Mon.Nov 26, 2018

article thumbnail

EventStorming; Continuous discovery beyond software modelling

Xebia

Moving towards a microservices architecture We see a lot of companies are moving towards a microservice architecture. The big pitfall of microservices architecture is to focus on the technology, how big the microservice needs to be, how many lines of codes, what entities do we put in a microservice, and using rest as the communication […]. The post EventStorming; Continuous discovery beyond software modelling appeared first on Xebia Blog.

article thumbnail

Making the Most of Data – and the Opportunity it Represents

Dell EMC

Dell EMC is leading the field in Distributed File Systems and Object Storage for a reason… Digital transformation is often discussed in terms of processes, services and applications. But what’s really driving it is data: management of it, access to it, and the ability to analyse it and put it to use. And of course, it’s growing at a phenomenal rate – especially when it’s unstructured.

Data 62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is Leadership Development the Answer to Low Employee Engagement? (Yes.)

N2Growth Blog

This White Paper is excerpted and adapted from Ultra Leadership: Go Beyond Usual and Ordinary to Engage Others and Lead Real Change (Giuliano, Lioncrest, 2016). Where are we? 90% of leaders think an engagement strategy is important while only 25% of organizations have one (ACCOR). Research by Gallup, as reported in The State of the American Workplace in 2013, discovered that roughly 70% of workers were disengaged.

article thumbnail

Project Management Evolution: Startups vs. Enterprises

Toptal

Startups play poker, large companies play chess. In this article, we compare and contrast startup project management with enterprise project management. Different challenges and opportunities arise in both settings. The best project managers should be able to utilize their skill sets to achieve the maximum results in both environments.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Why your data should be priority one as you build your cloud computing plan

CTOvision

Read why Oracle’s Kyle York says that data should be number one priority for companies adopting cloud computing on Diginomica : Ask any CIO to list his or her most important business assets and you can bet that the company’s corporate data will head up that tally. After all, this is the information about what materials […].

Cloud 86

More Trending

article thumbnail

How Blockchain Will Change the Data Supply Chain: Syncsort’s Predictions

CTOvision

It’s December and prediction time. Read Syncsort’s predictions about how blockchain technology could change data supply chain on Forbes : The more I read about blockchain and the more I talk to the CIOs, CTOs, developers, and tech-savvy executives I call early adopters, the clearer it is that everyone will need to make sense of […].

article thumbnail

Future of Gaming: 5 Tips to Keep Your Gamers Connected

Digital Realty

Whether your customers are avid gamers or just dabble from time to time in a mobile game, there’s no escaping the gaming industry’s influence as one of the largest and most popular forms of entertainment.

Games 90
article thumbnail

A critical look at Gartner’s top 10 IoT trends

CTOvision

Read Fredric Paul analyze Gartner’s predictions for the Internet of Things connected devices on Network World : At Gartner’s Symposium/ITExpo in Barcelona, Spain, earlier this month, the research firm shared a report on 10 strategic trends affecting the Internet of Things (IoT) from 2019 to 2023. In the report, titled Top Strategic IoT Trends and Technologies Through […].

IoT 79
article thumbnail

Replace Last Command in Shell

David Walsh

Whether I fat-finger a command or my MacBook Pro keyboard’s keys don’t want to respond like they should, I’m frequently misspelling commands. What’s more frustrating is that many of these commands are long, taking making fixing theme time-consuming. Luckily a Twitter follower is looking out for me , providing me a quick command for fixing the misspelled command: ~ $ crul davidwalsh.name -bash: crul: command not found ~ $ ^crul^curl curl davidwalsh.name <!

71
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Networking Tips For Any CEO Who Works ‘On’ Or ‘In’ The Business

CTOvision

Read Rick Itzkowich’s networking tips for CEOs on Forbes : As the CEO of your firm, is networking your responsibility or should the task belong to others in your firm? The answer depends on your level of business involvement. As the face of the company, the CEO should be building and nurturing relationships, whether to cultivate opportunities […].

Network 73
article thumbnail

Improving testability of CLLocationManager

Apiumhub

It is common to find difficulties with the response of methods that are not ours when we write class tests that have external dependencies. Let’s see a typical case in mobile development where we can find this problem and find out how we can improve testability of CLLocationManager. . Improving testability of CLLocationManager. We have developed an app that has a map and uses the location services of Apple’s CoreLocation to obtain the user’s location.

article thumbnail

Slow Software and latency issues

CTOvision

What feels “slow” to users? We all have a sense for when software annoys us with delays. But to get a better handle on this problem, we’ll complement these intuitions with academic research that answers the question rigorously. Perceived speed is all about latency. Comparing the “what feels slow” findings from academia with measurements of real-world […].

article thumbnail

Representative Line: Without a Parent

The Daily WTF

Rob M caught a ticket for a bug in a C# application. Specifically, when the user picked an item off a menu, that item wouldn't get highlighted, thus defeating the purpose of the menu. Strangely, the code hadn't been touched since its first commit, back in 2015. var sortedParentChildItems =. matchedMenuItems.OrderBy(x => x.ParentID ?? x.ParentID).ThenBy(x => x.ParentID); Somehow, this particular line made it through code review, which was notable because management was extremely pro

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What does an app developer Dubai estimates about an app budget?

Xicom

There is no doubt about the fact that every Android app development company is bent upon creating apps that can add to the profit of any business or a brand. After all, an app is created by keeping in mind all the factors of the UI/ UX of the app. It is the attractive user experience or the UI of the app that helps in retaining the users of the app as well as attract new users to generate revenue from the app.

Budget 56
article thumbnail

The Right Time For Abstractions

Professor Beekums

Abstractions are a critical part of software development. While we developers often abstract too much, software would take exponentially more time to build today without abstractions. Few write their own code to store data these days. We use databases instead. The same goes for web servers. And HTTP libraries. And JSON encoders/decoders. Like anything though, we can have too much of a good thing.

article thumbnail

Anti-Fragility: The Great Equalizer

Symantec

If we are to make progress toward equality, we must get comfortable with being uncomfortable and engage in the difficult conversations. Jared K. shares some ideas about how to do that.

How To 49
article thumbnail

The AWS re:Invent 2018 Expo Hall Survival Guide: 5 Questions you should ask every Vendor

CloudZero

It’s that time of year again. No, not the holidays, it’s time for the yearly pilgrimage to Las Vegas for Amazon’s AWS re:Invent 2018.

AWS 58
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

LinkedIn for Academics

Rapid BI

LinkedIn has been embraced by the world of business, but less so by many academics in the same way. This video sets out to show those in academic how and why LinkedIn is relevant for the world of academia too. Video contents – – Hi everyone, my name’s Mike Morrison. Today I want to talk […]. The post LinkedIn for Academics appeared first on RapidBI.

Video 52
article thumbnail

Four short links: 26 November 2018

O'Reilly Media - Ideas

Graphics Engine, Graph Library, Docker Tool, and Probabilistic Cognition. Heaps -- a mature cross-platform graphics engine designed for high-performance games. It is designed to leverage modern GPUs that are commonly available on both desktop and mobile devices. 2D and 3D game framework, built on the Haxe language and toolkit. VivaGraphJS -- JavaScript graph manipulation and rendering in JavaScript, designed to be extensible and to support different rendering engines and layout algorithms. dive

3D 46
article thumbnail

Security round up

TechTalk

Security round up With so much cyber security news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Security round-up of the three top cyber security stories. Federal bug bounty programmes seem to pay off The United States Marine Corps is a branch of the United […].

45
article thumbnail

If Identity is the new Cloud perimeter, then Access & Authorization is the Firewall

Orkus

As Enterprise applications, data, and infrastructure move to the cloud, identity is the new perimeter. Employees, contractors, partners, and hackers are continuously trying to access Enterprise cloud assets from everywhere. Controlling access is key to security and compliance. Access and authorization is the critical security layer that protects your sensitive and valuable cloud assets and prevents unauthorized access.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Connections, 'Transformation', Agile Software Development

Ron Jeffries

Agile transformations have little, if anything, to do with Agile Software Development. Let me hook up some connections for you. Bit of a rant here.

article thumbnail

Refactoring released on informit

Martin Fowler

You can now order the second edition of Refactoring from informit, in both physical and ebook formats. It will become available on Amazon in the next few days.

eBook 55
article thumbnail

Four Free (and a Few Paid) Resources to Amp-Up Your Users’ Tech Knowledge

Arcserve

Whether you’re an IT admin or an MSP managing tech for a bunch of clients, simple user problems can take a huge portion of your time. Maybe someone doesn’t know how to map a network drive, has no clue how to download that “GoToMeeting thing,” or inadvertently downloads ransomware—these issues can make your blood pressure. Read more » The post Four Free (and a Few Paid) Resources to Amp-Up Your Users’ Tech Knowledge appeared first on StorageCraft Technology Corporation.

article thumbnail

Amazon re:Invent Preview: RockSet and Yotascale take their bows

Yotascale

Tony Baer, Contributing Writer, ZDNet. With re:Invent dominating the airwaves this week, Amazon’s announcements will understandably garner the spotlight. But behind the scenes, some of the most significant announcements may crop up from the ecosystem that is building on the AWS cloud. We had a chance in the past few weeks to get acquainted with a couple of them that just emerged from stealth: Rockset , a search-oriented serverless database that exposes variably structured data as SQL;

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Adopting a AAA approach to software security

WorkingMouse

Data is king. Consumers are more conscious than ever in providing organisations with accurate data. The Cambridge Analytica - Facebook scandal certainly didn’t help change consumer perceptions. With such a premium placed on data, it’s imperative that software developers vigilantly protect consumer data.

article thumbnail

HIPAA Complaints, OCR Investigations, and Security Risk Analysis for Healthcare Delivery Organizations – A Common Thread

Coalfire

Many HIPAA covered entities (CEs) and business associates (BAs) may not be meeting the regulatory mandate as defined in §164.308(a)(1)(ii)(A) of the HIPAA Security Rule. This implementation specification requires that healthcare delivery organizations (HDOs) “Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associat

article thumbnail

What’s new in Actian DataFlow version 6.6.1?

Actian

Actian DataFlow is a parallel workflow platform for end-to-end data access, transformation, preparation, and predictive analysis that eliminates performance bottlenecks in your data-intensive applications. Complementary to the Actian Vector analytic database, DataFlow leverages concurrency, parallelism and pipelining to accelerate data movement between locations in your data architecture, creating faster results.