Sun.Oct 20, 2019

How Do You Know Something Is A Bug? – Using Mental Models and Oracles in Testing

Xebia

Did you ever find a problem of which you weren’t sure it was a bug? You probably thought it over, looked up the requirements or discussed with a team member. Perhaps you figured it out by yourself, the requirements made things clear or your team member could help you out. Either way, you needed some […]. The post How Do You Know Something Is A Bug? – Using Mental Models and Oracles in Testing appeared first on Xebia Blog. Testing Mental Model Oracle

Liberating Structures for Scrum (5): Strategy w/ Critical Uncertainties

Scrum.org

TL; DR: The Liberating Structures Strategy Meetup. During this Liberating Structures strategy for Scrum meetup we addressed dealing with uncertainty — a particularly useful skill in highly competitive markets.

SCRUM 130

Rethinking Data Management in a DevOps Environment

DevOps.com

You often hear data is the new oil. This valuable, ever-changing commodity has begun to play a starring role in many cloud-native applications.

CodeSOD: How Would You Rate Your Experience

The Daily WTF

The last time I was traveling, I noticed a little stand just past the security checkpoint, asking me to rate my experience. The five buttons ranged from a red frowny face to a green smiley, giving me the ability to respond with what must be the full range of human emotion. Every time I see one of those kiosks, I have to wonder: who uses those things, and who actually looks at the data? Perhaps inspired by that kiosk, Peter 's company does something similar.

Rapid Experimentation at Every Stage of Product Development

Speaker: Tanya Koshy, VP of Product, UserTesting

Experimentation isn't something you do once you have designs or once you’ve built the product; it's important to validate early and often to better understand your customer, their needs, and the market opportunity. Join Tanya Koshy, VP of Product at UserTesting, as she explores how, by using customer feedback at every stage of the product development process, you can better and more quickly iterate on your product ideas. Ultimately, this rapid experimentation during development will enable you to deliver customer value faster.

Survey: Success of Global Enterprise Depends on Adaptation to Hyper-Digitization

Teradata

A new study by Teradata and research firm, Vanson Bourne, shines a light on the market forces impacting the world's largest companies. Find out more

Study 52

More Trending

Why Can’t AI Beat Humans at Angry Birds?

The New Stack

For seven years, AI researchers have been struggling with an unusual challenge: shooting cartoon birds at cartoon pigs. An annual competition tests their ability to craft an AI agent that can play the popular videogame Angry Birds.

Games 52

Protecting Yourself Against Identity Theft

SecureWorks

Protecting Yourself Against Identity Theft Learn About Identity Theft and How You Can Help Protect Yourself The SecureWorks CISO team addresses some common identity theft scenarios in this Protecting Yourself Against Identity Theft article

52

Best Practices, Part 1

DevOps.com

The post Best Practices, Part 1 appeared first on DevOps.com. Blogs ROELBOB

10

5 Reasons Employees Are Your Biggest Security Threat

SecureWorks

5 Reasons Employees Are Your Biggest Security Threat Tactics and Methods Used To Exploit Human Behavior and The Policies Needed To Increase Protection Employees still remain the greatest security threat despite organizations implementing stricter security policies and start-of-the-art technology

The Science of High-Impact Experimentation

Speaker: Holly Hester-Reilly, Founder and Product Management Coach, H2R Product Science

Too many product teams don't know what to test, which leads to poorly designed experiments and unclear results. How can a product manager be certain they’re making effective decisions when it comes to experimentation? Join Holly Hester-Reilly, Founder and Product Management Coach at H2R Product Science, as she walks us through the entire experimentation process, from deciding what to test to sharing the results with stakeholders, to illustrate what strong testing practices look like and how they can be implemented in every organization.

Gaining altitude: How to deliver higher value to airline customers

DXC

By Tim West & Derek Janu-Chossek If booking an overseas trip fills you with trepidation, you are not alone.

A Breach is Just One Click Away – How to Use Training and Technology to Mitigate Risk

SecureWorks

A Breach is Just One Click Away – How to Use Training and Technology to Mitigate Risk Arming your employees with tools to help prevent attacks is a start, but it has to be done effectively and it isn’t enough to secure your information. Leadership

Tools 52

Strengthening the Human Firewall

SecureWorks

Strengthening the Human Firewall Security Awareness Training: Change Employee Behavior and Reduce Risk The right people must be organized to make security programs work. Learn how a culture of vigilance can strengthen your security posture. Leadership

Making a Strategic Investment in Cybersecurity

SecureWorks

Making a Strategic Investment in Cybersecurity Knowing the Cybersecurity Risks Specific to Your Company and Industry Learn where to start making an investment in cybersecurity by knowing the risks specific to your company and industry

Design and Run Experiments That Actually Progress Your Business

Speaker: Nick Noreña, Innovation Coach and Advisor, Kromatic

Experimenting as a way to explore new products, services, and business models can help eliminate the guesswork involved in building something your customers actually value. That said, it's often quite tricky to take your vision and figure out the first experiment to run. How do you get started? How can you ensure your experiments are well-designed? Join Nick Noreña, educator, entrepreneur, and currently an Innovation Coach at Kromatic, as he walks us through how we can figure out the right experiments to run for any product or service, and in organizations of all sizes.

Your Cybersecurity IQ

SecureWorks

Your Cybersecurity IQ Know the Threat Stay one step ahead of threats by knowing the security landscape, who the threat actors are, and how they operate. Fundamentals Leadership

Browser Memory Models – Firefox Catching Up?

SecureWorks

Browser Memory Models – Firefox Catching Up? Read as we explore Firefox catching up to Chrome and Internet Explorer web browsers' multi-process memory module

Certificate Authorities for SSL/TLS: Crypto’s Weak Link

SecureWorks

Certificate Authorities for SSL/TLS: Crypto’s Weak Link Read about the security risks of the current certificate infrastructure including the role of Certificate Authorities and the trust that's placed in them

April 2011 Patch Tuesday Sets a New Record

SecureWorks

April 2011 Patch Tuesday Sets a New Record Learn how small and medium businesses can protect valuable data from breaches, hackers, and other dangers

Data 40

How to Design Strong Experiments

Speaker: Franziska Beeler, Head of Cloud Academy, and Tendayi Viki, Associate Partner, Strategyzer

When testing new business and product ideas, choosing the right experiment is just the beginning. After we have chosen our experiment, it’s important that we spend some time designing it well. Join Tendayi Viki, corporate innovation expert and associate partner at Strategyzer, and Franziska Beeler, Head of Cloud Academy at Strategyzer, as they walk us through the three key elements that help you design stronger experiments and come away with the evidence you need to advance your idea.

4 Ways SMBs Can Fend off IT Security Threats

SecureWorks

4 Ways SMBs Can Fend off IT Security Threats Learn how small and medium businesses can protect valuable data from breaches, hackers, and other dangers. Fundamentals

Data 40

Catch Them If You Can: E-banking Malware Fraud

SecureWorks

Catch Them If You Can: E-banking Malware Fraud Frank Abagnale shot to notoriety in the 1960s for defrauding banks of millions of dollars with meticulously forged cheques

Breach Disclosure: The Greater Good; or Enemy of the Enterprise?

SecureWorks

Breach Disclosure: The Greater Good; or Enemy of the Enterprise? The stats on security breaches within companies make for bleak reading, 93% of large organisations and 76% of small businesses reported breaches last year

Bloomberg BusinessWeek: Portrait of a Chinese Hacker 

SecureWorks

Bloomberg BusinessWeek: Portrait of a Chinese Hacker Yes, The Chinese Army Is Spying On You Follow the story in Bloomberg Businessweek of how a notorious hacker’s identity is unmasked by the CTU's Director of Malware Research Joe Stewart. Fundamentals

Get Better User Insights With Wasteless Validation

Speaker: Tim Herbig, Product Management Coach and Consultant

Product teams tend to get ahead of themselves by rushing from idea straight to building a Minimum Viable Product (MVP). How can a product manager slow their team down and prevent them from wasting valuable resources? Join Tim Herbig, Product Management Coach and Consultant, as he introduces a new way of understanding MVPs and explores how you can approach validation without wasting the resources of your development team.

Is Your Incident Response Plan Ready for a Cyber Security Breach?

SecureWorks

Is Your Incident Response Plan Ready for a Cyber Security Breach? An Incident Response Plan is critical to any organization to contain and stop a potential information security breach from cyber-attacks. Are you prepared? Fundamentals

Accelerating Your Incident Response Plan

SecureWorks

Accelerating Your Incident Response Plan Not Having a Plan When a Cyber-Attack Occurs Can Cost You Millions Not having an Incident Response Plan when a cyber-attack occurs can cost you millions and also ruin your reputation. Fundamentals

40

Beware Cyber Scams Disguised as Holiday Goodies, Greetings and Discounts

SecureWorks

Beware Cyber Scams Disguised as Holiday Goodies, Greetings and Discounts With Cyber Monday on the horizon, here are 12 security tips for online shoppers. Fundamentals

40

Changes in Observed/Assumed Tactics, Techniques, and Procedures (TTPs)

SecureWorks

Changes in Observed/Assumed Tactics, Techniques, and Procedures (TTPs) SecureWorks recently detected several iSensor alerts indicating that systems were infected with the Poison Ivy RAT. Fundamentals

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761

SecureWorks

APT Campaign Leverages the Cueisfry Trojan and Microsoft Word Vulnerability CVE-2014-1761 SecureWorks CTU discovered the Cueisfry downloader trojan while analyzing a spearphishing email sent to an intelligence-related group in Japan. Fundamentals

Cryptowall Ransomware Overview

SecureWorks

Cryptowall Ransomware Overview The Largest & Most Destructive Ransomware on the Internet Learn about the Cryptowall ransomware, how it spread, its infection distribution, and remedies and recommendations to combat it. Fundamentals

3 Incident Response Tips To Save You Time & Money

SecureWorks

3 Incident Response Tips To Save You Time & Money In the 2014 Cost of Data Breach Study: Global Analysis, the average cost to a company in 2014 was $3.5 million, 15 percent more than what it cost in 2013. Fundamentals

Study 40