Thu.Mar 07, 2019

article thumbnail

Standing on the Shoulders of Giants: Russell Ackoff

Agile Alliance

This entry was written as part of the Supporting Agile Adoption program, an Agile Alliance initiative dedicated to supporting organizations and their people become more Agile. As a member of the Supporting Agile Adoption initiative, I was fortunate recently to spend a few days in a workshop with Agile thought leaders from a number of … Continued.

Agile 201
article thumbnail

How to Unlock Your Team’s Best Ideas

Let's Grow Leaders

To get your team’s best ideas, ask courageous questions. Have you ever watched a team member do something insightful, helpful, or creative and asked them why they hadn’t shared it with everyone else? Their answer holds the key to unlocking your […]. The post How to Unlock Your Team’s Best Ideas appeared first on Let's Grow Leaders.

How To 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Assessing Manager Commitment to Change

Change Starts Here

A recent article at Harvard Business Review titled, “Why Visionary Leadership Fails,” describes how it is counterproductive to teach managers how to lead change if they aren’t in fact committed to leading the desired change, project, or strategy. If managers become strong change leaders but aren’t aligned with leading the change vision cast by senior […].

article thumbnail

Report Identifies DevOps Skills in Highest Demand

DevOps.com

When it comes to DevOps there’s general agreement that a skills shortage is holding back broader adoption. The real issue, of course, is identifying what specific DevOps skills are required most. With that goal in mind, the DevOps Institute this week published a report that finds the DevOps skills most in demand fall into three […]. The post Report Identifies DevOps Skills in Highest Demand appeared first on DevOps.com.

DevOps 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to do application security on a budget

TechBeacon

As a bit of a thought experiment, I asked myself, “What if I had to develop an application security program with a budget of zero dollars? How would I do it?” People often talk about unlimited security budgets. Some of the largest financials in the world have gone on record to say that there is no limit to what they'll spend on cybersecurity.

Budget 110

More Trending

article thumbnail

Data-driven Design and Generative Design – An Overview

Toptal

Data-driven and generative design are two important design processes that can be exploited at the same time to create better product designs and user experiences.

Data 110
article thumbnail

Is Your Digital Product Ready for International Prime Time?

DevOps.com

When a digital product is developed in and for a particular geography and market, the enterprise and developer/architect function is focused on getting it to market first. Once it matures and receives greater engagement, enterprise is then looking to continuously add and develop a stable product that is feature-rich, scalable and robust. So, when the […].

article thumbnail

Edge computing yields deeper insights, faster

Enterprise.nxt

Transformational opportunities powered by edge computing are almost limitless. Real-time analytical power for things like automation, prediction, and control means more agility and business value. Here’s a quick guide on why you must expand your digital foundation to the edge and where to start.

Agile 97
article thumbnail

Lessons learned building natural language processing systems in health care

O'Reilly Media - Ideas

NLP systems in health care are hard—they require broad general and medical knowledge, must handle a large variety of inputs, and need to understand context. We’re in an exciting decade for natural language processing (NLP). Computers will get as good as humans in complex tasks like reading comprehension, language translation, and creative writing.

System 93
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Preparations for Full Duplex DOCSIS® 3.1 Technology are Marching Along

CableLabs

Built on the successful completion of CableLabs’ DOCSIS 3.1 specification, Full Duplex (FDX) DOCSIS® 3.1 technology is a key component of the 10G platform that will significantly elevate the level of services available to consumers using existing cable broadband networks. With FDX DOCSIS 3.1 technology, the same frequencies are simultaneously used for both upstream and downstream traffic, virtually doubling the capacity of the coaxial cable.

article thumbnail

At RSA, it is clear encryption divide is as wide as ever

Synopsys

Selective encryption backdoors don’t work; the laws of mathematics don’t know or care who you are. But the concept was still under intense debate at RSA 2019. The war on, and about, encryption, with law enforcement and intelligence agencies on one side and privacy advocates on the other, is very much alive. A couple of […]. The post At RSA, it is clear encryption divide is as wide as ever appeared first on Software Integrity Blog.

article thumbnail

8 ways blockchain will change finance & accounting

DXC

Blockchain is rapidly evolving from hype to high-value technology with real-world applications in business. In 2017, blockchain began making its way onto the roadmap of business process services. Now it is emerging in full operational deployments and disrupting fundamental business processes related to buying and selling and converging into mainstream accounting technology used to record […].

article thumbnail

Mitigating the Kubernetes API Server Patch Permission DoS Vulnerability (CVE-2019-1002100)

Aqua Security

A new medium severity vulnerability in the open source Kubernetes has been disclosed (CVE-2019-1002100) that can, if exploited, lead to a denial-of-service on the K8s API server, which in turn may lead to the cluster becoming inoperable. The best mitigation is to remove the “patch” permissions from untrusted users, and we have also updated Kube-Hunter to check if your cluster is vulnerable.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Introducing Google Cloud Hands-On Labs by Linux Academy

Linux Academy

Linux Academy is the industry-leading hands-on lab cloud training platform with unique hands-on labs that are not found anywhere else. These labs and platforms are a reflection of our core belief of supporting students in their mission to learn and grow and also pushing the boundaries of online learning, and we’ have even more to deliver. Recently, we expanded the hands-on lab platform to include: instant labs , instant terminal , Cloud Playground , and Cloud Sandboxes.

article thumbnail

Bakers Half Dozen – Episode 5

Dell EMC

Episode 5 Show Notes: Introduction with Matt Baker Item 1 – The State of AI in 2019 Item 2 – Machine Learning Algorithms Wired: How Netflix uses Machine Learning algorithms to make recommendations Forbes: Mastercard uses AI to stop fraud AI and Password security Item 3 — Deep Learning vs Machine Learning GAN Defined Check it out: thispersondoesnotexist.com Item 4 – Does Deep Learning lack common sense?

article thumbnail

RSA 2019: Watch Nikesh Arora’s Keynote

Palo Alto Networks

Palo Alto Networks CEO Nikesh Arora appeared on the RSA Conference keynote stage Wednesday, sharing his thoughts on cybersecurity, including why it’s an amazing time to be in the industry. Arista Networks CEO Jayshree Ullal joined him for a chat on issues including disruption, embracing change and inclusion & diversity. “Products are the most important thing in what we do for a living.

article thumbnail

New Hands-On Training Content, Enterprise Platform Features, & Free Gems Coming | April Live Shows

Linux Academy

The Linux Academy Live Show Returns in April. Join us to interact with our team and see the latest and greatest in cloud and Linux online training! You won’t want to miss our April Live Shows. Join Anthony James, Founder and CEO, and Chris Fisher, VP of Community as they take you behind the scenes of the most significant platform updates in our history: New hands-on training content to keep you ahead of the curve.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Releases Keep Rollin’ In

Flexagon

Flexagon has released FlexDeploy 5.0.0.4! The new version includes enhancements and bug fixes for FlexDeploy, our DevOps platform for continuous delivery and release automation. A few highlights include a new Helm plugin which streamlines installing and managing Kubernetes applications ongoing improvements for REST APIs ODI support for deployment archives Flexagon also released two new FlexDeploy jumpstart demo labs for Oracle E-Business.

article thumbnail

How to Increase AWS Certifications by 50% | Rackspace Case Study

Linux Academy

Rackspace is a global leader in IT services that helps businesses tap into the power of cloud computing and provides managed hosting services across public and private clouds. “Rackers” (Rackspace employees) deliver expert advice and integrated managed services across public and private clouds, managed hosting, and enterprise applications.

article thumbnail

Architectures

DevOps.com

The post Architectures appeared first on DevOps.com.

article thumbnail

Cloud Computing’s Value Proposition | Maximizing Business Value with AWS

Linux Academy

One of the most attractive aspects of cloud computing is its “pay as you go” pricing model. This can dramatically cut capital expenditures and replace them with operational expenses that offer more control and much greater flexibility to the enterprise. Amazon Web Services’ broad portfolio of solutions and services empower organizations to drive measurable business success including cost savings, cost avoidance, and operational resilience, with dramatic reductions in downtime, improved resource

AWS 60
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

4 Steps to Take When Someone Breaches Your Data

Arcserve

IT teams have many important jobs, and one of those is drafting a data security strategy for their business. And, since no plan is perfect, a key part of this strategy is devising a plan of action in case a hacker infiltrates the security measures in place. Here are a few steps you may consider. Read more » The post 4 Steps to Take When Someone Breaches Your Data appeared first on StorageCraft Technology Corporation.

Data 63
article thumbnail

Let the cloud lift your tech career

DXC

When you write about the workplace of the future, it’s easy to focus on the jobs of the future — that is, jobs involving technologies, such as artificial intelligence (AI) and blockchain, that have yet to become common across most enterprises. Still, make no mistake: There are and will be plenty of jobs opportunities and […].

article thumbnail

Make Innovation a Viable Part of Your Company Culture: 2019 Design Thinking Conference

Praxent

Innovation is about solving problems. It’s about purposeful and outcome-driven creativity and change. It requires a certain way of thinking — design thinking. Organizations and teams who cultivate and strengthen their design thinking abilities will unlock their potential to innovate with success. >> Listen to Tim Hamilton’s Commanding Business podcast interview with Marc Stickdorn, author of This is Service Design Thinking. 2019 Design Thinking Conference | Austin, Texas.

article thumbnail

Algorithm Efficiency

Gorilla Logic

Algorithmic efficiency enables better software. The efficiency of the algorithms used in an application can impact its overall performance; hence, the importance of measuring the performance and complexity of algorithms through means that are accessible not only to mathematicians but also to any software engineer who aims to excel in algorithm design.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

RSAC 2019: The Human Side of Security and Privacy

Symantec

Research in three key areas looks into how to work with common human behaviors

article thumbnail

We’re growing CircleCI’s engineering teams in Europe; join us!

CircleCI

At CircleCI, we’ve always been committed to hiring the best people where we find them. From the start, we’ve been a distributed engineering team and we pride ourselves on continuing to be globally distributed. Our engineers are now spread between San Francisco and Tokyo, across 4 continents, and with three oceans and 17 hours time difference between them.

article thumbnail

Disaster Recovery as a Service offre un altro modo per semplificare l’IT

DXC

Il ripristino di emergenza può essere una strategia di semplificazione IT. Veramente? Puoi scommetterlo. Il ripristino di emergenza richiede un grado di impegno difficile da sostenere. Sai che devi prepararti all’inevitabile, ma richiede disciplina per mantenere i backup. È necessario anche un budget per mantenere un insieme di “dark hardware” pronto, per ogni evenienza.