Tue.May 19, 2020

article thumbnail

Preparing for a threat modeling session

Martin Fowler

Jim explains how to prepare for a threat modeling session. There are three key questions to focus on: what are you building, what can go wrong, and what are you going to do?

How To 271
article thumbnail

How to Scale Using Kubernetes: From Startup to Superstar

Blue Sentry

The post How to Scale Using Kubernetes: From Startup to Superstar appeared first on Blue Sentry.

How To 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Building blocks for a resilient organization

Agile42

By Giuseppe De Simone. It was great to have so many people attending my webinar “Building blocks for a resilient organization” on April 23rd. The subject seemed to be resonating with a big audience and I want to thank everyone for their engagement and questions and especially to the many who got back to me through Linkedin or email: it looks like the community of people who get passionate about ORGANIC agility is growing day by day.

article thumbnail

Artificial intelligence (AI) vs. machine learning (ML): 8 common misunderstandings

CTOvision

Read Stephanie Overby bust some myths about machine learning and artificial intelligence on Enterprisers Project : Some people use the terms of artificial intelligence (AI) and machine learning (ML) interchangeably. […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Is HTML a Programming Language?

The Crazy Programmer

When we talk about a programming language, we can say them as a medium to communicate with the computer. To express ourselves, we as humans talk with each other using any of our native languages but we cannot simply communicate with the computer the same way. It simply can’t understand our native language. Instead, we need a translator who can translate our language into a computer’s language.

More Trending

article thumbnail

How COVID-19 Is Impacting Nonprofits

TechSoup

Because so many things have changed in nonprofit technology since the onset of the pandemic, we thought we'd check in with some technology consultants who work with many nonprofits all across the United States to find out what changes they are seeing so far. They confirmed much of what we’ve been hearing anecdotally from nonprofits.

Nonprofit 132
article thumbnail

Cloud-Native Security and Performance: Two Sides of the Same Coin

DevOps.com

You’re running Kubernetes in a production environment, and you need to apply a patch — perhaps to a commercial application, an open source component or even a container image. How long should it take to implement that patch in production? Thirty days? One day? One hour? Remember, cloud-native environments are supposed to respond to change […].

article thumbnail

Digital transformation is not primarily about technology

Capgemini

Digital transformation is everywhere. Every company is doing it. But it is not just a technology project. Digital transformation plans need to be bigger. It is about doing business differently as markets and consumers change. Technology will underpin the transition, but the bigger initiative is actually around change management. Most companies undergo the digital-transformation process for business reasons.

article thumbnail

5 Ways to Detect Application Security Vulnerabilities Sooner to Reduce Costs and Risk

DevOps.com

Security testing has always been an important step in the application development process. Yet, traditional measures often occur too late in the process to effectively find and fix vulnerabilities before causing costly production delays, or worse, putting organizations at risk for potential security breaches. To minimize security-related costs and risks, testing needs to occur sooner […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Microsoft and Sony to create smart camera solutions for AI-enabled image sensor

CTOvision

Sony and Microsoft have joined together to create artificial intelligence-powered (AI) smart camera solutions to make it easier for enterprise customers to perform video analytics, the companies announced. The companies will […].

article thumbnail

An Architect?s Introduction to Chaos Engineering

Dzone - DevOps

Your infrastructure will fail. It’s not an if but a when. As the rise of microservices and serverless make apps more distributed, potential fault points are rising exponentially. We may attempt to engineer our systems expecting certain failures only to make things worse, such as a well-intended retry logic overloading a stressed server even worse and causing failures to cascade across the enterprise.

article thumbnail

The Dangerous Comment

The Daily WTF

It is my opinion that every developer should dabble in making their own scripting language at least once. Not to actually use, mind you, but to simply to learn how languages work. If you do find yourself building a system that needs to be extendable via scripts, don’t use your own language, but use a well understood and well-proven embeddable scripting language.

Linux 111
article thumbnail

Build for a post-pandemic tomorrow

Beyond B2B

During these uncertain times, technology has played a pivotal role in supporting our ability to keep safe while remaining connected to one another.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Datical Embraces Liquibase Identity

DevOps.com

Datical today announced that it will now operate under the moniker Liquibase to better reflect the open source tool it provides for automating database releases. At the same time, the company is promising to make it easier to upgrade from the Liquibase Pro edition of its software to Liquibase Business, a new edition that provides […]. The post Datical Embraces Liquibase Identity appeared first on DevOps.com.

article thumbnail

10 Ways AI Is Improving Manufacturing In 2020

CTOvision

Read Louis Columbus list 10 ways in which artificial intelligence is improving manufacturing on Forbes : Perceiving the pandemics’ hard reset as a chance to grow stronger, more resilient, and […].

article thumbnail

What Is MLOps & Why It Matters More Than Ever

Dataiku

When building an Enterprise AI strategy that is fit to carry the business through economic highs and lows, it’s critical to have systems for monitoring models in production and to be able to quickly introduce, test, train, and implement new models in order to shift strategies or adapt to changing environments on a dime. Enter: MLOps.

Training 105
article thumbnail

Nvidia unveils monstrous A100 AI chip with 54 billion transistors and 5 petaflops of performance

CTOvision

Nvidia unwrapped its Nvidia A100 artificial intelligence chip today, and CEO Jensen Huang called it the ultimate instrument for advancing AI. Huang said it can make supercomputing tasks — which […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How behavioral analytics tackles advanced threats

TechBeacon

As attackers become more sophisticated, your organization needs increased visibility into what's happening on its computer networks. Advanced attacks can be carried out over months or even years, so security teams need to act quickly when a foe eventually does tip his hand.

Analytics 105
article thumbnail

Dell Precision Workstations Get Smaller, Faster and Cooler

Dell EMC

High-end application users working in mission-critical workflows have historically relied on desktop workstations to provide the power and performance they required. And back when “work” was viewed as a destination, it didn’t matter. However, the workplace is changing. Whether customers are working on ground-breaking healthcare research, designing innovative engineering solutions or editing the next big TV series, they shouldn’t have to sacrifice performance for portability.

article thumbnail

Learn How To Embrace Risk-Based Vulnerability Management

Tenable

Legacy vulnerability management tools can no longer keep up with the expanding attack surface. Now is the time to focus your remediation efforts on the vulnerabilities that pose the greatest risk to your business. . There’s a growing understanding among security professionals that legacy vulnerability management tools simply aren’t cutting it anymore.

How To 101
article thumbnail

Report: COVID-19 Crisis is Driving Digital Accessibility Awareness

DevOps.com

Survey Shows Resurgence in Digital Transformation Efforts Offering Opportunity for Organizations to Become More Accessible to People with Disabilities May 19, 2020 09:00 AM Eastern Daylight Time HERNDON, Va.–(BUSINESS WIRE)–Deque Systems, a leading software company specializing in digital accessibility, today announced results of a survey showing how the COVID-19 crisis has heightened awareness of the […].

Report 98
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

When Leadership, Ingenuity and Humanity Won the Day

Next Level Blog

A few weeks ago, I received a nice comment on LinkedIn about one of my blog posts from David Hoey who shared that he’s been a regular reader since 2010 when I wrote about the leadership lessons offered by the Chilean mine rescue. I appreciated David’s note for both the kindness he showed and for bringing the memory of the rescue back to mind. In case you’ve forgotten, from late August and into early October 2010, 33 Chilean miners were trapped a half mile underground for 70 days when a collapse

article thumbnail

Responding to disruption with innovation: a three-pronged approach

Capgemini

In today’s business environment, reinvention and adaptation are the new normal for companies in every industry. An organization’s average tenure on the S&P 5000 was 33 years in 1964, , but that number is forecasted to shrink to just 12 years by 2027. Additionally, 50% of companies will be replaced in the next 10 years. In this environment, change and evolution aren’t an option – they’re a necessity.

article thumbnail

Four short links: 19 May 2020

O'Reilly Media - Ideas

This Service Helps Malware Authors Fix Flaws in their Code (Krebs on Security) — Of course the Bad Guys(tm) are going to want security audits. Of course! “We can examine your (or not exactly your) PHP code for vulnerabilities and backdoors,” reads his offering on several prominent Russian cybercrime forums. “Possible options include, for example, bot admin panels, code injection panels, shell control panels, payment card sniffers, traffic direction services, exchange services, spamming sof

PHP 98
article thumbnail

Humio accelerates its momentum with extended collaboration with IBM

DevOps.com

Humio and IBM deliver streaming observability at scale to more customers around the globe Humio is pleased to announce that we signed an agreement with IBM to make the Humio log management platform available as part of the IBM Multicloud Management Pak.Humio, the only log management platform enabling complete observability for all streaming logs in […].

96
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Small Data Revolution: AI Isn?t Just For The Big Guys Anymore

CTOvision

Read Vaibhav Nivargi explain how artificial intelligence will fuel the small data revolution on Forbes : With artificial intelligence now all around us, all the time, we must confront a […].

article thumbnail

Why is OTT the Next Logical Step for Movie Theaters?

Daffodil Software

The COVID-19 pandemic has created a big void in the film industry and certainly, the road back to normalcy will be a long one. Film exhibitors are unpredictable about how long it will take customers to return to a crowded, enclosed space, even after there is an ease in lockdown restrictions.

Film 66
article thumbnail

SmartView Essbase Ad-Hoc and EPM 11.2

Datavail

Are you getting a pop-up error in SmartView when trying a top-level SmartView ad-hoc retrieve from Essbase? In my case, I got a weird Java message complaining about “essggridoption.setAncestorTop().” Our culprit here is a combination of the order by which Essbase 11.1.2.4 patches were automatically applied when EPM 11.2 was installed, and perhaps some funny business involving how files revert to read-only status in Windows Server 2019.

Windows 59