December, 2018

article thumbnail

The One Thing You Need to do Before Promoting Code to Production

OverOps

Writing, building, compiling and deploying code might seem easier in an automated workflow, but we still need to make sure our code is, indeed, ready for a ‘promotion’. Moving towards a CI/CD workflow means that we’re adding automation to our process, which is great, but we need to make sure we keep the quality of the code intact. In other words, we need to know where we should add some breakpoints to check the automated process, and make sure everything is working as it should.

article thumbnail

Top 12 BI tools of 2019

CIO

With more and more data at our fingertips, it’s getting harder to focus on the information relevant to our problems and present it in an actionable way. That’s what business intelligence is all about.

Tools 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kindle edition of Refactoring now available from Amazon

Martin Fowler

Amazon is now selling the Kindle edition of Refactoring. As I write this, it's touch more expensive than the hardback since they are currently discounting the hardback but not the electronic version. more….

274
274
article thumbnail

5 Best Programming Languages for Kids

The Crazy Programmer

The rate at which children handle gadgets in this technology savvy era is quite interesting. The fact they are able to easily operate the gadgets, run programs on it easily shows that they are intrigued by it. We all at a point have come across children who not only enjoy the games or other softwares but have shown interest in asking questions on how the softwares are programmed.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Developer On Call

Henrik Warne

For the system at work, I am on call one week every seven weeks. For most of the past ten years, I have been on organized on call rotations for the systems I have been developing. I think being on call is a logical way of taking responsibility for your work. You also learn a lot from it. However, it is stressful and an inconvenience, so you should get payed for it.

More Trending

article thumbnail

Application of advanced analytics and machine learning in the banking industry

Hacker Earth Developers Blog

Banks have always been custodian of customer data, but they lack the technological and analytical capability to derive value from the data. On the other hand, fintech companies have the analytical capabilities and, thanks to payments services directives, they now have access to valuable data. Whether it is a bank, non-bank, or fintech, competing in the banking revolution comes down to how efficiently the available data can be used to solve business challenges and better serve the customers.

article thumbnail

How hackers are approaching medical cybersecurity

The Parallax

PHOENIX—Within minutes of each other, two patients were wheeled into the hospital emergency department with emergency haste. The first patient, a woman in her early 70s, was suffering from what appeared to be a stroke: She was weak on the left side of her body and had difficulty speaking. The attending physician, Dr. Paul Pugsley, called for a CT scan to see if the stroke was caused by bleeding of the brain or a blood clot.

IoT 189
article thumbnail

OKR Guide: Understanding OKRs and How It Benefits Your Business

Luis Goncalves

OKR Guide – Understanding OKRs. Due to the complex nature of organisations, employees often face challenges among the rapid changes they deal with every day. It is often that employees feel demotivated, discouraged and have a lack of purpose just because the company goals are too high-level and abstract. That´s where Objectives and Key Results (OKRs) steps in to help companies with goal setting and implement a solid strategy.

article thumbnail

How to Manage Your Emotions When You Make Leadership Decisions

Let's Grow Leaders

Do you struggle to manage your emotions? You’re not alone. We were speaking to an international gathering of leaders from across Europe when a young man approached the microphone and asked: “How, as a leader, do you keep your personal feelings from […]. The post How to Manage Your Emotions When You Make Leadership Decisions appeared first on Let's Grow Leaders.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

The Top 13 Sessions From 2018 Ops and Dev Conferences

OverOps

It’s our favorite tradition of the season; Sit back, grab some popcorn and catch up on the top talks you might have missed, or want to watch again. December is almost over, and it’s that time of the year when we look back at all the great things that happened. It’s not just a time to reminisce, it’s also a time to squeeze in some more learning before we start the new year.

article thumbnail

Selling the Investment to Pay Down Technical Debt – The Code Christmas Tree

Agile Alliance

Sharing our experience in making code complexity and unit coverage visible in the hallway adjoining our team room and the conversations that happened around it. Not only did it help to focus the team on the high debt areas of the application, but its red (bad) and green (good) coloring combined with its high-foot-traffic location … Continued.

article thumbnail

How 3 women technologists built a career of their dreams

Hacker Earth Developers Blog

Did you know that women seeking leadership roles often report a lack of good mentors as an obstacle to their career growth. We recently ran a survey for women technologists and almost 47% of the respondents claimed that they had no tech mentors or role models to look up to. With a growing demand for technologists worldwide, organizations have a need now, more than ever, to create workplaces which support and uplift women in technology.

Education 181
article thumbnail

Is Gmail’s Confidential Mode a safe bet?

The Parallax

When email goes boom, it’s usually because somebody’s account got hacked, and his dirty laundry has exploded all over the Internet. But Google now offers a feature in Gmail that can help prevent the private contents of your messages from leaking out. It’s called Confidential Mode, and you can think of it as self-destructing email. Confidential Mode, which is available in Web browsers, as well as Gmail apps on iOS and Android, offers several privacy-forward features.

Windows 189
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Top Change Articles of 2018 at Enclaria

Change Starts Here

Another year is coming to a close! The following are the most popular posts of 2018 at the Enclaria blog. Which were your favorites, and what did you miss? Thank you for reading and sharing! What topics would you like to see covered next year? Please reply in the comments. 1. How to Do Change […].

How To 118
article thumbnail

Frontline Festival: Best of 2018 Edition

Let's Grow Leaders

Welcome to the Let’s Grow Leaders Frontline Festival! This month we are celebrating each blogger’s favorite post of the year (as identified by them). It’s always so much fun to see what emerges as the very best, and which topics rise to […]. The post Frontline Festival: Best of 2018 Edition appeared first on Let's Grow Leaders.

article thumbnail

The Future Of Big Data Is In The Hybrid Cloud

CTOvision

Read Kunal Agarwal take a look at the future of big data in the hybrid cloud on Forbes : Earlier in the year, I attended the Strata Data Conference in New York. It was an exciting event, and my conversations with customers, reporters and influencers underscored how rapidly big data adoption has grown over the past […].

Big Data 115
article thumbnail

Four Benefits of Automation with MuleSoft

Flexagon

The benefits of bringing DevOps tools into your IT Organization are many and well documented. Regardless of the technologies in play, continuous delivery and release automation help teams deliver higher quality software faster, and with less cost and risk by reducing or eliminating manual and scripted processes, and adding repeatability and consistency.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Women in Tech: Hiring Strategies to Attract and Retain Top Talent

Hacker Earth Developers Blog

Studies have shown that companies are more productive when they have a gender-mixed workplace. In order to attain this gender balance, companies need to devise a flexible recruiting approach that takes into account women’s specific needs and aspirations. These benefits go beyond simple remuneration and reach areas of women’s lives that are particularly important to them.

article thumbnail

What you need to know about the Marriott breach

The Parallax

Obama was president of the United States, Apple introduced its first watch, Russia invaded Crimea, and the San Francisco Giants won the World Series. The year was 2014, and from then until November 2018, hackers have been stealing data from computers controlled by Starwood Hotels and Resorts ( now owned by Marriott Hotels). All told, records belonging to as many as 500 million guests were stolen, the company said in a statement November 30.

Hotels 190
article thumbnail

Best of 2018: The Beauty of the COBOL Programming Language

DevOps.com

As we close out 2018, we at DevOps.com wanted to highlight the five most popular articles of the year. Following is the first in our weeklong series of the Best of 2018. Well-written code is a work of art. Always has been, always will be. A programmer pulls a thought pretty much out of […]. The post Best of 2018: The Beauty of the COBOL Programming Language appeared first on DevOps.com.

article thumbnail

The Smartest Way to Ensure Your Leadership Message Sticks

Let's Grow Leaders

Taking your management team out of the field for a leadership offsite or kick-off meeting can be an incredible way to provide clarity around your leadership message, to get everyone focused on what matters most, and to encourage the sharing of best practices. […]. The post The Smartest Way to Ensure Your Leadership Message Sticks appeared first on Let's Grow Leaders.

article thumbnail

Revolutionizing Contact Centers: Next-Gen Tech for Enhanced CX

Speaker: Liran Meir Frenkel, Performance Management and RPA Sr Product Marketing Manager at NICE; Harpreet Makan, Practice Director at Everest Group; & Santhosh Kumar, Practice Director at Everest Group

As contact centers navigate the challenges of delivering excellence within budget constraints and adapting to evolving employee expectations, optimizing agent tasks becomes crucial. Discover a holistic approach across three pillars - people, process, and technology - that is essential to excel in this dynamic landscape, and explore how next-gen technologies such as generative AI, performance analytics, and process intelligence play a pivotal role in transforming contact centers into advanced CX

article thumbnail

AI in cyber security: a help or a hindrance?

CTOvision

With a disappearing IT perimeter, a widening skills gap and the increasing sophistication of cyber attacks, it is not surprising that many enterprises are struggling to deal with the current cybersecurity landscape. It’s not just the continued data breaches that have hit the media headlines this year, but it’s the nature of the data – […].

Media 114
article thumbnail

Netflix OSS and Spring Boot?—?Coming Full Circle

Netflix Tech

Netflix OSS and Spring Boot?—?Coming Full Circle Taylor Wicksell, Tom Cellucci, Howard Yuan, Asi Bross, Noel Yap, and David Liu In 2007, Netflix started on a long road towards fully operating in the cloud. Much of Netflix’s backend and mid-tier applications are built using Java, and as part of this effort Netflix engineering built several cloud infrastructure libraries and systems?

article thumbnail

The Principles of Design and Their Importance

Toptal

Good design is possible without understanding the principles of design. But it may take a lot of trial and error to create something that both looks good and creates an optimal user experience.

110
110
article thumbnail

Here’s what Facebook shared about you in its latest scandal

The Parallax

Facebook doesn’t seem to be learning much from its growing list of data-oriented scandals. Instead of responding by revamping its business practices, the social network appears to keep telling its 2.27 billion active monthly users , “Hold my beer!”. It’s not exactly reassuring. The latest revelation: The company shared user data, including Facebook Messenger chat logs , with a select group of some of the world’s largest tech companies.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Google Cloud Platform: The Basics for Absolute Beginners

DevOps.com

Google Cloud Platform provides powerful tools and services. Why should you pay attention to one of the leading cloud service providers? More and more companies are moving to the cloud to help create software applications and manage data, and Google Cloud Platform is one of the many platforms available for cloud computing, an industry that […].

article thumbnail

How to Develop People When You Don’t Have Time

Let's Grow Leaders

You can’t afford not to develop people – but it doesn’t require hours. Katrina paced back and forth as she described her problems with customer service and employee retention. “I can’t improve either one, but I don’t have time to develop people.” […]. The post How to Develop People When You Don’t Have Time appeared first on Let's Grow Leaders.

article thumbnail

Indicators To Watch: 7 warning signs of an insider threat

CTOvision

Read Dan Swinhoe list seven signs which should warn you about an insider threat to your organization on CSO Online : Employees conducting attacks on their own employees – known as insider threats – are becoming increasingly common and costly. According to a CA report, over 50 percent of organizations suffered an insider threat-based attack […].

Report 114