics we can use to measure the health of our ecosystems as we build more resources for innovators.

Making a Strategic Investment in Cybersecurity

SecureWorks

Making a Strategic Investment in Cybersecurity Knowing the Cybersecurity Risks Specific to Your Company and Industry Learn where to start making an investment in cybersecurity by knowing the risks specific to your company and industry

Your Cybersecurity IQ

SecureWorks

Your Cybersecurity IQ Know the Threat Stay one step ahead of threats by knowing the security landscape, who the threat actors are, and how they operate. Fundamentals Leadership

Your Advanced Threats Cookbook: A Recipe For Success

SecureWorks

Your Advanced Threats Cookbook: A Recipe For Success Rapidly detect and remediate advanced and evasive threats Find the recipe to protecting your organization with the right mix of people, process, technology and intelligence. Fundamentals

Cyber Security IQ

SecureWorks

Cyber Security IQ Know the Threat This white paper will help you learn what motivates cyber criminals, what they want from your business and some practices for resilience against them. Fundamentals

42

BI Buyers Guide: Embedding Analytics in Your Software

The business intelligence market has exploded. And as the number of vendors grows, it gets harder to make sense of it all. Learn how to decide what features you need and get an evaluation framework for every technical and non-technical requirement you could imagine.

5 Tactics Cyber Criminals Use to Capture Personal Data

SecureWorks

5 Tactics Cyber Criminals Use to Capture Personal Data Learn how cyber criminals leverage intrusion tactics to capture personal and financial data. Learn how cyber criminals leverage intrusion tactics to capture personal and financial data. Fundamentals

Data 41

5 Ways Advanced Malware Evades the Sandbox

SecureWorks

5 Ways Advanced Malware Evades the Sandbox Five Techniques You Can Do To Prepare for Evasive Advanced Malware Learn the five ways advanced malware evades detection and recommended techniques you can do to prepare for them. Fundamentals

Browser Memory Models – Firefox Catching Up?

SecureWorks

Browser Memory Models – Firefox Catching Up? Read as we explore Firefox catching up to Chrome and Internet Explorer web browsers' multi-process memory module

Certificate Authorities for SSL/TLS: Crypto’s Weak Link

SecureWorks

Certificate Authorities for SSL/TLS: Crypto’s Weak Link Read about the security risks of the current certificate infrastructure including the role of Certificate Authorities and the trust that's placed in them

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

April 2011 Patch Tuesday Sets a New Record

SecureWorks

April 2011 Patch Tuesday Sets a New Record Learn how small and medium businesses can protect valuable data from breaches, hackers, and other dangers

Data 40

4 Ways SMBs Can Fend off IT Security Threats

SecureWorks

4 Ways SMBs Can Fend off IT Security Threats Learn how small and medium businesses can protect valuable data from breaches, hackers, and other dangers. Fundamentals

Data 40

Catch Them If You Can: E-banking Malware Fraud

SecureWorks

Catch Them If You Can: E-banking Malware Fraud Frank Abagnale shot to notoriety in the 1960s for defrauding banks of millions of dollars with meticulously forged cheques

Breach Disclosure: The Greater Good; or Enemy of the Enterprise?

SecureWorks

Breach Disclosure: The Greater Good; or Enemy of the Enterprise? The stats on security breaches within companies make for bleak reading, 93% of large organisations and 76% of small businesses reported breaches last year

2019 State of Engineering Performance Management Report

More than 100 software leaders were asked how they manage and measure engineering performance. How do the findings stack up to your own experience? The report includes the top engineering challenges and the most used performance metrics.