Mon.Dec 17, 2018

article thumbnail

An Interview with Greg DeArment, Head of Infrastructure at Palantir

CTOvision

This post captures the results of an interview with Greg DeArment, Head of Infrastructure at Palantir. Topics we covered included how Palantir manages the production environment for their modern data platform Foundry, with a special focus on Kubernetes. Gourley: Greg before we get started can you tell me a bit about yourself? DeArment: I joined […].

article thumbnail

Kindle edition of Refactoring now available from Amazon

Martin Fowler

Amazon is now selling the Kindle edition of Refactoring. As I write this, it's touch more expensive than the hardback since they are currently discounting the hardback but not the electronic version. more….

274
274
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Top 5 Ways DevOps Fails – and How to Prevent Them

DevOps.com

The working hypothesis for a Gartner report on how to avoid failure with your DevOps effort is that, unless the trajectory changes, “Through 2023, 90 [percent] of DevOps initiatives will fail to fully meet expectations.” The reason? You could boil it down to management not fully understanding DevOps tenets and nuances—things such as targeting business […].

DevOps 109
article thumbnail

The 3 most in-demand skills for IT Ops pros

TechBeacon

Enterprises are on the hunt for a new breed of IT Ops specialists. They want professionals who can manage complex cloud infrastructure, who are comfortable coding script, who know how to use data science and AI to optimize systems management, and whose skills bring application performance and site reliability to the fore.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Future of Cloud Services

CTOvision

Read how cloud computing can impact future businesses on CIO : Savvy businesses are increasingly turning to the cloud to reduce costs and increase business efficiency by moving from infrastructure-based operations to application-based operations. And as the cloud becomes more sophisticated, the operational advantages are becoming clearer. No longer do businesses need to install, operate and […].

Cloud 82

More Trending

article thumbnail

Scalability On The Blockchain – Is There A Solution?

CTOvision

Read why Gerald Fenech says that blockchain tech is the future for enterprises on Forbes : Enterprises want blockchain. In fact, 84% of executives say their companies are actively involved in this emerging technology. However, enterprises have not yet been able to efficiently implement it. The main issue seems to be scalability, according to reports, 40% […].

article thumbnail

4 Reasons You Should Still Opt for a Brick-and-Mortar Store

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

81
article thumbnail

Microsoft takes on Google Optimize with Clarity

CTOvision

Microsoft today launched a new web analytics product in beta. Clarity is designed to help developers understand user behavior at scale, including why users struggle, where they run into issues, and why they abandon a website. The web analytics space has seen quite a bit of movement over the past two years. Google Optimize 360, the […].

article thumbnail

Should Your Company Hire Remote Full-Stack Developers?

DevOps.com

Is your company seeking to hire a qualified full-stack developer? It seems like an easy enough task—create a job listing, read resumes, conduct technical interviews and make the hire. Finding engineers who understand every layer of the stack is difficult, however. Companies compete for the best and brightest full-stack developers and, unfortunately, they are in […].

Company 84
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

An Intel Breakthrough Rethinks How Chips Are Made

CTOvision

On Wednesday, Intel demonstrated its new 3-D packaging technology, called Foveros, which allows it to stack logic chips atop one another. Various methods of going vertical have boosted memory chips recently, but after years of research, Intel will be the first to bring 3-D stacking to CPU, graphics, and AI processors at scale. It’s not […].

article thumbnail

Memory leaks in iOS

Apiumhub

By Apple’s definition, a memory leak is: “Memory that was allocated at some point, but was never released and is no longer referenced by your app. Since there are no references to it, there’s now no way to release it and the memory can’t be used again.” To fully understand memory leaks we first must explain how the memory management works on iOS. .

article thumbnail

Key enterprise cloud trends for 2019

CTOvision

Read James Kobielus list the top enterprise cloud trends for 2019 on Infoworld : Cloud computing has become the principal paradigm for enterprise applications. As businesses modernize their computing and networking architectures, cloud-native architectures are the principal target environments. As 2019 approaches, it’s clear that the trend toward all-encompassing cloud computing is not slowing down.

Trends 73
article thumbnail

Change in the Workplace Starts with You

Symantec

Ian K. reflects on his experience attending Tech Inclusion London, and how his personal journey continues to motivate him to challenge the status quo.

77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Simplifying Surveillance in the Age of More

Dell EMC

Why an integrated, enterprise approach to IoT surveillance is the way forward More cameras, more sensors, more intelligence?today’s advanced video surveillance systems do more than ever before to protect people and property, with applications far beyond perimeter monitoring and access control. However, as a recent IDC white paper points out, putting new surveillance technologies to work quickly gets complex.

IoT 67
article thumbnail

Rethinking Security for Public Cloud

Symantec

Symantec’s Raj Patel highlights how organizations should be retooling security postures to support a modern cloud environment

Cloud 80
article thumbnail

E2E Testing with Cypress Automation: UI & REST API

Gorilla Logic

In this blog post, I will share my experience about Cypress automation technology. Cypress is an excellent end-to-end automation framework for web applications ( Cypress.io: JavaScript End to End Testing Framework ); it is written in JavaScript and used for UI and REST API test automation. In this article, I want to show you how to do UI & REST API automation using Cypress by using both the Cypress UI test runner and the “headless browser” (a web browser with no graphical user interface).

Testing 56
article thumbnail

CodeSOD: A Short Leap

The Daily WTF

You know the story. A report is spitting out the wrong dates. Someone gets called in to investigate what’s wrong. After digging through piles of deeply nested SQL queries and views and trying to track down the problem, it turns out someone wrote their own date handling code which is wrong. Darin P found the code this time. SET @EDate = (SELECT CAST(CAST(CASE WHEN MONTH(GETDATE())-1 = 0 THEN 12 ELSE MONTH(GETDATE())-1 END AS NVARCHAR). + '/' + CASE WHEN MONTH(GETDATE())-1 = 2 THEN '28

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

LOCO Innovations Releases Loco v1.5, Adding New Reporting Tools Via Google Documents to No-Code App Development Platform

DevOps.com

EVANSTON, IL (December 14, 2018) – Today, LOCO Innovations, LLC announced the release of Loco v1.5, the latest update to the no-code app development platform that launched earlier this year. In the new version, Loco users have the ability to generate and format custom reports using standard word processing features using Google Docs. Once the […].

Report 53
article thumbnail

Cloud Nine: All Your Analytics, Wherever You Want Them. Really!

Teradata

Brian Wood explains how Teradata Vantage in the cloud has your back when it comes to analytic simplicity, control, effectiveness, and results.

article thumbnail

Landing The Right Hire: When It’s Time To Walk Away

Battery Ventures

The job market is hotter than ever. Unemployment is hovering at 3.9% , the lowest level in 18 years, plus the economy is enjoying its longest-ever streak of month-to-month job growth. It’s unquestionably a candidate’s market – doubly so if you’re hiring for in-demand skill-sets or senior-level candidates. And that creates pressure to fill positions fast and, potentially, ignore red flags.

Travel 51
article thumbnail

AWS Service Icon Vector Pack: Part Deux

CloudZero

We’re back with another giveaway, and this time it includes every icon released by Amazon in their AWS Architecture Icon PowerPoint deck. You can find the original deck here. The link below provides an svg file for every service and resource icon provided by Amazon in the PowerPoint file each grouped by the service category. That is a total of over 300 icons for you to use when creating your architecture diagrams, in SVG format so you never have to worry about size or screen resolution.

AWS 45
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Four short links: 17 December 2018

O'Reilly Media - Ideas

Open Source Licensing, Computer History, Serverless, and Wicked Problems. Open Source Confronts Its Midlife Crisis (Bryan Cantrill) -- To be clear, the underlying problem is not the licensing, it’s that these companies don’t know how to make money—they want open source to be its own business model, and seeing that the cloud service providers have an entirely viable business model, they want a piece of the action.

article thumbnail

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2018: Dell EMC Storage Perspectives

Dell EMC

As we wrap up the year of 2018, it’s always nice to squeeze in one more conference to talk about Dell EMC storage products. For us, this was Gartner’s IT Infrastructure, Operations & Cloud Strategies show in Vegas. This conference traditionally gets C-level executives, storage administrators, industry analysts and decision makers together for four days to hear thought-leadership and strategies regarding technology solutions.

Storage 43
article thumbnail

What Is an Involuntary IT Manager?

Arcserve

It’s a story recognized by a large number of SMBs operating today. Something happens to an employee’s computer. They take a little while to try to resolve the problem themselves. Then they ask their colleagues to diagnose their issue. And in a last ditch effort to get their machine going, they contact IT. The IT. Read more » The post What Is an Involuntary IT Manager?

article thumbnail

A³ and CARES Employee Resources Groups Host Junior Achievement Students at Houston Office

Capgemini

On October 12, 2018, the Capgemini Houston office hosted high school students from Junior Achievement (JA) of Southeast Texas. The selected students are part of the STEAM (Science, Technology, Engineering, Art & Math) program at Alief Early College High School. They are all high-performing students completing dual credit college & high school courses.

Groups 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Malware Analysis using Osquery | Part 3

AlienVault

In part 1 of this blog series, we analyzed malware behaviour, and, in part 2 , we learned how to detect persistence tricks used in malware attacks. Still, there are more types of events that we can observe with Osquery when malicious activity happens. So, in the last blog post of the series, we will discuss how to detect another example of a technique used in a malware attack, one that involves installing a root certificate in the system that can be used to intercept information transmitted over

Malware 40
article thumbnail

Top 10 Posts of 2018

Nathan Magnuson

The seventh year of the Everyday Leadership blog has come to a close in 2018. Here are the Top 10 works (not just posts this time!) from the year. (By the way, you can view all my past Top 10 posts as well.). Ignite Your Leadership Expertise. My first book Ignite Your Leadership Expertise was published earlier this year! The book shows how to grow your expertise in leadership while also growing trust with the people around you.

article thumbnail

The Urgency of Resetting Relations With China

The Cipher Brief

Bottom Line Up Front: The Trump Administration is confronting China on issues that have been developing for years and have percolated to the top of a list of concerns that are affecting bilateral relations. The current 10% tariff on $250 billion of goods could escalate to 25% or higher if trade issues aren’t resolved in the next few months. A failure to resolve them, ideally through diplomacy, could lead to a new cold war with China.