Wed.May 06, 2020

article thumbnail

Branching Patterns: Release Branch

Martin Fowler

Today I begin the next section of patterns, which look at the path to production. The first pattern in this group is Release Branch: A branch that only accepts commits accepted to stabilize a version of the product ready for release. moreā€¦.

Groups 246
article thumbnail

Octoverse spotlight: An analysis of developer productivity, work cadence, and collaboration in the early days of COVID-19

Github

This article is a special report following the 2019 Octoverse report, providing trends and insights into developer activity on GitHub in the early days of COVID-19. The analysis is brought to you from the GitHub Data Science Team. Note: This report is best viewed on a large screen. The included charts and graphics are not optimized for mobile viewing.

Analysis 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

El Balance de las PrƔcticas TƩcnicas y Organizacionales

Agile Alliance

Mi invitado para la entrevista semanales con personajes de la Agilidad Latinoamericana esta vez fue Diego Fontdevila, que es un practicante de la agilidad que fue de quienes iniciĆ³ la comunidad Agil en su nativa Argentina. Diego es un profesor universitario y candidato a Doctorado que ademĆ”s co-fundĆ³ hace mas de una dĆ©cada Grupo Esfera, … Continued.

Agile 192
article thumbnail

DevOps and AIOps: Better Together

DevOps.com

DevOps is an attempt to scale technology with humans but AIOps is the ultimate answer. In todayā€™s world, where so many essential business tasks have become digitized, IT teams must deal with constant change while ensuring zero downtime. The irony is that, although IT has become business-critical, the productivity and agility of the people building […].

DevOps 143
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

8 steps to get started with enterprise service management

TechBeacon

There has never been a better time to get started with enterprise service management (ESM). The vendor landscape has solidified, and TechBeacon's Buyerā€™s Guide to Enterprise Service Management Products reveals a market that's competing vigorously for your business.

More Trending

article thumbnail

Create a WhatsApp Chatbot, Not an App

Toptal

Feedback on an enterprise web app prompted an experiment. Could a WhatsApp chatbot replace it? Would people like it better? Would it be more useful?

article thumbnail

GitHub Extends Scope and Reach of Repository

DevOps.com

GitHub today at its GitHub Universe Satellite virtual conference announced it has made it easier for developers to either launch a project or join an existing project on its repository and has added collaboration tools directly within the platform. GitHub is also moving to advance DevSecOps by adding code scanning tools and making secret scanning […].

article thumbnail

Introducing Teradataā€™s Incoming CEO Steve McMillan

Teradata

Teradata's Board of Directors has selected the company's next President and Chief Executive Officer: Steve McMillan. Read more from interim President and CEO, Vic Lund.

Company 108
article thumbnail

Do You Trust Your Cloud Provider to Protect Your Data? Maybe You Shouldnā€™t

DevOps.com

Around the world, businesses are moving to the cloud at a rapid rate. But, is the cloud really the best place to store your mission-critical data and applications? Is it truly a safe place to put data and apps that need strong protection? The immediate answer from many companies is ā€œyes.ā€ A recent study by […]. The post Do You Trust Your Cloud Provider to Protect Your Data?

Cloud 110
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. Itā€™s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Check out the new Online DevOps Dojo

DXC

DevOps dojos have been wildly popular as on-site workshops that support an organizationā€™s DevOps transformation. But even before COVID-19 and social distancing, in-person sessions had their limits. They could only reach a certain number of employees and customers. To bridge the gap, DXC has created Online DevOps Dojo ā€” an open source, immersive learning experience […].

DevOps 100
article thumbnail

The Basics of Exploit Development 3: Egg Hunters

Coalfire

Hello dear reader. If you have read the other articles in this series, welcome back! If not I encourage you to read the previous installments before proceeding with this post. This post covers a surprisingly useful technique in exploit development called Egg Hunters. In order to demonstrate how Egg Hunters function, we will write an exploit for a 32 bit Windows application vulnerable to a SEH overflow.

article thumbnail

RapidValue Solutions Progresses at GoodFirms by Proffering Excellent App Development Services

RapidValue

Leveraging cutting-edge technologies to unlock business values with robust mobile solutions would soon burgeon amongst top mobile app development solutions providers in the USA at GoodFirms. View RapidValue Solutionsā€™ GoodFirmsā€™ solutions to know more about the company and its robust service offerings. GoodFirmsā€™ Research Process. GoodFirms is a research and review platform and with one-of-its-kind research process, the team at GoodFirms evaluates several B2B companies based on three important f

article thumbnail

Keep Focus on Workloads with a Future-Proof Infrastructure

Dell EMC

When you have the reassurance that your IT infrastructure investments are protected, you can worry less about the critical workloads that keep your organization running. So far in our Direct2DellEMC series on optimizing your infrastructure for critical business workloads, we have been discussing how selecting the right technology provider can make the difference in organizations delivering superior outcomes.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Cybercriminals Target U.S. Citizens for COVID-19 Stimulus Fraud

SecureWorks

Cybercriminals Target U.S. Citizens for COVID-19 Stimulus Fraud Threat actors are selling and buying U.S. taxpayers’ data on underground forums to facilitate theft of coronavirus-relief stimulus checks and income tax refunds. Threat actors are selling and buying U.S. taxpayersā€™ data on underground forums to facilitate theft of coronavirus-relief stimulus checks and income tax refunds.

Data 100
article thumbnail

FlexDeploy Connectivity to Windows SSH Server

Flexagon

FlexDeploy utilizes SSH to communicate with remote server (known as Endpoint in FlexDeploy topology). For Microsoft Windows, Cygwin was required to establish SSH connectivity. I had described use of Copssh as well in a previous blog entry. Copssh is based on Cygwin. Now FlexDeploy 5.3 has introduced connectivity using Windows SSH server which is available.

Windows 78
article thumbnail

Top 5 Industries that can benefit from OTT Apps (With Examples)

Daffodil Software

The Over-the-Top (OTT) market is thriving. Globally, online streaming service subscriptions have grown from 150 million in 2014 to over 600 million in 2019. Subscribers are expected to grow to 1.1 billion by 2021.

article thumbnail

FlexDeploy connectivity to Windows SSH Server

Flexagon

FlexDeploy utilizes SSH to communicate with remote server (known as Endpoint in FlexDeploy topology). For Microsoft Windows, Cygwin was required to establish SSH connectivity. I had described use of Copssh as well in a previous blog entry. Copssh is based on Cygwin. Now FlexDeploy 5.3 has introduced connectivity using Windows SSH server which is available.

Windows 78
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Make B2B integration flexible AND innovative

Beyond B2B

When it comes to B2B Integration technology and partner management, you have to be careful what you chose to label as old, new, or out of date.

B2B 98
article thumbnail

Suddenly Distributed: Effective Retrospectives in the Age of Coronavirus

Agile Alliance

151
151
article thumbnail

Ford v. Ferrari: Leading Under Pressure

Experience to Lead

Leading under pressure can be stressful for even the most seasoned leader. When outcomes are uncertain, deadlines are tight, and the stakes are high, leaders must focus on quickly analyzing information and making the best decisions possible. Often, high-pressure situations result in innovation as leaders and their teams must adopt new ways of thinking and [.

article thumbnail

Suddenly Distributed: Effective Retrospectives in the Age of Coronavirus

Agile Alliance

148
148
article thumbnail

Reimagined: Building Products with Generative AI

ā€œReimagined: Building Products with Generative AIā€ is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Old but still dangerous ā€“ Dharma ransomware via RDP intrusion

Darktrace

Max Heinemeyer explains how Cyber AI detected a fast-acting, targeted Dharma ransomware attack, highlighting the anomalous behavior involved in every stage of the attack lifecycle.

72
article thumbnail

Mitigating High Severity CVEs Affecting SaltStack on Public Clouds

Aqua Security

Two high-severity CVEs in the SaltStack platform were published last week by researchers at F-Secure. These vulnerabilities can enable remote code execution (RCE), which lets attackers remotely execute commands on the Salt leader node. This results in a full compromise of the host and can expose sensitive information within the cloud environment. To address this, Aqua CSPM has been updated with new plugins that check AWS, Azure, and GCP environments for these new vulnerabilities.

Cloud 72
article thumbnail

Suddenly Distributed: Tools for Effective Agile Teams

Agile Alliance

Tools 130
article thumbnail

Deepfakes and Data Upskilling

Dataiku

In an ever-evolving technology landscape inundated with competitive players, itā€™s important for data scientists to question and critically analyze how to focus their learnings. Who grants authority to those in charge of validating content? How do we remain cognizant of big tech and corporations that shape our content and decisions? How do we upskill our efforts in a way that is trusted and not overly narrow in focus?

Data 66
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure youā€™ve thought of everything to make your project a success! The list was created by Senzingā€™s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Twelve Characteristics of Great Leaders

thoughtLEADERS, LLC

In this episode of Innovating Leadership Maureen Metcalf, thoughtLEADERS Principal, interviews Mike Figliuolo, thoughtLEADERS Managing Director, on the twelve characteristics of a great leader. As part of the continuing thought leader series at the Innovating Leadership podcast, Mike will discuss with Maureen his insights and thoughts on the twelve characteristics of great leaders and what makes these characteristics so important.

article thumbnail

Pitching Like a Pro

TechSoup

In the past two posts, you learned about what piques a reporter's interest and how to make it newsworthy. It's time to take the knowledge and create a pitch for journalists.

Report 66
article thumbnail

Time To Look At These Trending App Ideas Before Planning the Development

Xicom

Presently, the digital environment is app-focused. Approximately 90% of mobile time is spent using mobile apps. Irrespective, with 3.8 million apps on Google play and around 2 million apps on Apple play store, we jolt what applications people may still miss, and here we are ready to share the most promising app ideas with you. Also Read : HOW MUCH DOES IT COST TO DEVELOP AN APP LIKE INSTASHOP?

Trends 64