August, 2022

article thumbnail

Fixed Partitions

Martin Fowler

When partitioning data across a set of cluster nodes we need a uniform distribution and to be able add and remove nodes to the cluster without causing a lot of data to be moved around. Unmesh Joshi. explains how to do this by allocating data to a large number of virtual fixed partitions which are then allocated to the nodes.

article thumbnail

How to Give Your Boss Bad News: Avoid This Mistake and What to Do Instead

Let's Grow Leaders

Avoid This Mistake When Giving Your Boss Bad News. You’ve got to give your boss bad news. But the timing isn’t great–for you or for them. The restructure. The uncertainty. The promotion that’s right around the corner. Maybe it’s just not a great time to rock the boat. . How do you give your boss bad news well, while avoiding the proverbial shooting of the messenger?

How To 250
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Joy of Agility – Joshua Kerievsky

Agile Alliance

Joshua shares six essential agile mantras, plus unforgettable, real-world agile stories that will empower you to be quick, adaptable, and resourceful in the face of opportunities and challenges. The post Joy of Agility – Joshua Kerievsky first appeared on Agile Alliance.

Agile 298
article thumbnail

Reflections on Agile2022

Agile Alliance

Profiles in Agility, courage, resilience and humility I am in awe of Agile2022–the world’s largest gathering of Agilists and all things Agile, which Agile Alliance hosted the week of July 18th in Nashville! I literally stood back and observed the stage the Agile2022 Conference committee created for the phenomenon of Agile to shine! AGILITY This … Continued.

Agile 250
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Geopolitical risks could present new opportunities for CIOs: Gartner

CIO

Digital geopolitics, emanating from cross-country politics, is rapidly becoming an issue that multinational CIOs must step up to lead, according to Gartner. Gartner predicts that by 2026 about 70% of multinational enterprises will adjust the countries in which they operate by hedging to reduce their geopolitical exposure. The research firm defines geopolitics as the geographic influence on power relationships in international relations.

More Trending

article thumbnail

Kubernetes Version 1.25: An Overview

Aqua Security

Kubernetes Version 1.25 was released with 40 new enhancements including 13 Stable, 10 Beta, 15 Alpha, and 2 Deprecated. Join us as we present some of the notable features in this release, apply security with the Pod Security Admission (PSA), validate whether your cluster is using containerd, and give an overview of the features.

145
145
article thumbnail

How to Host a Clear the Air Meeting for Better Team Collaboration

Let's Grow Leaders

Practical Approaches For a Better Clear the Air Meeting. Do you ever need to have a meeting to “clear the air?” This question came in from one of our recent leadership development programs. An HR professional working to support co-workers who wanted to resolve their conflict and show up for one another in a human-centered way. They wanted to have a clear-the-air meeting, but they wanted to ensure it didn’t backfire and make things worse.

Meeting 207
article thumbnail

An Engineering Manager’s Bill of Rights (and Responsibilities)

Honeycomb

Or, the small crisis with engineering management. In 2018, Honeycomb co-founder & CTO Charity Majors wrote a blog post titled, “An Engineer’s Bill of Rights (and Responsibilities).” We’ve recently updated and reposted it. The post describes how, in most software engineering organizations, power naturally accrues to managers—and also makes the case that it’s important to limit this accrual in some ways, guaranteeing certain conditions for engineering ICs, rather than leaving every aspect of t

article thumbnail

DevOps World 2022: Why DevOps Needs a Remix

DevOps.com

I was checking out the DevOps World website today to gather information, as Techstrong.TV will be live streaming from the show in Orlando, Florida September 28 and 29, 2022. The theme for this year’s DevOps World is “DevOps Remix.” The more I thought about it, the more it became clear that DevOps Remix is a […]. The post DevOps World 2022: Why DevOps Needs a Remix appeared first on DevOps.com.

DevOps 145
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Metaverse: The time for CIOs to experiment is now

CIO

For the past forty years CIOs have labored to retrofit, rearchitect, and ultimately replace underfunded and underappreciated legacy infrastructures in hopes of delivering the full benefits associated with periodically occurring waves of transformative emerging technologies. Debate now rages in IT and digital communities regarding what will be the seismic technological shift of the 2020s.

VR 362
article thumbnail

These 5 investors are betting on helping you live longer and better

TechCrunch

Analysts estimate that the market for “delaying human death” could be worth $610 billion by 2025. But that doesn’t sit well with Christian Angermayer, who co-founded Cambrian BioPharma and Rejuveneron, and whose family office Apeiron Investment Group has a special interest in expanding longevity. “This is a nonsensical, imaginary number that is almost entirely made up by the cosmetics and supplements industry,” Angermayer said of the $610 billion estimate.

Biotech 313
article thumbnail

Now you can Scan your AWS Services for Security Issues with Trivy

Aqua Security

Every cloud provider has different resources that require detailed understanding to scan for security issues. To make this easier, cloud providers offer built-in security scanners. However, those may often lack functionality and integration into your existing stack.

AWS 144
article thumbnail

How to Help Your Team’s Performance Stand Out For Better Recognition

Let's Grow Leaders

Better Recognition Starts With More Strategic Contribution. You care about your team and the work they’re doing. They’re working hard. And if they’re like so many teams we work with, they yearn for better recognition. They want to know their work matters and that you (and your boss) appreciate all they do. So how do you help your team’s performance stand out?

article thumbnail

“Build vs Buy Analytics?” The Question ALL SaaS Leaders Need to Answer in 2024

As a SaaS leader, you know that the more metrics, insights, and analytics you add to your products, the more engagement you’ll have – and the stickier your product will become with customers. At what point do you decide to keep building your analytics in-house or invest in an embedded analytics solution? Read our Build vs. Buy Analytics guide to learn: Top 4 benefits of embedded analytics A quick cost comparison of in-house analytics development vs embedded analytics 10 considerations to help yo

article thumbnail

A Concise Guide to DevSecOps and Their Importance in CI/CD Pipeline

Dzone - DevOps

Leveraging continuous integration and delivery (CI/CD), many businesses today automate the software development life cycle. CI/CD is a part of the DevOps process, which aims to accelerate software development while minimizing errors. Continuous delivery automates the entire software release process up to production, whereas continuous integration produces and tests code automatically.

article thumbnail

MLOps Vs. DevOps: What’s the Difference?

DevOps.com

Machine learning operations, or MLOps for short, is a key aspect of machine learning (ML) engineering that focuses on simplifying and accelerating the process of delivering ML models to production and maintaining and monitoring them. MLOps involves collaboration between different teams including data scientists, DevOps engineers, IT specialists and others.

DevOps 145
article thumbnail

5 forces shaping the future IT workforce

CIO

Concerns about a looming recession have not derailed the booming IT job market. In the first half of this year, 115,000 new IT jobs were added, according to consulting firm Janco Associates. Even with inflation, high energy costs, and the invasion of Ukraine, IT hiring continued at a record-setting pace, but keeping tech talent still poses challenges.

article thumbnail

Why not all VCs are ready to embrace AI-powered investment tools

TechCrunch

AI’s strength lies in its predictive prowess. Fed enough data, the conventional thinking goes, a machine learning algorithm can predict just about anything — for example, which word will appear next in a sentence. Given that potential, it’s not surprising that enterprising investment firms have looked to leverage AI to inform their decision-making.

Tools 296
article thumbnail

Addressing Top Enterprise Challenges in Generative AI with DataRobot

The buzz around generative AI shows no sign of abating in the foreseeable future. Enterprise interest in the technology is high, and the market is expected to gain momentum as organizations move from prototypes to actual project deployments. Ultimately, the market will demand an extensive ecosystem, and tools will need to streamline data and model utilization and management across multiple environments.

article thumbnail

CyRC Case Study: Exploitable memory corruption using CVE-2020-25669 and Linux Kernel

Synopsys

This in-depth analysis explores CVE-2020-25669, a vulnerability that exploited a memory corruption issue in Linux Kernel. The post CyRC Case Study: Exploitable memory corruption using CVE-2020-25669 and Linux Kernel appeared first on Application Security Blog.

article thumbnail

Threat Actor Tactics in the Russo-Ukrainian Conflict: Analyst Observations and Predictions

Darktrace

The escalation of the conflict between Russia and Ukraine has led to fears of a full-scale cyberwar. In this discursive blog, analysts cover the most popular methods of attack in the conflict so far, some of the hacking groups involved, and the observations Darktrace has made in its own customer environments.

Groups 142
article thumbnail

Why Process Orchestration Needs Advanced Workflow Patterns

Bernd Rucker

Life is seldom a straight line, and the same is true for processes. Therefore, you must be able to accurately express all the things happening in your business processes for proper end-to-end process orchestration. This requires workflow patterns that go beyond basic control flow patterns (like sequence or condition). If your orchestration tool does not provide those advanced workflow patterns, you will experience confusion amongst developers, you will need to implement time-consuming workaround

article thumbnail

NewOps? AIOps? NoOps? Just Don’t Call Me Late for Dinner

DevOps.com

Once again, we are seeing an uptick in the use of the term NoOps. I always felt that NoOps was a misleading and, in fact, empty phrase. I don’t care what magic you think you have; you are never going to eliminate the need to operate your software, applications and infrastructure. I first heard the […]. The post NewOps? AIOps? NoOps? Just Don’t Call Me Late for Dinner appeared first on DevOps.com.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Why every IT leader should avoid ‘best practices’

CIO

The nonsense was tucked away in a PowerPoint slide, as so much nonsense is. “We’ll help you institute best practices, followed by a program of continuous improvement,” the offending bullet said. Now, I’m willing to shrug at a bit of harmless puffery from time to time. And maybe this puffery was harmless. But I don’t think so. As my pappy used to say, ‘If someone sells this and someone else buys it, they have something in common: They’re both schmucks.

article thumbnail

Ulta Beauty launches a fund, showcasing the resilience of corporate venture capital

TechCrunch

Over the past few years, corporate venture capital investors have solidified their stature as a reliable source of VC funding. The number of companies launching investment arms has exploded , and the amount of new funds has continued to rise despite the current market volatility. Ulta Beauty, the largest chain of beauty stores in the U.S., became the latest company to launch a venture arm this week.

article thumbnail

Oh, the Humanity! Of Cybersecurity

CEO Insider

A rigorous cybersecurity plan is critical for your company’s protection, but it means nothing if you’re employees aren’t trained to recognize cyberthreats. When employees know what to watch out for, you can be assured that your organization will be safe from data breaches and other security issues. Implement these strategies to turn your employees into […].

Training 137
article thumbnail

Emotet Resurgence: Cross-Industry Campaign Analysis

Darktrace

This blog aims to provide background and technical discoveries from the recent Emotet resurgence detected in early 2022 across multiple Darktrace client environments in multiple regions and industries. Predominantly in March and April 2022, Darktrace DETECT provided visibility over network activities associated with Emotet compromises using initial staged payload downloads involving algorithmically generated DLLs and subsequent outbound command and control, as well as spam activities.

Industry 141
article thumbnail

From Whims to Wins: How a Customer-Centric Portfolio Transforms Product Strategy

Speaker: John Mansour - President, Product Management University

You know that sinking feeling. You’ve come up with a winning product strategy, everyone’s on board and energized, and you’re halfway down the path to execution only to have it submarined by something someone convinced your leadership was more strategic! It’s a scenario that’s all too familiar, and it exemplifies one of the biggest struggles with individual product strategies.

article thumbnail

Threat Alert: Cloud Network Bandwidth Now Stolen through Cryptojacking

Aqua Security

Threat actors are looking to increase their financial gain and thus deploy cryptominers which are considered easy to use and lucrative. Cryptomining involves complex calculations leading to high computation power and consequently increased CPU consumption and electricity (or cloud) bill. Aqua Nautilus found a new type of cryptomining attack in the wild.

Network 136
article thumbnail

A Guide to Cloud Migration Trends and Strategies

DevOps.com

For several years, we have witnessed widescale cloud adoption as a software infrastructure growth and maintenance strategy. Spending on cloud application services (SaaS) continues to grow as monolithic applications are replaced by microservices-based apps and monoliths become relics of the past. In 2021 alone, companies spent $410.9 billion on public cloud services, and Gartner expects […].

Trends 145
article thumbnail

Securing the ever-evolving hybrid work environment

CIO

Even as many business leaders debate the boundaries of remote work styles and schedules, there is little doubt that hybrid work will persist for most enterprises. Yet, how hybrid work takes shape for any given business will likely evolve as business needs and employee expectations change over time. For IT and network security teams, the challenge is to secure their environments, regardless of where people are working.

WAN 327