Wed.Jul 11, 2018

article thumbnail

Changing the Culture by Changing Habits

Agile Alliance

By Jutta Eckstein and John Buck We hear people often say that an Agile transformation implies a culture change and that this culture change refers actually to a change of the mindset. However, what does this really mean, and how can you possibly change the culture (or help others do it)? The very first answer … Continued.

Culture 213
article thumbnail

DevOps vs. SRE: What’s the Difference Between Them, and Which One Are You?

OverOps

DevOps or SRE? We’re going over the two concepts, highlighting the differences between them and trying to understand how each one came to be. DevOps and SRE seem like two sides of the same coin. Both titles aim to bridge the gap between development and operation teams, with a unified goal of enhancing the release cycle without any compromises. And indeed, in most companies we can see that there’s a requirement for just one of these positions, with an overlap in responsibilities and abilities.

DevOps 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Are You Accidentally Reinforcing What You’re Trying to Change?

Change Starts Here

There once was an organization that was very hierarchical and authoritarian. People were accustomed to waiting until their boss told them what to do, even at the highest levels of leadership. Working, or even talking, with someone who was more than one organizational level away (like your boss’s boss) wasn’t “allowed.” As a result, no […].

article thumbnail

Building an ASP.NET Web API with ASP.NET Core

Toptal

ASP.NET Core is a leaner and more modular redesign of ASP.NET 4.x. In this article, Toptal Freelance ASP.NET Developer Damir Imangulov shows how to build a robust RESTful API using ASP.NET, EF Core, AutoMapper, and XUnit.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Technology To See at the 2018 DoDIIS Worldwide Conference

CTOvision

One of the great things about the DoDIIS Worldwide Conference (Aug 12-15 Omaha, Nebraska) is the expo floor. It is unlike any other tech conference. This one is filled with providers of great technology who know the importance of support to national security missions. The problem is that there are so many great solutions demonstrated [.].

More Trending

article thumbnail

How Strong is Your Leadership Pyramid?

Next Level Blog

This post is adapted from the forthcoming third edition of my book, The Next Level: What Insiders Know About Executive Success. Available in October, you can pre-order it here. Research shows that moving to the executive level is among the toughest transitions of any career. For example, a study conducted by the Center for Creative Leadership shows that 40 percent of new executives fail within eighteen months of being named to their positions.

article thumbnail

It may be years before you have a real AI driven car, the AI Chips arms race and Silicon Fens – a new place for cyber talent

CTOvision

The following are some of the stories we are tracking in the world of AI: The AI revolution has spawned a new chips arms race No doubt that artificial intelligence is the future. In its wake, AI and machine learning have spawned a new chips arms race involving tech giants and a plethora of chip [.].

article thumbnail

Choose your date for the Advanced ScrumMaster class

Agile42

Second half of the year is going to be very exciting, as we are starting to offer advanced classes for ScrumMasters and other practitioners who want to take the next step in learning, scaling, and dealing with resistance, in order to become true experts. Our book The Hitchhiker’s Guide to Agile Coaching is a good starting point to explore our approach to coaching and facilitating teams.

SCRUM 61
article thumbnail

Facebook lets Mail.Ru access to sensitive user information, Macy’s mega data breach, Apple insider stole driverless car secrets, YouTube’s Incognito Mode

CTOvision

The following are some of the cybersecurity related topics we wanted to bring to your attention: Russian company had access to Facebook user data through apps Facebook's woes continue! Facebook apps from Mail.Ru are being reviewed as part of Facebook's probe into user data misuse. Even after the huge public outcry for letting Chinese phone [.].

Data 60
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

CIOs Need To Know: Will AI Be A Good Or A Bad Thing For Their Company?

The Accidental Successful CIO

Sure AI is powerful, but can it be too powerful? Image Credit: A Health Blog. As the person with the CIO job, it is our responsibility to stay on top of all of the new technology that is out there because we understand the importance of information technology. Our goal has to be to understand how the new technology works and to determine whether or not it can be useful for our company.

Company 56
article thumbnail

The Future of Work: A View from Seattle

Toptal

Major economic forces are shaping the Future of Work. Toptal sits down with executives from Seattle to hear their perspective on topics impacting companies across the US, including the talent gap and the looming threat of disruptive innovation.

article thumbnail

Reproducible Heisenbug

The Daily WTF

Matt had just wrapped up work on a demo program for an IDE his company had been selling for the past few years. It was something many customers had requested, believing the documentation wasn't illustrative enough. Matt's program would exhibit the IDE's capabilities and also provide sample code to help others get started on their own creations.

article thumbnail

Search Git Commits Between Dates

David Walsh

One of my weaknesses as a developer is relying on UIs to provide me the data I need. It’s not a fatal weakness but it does hamper me a bit. One prime example is relying on GitHub’s interface to review changes; git’s command line provides the information needed with commands but the UI is just so much nicer. I recently needed to trace back commits to find a problematic commit between a given date range.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Post-platform Enterprise Pattern: Faster and Cheaper Inter-Enterprise Ecosystem Business

BPM

In the modern business world, the vast majority of work is done by joint efforts of two or many enterprises. Inter-enterprise “working together” is a norm right now. Each effort may have a different longevity: one-off or sporadic or permanent (as B2B partnership).

article thumbnail

Simply Powerful Data Protection for Midsize Orgs at the Lowest Cost to Protect

Dell EMC

Dell EMC Data Protection had a very strong start to the year with IDC reporting that Dell extended our #1 share lead in the Worldwide Purpose Built Backup Appliances (PBBA) segment1 and also gained share in the Data Protection & Recovery software segment2. The gains we made in PBBA were not only significant for Dell, they were record-breaking, representing the largest year-over-year share gain that we’ve ever recorded in IDC’s published estimates going back to Q120111.

Data 44
article thumbnail

We’re hosting a webinar – Can GPU Databases Perform at Scale in Finance?

SQream

Banks and financial services are experiencing a real need for solutions that provide performance-at-scale. New regulations like FRTB (also called Basel IV FRTB). The post We’re hosting a webinar – Can GPU Databases Perform at Scale in Finance? appeared first on SQream - GPU Data Warehouse.

article thumbnail

Ride the HCI Growth Curve with the New Dell EMC IDPA DP4400

Dell EMC

If you’re seeing demand for hyper-converged infrastructure (HCI) exploding among your customers, you know the reasons: increasing demand for virtualization, scalable solutions, and data protection and disaster recovery. From what market researchers tell us, the HCI growth curve will continue for years to come. Given that ideal sales environment, the announcement of the new Dell EMC Integrated Data Protection Appliance (IDPA) DP4400 is a welcome news for a Dell EMC channel partner such as yoursel

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Expanded Privacy Protections Granted to California Residents: The California Consumer Protection Act

Coalfire

In late June, California passed a new consumer privacy law—the California Consumer Privacy Act (CCPA). This statute provides protections to California residents; but it will also have wide-ranging effects outside of California as it will apply to organizations that conduct business in California. The CCPA, which goes into effect on January 1, 2020, will be the broadest privacy law in the United States, granting more protections to personal data than any current privacy statute.

article thumbnail

Why You Should Grow Your Own Scrum Masters Instead of Bringing in Outside Coaches

Net Objectives

If you are kicking off new teams there are two types of coaches you can bring in. While it's useful to bring in someone who can actually help with the work, such as a technical or ATDD coach, when it comes to Scrum or Agile coaches it's usually better to grow your own.There are several reasons for this: . investing in your people pays off big dividends in many ways - morale, demonstration of a commitment to them, and a guarenteed return. it is harder to learn your own environment and product th

SCRUM 40
article thumbnail

Kubernetes Operators and CRDs with Ambassador: Admiralty Share Their Research

Daniel Bryant

Adrien Trouillaud has recently published an article on the Admiralty blog about his experience of creating a Kubernetes Custom Resource Definition (CRD) for the Ambassador API gateway. With the aiming of helping to guide tool choice for Kubernetes developers and platform operators looking to create extensions, he prototyped the Ambassador shim using three open source development kits in this space: Kubebuilder , the Operator SDK and Metacontroller.

article thumbnail

Lean Thinking on Frameworks Vs the Work in Them

Net Objectives

One of the central tenets of Lean is that the system people are in impacts them significantly. This does not mean, however, that one can just create a new system and put people in it - this would be a perversion of Lean-Thinking. Lean suggests sysetms support our people. But this presumes they are capable of getting their work done. Putting people into a potentially Agile system does not teach someone actual Agile skills. .

Agile 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Network of Terror Leads to Charging of Iranian Diplomat

The Cipher Brief

This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. ?. Cipher Brief Members engage in high-level conversations about national and global security issues every day. If you’re not already a member, you should be. ?. If you are experiencing any issues with signing up or signing in, please drop an email to support@thecipherbrief.com. ?.

Network 37
article thumbnail

A six-step approach to Zero Trust in today’s perimeterless world

Netskope

Zero Trust is a security concept that is centered around the belief that organizations should not trust anything inside or outside its perimeter and instead must verify anything trying to access systems. Zero Trust is rooted in the principle of “trust, but verify,” which became a well-known phrase used by President Ronald Reagan on multiple occasions in the 1980s in the context of nuclear disarmament.

Cloud 40