Wed.Mar 04, 2020

article thumbnail

How to Communicate Software Development Costs to Your Finance Department

ParkMyCloud

If you’re in engineering or development, communicating about cloud infrastructure and other software development costs with your finance department is tricky. For one thing, those costs are almost certainly rising. Also, you are in different roles with different priorities. This naturally creates barriers of communication. You may think your development costs are perfectly reasonable while your CFO thinks there’s a problem – or you may be focused on different parts of the bill than your colleagu

article thumbnail

The Cloud Is Booming — But so Is Cloud Waste

DevOps.com

Fueled by the growth in cloud spend, cloud waste will exceed $17.6 billion in 2020. Over 90% of organizations will use public cloud services this year. In fact, public cloud customers will spend more than $50 billion on Infrastructure as a Service (IaaS) from providers such as AWS, Azure and Google. This boom is, of […]. The post The Cloud Is Booming — But so Is Cloud Waste appeared first on DevOps.com.

Cloud 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OKRs From a Beyond Budgeting Perspective

Agile Alliance

During the last few years we have witnessed the amazing revival of an almost 50 year old management idea called “Objectives and Key Results” (OKR). The former Intel CEO Andy Grove introduced the concept in this company in the seventies, as described in his 1983 book “High Output Management”. John Doerr, a former Intel employee, … Continued.

Budget 277
article thumbnail

Coronavirus and the Cybersecurity Threat Landscape

CTOvision

Read Raef Meeuwisse explain the interesting link between the Coronavirus epidemic and the cybersecurity threat landscape on Infosec Magazine : Cybersecurity professionals are always interested in understanding how evolving events shape the threat landscape. Events such as WannaCry and NotPetya may have temporarily crippled technology environments that were running with third-rate security*, but the repercussions […].

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Remembering Freeman Dyson

O'Reilly Media - Ideas

Freeman Dyson died last week at the age of 96 after injuring himself in a fall in the cafeteria at the Institute of Advanced Studies in Princeton, where he had continued to work right up to the end. I can’t resist adding to the outpouring of appreciation and love that has ensued. He has an outsized place in my mind and in my heart for someone whom I met in person fewer than a half-dozen times.

More Trending

article thumbnail

Feedback Ladders: How We Encode Code Reviews at Netlify

Netlify

The code review is a critical part of life as a professional developer: in most engineering organizations, no code gets checked in without at least a second look from another engineer. This has many benefits for enforcing code standards; however, we can run into communication issues because we don’t establish standards for the code reviews themselves.

article thumbnail

Get security and compliance with DevSecOps: 4 key components

TechBeacon

Businesses today are in a highly regulated world where data privacy and trust have become critical to retaining customers and avoiding fines. To keep up, organizations are "shifting-left" on security and compliance by building these features into the development process early, rather than addressing them through later reviews.

article thumbnail

Extending Cloud to Enable Intelligent Edge

DevOps.com

In the last few years, with the emergence of 5G, IoT and AI, cloud providers have recognized the value and the importance of edge, and started building the infrastructure technologies to provide computing and connection between cloud and edge, as well as edge based intelligent services as part of their total cloud value proposition. However, […].

Cloud 119
article thumbnail

3 steps to create a maintainable, browser-based test framework

TechBeacon

Browser-based automated tests are normally a pain to maintain. There are lots of moving parts in complex web applications, forever breaking xpath locators, and long test execution times for business workflows with multiple steps. Those are just a few of the challenges.

Testing 125
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Kafka Connect Elasticsearch Connector in Action

Confluent

The Elasticsearch sink connector helps you integrate Apache Kafka® and Elasticsearch with minimum effort. You can take data you’ve stored in Kafka and stream it into Elasticsearch to then be […].

Data 119
article thumbnail

Gotta Patch ‘Em All? Not Necessarily, Experts Say

CTOvision

Read why experts say that patching all vulnerabilities may not be feasible hence it is necessary to prioritize bug patches on Dark Reading : Modern security teams face a daunting task in keeping up with a growing amount of vulnerabilities. While they may not be able to patch all the flaws in their environments, they […].

101
101
article thumbnail

20+ Essential Tips for an Interview

Gitprime

With the job market as unstable as it is, its important to be fully prepared in every aspect to get the job you want. In this article we discuss each stage in the face-to-face interview and list some tips the ensure you make the best use of such an opportunity.

article thumbnail

Ten Reasons Why Risk Management Increases Risk

CTOvision

Read why Steve Denning says that risk management can actually increase the risks to a business on Forbes : Yet another article on risk management in the March-April issue of Harvard Business Review 2020 (“Your Company Is Too Risk Averse”) suggests—misleadingly—that a central staff of risk managers, using analytic gadgets to evaluate new investments, can […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to build confidence as an engineer: advice from CircleCI engineers and execs

CircleCI

Confidence is different for everyone – there’s no one correct definition or expression of confidence. For one person it’s built over time by successes and failures, and for others, confidence is natural but needs to be tempered and sharpened by time. It’s also something many people struggle with that requires a lot of hard work and self-reflection for them to harness.

article thumbnail

Lessons Learned from 2019’s Biggest Data Breaches

CTOvision

Read Julian Weinberger list the lessons that can be learned from the 2019’s biggest data breaches on Security Boulevard : With more than 5,000 data breaches and over 7 billion records exposed, 2019 was the worst year on record for breach activity. According to research from Risk Based Security, the number of data breaches within […].

Data 96
article thumbnail

The March Scrumtisch Berlin

Agile42

Thanks to everybody who joined the Scrumtisch in Berlin on Tuesday, March 3rd, 2020 and special thanks to Share Now for providing such great facilities. We introduced the Archetypes from the ORGANIC Leadership Framework. The Archetypes illustrate the inter-connectedness of the organizational structure, the situation, the underlying culture and the leader's attitude which manifests in their behavior.

article thumbnail

Wickr: An OODAcon 2020 Future Proof Sponsor

CTOvision

Wickr is a sponsor of Future Proof, our 2020 OODAcon. We have tracked Wickr for years and use them extensively to communicate and collaborate with a wide range of stakeholders. We have also examined their technology and approach and believe it to be the most secure and most functional messaging capability available to the public […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

CodeSOD: Unique Subscription

The Daily WTF

Today’s anonymous submission starts with “I inherited an old wordpress site that uses an external corporate authentication server for logins.”. As one might expect, the result is a hodgepodge of reinvented wheels and anti-patterns. Deep in the authentication code, there’s a method to add an email subscription. You might ask yourself, “What does adding an email subscription have to do with authentication?

article thumbnail

Purpose and Role of DevOps in Custom Software Development

Dzone - DevOps

Do you have any system of checks ensuring all the coding and testing principles are followed to the core? As important as this question is, equally important is seeking answers for it. If your answer to this question is a No then remember your custom software development project is at stake.

article thumbnail

How to Use Machine Learning for Language Translation Apps

VironIT

The challenge was to create two applications, which enable translation of any sign by pointing the phone camera at it and speech-to-speech translation. How does it work? The first app is a crowdsourcing translation application that covers more than 100 languages. This application goes beyond the basic functions and allows three different input methods: keyboard, […].

article thumbnail

Understanding Machine Learning (ML) Models and their Training Methods

Daffodil Software

Learning is an extensive process, involving a number of aspects to it. Development of cognitive skills, acquisition of new declarative knowledge, discovering new facts & theories from experimentation are some of the common and significant aspects of learning.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Internet of Things – Home Automation

Modus Create

Home Automation isn’t new – the X10 control system was available in the mid-1970s and it is still available today. In the past few years, there has been an explosion of growth in the Home Automation space with a number of competing technologies and device manufacturers. The availability of cheap “maker boards” like the Raspberry Pi make it easy to make your own devices, as well.

article thumbnail

5G: Vast potential, but better security needed

Synopsys

5G security is top of mind for those who recognize that 5G is going to be higher risk. Fuzzing is one of the leading testing techniques for securing 5G. The post 5G: Vast potential, but better security needed appeared first on Software Integrity Blog.

Testing 64
article thumbnail

Changing How We Change Software with GeePaw Hill

Marcus Blankenship - Podcasts

Episode 39. What if we could create a trade culture that allowed for change rather than relying on mechanical thinking? In this episode of Programming Leadership, Marcus and his guest, GeePaw Hill, discuss how the doubling rate in the software industry has resulted in a complete lack of trade discipline. Drawing on his 40 years in the software industry, GeePaw’s solution is to develop a thick culture in which certain standards are established across the industry.

article thumbnail

What I Learned from Jack Welch

Next Level Blog

One of the most memorable moments of my professional life was the first time I got to present from the Pit. (The picture that accompanies this post is me in that moment from 2013.). In case you’re not familiar with it, the Pit is the well at the bottom of an amphitheater style room that seats about a hundred people on GE’s Crotonville leadership development campus in the Hudson River Valley.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Four short links: 5 March 2020

O'Reilly Media - Ideas

libfacedetection — they claim 1000fps. Open source. Rich Hickey on Becoming a Better Developer — By constantly switching from one thing to another you are always reaching above your comfort zone, yes, but doing so by resetting your skill and knowledge level to zero. Mastery comes from a combination of at least several of the following: knowledge; focus; relentless considered practice over a long period of time; detected, recovered-from failures; mentorship by an expert; always workin

article thumbnail

Protected: Using console in JS for better testing

Apiumhub

This content is password protected. To view it please enter your password below: Password: The post Protected: Using console in JS for better testing appeared first on Apiumhub.

Testing 52
article thumbnail

Oracle 19c Manages Emerging Data Types

Datavail

It’s not just that the volume of data is growing. It’s also the type of data that’s posing so many challenges to so many companies. They’re finding it almost impossible to co-opt their legacy database technology for use with cutting-edge data sources like Artificial Intelligence (AI) and the Internet of Things (IoT). Fortunately, database administration systems specialist (DBMS) Oracle has introduced its newest DBMS, Oracle 19c, to help every company make sense of both th