Thu.Mar 19, 2020

article thumbnail

Be Humble: Black Swans and the Limits of Inductive Reasoning

DataRobot

After a decade of relative economic stability, we are now confronted by the COVID-19 pandemic, with many financial analysts labelling it as a ‘black swan’ event. A ‘black swan’ is a metaphor for something unexpected which has a major impact. These type of events can cause significant disruption to business processes, financial markets, and our lives.

Marketing 112
article thumbnail

How to do effective video calls

Martin Fowler

During 2011-2012 there was a small but significant revolution in how we worked at ThoughtWorks. When we needed to communicate while separated we used to do telephone meetings, but within a year the telephone disappeared and we started using video calls instead. Now Covid-19 has struck, a lot more people are getting acquainted with remote working and the video calls that come with them.

Video 359
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Taking Firebase Serverless – Mobile and Web Applications Made Easy

Toptal

Mobile and web applications typically need a back-end server, which requires maintenance, updates, backups, and more. So why not dispense with them? In this article, Toptal Java Developer Phillip Edwards outlines how you can use Google Firebase to develop serverless applications without incurring a lot of costs.

article thumbnail

Tips for Better Remote Meetings

Agile Alliance

As of this week, many people who are accustomed to going to the office are working from home. I myself am mostly staying at home, avoiding face-to-face interaction with colleagues and friends, especially those over 65 or with medical issues. That means more remote meetings, remote working sessions, and remote social catch ups. (My book … Continued.

Meeting 327
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Leaders Share about Diversity and Inclusion: A Frontline Festival

Let's Grow Leaders

Welcome to the Let’s Grow Leaders Frontline Festival! This month, our contributors share their thoughts about diversity and inclusion AND we share some powerful videos on the subject. Thanks to Joy and Tom Guthrie of Vizwerx Group for the great pic and to […]. The post Leaders Share about Diversity and Inclusion: A Frontline Festival appeared first on Let's Grow Leaders.

Video 177

More Trending

article thumbnail

How to successfully work from home: strategies for remote work

CircleCI

Remote work is top of mind right now for many employees, teams, families, and companies suddenly faced with a very new work situation. For many people, this is the first experience they’ve had working from home for an extended period while also trying to figure out how to establish a new normal. On top of the standard challenges involved with switching to a fully-remote setup, many people are also dealing with a host of unexpected changes – kids who need to continue learning while schools are cl

Strategy 141
article thumbnail

Digital Transformation Efforts Hindered by Lack of Upskilling

DevOps.com

There’s no digital transformation without a staff transformation. The people skills that helped bring successful enterprises to where they are today won’t be the skills that will make them successful tomorrow. Fortunately, Leadership Suite readers are well aware at how important it is for the success of their organizations to close the gaps between the […].

article thumbnail

How to remove blind spots with visual testing

TechBeacon

Visual bugs are errors in the presentation of an application. They appear all the time, and frequently surface when applications are viewed in the various viewport sizes of our mobile devices (laptops, phones, tablets, watches).

Testing 128
article thumbnail

Five security risks companies face as workers go remote

Darktrace

Companies need to leverage technology that can allow them to continue to operate amidst uncertainty without choking productivity at this critical time.

Company 136
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

5 Ways to Protect Your Company From Cybercrime

CTOvision

Read Lucas Miller’s article listing five ways in which you can protect your small and medium businesses from cyberattacks on Entrepreneur : Some small- to medium-sized businesses (SMBs) consider cybersecurity an issue to be dealt with once their budget is a bit larger. Unfortunately, it is these businesses that are most likely to be targeted […].

Company 101
article thumbnail

Article: Q&A on the Book AI Crash Course

InfoQ Culture Methods

The book AI Crash Course by Hadelin de Ponteves contains a toolkit of four different AI models: Thompson Sampling, Q-Learning, Deep Q-Learning and Deep Convolutional Q-learning. It teaches the theory of these AI models and provides coding examples for solving industry cases based on these models. By Ben Linders, Hadelin de Ponteves.

Course 113
article thumbnail

Push Security to the Edge: Overcoming Edge Computing Challenges

CTOvision

Read why Ken Mafli says it is necessary to protect the edge computing environments from cyberattacks on Infosec Magazine : The best attacks are the ones you never see coming. While most data centers are the focus of cybersecurity hardening, edge computing environments can sometimes be overlooked. Given this, groups like MoneyTaker exploit edge environments to […].

article thumbnail

6 trends framing the state of AI and ML

O'Reilly Media - Ideas

O’Reilly online learning is a trove of information about the trends, topics, and issues tech leaders need to know about to do their jobs. We use it as a data source for our annual platform analysis , and we’re using it as the basis for this report, where we take a close look at the most-used and most-searched topics in machine learning (ML) and artificial intelligence (AI) on O’Reilly [1].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

DevOps Institute Announces Virtual SKILup Days to Advance the Humans of DevOps

DevOps.com

Due to Coronavirus concerns and social distancing practices, DevOps Institute has migrated all SKILup Day events to one-day, virtual micro-conferences available for free to the global community BOCA RATON, Fla., March 19, 2020 — DevOps Institute, a global member-based association for advancing the human elements of DevOps, today announced eight Virtual SKILup Day micro-conferences starting […].

DevOps 110
article thumbnail

What Is Continuous Integration?

Flexagon

DevOps is a transformational way of thinking about software development, converting a slow, cumbersome, long-term process to an agile, nimble, responsive one. As DevOps is adopted and accepted worldwide, language and terms specific to DevOps are being used more as well. However, for people new to DevOps – and even those that are familiar with. The post What Is Continuous Integration?

article thumbnail

How Machine Learning Can Strengthen Insider Threat Detection

CTOvision

Read Akshaya Asokan explain how machine learning could increase insider threats detection on Bank Info Security : As companies continue to grapple with the challenges of insider threats, machine learning coupled with behavioral analytics can assist in predicting and detecting potential threats from employees and contractors, according to a panel of security experts at RSA […].

article thumbnail

Covid-19 panic brings misinfo, malware, unintended consequences

TechBeacon

The novel coronavirus is affecting the world of infosec. From misinformation spread by your Facebook friends, through malware distribution, to the DDoS’ing of health agencies.

Malware 105
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Experian’s Data Breach Preparedness Study: Increased Investments in Security Aren’t Stopping Breaches

CTOvision

While corporations today are more knowledgeable about security threats and prepared to respond to data breaches, there are key areas in which progress declined in 2019. Experian® released its seventh annual corporate preparedness study, Is Your Company Ready for a Big Data Breach?, revealing that cybercriminals may still be one step ahead of companies’ security […].

Study 95
article thumbnail

Women Should Be In the Kitchen…Of Every Software Development

CEO Insider

My technology career was born out of administrative heartbreak in a shared storage closet. That’s where I poured through cancer patient records to identify individuals who could participate in clinical trials. It was part of my internship at an oncology clinic. I could spend one to two hours reviewing an individual patient’s chart, getting excited […].

article thumbnail

Shyam Sankar Provides Context on Make vs Buy in the Federal Ecosystem

CTOvision

Note: I realize that so many are focusing hard on our collective actions to beat the COVID-19 pandemic and was thinking of holding off this article till we can return more focus to enterprise IT. Then I realized that this article may be more important than ever. If you know of anyone anywhere in government […].

article thumbnail

How I Built a Machine Learning Pipeline on AWS for Under $7 a Day

CloudZero

Andreessen Horowitz recently published a blog about the Heavy Cloud Costs and Scaling Challenges of The New Business of AI , in which they describe how AI companies are facing cloud cost challenges, which are impacting their margins. As someone who used to manage a fully home-grown on-site distributed speech recognition platform for an industry leader, I know firsthand that ML can be expensive and challenging to maintain.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Executive Spotlight: Clement Perrette, Senior Portfolio Manager At RAM Active Investments

CEO Insider

Clement Perette spent over twenty years working his way up within the financial sector in Europe, building an impressive career in Paris and London. During that time, he held high-level positions within some of Europe’s top banking institutions, including Barclays, until he retired from the industry in 2013 in an effort to create a more […].

Banking 98
article thumbnail

Day 2 for the Operator Ecosystem

DevOps.com

The original focus for Kubernetes was very much on stateless applications, which don’t rely on coordination between instances or sharing data between client sessions. In practice, that usually means that we can stop and start our stateless applications without data loss or impacting on client connections. If all applications were stateless, the world of application […].

article thumbnail

Are You Aware of DevOps Top 10 Trends in 2020?

Kovair - DevOps

The popularity of DevOps is getting high day by day due to the involvement of technologies like AI, IoT, and so on. Such technological implementations.

DevOps 98
article thumbnail

2nd Watch Allies With GitLab for Managed DevOps Service

DevOps.com

2nd Watch today launched a managed DevOps service based on the continuous integration/continuous deployment (CI/CD) platform from GitLab that it will operate on behalf of customers in addition to coaching them on how to adopt best DevOps practices. Stefana Muller, a senior product manager, said the 2nd Watch Managed DevOps service combines the managed and […].

DevOps 88
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Setting Staff Up for Remote Success with a Well-Planned Policy

TechSoup

Most nonprofits have standard policies and procedures for working in an office setting. But when a crisis hits such as the current pandemic , many organizations are just navigating the waters when it comes to how to react to such global threats and shift to a remote working environment.

article thumbnail

Running Kubernetes in Production: Make Sure Your Routing Strategy Works

DevOps.com

Managing Kubernetes deployments in production raises some rather complex challenges. The dynamic nature of network communication in containerized environments produces unique operational issues–capable of bewildering even experienced DevOps teams. To mitigate these issues, software-based routing components offer key advantages across a number of areas.

article thumbnail

Error'd: Let's Dazzle Them with Errors!

The Daily WTF

"Hmmm.Somehow, I can't seem to remember the password for this particular AppleID," writes Thomas G. . "The video will be finised processing in roughly 585 million years. (That's later than the lifetime of some of the stars in the Orion constellation)," David K. wrote. . Brian A. writes, "AWS Canary only speaks English, huh?

AWS 81