Wed.Oct 09, 2019

article thumbnail

Why you should hire DevOps enablers, not experts

TechBeacon

We are regularly asked if we know any DevOps or site reliability engineering (SRE) experts available for hire. Our answer is, invariably, "Not really." It's a tough market out there.

DevOps 108
article thumbnail

Middle Manager Magic of Engagement

Accenture

As agile organizations aim to attract top talent, and grow its people through autonomy, mastery, and purpose, there is pressure on the middle manager. Ok, you’re a middle manager thinking, “That’s nothing new!”. The white paper “What Moves You” published recently by the Business Agility Institute points to more change for incentive and rewards programs, and middle managers will be asked to help.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Automation Testing vs. Manual Testing: What’s the Best Approach For You?

Dzone - DevOps

Will you choose manual or automated testing? One of the essential aspects of the software development life cycle is the process of testing to verify the quality of the project. Whether you are launching a mobile app or developing a website, if you don’t test it before launching, then you might not get what you are expecting. Software testing is the process of evaluating the functionality of your web app to verify whether it meets the intended requirements of not.

Testing 45
article thumbnail

Integration tests don't cut it for microservices. Here's what does.

TechBeacon

Scaling is one of the many promises of adopting a microservices architecture. By splitting up an application into smaller parts, organizations hope to allow more development teams to work autonomously, without conflicting with each other, and ultimately allow a successful product to grow faster.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

To Grow Your Team and Get More Done, Let Go of Perfect

Next Level Blog

No doubt, you’ve heard the phrase that the perfect is the enemy of the good. That doesn’t just apply to other people; it applies to you and your team too. And, the thing is, a lot of the time what you expect as a leader is your version of perfect. There are some cases when perfection is truly an objective measurement but most of the time it’s subjective and good enough is good enough even if it doesn’t meet your version of perfect.

More Trending

article thumbnail

Low-tech social engineering attacks

CTOvision

Frank Abagnale is probably the most famous low-tech hacker since Son’ka the Golden Hand and the man who stole the Mona Lisa, Vincenzo Peruggia. Abagnale famously impersonated various professions, including a doctor and a pilot, to help facilitate his financial scams where he used false identities to forge checks and cash them in. Abagnale ended […].

Social 70
article thumbnail

SAFe vs LeSS vs DaD: Comparing the Three Frameworks to Scale Agile

Daffodil Software

Software development methodologies have come a long way. From Spiral, Waterfall to Agile, there is a significant shift in team roles, ceremonies, planning, and delivery activities.

Agile 66
article thumbnail

Sharp Spike in Attacks Targeting Company Email Accounts

CTOvision

A new report by email and data security company Mimecast has revealed a staggering increase in the number of Business Email Compromise (BEC) cyber-attacks. The quarterly Email Security Risk Assessment (ESRA) report, released today, found a 269% increase in the number of BEC attacks in quarter three of 2019, compared to the second quarter of […].

Company 67
article thumbnail

Using PVS-Studio To Get Beginners Familiar With Code Analysis Tools

Dzone - DevOps

PVS-Studio wants to be your first static code analyzer. Our support chats and some other indirect signs showed that there are many students among our free users. Here's the reason: PVS-Studio is now more often used by professors in courses related to software development. We are very pleased with this, and we decided to write this small article for teachers to try to contribute to this trend.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Lead Multiple Agile Teams Without Sacrificing Sanity

Gorilla Logic

I have been leading Agile teams for some time now and working at Gorilla Logic for almost a year. One of the most impressive things I have seen thus far is the capacity this company has to lead multiple projects at multiple levels in an Agile way. In theory, this may sound easy-peasy, even common sense, but in practice, it can be a huge challenge. Of those challenges, the most common ones are: . • Delivery is not what the client was expecting. • There was a problem and it was not mentioned in ti

Agile 58
article thumbnail

How I Use Bitbucket In My Regular Routine

Dzone - DevOps

Here's how Bitbucke fits into this developer's flow. I’m an independent software developer, and I use Bitbucket for all my client projects. It works reliably and has a sense of "business software" I like. I mostly use the Git command line, but there are a few places I have come to rely on the visual interface of Bitbucket. In this post, which is geared towards beginners, I’ll share my regular routine with Bitbucket and some thoughts on why I don’t use GitHub.

article thumbnail

Where Does It Make Sense To Use WAN Optimization Equipment?

taos

First Published: April 27, 2015, B y Marc Ferreria?—?Practice Leader & Senior Networking Consultant Where does it make sense?—?cost-wise and performance-wise?—?to invest in WAN Optimization equipment? This is a question some clients will have. There are a few of them on the market, and they all claim to speed up application performance and save money on bandwidth.

WAN 52
article thumbnail

Article: Author Q&A on the Book Software Estimation Without Guessing

InfoQ Culture Methods

George Dinwiddie has written a book titled Software Estimation without Guessing: Effective Planning in an Imperfect World. The book discusses different approaches to estimation for software products, the ways they can go wrong and be misused, and when to use them By Shane Hastie, George Dinwiddie.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Using Multiple Accounts In The AWS CLI With Direnv

taos

First Published: April 13, 2016, By Dan Roncadin?—?Chief Consultant I often need to work with multiple AWS accounts. There are personal accounts, business accounts, and various client accounts. This adds up to a lot of different credentials. I need a way of quickly and accurately switching between these various credential sets while making it clear to me which account I’m currently working with.

AWS 52
article thumbnail

What’s new in OTX

AlienVault

AT&T Alien Labs and the Open Threat Exchange (OTX) development team have been hard at work, continuing our development of the OTX platform. As some of you may have noticed, we’ve added some exciting new features and capabilities this last year to improve understanding within the OTX community of evolving and emerging threats. Malware analysis to benefit all The biggest (and latest) new feature within OTX is the ability to submit samples to be analyzed in our backend AT&T Alien Labs

Malware 40
article thumbnail

Book Reviews For Fellow Techies

taos

First Published: October 25, 2013, By Ross Oliver, Taos Technical Consultant I read a lot of books. A LOT. But very few are what would be considered “high tech” topics. I’ve found my best ideas come from a cross-pollination of different disciplines. I read a lot of history, history of technology, medicine, aviation, economics, and psychology. When asked to write a Taos blog entry, I decided to share some of my favorite titles that might be interesting to other tech geeks.

article thumbnail

TEST – Introduction to Large-Scale Scrum (LeSS)

Agile Alliance

## Large-Scale Scrum (LeSS) [LeSS]([link] is a lightweight (agile) framework for scaling Scrum to more than one team. It was extracted out of the experiences of Bas Vodde and Craig Larman while Scaling Agile development in many different types of companies, products and industries over the last ten years. There are several [case studies]([link] available and an upcoming book describing [LeSS in detail]([link].

SCRUM 23
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Log for Database % Is Not Available

taos

First Published: May 23, 2017, By Denise Crabtree If you have never seen it before, those words invoke a cold chill sinking into your chest. You know it could be bad. Until it is resolved, that database is unusable. The event log number is 9001. It will appear in the Application Event Log and SQL Server Error Log. It Happened to Me: The first two times I experienced this error happened two weeks apart for extremely different reasons.

Backup 40
article thumbnail

How I Use Bitbucket In My Regular Routine

Dzone - DevOps

Here's how Bitbucke fits into this developer's flow. I’m an independent software developer, and I use Bitbucket for all my client projects. It works reliably and has a sense of "business software" I like. I mostly use the Git command line, but there are a few places I have come to rely on the visual interface of Bitbucket. In this post, which is geared towards beginners, I’ll share my regular routine with Bitbucket and some thoughts on why I don’t use GitHub.

article thumbnail

The Innovators

taos

First Published: March 19, 2015, By Jed Donnelley?—?Technical Consultant Geeky + bccs, I just finished reading “The Innovators” by Walter Isaacson: [link] You might know the author from his biographies of Albert Einstein and/or Steve Jobs. I really enjoyed this book and recommend it, particularly for anybody with any interest in technology, especially computer and communication technologies.

article thumbnail

Java and the Java Virtual Machine for cloud native applications

O'Reilly Media - Ideas

Java is ready for the cloud today. In principle, any programming language can be used to create microservices. In reality, though, there are several factors that should influence your choice of a programming language. In this article, we discuss the reasons why Java is an excellent programming language and platform for cloud native applications. The depth of the Java community’s business knowledge, the Java Virtual Machine's (JVM) unrivaled performance with flexibility, and developer friendlines

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Four Horsemen of DevOps

taos

First Published: March 6, 2015, By Corey Quinn?—?Senior Technical Consultant This past week, I had the honor of being invited to speak at SaltConf 2015. I additionally was asked to serve on a panel that discussed using multiple configuration management systems in the same environment. The panel got me thinking about what DevOps in 2015 means (from a technical sense; the cultural shifts and methodologies will have to wait for another blog post someday!).

DevOps 40
article thumbnail

Nutanix Integration with ServiceNOW

Nutanix

As Nutanix leads the industry with its innovative 100% software-defined hyper-converged infrastructure and multi-cloud services, customers are deploying at scale and need to integrate with their IT operations environments.

article thumbnail

Defending Against CSS Attacks in this CyberSecurity Era  

CTOvision

Cyber security is a concern for just about everyone these days and knowing what threats are out there is a good first step towards defending yourself, your website and your data. Whether you are looking into cyber security as the owner of a website or as an internet user, there are some basic defensive questions […].

article thumbnail

Introducing: Security Compliance for Nutanix Private Cloud

Nutanix

Businesses are increasingly adopting multi-cloud architectures to benefit from the freedom to choose the appropriate cloud platforms for their various workloads. One of the key challenges in a multi-cloud world is ensuring the security of your critical applications and data.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How concerned are you about the privacy challenges of your IoT devices?

CTOvision

Read Amer Owaida’s article about the Internet of Things connected devices privacy on We Live Security : The alarm is ringing. Half asleep, you scrabble for your smartphone on the nightstand, to snooze it for at least a few more minutes. Drowsily, you shuffle to the bathroom and ask your voice assistant to play your […].

IoT 15
article thumbnail

Nutanix and HPE Team Up Together to Deliver Cloud Simplicity On-Premises

Nutanix

HPE and Nutanix announce the availability of HPE GreenLake with Nutanix. HPE GreenLake is an infrastructure service that delivers on-demand capacity and planning.

Cloud 20
article thumbnail

Kafka Summit San Francisco 2019 Session Videos

Confluent

Last week, the Kafka Summit hosted nearly 2,000 people from 40 different countries and 595 companies—the largest Summit yet. By the numbers, we got to enjoy four keynote speakers, 56 sessions, 75 speakers, 38 sponsors, and one big party, including the classic Apache Kafka ® ice sculpture, per the traditions handed down to us. (I guess we handed those traditions down to ourselves in this case, but still.).

Video 17