June, 2022

article thumbnail

10 Key Trends of Digital Transformation in Healthcare in 2022

OTS Solutions

The COVID-19 pandemic fundamentally altered healthcare in 2020. Still, in 2021, a new set of problems has emerged, including more potent COVID-19 variations and overflowing hospitals attempting to treat both people with and without the virus. Technology has proven important in maintaining the healthcare industry’s resilience in the face of so many obstacles.

article thumbnail

Product Backlog Building Canvas

Martin Fowler

Many software teams describe desired product capabilities as a product backlog: a list of user stories. These stories capture who needs the work, what the work is, and why it's needed. Too often teams expect a product owner to be the sole source of the backlog, but anyone could (and should) write user stories. Paulo Caroli teaches teams to use a Product Backlog Building Canvas , which provides a simple process to develop user stories, starting with describing personas for product users and the a

Software 286
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The 10 biggest issues IT faces today

CIO

CIOs are used to rapid change. New technologies hit the market, existing ones evolve, business needs change on a dime, staff comes and goes. All that together, though, is nothing compared to the turbulence that CIOs are seeing today. IT leaders are now contending with continued pandemic-related disruptions, geopolitical instability, and economic volatility — on top of those usual factors.

article thumbnail

FDA orders Juul to stop selling its vaping products in the US

TechCrunch

The axe has fallen for e-cigarette maker Juul. The FDA ordered the company to stop selling and distributing its ubiquitous vaping devices in the U.S. Thursday, a dramatic end for a company that dominated the e-cigarette market and was valued at $38 billion at the top of its game. Juul will no longer be able to sell its vapes nor its 5% or 3% tobacco and menthol-flavored pods in the U.S. without “risk[ing] enforcement action” from the U.S.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Professionalising the Scrum Master Role

Agile Alliance

The global pump manufacturer Grundfos is experimenting with implementing Agile techniques for the development of hardware and software components. This article describes how the authors guided and supported the professional development of the Scrum Masters role and competencies, with an emphasis on challenges encountered and lessons learned. The post Professionalising the Scrum Master Role first appeared on Agile Alliance.

SCRUM 257

More Trending

article thumbnail

10 women in cybersecurity predict software security trends

TechBeacon

Rounding the corner into the second half of the year offers a good opportunity for security strategists to reevaluate the state of their cybersecurity plans as they match them with the realities of the threat landscape.

Trends 145
article thumbnail

Survey Shows Correlation Between Open Source, DevOps Skills Demand

DevOps.com

A survey published this week by the Linux Foundation suggested enterprise IT organizations now prefer to hire IT professionals that have both open source software and DevOps experience. Conducted in collaboration with edX, a leading global online learning platform from 2U, Inc., the survey polled 1,672 open source professionals and 559 respondents with responsibility for […].

article thumbnail

What is data analytics? Analyzing and managing data for decisions

CIO

What is data analytics? Data analytics is a discipline focused on extracting insights from data. It comprises the processes, tools and techniques of data analysis and management, including the collection, organization, and storage of data. The chief aim of data analytics is to apply statistical analysis and technologies on data to find trends and solve problems.

Analytics 338
article thumbnail

Pear VC’s Anand Iyer goes solo with new $20M fund for crypto developer tools

TechCrunch

Engineers are the bedrock of any tech product, and blockchains are no exception. As the race between different chains heats up, communities of loyalists are duking it out to attract developers to their blockchain of choice in hopes that doing so will turbocharge growth. And competition aside, without adequate infrastructure and tooling, the big ideas and promises of web3 don’t have any shot of seeing the light of day.

Tools 315
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Public Travis CI Logs (Still) Expose Users to Cyber Attacks

Aqua Security

In our latest research, we at Team Nautilus found that tens of thousands of user tokens are exposed via the Travis CI API, which allows anyone to access historical clear-text logs. More than 770 million logs of free tier users are available, from which you can easily extract tokens, secrets, and other credentials associated with popular cloud service providers such as GitHub, AWS, and Docker Hub.

AWS 145
article thumbnail

Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134

Lacework

Details regarding the recent Confluence OGNL ( CVE-2022-26134 ) exploit were released to the public on June 3rd 2022. Shortly following this, Lacework Labs began seeing multiple attacks in the wild from both uncategorized and named threats. While this was expected, there appears to be more widespread exploitation of CVE-2022-26134 compared to previous Confluence vulnerabilities.

Malware 144
article thumbnail

Why open source matters for developers

TechBeacon

Organizations' use of open source is continuing to increase. In fact, in 2021, some 77% of companies reported that they were using more open-source software, while 36% said they were using significantly more open-source tools.

article thumbnail

The Risks of Shadow Code

DevOps.com

As the economy struggles to recover after the last two years of the COVID-19 pandemic, we have all learned a thing or two about supply chains—and what happens when they break down. But many people do not realize that modern websites also have digital supply chains, third-party ones that can be compromised in myriad ways. […]. The post The Risks of Shadow Code appeared first on DevOps.com.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How You Can Become a Listening STAR

thoughtLEADERS, LLC

Today’s guest post is written by Brian Ahearn. Brian’s one of the most knowledgeable guys I know on the subject of influencing people (which is why he’s been a guest here before). Brian’s blog, Influence PEOPLE, is followed by people in more than 180 countries. You can learn more about Brian at the end of this post. Enjoy! My wife Jane is an excellent golfer, a poster child for hard work and practice.

article thumbnail

6 reasons to invest in startups from Ukraine

TechCrunch

Oleksandr Yaroshenko. Contributor. Oleksandr Yaroshenko is head of investor relations at Headway , an edtech startup based in Ukraine. For more than three months, Ukraine has been engulfed in the flames of a war with Russia. That might look like a red flag from an investor’s point of view, but everything is not so black and white in the country’s tech sector.

article thumbnail

Is Your Approach Parent-Child Management or Adult-to-Adult Leadership?

Next Level Blog

Years ago, when I was a rising leader in corporate-land, I worked for a company president who regularly asked a thought-provoking question, “Are we engaging in an adult-to-adult conversation or a parent-child conversation?”. When she asked the question, I don’t think she had in mind the nurturing type of parent-child relationship that most of us would likely prefer, but the type in which the parent is the alpha and the child is the beta.

article thumbnail

Empathetic Leadership Begins with Love

Steve Farber

Over the past couple of years, our world has lost and gained a lot. We’ve been through an incredibly stressful yet profound experience, and we’ve come out on the other side, scarred but intact and. Read more. The post Empathetic Leadership Begins with Love first appeared on Steve Farber.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How to make low code work long term

TechBeacon

Low-code development's popularity has been steadily increasing for years now, with no signs of slowing down. Its appeal is that it gives users the ability to create software applications through a graphical interface, with little or no need for programming in the traditional sense.

How To 138
article thumbnail

The Two Types of Code Vulnerabilities

DevOps.com

Spell checkers, grammar checkers and predictive keyboards all help reduce errors in written communication, but in a creative medium where writers need to innovate new expressions, nothing can eliminate all errors. The same is true in the code we write. Of course, your code is probably perfect but, on average, all code has bugs. Some […]. The post The Two Types of Code Vulnerabilities appeared first on DevOps.com.

Course 144
article thumbnail

WhiteHat brings new dimension to DAST capabilities at Synopsys

Synopsys

The acquisition of WhiteHat Security, the leading the DAST solution provider, is a step toward a more comprehensive, end-to-end portfolio for AppSec. The post WhiteHat brings new dimension to DAST capabilities at Synopsys appeared first on Application Security Blog.

article thumbnail

Athleisure icon Ty Haney raises $9.8M in fresh funding for her blockchain rewards startup

TechCrunch

Outdoor Voices founder Ty Haney made a name for herself by making sportswear the hottest trend among non-athletes. Now, the 33-year-old entrepreneur is betting she can bring together another underrated duo — consumer brands and crypto. Haney joined TechCrunch’s Chain Reaction podcast this week to talk about her latest venture, Try Your Best (TYB).

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Building Transparency into AI Projects

Harvard Business Review

As AI becomes ever more embedded in people’s lives, effective communication with stakeholders can define a product’s success — or failure.

article thumbnail

How Low Code Demands More Creativity From Developers

Dzone - DevOps

This is an article from DZone's 2022 Low Code and No Code Trend Report. For more: Read the Report. Yes, engineering is a science, but it's more and more an art, too. Developers must be at least as creative as the next hacker — and they need to cultivate user empathy. That's why organizations benefit from automating the minutia, allowing devs to focus on novel problem-solving.

article thumbnail

GitHub Bug Allowed Third-party Apps to Gain Elevated Permissions

Aqua Security

We learned about a bug in GitHub that for about five days at the end of February allowed connected GitHub third-party applications to generate new scoped installation tokens with elevated permissions. For example, if you connected the Codecov app to your GitHub account with read-only access to your repositories, during that window it could have created a new token with write access to them.

Windows 126
article thumbnail

Developer’s Guide to Web Application Security

DevOps.com

When it comes to security, there are many vulnerabilities that can leave your website or web app open to attack. In this article, we’ll go over 15 common web application security vulnerabilities and how you can prevent them. 1. Insufficient Cryptography Cryptography is a critical security measure that is used to protect data in transit […].

article thumbnail

Revolutionizing Contact Centers: Next-Gen Tech for Enhanced CX

Speaker: Liran Meir Frenkel, Performance Management and RPA Sr Product Marketing Manager at NICE; Harpreet Makan, Practice Director at Everest Group; & Santhosh Kumar, Practice Director at Everest Group

As contact centers navigate the challenges of delivering excellence within budget constraints and adapting to evolving employee expectations, optimizing agent tasks becomes crucial. Discover a holistic approach across three pillars - people, process, and technology - that is essential to excel in this dynamic landscape, and explore how next-gen technologies such as generative AI, performance analytics, and process intelligence play a pivotal role in transforming contact centers into advanced CX

article thumbnail

Why programmers still love COBOL

TechBeacon

The programming language COBOL conjures up images of thin ties, white shirts, spinning tape drives, and all of the glory and pain of the mainframe era. This only makes sense because the language first appeared in 1959 and it was one of the dominant ways to code in the 1960s.

article thumbnail

A downturn is nothing new for diverse founders

TechCrunch

From black swan memos and heart-to-hearts to not-so-subtle emails asking for on-the-record confirmations that your startup does, indeed, have revenue, investors have a lot to say about the downturn. Yet, it’s a quieter and more realistic truth that has landed my attention as of late: For diverse founders, the downturn is nothing new. Some investors, largely those who focus on backing historically overlooked founders, say that the crackdown on tech companies isn’t impacting diverse founders as ha

Study 303
article thumbnail

Harness the Power of WordPress Hooks: Actions and Filters Explained

Toptal

WordPress developers might be tempted to customize this popular website builder directly, but that approach creates ongoing maintenance headaches. Fortunately, there's a clean way to extend functionality: via WordPress hooks, actions, and filters.