Thu.Jan 05, 2023

article thumbnail

Low code/no code tools reap IT benefits—with caveats

CIO

Low-code/no-code visual programming tools promise to radically simplify and speed up application development by allowing business users to create new applications using drag and drop interfaces, reducing the workload on hard-to-find professional developers. A September 2021 Gartner report predicted that by 2025, 70% of new applications developed by enterprises will use low-code or no-code technologies, up from less than 25% in 2020.

article thumbnail

Whoops! Is generative AI already becoming a bubble?

TechCrunch

Venture capitalists are in the business of predicting the next big thing, even if they get burned in the process. While everyone piled onto crypto in 2021 — and many remain bullish about its future despite multiple failures this year — 2022 saw the rise of generative AI. But as is the case with any transformative new tech, hype is sure to accompany growing adoption, and generative AI has garnered so much attention and money that many VCs already feel the budding sector will be the next bubble.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What it takes to succeed as a CIO today

CIO

The market for technology talent has been white hot over the past year. What will the next twelve to eighteen months bring? On a recent episode of the Tech Whisperers podcast , two executive recruiters in the CIO retained search space, Martha Heller, CEO of Heller Search Associates, and Art Hopkins, executive director of Russell Reynolds Associates’ Information Officer search practice, shared their thoughts about the state of the tech talent market, the evolving role of the CIO, and key consider

article thumbnail

OneRoof grabs funding to help apartment dwellers cozy up to their neighbors

TechCrunch

Apartment living can be a lonely life, but OneRoof is here to change that. The company offers a hyperlocal social network app meant to connect people in the same residential building around common interests like hobbies and to even organize around a common goal. The pre-revenue company has grown up a lot since we profiled it in 2021 after OneRoof secured $1.25 million in funding.

Social 242
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Sara Fenwick, Vice President Business Technology, Ren’s Pets

CIO

Women in IT – Sara Fenwick shares her journey as a tech leader in Canada to support diversity, equity and inclusion and her role as a woman in leadership. Watch the episode: Listen to the episode: CIO Leadership Live.

More Trending

article thumbnail

Data Mesh Accelerate Workshop

Martin Fowler

Over the last couple of years, we've been helping several enterprises use the Data Mesh approach to managing analytical data. Shifting thinking to Data Mesh isn't easy, it changes how teams are organized, how work is prioritized, and what technologies to apply. To help our clients do this Paulo Caroli and Steve Upton describe the Data Mesh Accelerate Workshop, a four half-day program to align people involved in the effort and explore the process for identifying and building data products.

Data 228
article thumbnail

Daily Crunch: In layoff update, Amazon CEO tells workers ‘we plan to eliminate just over 18,000 roles’

TechCrunch

To get a roundup of TechCrunch’s biggest and most important stories delivered to your inbox every day at 3 p.m. PST, subscribe here. Hello, I hope it is a great Thursday for you so far. For me, it’s the little things that get me excited and today it is Delta Air Lines’ announcement that SkyMiles frequent flyers, including yours truly, will get Wi-Fi for free starting February 1.

VR 234
article thumbnail

Continuous deployment for Artifact Registry container images

Xebia

Continuous deployment to Cloud Run works out-of-the-box when you own the application code. However, you don’t always own the application code. You might use suppliers that publish container images to your Artifact Registry. Therefore, this blog shows how to configure a continuous deployment pipeline for container images. Target implementation Suppliers publish container images to trigger application deployments.

Cloud 130
article thumbnail

Frosty fundraising environment may change early startups’ DNA for the better

TechCrunch

There isn’t much hope that 2023’s fundraising environment will be better for startups than last year’s. It seems likely that it will get worse before it gets better — even at the earliest stages, which have largely been insulated thus far. But for burgeoning companies capable of building business models that reflect current conditions and rely less on venture capital to grow, the frosty environment could wind up being a good thing down the line.

Company 192
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why SREs Are Critical to DevOps

DevOps.com

Although a relatively new concept, site reliability engineers (SREs) have become crucial for DevOps teams, helping to solve an array of operational problems such as network availability and user experience. However, in previous years, some people have questioned the longevity of such a role. This article will discuss several reasons why site reliability engineering roles […].

DevOps 145
article thumbnail

How Attackers Catch Vulnerabilities Before Defenders Do

TechBeacon

Security vulnerabilities are inevitable, and attackers and defenders are in a never-ending race to discover them first. As soon as we find a misconfiguration or a new attack technique, a bad actor is already looking for a new one.

.Net 105
article thumbnail

Southwest Airlines: ‘Shameful’ Technical Debt Bites Back

DevOps.com

Last month’s débâcle of canceled flights was caused by decades of technical debt. That’s the analysis of Columbia University professor Zeynep Tufekci. The post Southwest Airlines: ‘Shameful’ Technical Debt Bites Back appeared first on DevOps.com.

Airlines 130
article thumbnail

U.S. Soccer’s Gregg Berhalter on Rebuilding Trust in the Wake of Controversy

Harvard Business Review

Berhalter says he’s saddened that his public life has affected his family as he addresses an accusation of violence from 30 years ago.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Will DevSecOps Replace the Security Operations Center?

DevOps.com

Traditionally, a security operations center (SOC) is a physical facility where an organization performs information security activities. The SOC team analyzes and monitors the organization’s security systems. A SOC aims to protect businesses from security breaches by identifying, analyzing and responding to cybersecurity threats. The SOC team consists of administrators, security analysts and security engineers. […].

article thumbnail

Simplifying Kubernetes DevSecOps Through Platform Engineering

d2iq

DevSecOps–short for development, security, and operations–is a trending practice that introduces security testing, triage, and risk mitigation as early as possible in the software development lifecycle, rather than bolting on security in the final stages. DevSecOps requires a shift (also known as “shift-left”) in culture, process, and tools across development, security, and operations teams to make security a shared responsibility.

article thumbnail

Intel Expands Scope of oneAPI Initiative

DevOps.com

Intel has expanded its effort to drive adoption of a set of open compilers, libraries, analysis and porting tools and frameworks for artificial intelligence (AI) applications, collectively made available via a oneAPI initiative, to include support for its latest generation of processors. The oneAPI initiative was launched more than three years ago to create a […].

article thumbnail

GPT-3 Playground, the AI that can write for you

Apiumhub

An introduction to Artificial Intelligence. When it comes to artificial intelligence, there are two main ideas on the table. Some believe that artificial intelligence will eventually surpass human intelligence, while others believe that artificial intelligence will always be at the service of humans. However, there is one thing both sides can agree on: it is advancing faster and faster every year.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Perficient Welcomes a New Data Solutions Alliance Manager!

Perficient

Meet Our Newest Team Member Kyla Faust. Our Partner Alliance team is growing, and we’re excited to introduce the newest member, Kyla Faust ! With experience in sales and partnerships/alliances, Kyla is using her knowledge and skills to build relationships with her partners here at Perficient. This will result in powerful partnerships to ultimately work better together!

Data 64
article thumbnail

How to choose React Native libraries for secure mobile application development

Synopsys

Learn how to choose React Native libraries that abide by application security principles in order to build secure mobile applications.

Mobile 75
article thumbnail

Research: Where Managers and Employees Disagree About Remote Work

Harvard Business Review

Part of the disconnect hinges on how productivity is measured.

Research 105
article thumbnail

Ring in 2023 with Stronger Cybersecurity Resolutions

SecureWorks

Ring in 2023 with Stronger Cybersecurity Resolutions Three unexpected ways to maximize your security in the year to come Secureworks® offers three ways to maximize your security efficacy and efficiency in the New Year.

66
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Bluebottle: Campaign Hits Banks in French-speaking Countries in Africa

Symantec

Continuation of previously documented activity leverages new TTPs.

Banking 94
article thumbnail

Error'd: Quel pénible

The Daily WTF

I have been collecting submissions for a set of themed columns to appear later. This week we received several submissions that will fit nicely in those themes and have been placed into stasis pending $whenIfeellikeit. If you haven't seen your submission appear, be strong; it may show up eventually. What remains here are entries that don't fit the available themes.

article thumbnail

Bridging Generational Divides in Your Workplace

Harvard Business Review

It’s both a culture and policy question.

Policies 100
article thumbnail

Palo Alto Networks Conformance to the NCSC Cloud Security Principles

Palo Alto Networks

In recent years, cloud has gone from being a small part of most companies’ IT strategies to a critical business capability as organisations increasingly take a cloud-centric approach. Remote work, driven by Covid, has led to an explosion of deployed, cloud-based services. One of the advantages of cloud computing is that it has given organisations more choice in the types of technology and services they deploy.

Network 53
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Allocating Capital When Interest Rates Are High

Harvard Business Review

It’s time for a more rational, disciplined, value-oriented framework.

Budget 83
article thumbnail

Coforge | Blog | Advantages of Virtual Desktop Infrastructure (VDI) for your business

Coforge

The price of IT equipment is causing tremendous stress to businesses today. To keep up with the newest technology and be able to provide employees with workspaces that are efficient and modern, an increasing amount of capital is required. The use of a VDI (Virtual Desktop Infrastructure) can be an economically interesting alternative. It reduces the cost of expensive and fast computers on site and the use of technicians for the maintenance of the systems.

article thumbnail

CVE-2022-47523: ManageEngine Password Manager Pro, PAM360 and Access Manager Plus SQL Injection Vulnerability

Tenable

CVE-2022-47523: ManageEngine Password Manager Pro, PAM360 and Access Manager Plus SQL Injection Vulnerability Zoho patches a newly disclosed high-severity SQL injection flaw in several ManageEngine products; attackers have historically targeted several ManageEngine products over the last three years. Background. On December 29, Zoho’s ManageEngine published an advisory for a newly disclosed vulnerability in its Password Manager Pro , PAM360 and Access Manager Plus products.