September, 2023

article thumbnail

Unleashing AI’s Potential: The Imperative of Creative Executive Leadership

N2Growth Blog

In today’s digitized business era, where artificial intelligence (AI) continually reshapes industry dynamics, a new breed of executive leadership emerges at the forefront. While AI offers significant advancements, creative thinking executives are poised to unlock its ultimate potential. Let’s dive deep into why the C-suite’s creative minds have never been more crucial.

article thumbnail

The Fusion of AI and DevOps: A Tech Revolution

Kovair - DevOps

The technological landscape is perpetually evolving, with artificial intelligence (also known as AI) and Development Operations (DevOps) leading. The fusion of these two powerful tools.

DevOps 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What I Have Changed My Mind About in Software Development

Henrik Warne

I really like this quote from Jeff Bezos: “Anybody who doesn’t change their mind a lot is dramatically underestimating the complexity of the world we live in.” Lately I have been thinking about what I have changed my mind about in software development. Here are the things I came up with: Self-documenting code. I used to think that the names of the classes, methods and variables should be enough to understand what the program does.

article thumbnail

Building an Effective Chief Technology Office on Different Business Scales

CTO Academy

It is now common for a team leader or project manager to find themselves placed in the CTO’s shoes at a moment’s notice. Often, this brand-new executive is forced to form a Chief Technology Office out of thin air and without any help. This is the challenge facing what we call the accidental CTO. At […] The post Building an Effective Chief Technology Office on Different Business Scales appeared first on CTO Academy.

CTO 97
article thumbnail

LLMs in Production: Tooling, Process, and Team Structure

Speaker: Dr. Greg Loughnane and Chris Alexiuk

Technology professionals developing generative AI applications are finding that there are big leaps from POCs and MVPs to production-ready applications. They're often developing using prompting, Retrieval Augmented Generation (RAG), and fine-tuning (up to and including Reinforcement Learning with Human Feedback (RLHF)), typically in that order. However, during development – and even more so once deployed to production – best practices for operating and improving generative AI applications are le

article thumbnail

Data – The Lifeblood of Intelligence Automation

Perficient

With all the hype around artificial intelligence (AI), AI can feel complicated, distant, or foreign. But guess what? It’s not new news and it doesn’t need to be complicated; it’s just a revolution of how we leverage data! Let’s take a quick dive into the data-driven universe of AI (i.e., intelligence automation). This article breaks down how data powers intelligence automation.

More Trending

article thumbnail

Artificial Intelligence — Beyond the Algorithms

Palo Alto Networks

In Episode 6 of “This is How We Do It,” Peter Havens, from Cortex product marketing, continues the interview series. He sits down with Yoni Allon, VP Research, to discuss how Palo Alto Networks leverages artificial intelligence (AI) to enhance cybersecurity in our SOC. Palo Alto Networks stands as a cybersecurity stalwart, safeguarding the network and security environments for nearly one hundred thousand organizations across the globe.

article thumbnail

How is GenAI different from other code generators?

Martin Fowler

How is code generation with GenAI different from more "traditional" code generators? The newest memo in Birgitta Böckeler's explorations of GenAI talks about abstraction levels in software engineering, and on which levels GenAI sits in the translation of our thoughts into zeros and ones.

article thumbnail

Is All-in-One Nonprofit Software Right for You?

TechSoup

Do you feel like you're using too many apps? Do you find yourself jumping between several different pieces of software to complete a given task? Do you feel like you're wasting time and energy by entering information into multiple places?

Software 112
article thumbnail

Agile2024: An Amazing Program Needs Amazing Reviewers

Agile Alliance

We'd like to officially invite you to raise your hand to serve as a reviewer for Agile2024 this year. We'll take as many as we can get, and you’ll get to participate as much as you want in the process. The post Agile2024: An Amazing Program Needs Amazing Reviewers first appeared on Agile Alliance.

article thumbnail

Use Cases for Apache Cassandra®

There’s a good reason why Apache Cassandra® is quickly becoming the NoSQL database of choice for organizations of all stripes. In this white paper, discover the key use cases that make Cassandra® such a compelling open source software – and learn the important pitfalls to avoid. From understanding its distributed architecture to unlocking its incredible power for industries like healthcare, finance, retail and more, experience how Cassandra® can transform your entire data operations.

article thumbnail

The GitHub Actions Worm: Compromising GitHub Repositories Through the Actions Dependency Tree

Prisma Clud

Learn how a novel attack vector in GitHub Actions allows attackers to distribute malware across repositories using a technique that exploits the actions dependency tree and puts countless open-source projects and internal repositories at risk. Get an in-depth look at the attack vectors, technical details and a real-world demo in this blog post highlighting our latest research.

Malware 144
article thumbnail

CVE-2023–29357, CVE-2023–24955: Exploit Chain Released for Microsoft SharePoint Server Vulnerabilities

Tenable

CVE-2023–29357, CVE-2023–24955: Exploit Chain Released for Microsoft SharePoint Server Vulnerabilities A proof-of-concept exploit chain has been released for two vulnerabilities in Microsoft SharePoint Server that can be exploited to achieve unauthenticated remote code execution. Background On September 25, STAR Labs researcher Nguyễn Tiến Giang (Jang) published a blog post outlining the successful chaining of CVE-2023–29357 and CVE-2023–24955 to achieve remote code execution (RCE) against Micro

article thumbnail

Article: Bridging Silos and Overcoming Collaboration Antipatterns in Multidisciplinary Organisations

InfoQ Culture Methods

There's a worrying trend towards focusing on specialisms at the expense of collaboration, shared responsibility and valuable outcomes, which can take teams away from multi-disciplinary collaboration. This article calls out three collaboration anti-patterns that appeared in more than one organisation, some of the symptoms they cause and some thoughts on how to go about counteracting them.

Trends 132
article thumbnail

LLMs Demand Observability-Driven Development

Honeycomb

Our industry is in the early days of an explosion in software using LLMs, as well as (separately, but relatedly) a revolution in how engineers write and run code, thanks to generative AI. Many software engineers are encountering LLMs for the very first time, while many ML engineers are being exposed directly to production systems for the very first time.

article thumbnail

Addressing Top Enterprise Challenges in Generative AI with DataRobot

The buzz around generative AI shows no sign of abating in the foreseeable future. Enterprise interest in the technology is high, and the market is expected to gain momentum as organizations move from prototypes to actual project deployments. Ultimately, the market will demand an extensive ecosystem, and tools will need to streamline data and model utilization and management across multiple environments.

article thumbnail

The Real Problem with Software Development

O'Reilly Media - Ideas

A few weeks ago, I saw a tweet that said “Writing code isn’t the problem. Controlling complexity is.” I wish I could remember who said that; I will be quoting it a lot in the future. That statement nicely summarizes what makes software development difficult. It’s not just memorizing the syntactic details of some programming language, or the many functions in some API, but understanding and managing the complexity of the problem you’re trying to solve.

article thumbnail

Ship Of Fools

Successful Software

I recently had a 3 week holiday in Florida with my family. My 17 year old son is interested in rocketry and my wife is interested in wildlife. We got to see plenty of both and had a great time. There is a lot to like about America and Americans. But the sheer waste of resources on show everywhere was pretty shocking. In Europe we absolutely aren’t doing enough to protect the environment and avert the impending climate catastrophe (I flew to Florida and drove a car there, so I am no environ

Hotels 126
article thumbnail

2023 Unit 42 Attack Surface Threat Report Highlights the Need for ASM

Palo Alto Networks

Palo Alto Networks Unit 42 illuminates some of the riskiest security observations around attack surface management (ASM) with the 2023 Unit 42 Attack Surface Threat Report. The report contrasts the dynamic nature of cloud environments with the speed at which threat actors are exploiting new vulnerabilities. It found that cybercriminals are exploiting new vulnerabilities within hours of public disclosure.

Report 126
article thumbnail

Tenable's Plan to Acquire Ermetic Will Accelerate Customer Value in CNAPP and Exposure Management

Tenable

The acquisition of cloud security innovator Ermetic, once completed, will add unified, elegantly integrated CNAPP and market-leading CIEM capabilities to the Tenable portfolio. Today, Tenable announced our intent to acquire Ermetic, an innovator in the cloud security market with deep expertise and capabilities in the complex discipline of securing cloud identities and entitlements.

Cloud 135
article thumbnail

From Whims to Wins: How a Customer-Centric Portfolio Transforms Product Strategy

Speaker: John Mansour - President, Product Management University

You know that sinking feeling. You’ve come up with a winning product strategy, everyone’s on board and energized, and you’re halfway down the path to execution only to have it submarined by something someone convinced your leadership was more strategic! It’s a scenario that’s all too familiar, and it exemplifies one of the biggest struggles with individual product strategies.

article thumbnail

Documentation as Code: A Game Changer for DevOps Teams?

DevOps.com

Documentation-as-code improves collaboration, ensures consistency and accuracy, facilitates version control and streamlines updates and maintenance processes.

DevOps 126
article thumbnail

Making Government More Like Amazon Through Estonia’s Blueprint

CEO Insider

As another potential government shutdown looms over Washington, the need for a more efficient and resilient government becomes increasingly evident. The ongoing political turmoil underscores the importance of reducing the burden on taxpayers and businesses who suffer the consequences of these shutdowns. To address these issues, we must look to innovative solutions, such as those […] The post Making Government More Like Amazon Through Estonia’s Blueprint appeared first on CEOWORLD mag

article thumbnail

Article: Why Developers and Staff+ Engineers Should Get Involved in Open-Source Collaborative Development

InfoQ Culture Methods

Over the last 30 years, the world has become connected and digital. Open source is how we do modern software development, stitching together downloaded open-source libraries, frameworks, and other code to create new applications or functionality. This is why every developer and senior staff+ roles need to know what open source is and how it works.

article thumbnail

Announcing the General Availability of Netlify Software Development Kit (SDK)

Netlify

Empower your development teams to streamline the process of taking their concepts from idea to production, quickly and at global scale with Netlify SDK.

article thumbnail

The Definitive Entity Resolution Buyer’s Guide

Are you thinking of adding enhanced data matching and relationship detection to your product or service? Do you need to know more about what to look for when assessing your options? The Senzing Entity Resolution Buyer’s Guide gives you step-by-step details about everything you should consider when evaluating entity resolution technologies. You’ll learn about use cases, technology and deployment options, top ten evaluation criteria and more.

article thumbnail

The Service Experience Holds the Keys to Sustained Success

IDC

In today's dynamic business landscape, organizations overlook three pivotal components within the service and support realm. This oversight not only hinders their growth but also prevents them from harnessing a significant opportunity that could set them apart in the competitive market. Discover the missing links that can potentially transform your business into a standout success story.

article thumbnail

Tenable and Cyversity Partner on CISSP Exam Prep Program

Tenable

Tenable is now accepting applicants for its training scholarship dedicated to supporting cybersecurity professionals from diverse backgrounds in their preparation for the CISSP exam Diversity, equity and inclusion (DEI) is a priority at Tenable. We strive to be a career destination in which individuals from all backgrounds are welcomed and empowered, treated with fairness and respect, presented with opportunities to make a difference and provided with resources to enable them to grow.

article thumbnail

Measuring GitHub Copilot’s Impact on Engineering Productivity

DevOps.com

What methodology (and metrics) should you use to accurately assess the impact on productivity and value delivery of a tool like GitHub Copilot?

article thumbnail

Securing Your Metadata from Cloud Heists with Prisma Cloud’s Attack Path Policies

Prisma Clud

Many businesses today rely on cloud computing, and AWS is a significant player in this space. Using AWS, though, can be tricky. If not set up correctly, you can unknowingly create a security risk. Take, for example, the increasingly prevalent scenario involving an EC2 instance. Far too often an EC2 instance is left accessible to anyone on the internet.

Cloud 116
article thumbnail

The New GTM Playbook: 18 Ways to Future-Proof Your Sales Team

Longer sales cycles. Increasingly discerning buyers. More meetings. Intensifying competition. Economic uncertainty. Go-to-market teams of every size, in every industry, are grappling with these challenges firsthand. Thankfully, there’s an answer. We’ve developed an entirely new way for GTM leaders to identify and execute proven, data-driven strategies that drive revenue.

article thumbnail

ONLY Cortex Delivers 100% Protection and Detection in MITRE Engenuity

Palo Alto Networks

The 2023 MITRE Engenuity ATT&CK Evaluation results are in, and only Cortex XDR delivers 100% protection and 100% analytic coverage with zero configuration changes and zero delayed detections. The results of the fifth round of the MITRE Engenuity ATT&CK Evaluations have been released, and while every vendor is claiming 100% of everything, the truth is in the details, and the data does not lie.

Linux 115
article thumbnail

SWR & Fine Grained Cache Control on Netlify

Netlify

Gain more control over edge caching patterns and more options for persisting responses outside of Builds and Atomic Deploys.

140
140
article thumbnail

A new community for Lacework customers

Lacework

Modern cybersecurity takes a village. This week, Lacework takes a huge step to connect experts, curate knowledge, and make sure we’re all doing cybersecurity better, together. Lacework is launching its brand new customer community where customers, Lacework employees (a.k.a.

Cloud 117