Thu.Apr 11, 2019

article thumbnail

Lamenting the passing of the Golden Age of presentation visuals

Martin Fowler

For a few years it was easy to give a talk with a visual accompaniment driven by my laptop next to me. But recently it's getting harder to do this, making me wonder if I should continue designing visuals at all.

172
172
article thumbnail

How to Manage the Most Difficult Stakeholders

Let's Grow Leaders

Difficult stakeholders are a chance to grow your influence You look at the phone and your heart sinks. It’s the night before you’re supposed to wrap up your assignment and brief the leadership team on what you’ve done. It’s Bruce, a charismatic […]. The post How to Manage the Most Difficult Stakeholders appeared first on Let's Grow Leaders.

How To 154
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

5 DevOps Trends Worth Knowing in 2019

DevOps.com

DevOps today is more than the buzzword it was 10 years ago. Back then, the idea of combining development with production in your IT infrastructure was not common; the logistics were nonexistent and most of the time businesses decided it was far too much effort. However, if the last nine years has taught us anything, […]. The post 5 DevOps Trends Worth Knowing in 2019 appeared first on DevOps.com.

Trends 111
article thumbnail

Yahoo data breach settlement effort reaches $117.5 million

CTOvision

Yahoo has once again attempted to settle a class-action lawsuit involving millions of users following one of the largest data breaches in history with a revised settlement figure of $117.5 million. On Tuesday, the proposed resolution to the lawsuit was made public. The revised figure of $117.5 million has been made in response to criticism made […].

Data 97
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Developing Simple and Stable Machine Learning Models

DevOps.com

A current challenge and debate in artificial intelligence is building simple and stable machine learning models capable of identifying patterns and even objects. Is it possible to know which models will work best or to simply see the data? It is possible, and the question is figuring out how to get there. Simple models are […]. The post Developing Simple and Stable Machine Learning Models appeared first on DevOps.com.

More Trending

article thumbnail

An IDEA is Born: CableLabs Heads Up New Alliance That Will Bring Holodecks Into Your Living Room

CableLabs

CableLabs has joined forces with top players in cutting-edge media technology—Charter Communications, Light Field Lab, OTOY and Visby—to form the Immersive Digital Experiences Alliance (IDEA). Chaired by CableLabs’ Principal Architect and Futurist, Arianne Hinds , the alliance aims to facilitate the development of an end-to-end ecosystem for immersive media, including VR, AR, stereoscopic 3D and the much-talked-about light field holodeck, by creating a suite of display-agnostic, royalty-free spe

VR 104
article thumbnail

Fintech fiddles as home burns: 97% of apps found insecure

TechBeacon

This is not fine. A white-hat researcher examined 30 financial apps, looking for information security issues—worryingly, all but one of them were insecure.

Fintech 110
article thumbnail

A Nonprofit's Guide to Event Planning: 4 Essential Steps

TechSoup

Holding a fundraising event is a great way for nonprofits to earn support for their cause and attract new donors. For many nonprofit organizations, events play a key role in raising the funds needed to support the organization's projects. Events are definitely a fun way to fundraise; however, they also require a lot of hard work. The most effective fundraising events require thorough planning, collaboration between key staff members, and financial support to be successful.

Nonprofit 102
article thumbnail

Web threats affecting SMBs in 2019

CTOvision

How safe is my business online? This question goes through our minds quite a bit as we click around our emails, scroll various web pages, and consent to cookies that track our data. With a robust internet audience of over 4 billion active users, the web has turned into a playground full of data for cybercriminals. […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Kill more bugs! Add randomization to your web testing

TechBeacon

In his book Software Testing Techniques , Boris Beizer describes the Pesticide Paradox. In the context of software testing, it says that no matter what testing method you choose, you will still miss subtler "pests," or software bugs.

Testing 96
article thumbnail

Mozilla adds fingerprinting and cryptocurrency mining protection to Firefox

CTOvision

Mozilla is adding a new feature to protect you against web annoyances in future releases of Firefox. The new feature is currently available in the beta version of Firefox 67, and the nightly version of Firefox 68. They will be available in the stable release of Firefox in a few weeks. The cryptomining and fingerprinting blocks […].

85
article thumbnail

Improving Your Website Content Will Boost Your Business: Here’s How You Do It

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

94
article thumbnail

Security Configuration Benchmarks for Kubernetes

Aqua Security

When you’re running Kubernetes, how do you know whether it’s configured securely? Kubernetes is a complex system, with several control plane components, each of which has numerous configuration parameters. In some cases, it’s clear that a parameter will have a security impact – for example, providing keys and certificates for setting up secure connections between components.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

As the connectivity of trucking fleets grows, so do cybersecurity risks

CTOvision

Connectivity is changing commercial truck fleet operations. While the development of autonomous heavy vehicles is still in early stages, fleet owners have been increasingly relying on “connected” trucks to improve their uptime, safety, fuel efficiency and tracking, among other things. But every connected technology — from telematics and remote diagnostics to in-cab software and on-board […].

article thumbnail

DevOps Chat: Aqua Security Talks Funding, Security in a Cloud-Native World

DevOps.com

Aqua Security, one of the leaders in container and cloud-native security, recently announced it has raised $62 million in a “C” round of investment, led by Insight Partners. In this DevOps Chat, we speak with Rani Osnat and Andy Feit of Aqua Security about how this validates the cloud-native security field that Aqua has helped […].

DevOps 91
article thumbnail

Anatomy of a Cloud-Native Data Breach

CTOvision

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a result, cloud-native data breaches frequently have different characteristics and follow a different progression than physical data breaches. Here is a real-life example of a cloud-native data breach, how it evolved and how it […].

Cloud 79
article thumbnail

DataOps and Hitachi Vantara

Hu's Place - HitachiVantara

According to the Harvard Business Review , " Cross-industry studies show that on average, less than half of an organization’s structured data is actively used in making decisions—and less than 1% of its unstructured data is analyzed or used at all. More than 70% of employees have access to data they should not, and 80% of analysts’ time is spent simply discovering and preparing data.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

What data scientists and data engineers can do with current generation serverless technologies

O'Reilly Media - Ideas

The O’Reilly Data Show Podcast: Avner Braverman on what’s missing from serverless today and what users should expect in the near future. In this episode of the Data Show , I spoke with Avner Braverman , co-founder and CEO of Binaris , a startup that aims to bring serverless to web-scale and enterprise applications. This conversation took place shortly after the release of a seminal paper from UC Berkeley ( “Cloud Programming Simplified: A Berkeley View on Serverless Computing” ), and this paper

article thumbnail

Debugging CI/CD pipelines with SSH access

CircleCI

In my recent interactions at AWS re:invent and KubeCon, I discovered that too many existing CircleCI users were not aware of, or not using, the very useful and powerful debugging with SSH feature. This feature enables a user to troubleshoot and debug builds on the resources where the build failed. I’ll start this post with a mock dialogue that most developers more than likely have had at one time or another with their sys admins, SREs, or DevOps colleagues regarding failed CI/CD builds, and it g

AWS 75
article thumbnail

An Attempted Breach from the Attacker’s Point of View

Edgewise

Today’s news is full of data breaches and security incidents. What was once only of interest to a small portion of the technical world is now attracting more attention and questions from the non-technical population of the world. I first realized that times had changed when family members who had previously been adamantly uninterested in technology started asking me questions about a data breach they’d heard about through mass media.

Network 75
article thumbnail

Bakers Half Dozen – Episode 6

Dell EMC

Episode 6 Show Notes: Introduction with Matt Baker Item 1 – Cloud Hosting Costs Item 2 – AWS Use Soars, As Do Costs The Information Item 3 – Public Cloud is more expensive for lift and shift Item 4 – Frozen data is worthless Item 5 – Implications of modern data-centric workloads Next Platform Item 6 – The definition of “work” Item 6.5 – Man in the middle attack Close Disagree, agree, or just chat with Matt using #BakersHalfDozen.

AWS 73
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Error'd: Are You Not Satisfied?

The Daily WTF

"Does this mean that Toyota believes that hybrid owners are fundamentally unhappy with their cars?" writes Thom. . Brian K. wrote, "When I clicked on a link on our intranet for a PowerPoint presentation, clearly Microsoft thought that perfectly valid server certificates are suspicious and asked me to confirm." . "Make? Model? Year?

article thumbnail

How Designers, Developers & Businesses Work Together (Part 3)

Praxent

This article is the last in a three-part series on the human-centered design approach to new product development. For digital products that are not only human-centered and optimally functioning, but also sensitive to business constraints, designers, product leaders, engineers, coders and stakeholders must work together. This series outlines a three-part process for cross-disciplinary human-centered design.

article thumbnail

ISTR 2019: Cyber Skimming Payment Card Data Hits the Big Time

Symantec

Formjacking, while by design less attention grabbing than ransomware, is becoming a pervasive form of money-making attack

Data 86
article thumbnail

Cloud Playground Challenge

Linux Academy

Here at Linux Academy, we not only want to help you learn but also to see what you can do with your knowledge! That’s why we are introducing the Cloud Playground Challenge. This challenge is a way to show your skills while gaining between 2,000 to 10,000 gems to spend on special swag from our Swag Store ! So, what’s the challenge? We want to see you create your own Cloud Playground Project!

Cloud 60
article thumbnail

How To Package & Price Embedded Analytics

Just by embedding analytics, app owners can charge 24% more for their product. How much value could you add? This framework from Software Pricing Partners explains how application enhancements can extend your product offerings. You’ll learn: How to take a disciplined approach to pricing The three elements of the Packaging Decision Framework Ways to structure your new embedded analytics offering Download the White Paper to learn about How To Package & Price Embedded Analytics.

article thumbnail

Making Sense of Startup Ecosystem Data

Dataiku

When it comes to data on startups, Startup Genome is the gold standard - their yearly report on the startup ecosystem is well-respected (not to mention well-cited). But how are they able to find and make sense of data in order to produce it?

Data 68
article thumbnail

Why Process-to-Process Visibility Is So Important

Lacework

One of the challenges in securing processes operating in cloud environments is the visibility limitations imposed either by the cloud service provider or the customer’s solution architecture. In the case of the cloud service provider, because the environment is shared by everyone who has access to that cloud service, including many thousands of their customers [.].

article thumbnail

Connections

DevOps.com

The post Connections appeared first on DevOps.com.

105
105