May, 2018

article thumbnail

Time to Market: How your Company Can Keep Launching New Products and Features Ahead of Your Competition

Luis Goncalves

Time to Market: How your Company Can Keep Launching New Products and Features Ahead of Your Competition. Companies like Apple, Facebook, and Microsoft have proven that innovation is the key to greatness. That’s why most businesses put a significant premium on it. However, just coming out with innovative products or new features is not enough. Companies also have to make sure their products and services reach the market in time.

Marketing 276
article thumbnail

How will the GDPR impact machine learning?

O'Reilly Media - Data

Answers to the three most commonly asked questions about maintaining GDPR-compliant machine learning programs. Much has been made about the potential impact of the EU’s General Data Protection Regulation (GDPR) on data science programs. But there’s perhaps no more important—or uncertain—question than how the regulation will impact machine learning (ML), in particular.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to stop calendar spam

The Parallax

Nestled on your calendar between a 1:30 p.m. lunch and a 2:30 p.m. phone call sits an appointment you weren’t expecting. You didn’t create it, and you certainly didn’t accept an invitation for it, but there it is: “$$$ Playmate Wanted $$$.”. Congratulations, you’ve been hit with Calendar spam. Calendar services from Google, Microsoft, and Apple are susceptible by default to having appointments placed on them without user permission, says security expert Bryan Seely.

How To 190
article thumbnail

9 Questions to Help Your Team Solve Problems On Their Own

Let's Grow Leaders

“David, I just don’t have time. My team constantly needs my help, but I need them to do more and solve problems on their own. There’s so much to do that some days I just want to give up!” Lynn was a […]. The post 9 Questions to Help Your Team Solve Problems On Their Own appeared first on Let's Grow Leaders.

192
192
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How Blockchain Can Boost the Security of Mobile Application

OTS Solutions

How Blockchain Can Boost the Security of Mobile Application. If you are wondering how Blockchain technology can enhance the security of mobile application, you are in the right place. For you to be able to enjoy maximum benefits, of Blockchain, get a proper understanding of all the functionalities and how it is fit for mobile applications. The functionality of your app does not have to match with bitcoin, but you can be safe while transferring funds.

More Trending

article thumbnail

How to Calculate Cost of Delay So You Know Where You’re Losing Money

Luis Goncalves

Deciding which project should be given top priority is a dilemma that business owners and managers face regularly. For instance, would it serve the company better if it focuses on a $1 million, a three-month-long project first or push through with the smaller project that would cost $20,000 but with a two-week deadline? Sadly, making a concrete decision isn’t easy and often entails blurry visualisations using project management tools that don’t really tell you anything.

How To 189
article thumbnail

Humans and the machine: Machine learning in context

O'Reilly Media - Data

Jean-François Puget explains why human context should be embraced as a guide to building better and smarter systems. Continue reading Humans and the machine: Machine learning in context.

article thumbnail

3 tips to secure your connected home

The Parallax

MOUNTAIN VIEW, Calif.—Google’s voice-activated Assistant is about to get an impressive power boost. At its annual Google I/O developer conference here Tuesday, the company revealed a new Assistant feature that can carry out an entire phone conversation on your behalf. The feature, called Google Duplex and available on its Google Home, Android, Chromebooks, and other devices, has been in development “for many years,” CEO Sundar Pichai told the crowd of more than 6,000 Google developers and media.

IoT 189
article thumbnail

Communicating With Executives When Your World’s on Fire

Let's Grow Leaders

When your world’s on fire, and you’re working around the clock to survive, it feels like the last thing you have time for is formal updates. And of course, the bigger the fire, the more the senior team needs to know what’s […]. The post Communicating With Executives When Your World’s on Fire appeared first on Let's Grow Leaders.

Course 154
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

5 Biggest DevOps Mistakes You Must Avoid

OTS Solutions

There are Five Biggest DevOps Mistakes You Must Need to Avoid. Introduction. Most business owners talk about DevOps, but when it comes to implementing them, problems start. Having gone through the process with many companies, a devops engineer told me the five common devops mistakes organizations make when carrying out devops development for the first time.

DevOps 133
article thumbnail

Is Manual Testing Needed?

Henrik Warne

For the past few years, I have heard many people advocating using only automatic tests. For example, if all the automatic tests pass, then the code should automatically be deployed to production. I have always performed a bit of manual testing before feeling confident about my code. So for the past year I have paid extra attention to bugs I have found manually testing my own code.

Testing 130
article thumbnail

Not all Machine Learning is Artificial Intelligence

CTOvision

One of the downsides to the recent revival of popularity of Artificial Intelligence (AI) is that we see a lot of vendors, professional services firms, and end users jumping on the AI bandwagon labeling their technologies, products, service offerings, and projects as AI projects without necessarily that being the case. On the other hand, there […].

article thumbnail

The evolution of data science, data engineering, and AI

O'Reilly Media - Data

The O’Reilly Data Show Podcast: A special episode to mark the 100th episode. This episode of the Data Show marks our 100th episode. This podcast stemmed out of video interviews conducted at O’Reilly’s 2014 Foo Camp. We had a collection of friends who were key members of the data science and big data communities on hand and we decided to record short conversations with them.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Malware and antivirus software usually go together like tacos and pickles. Leave it to North Korea to combine them like peanut butter and jelly. Researchers announced on May 1 that when they inspected the ingredients of the North Korean antivirus software for Windows computers, they found a mix of spyware and old code stolen from an antivirus vendor.

Spyware 187
article thumbnail

Get Things Done – Leading When Life Isn’t Fair

Let's Grow Leaders

Get Things Done by Changing Your Question Sara leaned back, crossed her arms, and sighed. “It’s not right! My VP expects me to hit these numbers, but customers want updates, and research is focused on new products and won’t give me the […]. The post Get Things Done – Leading When Life Isn’t Fair appeared first on Let's Grow Leaders.

Research 144
article thumbnail

Top 4 Trends That Define Future Of iOS App Development

OTS Solutions

Top Four Trends That Define Future Of iOS App Development. A couple of days ago, Apple launched their new Operating System iOS 11.3, which has a lot of improvements in the existing features. As a result, it is crucial to be in check with iOS App Development trends. The main reason why iOS applications are succeeding is that they offer better security capabilities than Android.

Trends 113
article thumbnail

On-Demand Webinar: The Dark Side of Java Production Monitoring

OverOps

Automated workflows are the new gold standard for delivering top quality products in an agile environment, but with constant change, comes constant risk. Enter Observability, a measure of how well the internal states of a system can be inferred from its external outputs. It’s the ability to know how applications operate in production. Join the webinar.

Metrics 113
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

How to Calculate Cost of Delay

Evolution4all

One challenge that every business face is deciding which project should be prioritised. Would it be in a company’s best interest to embark on a $1 million project that would take three months to finish or a 20-day project that would cost $30,000? Choosing the best option often takes often a lot of time and resources. Unfortunately, decisions like these can’t be rushed.

How To 113
article thumbnail

The Paradise Papers: Behind the scenes with the ICIJ

O'Reilly Media - Data

Pierre Romera explores the challenges in making 1.4 TB of data securely available to journalists all over the world. Continue reading The Paradise Papers: Behind the scenes with the ICIJ.

Data 117
article thumbnail

What ‘EFail’ means for your email privacy

The Parallax

It’s never been easy to encrypt email communications fully, from one end to the other. Security experts have long said the only way to secure email from snooping is to use a somewhat-cumbersome multistep process involving a cryptographic key exchange called Pretty Good Privacy, or PGP. Unencrypted emails, which include standard-issue Gmail, Outlook, and Apple Mail accounts, are often said to be about as secure as a postcard.

Research 185
article thumbnail

Massive Failures? What Great Leaders Do Next

Let's Grow Leaders

What do you do when you’ve screwed up and everyone knows it? Your failures weren’t just mistakes in judgment…you let yourself down. You didn’t keep your commitment. You hurt people you are supposed to help. Your team looks at you with disappointment. […]. The post Massive Failures? What Great Leaders Do Next appeared first on Let's Grow Leaders.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

So You Want to Be a Change Practitioner. Where Do You Start?

Change Starts Here

I often meet people who want to move into change management from another job, and they ask me, where do I start? The good news is that most of the people I know who do change work full time didn’t start there. When you’re in school, you typically don’t recognize that it would be necessary […].

article thumbnail

Chinese Intelligence Operations In America

CTOvision

In part 2 of our Cyberwar series we’ll take a look at how the Chinese government utilizes the US’s open business environment to stage intelligence operations on American soil. Reconnaissance: While there has been a lot of recent press on Cambridge Analytica, the reality is there’s a giant industry that sells information on individuals who play […].

article thumbnail

Python Multithreading and Multiprocessing Tutorial

Toptal

Threading is just one of the many ways concurrent programs can be built. In this article, we will take a look at threading and a couple of other strategies in building concurrent programs in Python, as well as discuss how each is suitable in different scenarios.

article thumbnail

When to KISS

O'Reilly Media - Data

Zubin Siganporia explains how the KISS principle (“Keep It Simple, Stupid”) applies to solving problems and convincing end-users to adopt data-driven solutions to their challenges. Continue reading When to KISS.

Data 114
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Twitter politely requests: Please reset your password

The Parallax

Twitter CTO Parag Agrawal approached the company’s 330 million users on Thursday with an unusual security message: We made a mistake, he said. We haven’t been breached, but could you please consider resetting your password? “Due to a bug, passwords were written to an internal log before completing the hashing process,” Agrawal wrote in a blog post revealing that the service had been storing user passwords before encoding them for internal use.

article thumbnail

How Do I Convince My Manager I’m a Professional

Let's Grow Leaders

“Why does my manager care if I go directly to his boss with an idea? Good ideas are good ideas, right?” “Customers don’t need all that formality. They’re chill. Why can’t I just show up and give them an update?” “When the […]. The post How Do I Convince My Manager I’m a Professional appeared first on Let's Grow Leaders.

135
135
article thumbnail

Three People Factors to Include in Your Project Timeline

Change Starts Here

People can be the greatest risk to a project timeline. Making sure they are ready to adopt change and not obstruct it takes time and deliberate effort. If left off the schedule, the resulting resistance and confusion can prevent your project from delivering results. Trying to add it later will blow up your budget and […].

Budget 101