October, 2018

Changing the Status Quo: How to Create a Culture of Accountability in your Org

OverOps

Today, there is little dispute that software is indeed eating the world. Every part of our life includes software, from the way we watch movies, to the way we rideshare, reserve hotels, communicate, shop, etc.

4 imperatives for making business intelligence work

O'Reilly Media - Data

Create a coherent BI strategy that aligns data collection and analytics with the general business strategy. Results-based leaders rely on having the right information at the right time in order to support operational decision-making.

Important Practices for DevOps in the Cloud

OTS Solutions

Cloud computing and DevOps are two aspects of the technological shift which are completely inseparable.

DevOps 193

Types of Data Structures

The Crazy Programmer

Data structures are a very important programming concept. They provide us with a means to store, organize and retrieve data in an efficient manner. The data structures are used to make working with our data, easier. There are many data structures which help us with this. Types of Data Structures.

Data 276

The Changing Role of CX Testing in Digital Transformation

Speaker: Diego Lo Giudice and Chad Hendren

With new competition emerging every day, businesses are transforming themselves, and using software as a means to drive differentiation. Digital transformation has become a key initiative for businesses across the globe, and CX is ground zero. Register now for this webinar and hear from Cyara and their guest speaker, Diego Lo Giudice of Forrester, how testing and QA practices are changing to enable and accelerate digital transformation.

OKR Guide: Understanding OKRs and How It Benefits Your Business

Evolution4all

OKR Guide – Objectives and Key Results (OKR) is a popular framework in goal setting and management that helps organisations implement a solid strategy.

More Trending

How to tell you’re part of the 30 million user Facebook breach

The Parallax

The massive data breach Facebook reported at the end of September isn’t quite as big as the company thought it might be. That might sound good, but it isn’t likely to comfort the tens of millions of consumers whose personal data they entrusted to the social-media juggernaut has been stolen.

How To 207

How social science research can inform the design of AI systems

O'Reilly Media - Data

The O’Reilly Data Show Podcast: Jacob Ward on the interplay between psychology, decision-making, and AI systems. In this episode of the Data Show , I spoke with Jacob Ward , a Berggruen Fellow at Stanford University.

Attending Oracle’s CodeOne? Here Are 15 Sessions Everyone Will Be Talking About

OverOps

The event of the season is here! Formerly known as JavaOne – Oracle’s new CodeOne conference has a packed schedule with 400+ sessions to choose from.

DevOps 207

Difference between Top-down and Bottom-up Approach in Programming

The Crazy Programmer

Here you will learn about difference between top-down and bottom-up approach. Today we are going to have a comparative study of the two approaches being used in field of structured and object oriented programming.

Innovation: Five Signs You Might Be Faking It

Every company wants to be a leader in innovation, but how can you tell if your company is really innovating or just going through the motions? See the 5 signs you might be faking innovation and what to do if you are.

The hacker's guide to uncertainty estimates

Erik Bernhardsson

It started with a tweet: New years resolution: every plot I make during 2018 will contain uncertainty estimates — Erik Bernhardsson (@fulhack) January 7, 2018.

Groups 285

Embracing open banking and API ecosystem

Hacker Earth Developers Blog

If implemented effectively, open banking will unlock innovation that will transform and improve the customer banking experience. David Beardmore. Banking And Finance, Open Standards And Open Apis. Overview of open banking . Third party providers. Potential Impact. Barclays Case Study.

New Zealand defends its border device search policy (Q&A)

The Parallax

What’s the cost of data privacy at the border? In New Zealand, it could be $5,000, if you resist an immigration official’s demand that you hand over your phone, tablet, or laptop before entering the country.

Scaling Scrum to the Limit

Scrum.org

You’re likely to have been asked the question: “we need to go faster, how many more people do we need?” Most people naturally understand that just adding a random number of people isn’t likely to make us any faster in the short run. So how do you scale Scrum to the limit? And what are those limits?

SCRUM 239

The Ultimate Embedded Analytics Guide

In today’s ambitious business environment, many companies are taking an embedded analytics approach to capitalizing on the value of their information. Learn all about embedded analytics in this guide by Sisense, including a general overview of embedded analytics, the different approaches to embedding BI and analytics, and the benefits and challenges of the most popular BI solution technologies.

OverOps Automated Timers And Performance Monitoring in Splunk

OverOps

We are excited to be a sponsor at the Splunk User conference,conf18 in Orlando this week. And we are even more excited to meet with hundreds of great Splunk users.

7 Critical Tips to Learn Programming Faster

The Crazy Programmer

Programming is a skill that more and more people have been learning over the past few years. In addition to the hundreds of thousands of Americans who work as computer programmers in the USA, there are thousands and thousands more who program for fun or in their spare time.

How to protect your code against malicious hackers without spending days on refactoring

Xebia

During our work as penetration testers, we found that there are lots of vulnerabilities being introduced in applications. Vulnerabilities that could have been prevented in an early stage of development. Sadly these are often the same vulnerabilities over and over again. Luckily the IT development landscape is changing. We can see the latest trend in […]. The post How to protect your code against malicious hackers without spending days on refactoring appeared first on Xebia Blog.

Blockchain: Distributed Shared Ledger Technology in Banking

Hacker Earth Developers Blog

Over 90% of the world’s leading banks are either exploring, experimenting (PoCs), or formulating a strategy for leveraging blockchain technology, says an Accenture survey. Since its inception ten years ago, there has been plenty of hype around blockchain.

Assessing the Five Styles of Enterprise Business Intelligence

The world of BI and analytics has evolved. Discover the five styles of reporting and analysis, and learn the pros and cons of each in an enterprise scenario.

How to check whether a link is safe

The Parallax

How To 190

Using Scrum in the Music Industry

Scrum.org

When Two Lives Intersect . I live many lives – in one of them, I am happily residing in the world of software development where I am also a Professional Scrum Trainer.

Pivotal Partner Days – From an OverOps Solution Engineer POV

OverOps

As a member of the OverOps field team, I spend a lot of time interacting with customers, and it seems they are all thinking about how DevOps and SREs teams can help mediate the battle between reliability and innovation. How can they achieve a happy balance between speed, innovation, and quality?

Cisco CCNA Wireless Certification Exam Questions From PrepAway – Build Your Career of Successful Network Engineer

The Crazy Programmer

Cisco Corporation offers a scope of products and conveys coordinated solutions to create interface networks around the world.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Building Conversational Interfaces with Dialogflow

Xebia

Ever since Siri became a standard feature on iOS, voice commands and conversational interfaces have gone through a renaissance of sorts, finally passing a threshold from gimmicky tech demos or science fiction to actual usability.

How companies are innovating in the energy sector

Hacker Earth Developers Blog

When leaders from 193 countries created a plan labeled the Sustainable Development Goals (SDGs) in 2015, it was the beginning of a new era of hope and possibilities. The ambitious goals promised equitable, sustainable growth for today’s and tomorrow’s generations by 2030. Fast forward to 2018.

Energy 192

Context Conversations preview: Election security

The Parallax

When it comes to election security, it’s hard not to think of the United States as a proverbial dumpster fire. Kids as young as 11 are able to hack voting machines in fewer than 10 minutes.

Why you need only ONE Product Owner

Scrum.org

Scrum prescribes one person in the role of Product Owner (PO). Not multiple people, not a committee, just one person: “The Product Owner is the sole person responsible for managing the Product Backlog.” Scrum guide).

SCRUM 229

Top 5 Analytics Features to Reach More Users with Valuable Data Insights

Ready to expand the benefits of your BI and analytics? This eBook describes the key capabilities that product, IT, and business owners must consider when charting a plan to scale up business benefits from data and analytics.