Wed.Jul 18, 2018

article thumbnail

Data collection and data markets in the age of privacy and machine learning

O'Reilly Media - Data

While models and algorithms garner most of the media coverage, this is a great time to be thinking about building tools in data. In this post I share slides and notes from a keynote I gave at the Strata Data Conference in London at the end of May. My goal was to remind the data community about the many interesting opportunities and challenges in data itself.

article thumbnail

Scrum is not an Agile Software Development Framework

Ron Jeffries

People have been telling me for years that Scrum is not an Agile Software Development Framework. I should have paid more attention. It's still good stuff, though.

SCRUM 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chasing the Elusive Machine Learning Platform

CTOvision

If you have been following the breathless hype of AI and ML over these past few years, you might have noticed the increasing pace at which vendors are scrambling to roll out “platforms” that service the data science and ML communities. The “Data Science Platform” and “Machine Learning Platform” are at the front lines of [.].

article thumbnail

Need a Morale Boost? Reward and Recognition Can Help

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

63
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Apple iCloud data now stored on Chinese government servers, Data breach at LabCorp, SIM hijacking, Aircraft cybersecurity, half of US retailers suffer data breach in 2018

CTOvision

The following are some of the cyber security and cyber war related stories we are tracking: Apple’s iCloud user data in China is now handled by a state-owned mobile operator If you are an Apple iPhone or Mac user and are communicating with someone in China, you should be extra careful because as per the [.].

Data 65

More Trending

article thumbnail

Top NoSQL Database Engines

InfoBest

Summary. 0. Time needed to finish reading: 2-3 minutes. 1. A quick introduction. 2. Why noSQL? 3. List of top NoSQL Database Engines. 4. Conclusions. #1. A quick introduction. The overwhelming majority of projects, be it web or mobile projects, will require the use of a database technology. Choosing the right database technology is not an easy job and as an application architect you should have a very clear overview on the database engines (with their advantages and disadvantages) available out

article thumbnail

Machine Learning and AI Underpin Predictive Analytics to Achieve Clinical Breakthroughs

Cloudera

The practice of medicine is not only a science, it is also an art. With it, difficult situations will arise requiring insightful judgments made by well-trained physicians who can tailor their approach to the needs of patients. As such, we are witnessing a revolution in the healthcare industry, in which there is now an opportunity to employ a new model of improved, personalized, evidence and data-driven clinical care.

article thumbnail

Server Infrastructure Security: Just How Valuable is It?

Dell EMC

Server security. It’s kind of a big deal. But we don’t have to tell you that. As an IT leader, you understand the critical role that server infrastructure security plays in a company’s IT transformation. It’s a top priority that runs across all IT initiatives. Today’s IT departments juggle multiple things at once, often struggling to keep up with changing security demands.

article thumbnail

How to simplify the data layer with MoyaRx and Codable

Apiumhub

Today all apps are connected at some point with servers to show data. This is why it is very important to have a well defined (and simple) client implementation to avoid problems in this very important layer of the application. We will also look at a pattern widely used in REST services and how we can improve it using the latest tools provided by Rx and Swift.

Data 49
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Smart Cloud Security: Block and Quarantine Zero-day Malware in the Cloud

Netskope

The complexity of different types of malware continues to grow and zero-day malware is often missed by traditional security solutions. Often, zero-days will not become malicious until all the bits and pieces are compiled together – and by that time it’s too late. The Netskope Threat Research Labs has discovered many zero-days and continues to find more.

Malware 45
article thumbnail

[The Source Podcast] Making it REAL: for our Partners

Dell EMC

During the 2018 Global Partner Summit Keynote, our commitment to the channel was clear. Make it easier for our partners to do business with Dell Technologies is Priority #1. Part of that includes powerful new marketing tools, trainings and materials, created with you—our partners—in mind and based entirely on your feedback, as announced here on Direct2DellEMC by Cheryl Cook.

article thumbnail

ZombieBoy

AlienVault

This is a guest post by independent security researcher James Quinn. Continuing the 2018 trend of cryptomining malware, I’ve found another family of mining malware similar to the “massminer” discovered in early May. I’m calling this family ZombieBoy since it uses a tool called ZombieBoyTools to drop the first dll. ZombieBoy, like MassMiner , is a cryptomining worm that uses some exploits to spread.

Malware 40
article thumbnail

Rugged Mobility Helps Chart Course for Clipper Round the World Race

Dell EMC

Anchors aweigh and set sail! As an official technology provider to the famous Clipper 2017-18 Round the World Yacht Race, the Dell EMC OEM and Rugged teams along with some of our marine customers are set to join the skipper and crew for an afternoon excursion off the beautiful coast of Northern Ireland. This pleasant Derry-Londonderry boat tour will provide a tame glimpse of wild ride that’s a 40,000 nautical mile test of human courage and a tough technology ecosystem.

Course 40
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Top 12 recruiting software for hiring technical talent

Hacker Earth Developers Blog

Introduction. Continuing our two-part post on technical recruitment (Read: What is technology recruiting? ), we put together a list of recruiting software tools tech recruiters can use, in no particular order. Top recruiting software tools are. Dice. Codility. HireVue. Pymetrics. Recruit (HackerEarth). The Predictive Index. People Search (Workable).

article thumbnail

Classic WTF: The Mega Bureaucracy

The Daily WTF

Part of the reason we need a summer break is because we simply don't have the organizational skills of this particular company. I wonder if they sell consulting. Original -- Remy. At my daytime corporate-type job, if I need to even sneeze in the general direction of a production environment, I need both a managerial and customer approvals with documentation solemnly stating that I thoroughly tested my changes and swear on a stack of MSDN licenses and O'Reilly books that I am NOT going to

article thumbnail

Primary Sociotechnical Design Heuristics

Strategic Tech

There are thousands of ways we can shape the software systems we build and organise our teams around them. Yet there is no flowchart we can simply follow to find the optimal design. Sociotechnical systems are complex systems formed of complex systems. We have the unpredictable nature of markets. Consumer expectations are in a constant state of flux as new technological advancements arise and new competitors emerge, yet the goal is to continuously deliver products that satisfy market demand.

article thumbnail

Kubernetes Container Orchestration

Gorilla Logic

If you’re reading this article, it’s probably because you already know about or have heard of container orchestration. But if it’s the first time you’ve come across the term, the main point of this article is to show you how to implement amazing, container-based software architecture, so welcome. Check out my second post on how to deploy a Java 8 Spring Boot application on a Kubernetes cluster.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

20 Programming Myths

Codegiant

You might think a profession based on logic and learning would be immune to folklore, but the developer community remains rife with myth?—?myths so pervasive they begin to manifest into reality. If all the programming myths were true, the programming world would look like a cohort of 20-something geeks (some 10x better than others) using their elevated math skills to code at all hours of the night.

article thumbnail

From Monolith to Service Mesh, via a Front Proxy — Learnings from stories of building the Envoy…

Daniel Bryant

From Monolith to Service Mesh, via a Front Proxy?—?Learnings from stories of building the Envoy Proxy The concept of a “ service mesh ” is getting a lot of traction within the microservice and container ecosystems. This technology promise to homogenise internal network communication between services and provide cross-cutting nonfunctional concerns such as observability and fault-tolerance.

SOA 40
article thumbnail

How Can CIOs Help Their Company Modify Its Products For Unique Customers?

The Accidental Successful CIO

Some customers require the company to change its products Image Credit: 10ch. A CIOs focus is more often than not on the internal workings of the company. We spend our time using the importance of information technology to try to figure out how more things within the company can be automated or how we can keep the bad guys out. However, in this day and age in which we are living, there is a new role that is being thrust upon the person with the CIO job.

Company 45