Tue.Nov 13, 2018

article thumbnail

Managing risk in machine learning

O'Reilly Media - Ideas

Considerations for a world where ML models are becoming mission critical. In this post, I share slides and notes from a keynote I gave at the Strata Data Conference in New York last September. As the data community begins to deploy more machine learning (ML) models, I wanted to review some important considerations. Let’s begin by looking at the state of adoption.

article thumbnail

3 Reasons You Should Add AIOps to Your Tooling Arsenal

OverOps

AIOps, at its core, is a data-driven practice of bridging resources and leveraging AI and machine learning to make predictions based on historical data. AIOps seems to be all the rage these days, and it’s not hard to figure out why. It sounds like a new magical solution to resolving all errors ever! Ok maybe not quite, but it certainly promises to add serious firepower to DevOps teams’ monitoring arsenals.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Surprising Reason Emerging Leaders Stop Emerging

Let's Grow Leaders

I met a fellow keynote speaker at a conference where we both presenting. She was a seasoned entrepreneur who had built a successful business from scratch, so what she had to share with me was surprising. Karin, I’m so intrigued by this […]. The post The Surprising Reason Emerging Leaders Stop Emerging appeared first on Let's Grow Leaders.

article thumbnail

3 Reasons You Should Add AIOps to Your Tooling Arsenal

OverOps

AIOps, at its core, is a data-driven practice of bridging resources and leveraging AI and machine learning to make predictions based on historical data. AIOps seems to be all the rage these days, and it’s not hard to figure out why. It sounds like a new magical solution to resolving all errors ever! Ok maybe not quite, but it certainly promises to add serious firepower to DevOps teams’ monitoring arsenals.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

UX Research Methods and the Path to User Empathy

Toptal

How can designers move beyond personal insights to understand the problems users face? We introduce time-tested UX research methods that inspire user empathy and lead to better user experiences.

Research 110

More Trending

article thumbnail

Aligned for Success – A Guide to What Investors Look For in a Startup

Toptal

Startup investors are not benevolent creatures, they’re looking for certain signals that help to persuade them to part with their money. This guide, written from an investor’s perspective, intends to help startups understand the key areas to focus on and emphasize when raising money.

110
110
article thumbnail

Artificial Intelligence and how it will affect our day to day life

CTOvision

Read Jeremy Kahn and Dina Bass’ analysis of artificial intelligence and how it will affect our day to day life on Washington Post : Artificial intelligence, or AI, is both the stuff of Terminator-esque, end-of-humanity scenarios and an invisible but steadily increasing part of our daily lives, suggesting what news we should read, for instance, […].

article thumbnail

High-Touch Leadership in Buffer’s Fully Remote Culture

Gitprime

GitPrime elevates engineering leadership with objective data. In this interview series, Engineering Leaders talk about how to build high performing teams. When you’re running a startup company, things just work differently than they do in a more established one. You’re all in each other’s faces and spaces. You know almost everything your coworkers are doing at work, not to mention what’s going on in each other’s lives.

Culture 84
article thumbnail

Oracle OpenWorld 2018 Takeaways: The Latest on Cloud, Containers, and DevOps

Flexagon

The end of October brought us the largest conference for companies running Oracle: OpenWorld. We were at the conference in full force, and when we weren’t presenting sessions, we were attending presentations and talking with partners, attendees, and members of the Oracle team. During it all, our team took notes on the biggest insights and. Read more.

DevOps 74
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AI and machine learning could spot the next Jobs, Gates, or Zuckerberg

CTOvision

Read Jake Hsu’s article about how AI and machine learning could help companies spot talent on Market Watch : During the Industrial Revolution, many people feared that the emergence of new technologies — textile mills, factories, steam-powered manufacturing — would eliminate their jobs. We are in the midst of another technological sea change. This time, […].

article thumbnail

Standing Out From The Crowd: How to Choose the Right Specialization

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

How To 78
article thumbnail

How Leveraging The Internet Of Things for Manufacturing Can Be A Game Changer

CTOvision

Read Maciej Duraj’s article about how the manufacturing sector can leverage the Internet of Things for a greater advantage on Forbes : You may be aware of how tech companies, particularly Amazon, are transforming store shelves worldwide by coming to the digital aspects of their online store with the easy pickup. How literally, shoppers can just […].

article thumbnail

Dell EMC and the 5G Network Transformation

Dell EMC

Applying Digital, IT, Security and Workforce Transformation to 5G Networks I’ve blogged about 5G and the mobile network transformation a few times (including here, and here), and have spent countless hours, at this point, speaking with many of Dell EMC’s top service provider customers and partners on how the 5G network transformation will play out. To date, I’ve refused to walk into meetings with canned slides that capture the enormity of 5G in orders-of-magnitude (more devices, more data, lower

Network 76
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

What Are The Top 10 IoT Trends For Next 5 Years

CTOvision

While the Internet of Things or IoT is touted as the next big thing in the communication technology world and is said to connect over 30 billion devices in next five years and generate revenues in multiple of trillions, industries are not very sure what verticals would drive the initial growth where to put their […].

IoT 73
article thumbnail

How to add In-App Purchases in your iOS app?

VironIT

In-app purchases (IAP) is a great way to monetize your iOS and macOS applications. In the AppStore, there are applications with the “Offers In-App Purchases” label near the Buy or Get button. It means that these apps contain in-app purchases. IAP is most often used to unlock additional content or functionality. Usually, apps with in-app […].

How To 75
article thumbnail

Google open-sources AI that can distinguish between voices with 92% accuracy

CTOvision

Google is going open-source with it’s best-kept secret to users – AI technology. According to sources, Google is releasing open-source AI algorithms that its researchers say can distinguish between voices with 92% accuracy. — The Google patented tool called Diarization — the process of partitioning out a speech sample into distinctive, homogeneous segments according to who said what, […].

article thumbnail

Serverless Security: The Importance of FaaS Risk Assessment

Aqua Security

In my previous blog, I discussed the serverless services spectrum and the unique security considerations of serverless functions. In this post, I’d like to elaborate on the importance of preliminary risk assessment checks and their contribution to an effective security strategy, based on lessons learned in containerized workloads environments.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Chinese ‘gait recognition’ tech IDs people by how they walk

CTOvision

One of the fears of AI and machine learning tech is it can be used by nation states to play big brother. And from what Chinese authorities are doing, the big brother part seems real. China has begun deploying “gait recognition” AI software in Beijing and Shanghai that identifies people via their body shapes and […].

article thumbnail

The Recap: Kentik at Networking Field Day 19

Kentik

On Friday we presented at Networking Field Day 19. This is an event we love because, well, NFD delegate Ethan Banks of Packet Pushers summarized it nicely: So What’s New at Kentik? Watch the segment. Kentik Co-founder and CEO Avi Freedman kicked off NFD 19 with his take on how networks are changing. He said it’s largely due to: Multiple architectures.

Network 56
article thumbnail

Bob Gourley Interviews Cyber Tech Titan Richard Bejtlich On Enterprise Cybersecurity Lessons Learned

CTOvision

Carahsoft and Corelight are sponsoring a webinar 13 December 2018 which features an interview of Cybersecurity Pioneer Richard Bejtlich by CTOvision publisher Bob Gourley. For more and to register see: Lessons Learned from a Tech Titan. Few defenders have seen as much action in cyberspace as Richard Bejtlich. His career in network security started in the […].

article thumbnail

Representative Line: An Equal Crunch

The Daily WTF

Rina works in an environment which tends to favor crunch. It's a bit of a feast or famine situation, where they'll coast for months on a pretty standard 9-5 schedule, and then bam , suddenly it's 18 hours days. No one particularly likes those periods, and code quality takes a nosedive. Co-worker Rusty, though, starts making utterly bizarre decisions when stressed, which is how Rina found this line while doing a code review: int count = stackRepository.getQueryCount(queryPredicate); i

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

FingBox Gives You Network Superpowers: Network security that contributes to physical security

CTOvision

FingBox is a fantastic device that I recommend everyone put in their home. It is also perfect for small businesses. Features of the FingBox help you track the status of your network and the many devices connected to it. It also enables you to set alerts and receive notifications when device status changes. You can […].

Network 60
article thumbnail

Microsoft Patch Tuesday – November 2018

Symantec

This month the vendor has patched 62 vulnerabilities, 13 of which are rated Critical.

80
article thumbnail

Sponsored Post: Twitch, InMemory.Net, Triplebyte, Etleap, Stream, Scalyr

High Scalability

Who's Hiring? Twitch's commerce team in San Francisco is looking to hire senior developers to keep up with rapidly increasing demand for our Subscriptions and Payment platform. Engineers will be tasked with building new products and features to solve business and ecommerce challenges as we're dealing with engaging problems at a massive scale and will create solutions that impact millions of people around the world.

article thumbnail

Four short links: 13 November 2018

O'Reilly Media - Ideas

Ways of Working, Too-Smart AI, Wi-Fi Vision, and Materials Science AI. Internet-Era Ways of Working -- an elegant brief summary of how we do software in 2018, from Tom Loosemore's public.digital team. Examples of AI Gaming the System -- a list of examples of AIs learning more than was intended. Neural nets evolved to classify edible and poisonous mushrooms, took advantage of the data being presented in alternating order, and didn't actually learn any features of the input images.

.Net 46
article thumbnail

Revolutionizing Contact Centers: Next-Gen Tech for Enhanced CX

Speaker: Liran Meir Frenkel, Performance Management and RPA Sr Product Marketing Manager at NICE; Harpreet Makan, Practice Director at Everest Group; & Santhosh Kumar, Practice Director at Everest Group

As contact centers navigate the challenges of delivering excellence within budget constraints and adapting to evolving employee expectations, optimizing agent tasks becomes crucial. Discover a holistic approach across three pillars - people, process, and technology - that is essential to excel in this dynamic landscape, and explore how next-gen technologies such as generative AI, performance analytics, and process intelligence play a pivotal role in transforming contact centers into advanced CX

article thumbnail

How to secure your Cloud environment

Enlume

Today’s technology is fast addressing business challenges and creating a multitude of newer opportunities for economic growth. Cloud computing is enabling us to realize better efficiencies across provisioning, deployment, and monitoring of Information Assets. With these rapid technologies, changes come the risk of Security as the Enterprises strive to be ahead of the Hacker communities and protect one’s assets.

article thumbnail

“helm install?—?wait” does not wait?—?workaround

ProdOps

“helm install?—?wait” does not wait?—?workaround W e’re using Helm to deploy services to K8s for several clients we’re supporting. Helm gives you the option to install and upgrade releases in your K8s clusters. As part of this process, the ability to know if the release has ended successfully or not is very important (whether to rollback or not). Helm does this by utilizing an ability to read the deployment status of k8s resources.

DevOps 40
article thumbnail

The True Intention of Scrum

Net Objectives

Scrum was inspired by the article “The New New Product Development Game” (’86). It introduced a new way to develop new products. The question essentially was “how do we get innovation from product development teams?” The emphasis was on speed & flexibility. Several characteristics of successful development included: Teams work best when they work autonomously … Continue reading "The True Intention of Scrum".

SCRUM 40