July, 2020

Artificial Intelligence, Machine Learning, Deep Learning: What’s the Difference?

Daffodil Software

Over time, there has been an astronomical rise in the number of ways Artificial Intelligence can be utilized for the betterment of everyday lives. The technology is almost everywhere- in traffic predicting Google Maps, in video surveillance cameras, in face recognition apps, in speech recognition & language translation solutions, etc. In fact, AI is one of the trending technologies during the COVID-19 pandemic. Artificial Intelligence Software Development

Good Logging

Henrik Warne

To check if a program is doing what it should, you can inspect the output from a given input. But as the system grows, you also need logging to help you understand what is happening. Good log messages are crucial when troubleshooting problems. However, many developers don’t log enough information in the right places. I look at logs when I troubleshoot a problem. Sometimes there is a bug causing the wrong behavior.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

EMA Top 3: Enterprise Decision Guide 2020


OverOps is thrilled to share that we have been named an EMA Top 3 Vendor in the DevOps and Site Reliability Engineering – Continuous Reliability category of the EMA Top 3 Enterprise Decision Guide 2020! With all the challenges of 2020, we are always on the lookout for little reasons to celebrate. This week, we are excited to share that we have a BIG reason to celebrate: we’ve been recognized as an EMA Top 3 DevOps & SRE Vendor in the Continuous Reliability Category! Read the Report.

Product Ownership - Top Ten Points


In May 2019, I spoke at the Agile Manchester conference, where I presented my talk "The Product Owner's Toolbox". I asked the audience a question, "What is the main worry for a Product Owner?". Then gave people them 1 minute to thinking about what their answer would be. Using the Liberating Structure 25/10 , the audience identified the common issues that Product Owners face and how they potentially could be solved. . .


Facebook Causes Continue to Show Little Promise as Fundraising Tools

How to Achieve AWS Security in 10 Steps


Looking to lock down your AWS cloud service? Here are the 10 steps to take for AWS security As more companies embrace the cloud, security is becoming a more significant challenge. Irrespective of size, organizations are increasingly realizing the importance of having proper cloud security practices in place. More and more companies are creating a […]. The post How to Achieve AWS Security in 10 Steps appeared first on DevOps.com.

AWS 85

More Trending

What are AI and machine learning adding to threat intelligence – brains, brawn or both?


Read Ariadna Miret take a look at what artificial intelligence and machine learning bring to threat intelligence on Security Boulevard : Too much information and not enough time. This, and […].

Advanced Scrum Product Ownership - Riding Dinosaurs


. What does Scrum Product Ownership have to do with Dinosaurs? We typically say that Scrum Masters get to herd cats. But Scrum Product Owners actually need to learn how to ride a Dinosaur! With the click-bate established, what does that even mean? . I've been using a visualization that people find useful for understanding the relationship between the various Lean/Agile requirement containers. Some people call the full model a dinosaur.


Introducing the Agile2020 Experience Reports

Agile Alliance

We were already busy writing and reviewing experience reports when the Agile2020 conference was cancelled in early June. Towards the end of March, we’d selected twenty experience reports (out of 88 submissions). Each report author was then paired with a shepherd who had advocated for their report. Shepherds volunteer their time to give constructive advice … Continued. Process 2020 experience reports assessments domain-driven design visual models

Report 166

Bringing an AI Product to Market

O'Reilly Media - Ideas

The Core Responsibilities of the AI Product Manager. Product Managers are responsible for the successful development, testing, release, and adoption of a product, and for leading the team that implements those milestones. Product managers for AI must satisfy these same responsibilities, tuned for the AI lifecycle.

Intelligent Process Automation: Boosting Bots with AI and Machine Learning

Across all sectors, companies are learning that they can transform their businesses by embracing Intelligent Process Automation, or IPA. With the pairing of AI and RPA, IPA adds a new layer of intelligent decision-making processes to automated RPA tasks. By automating repetitive work, and adding the ability to automate intelligent decision making, intelligent automation frees up your most valuable resources – your employees – to spend more time on higher value and more strategic work. But in order to reap the rewards of Intelligent Process Automation, organizations must first educate themselves and prepare for the adoption of IPA. In our ebook, Intelligent Process Automation: Boosting Bots with AI and Machine Learning.

Is Kanban Linear?


typical Kanban board usually shows a series of steps or activities that work passes through. In software development, this may take the form of work items passing through some sort of discovery step when analysis or design happens, to a building or development activity, before it passes through a validation or testing stage. Such a visualisation often shows that work items move from the left hand side of the board to the right.


How to Become a Data Scientist in India?

The Crazy Programmer

First, we should know that how is scope in Data Science, So let me tell you that If you searched top jobs on the internet, in that list Data Science will be also present. So you can say this time Data Scientist has one of the most opportunities to become his career. So, here we will discuss how to become a Data Scientist in India, and how much time need to become a Data Scientist. Image Source. What is Data Science?

How To 172

EventStorming; Core concepts, glossary and legend


Recently on Twitter Chris Richardson asked if anyone has created a consistent and comprehensive glossary for EventStorming core concepts. I replied saying that #EventStorming is fuzzy by design. There are standard core concepts, and depending on the context, we use different words for the post-its. Because with that fuzziness, you get more insights. I call […]. The post EventStorming; Core concepts, glossary and legend appeared first on Xebia Blog.


Scaling the hottest app in tech on AWS and Kubernetes

A Cloud Guru

A cloud conversation with Blake Stoddard, Sr SRE at Basecamp / HEY. This interview has been edited and condensed for clarity

AWS 77

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

Weird AI illustrates why algorithms still need people


Read why Ben Dickson says that artificial intelligence algorithms still need people on The Next Web: These days, it can be very hard to determine where to draw the boundaries […].

The Short Story From Arthur C. Clarke Every Officer in Space Force Should Read and Heed


Like so many others in the national security domain I am tracking what I can about the new US Space Force, the newest US military force. I believe their mission […]. News SciFi


Azure Virtual Machine Tutorial

The Crazy Programmer

So in this article, we’ll learn the following things: What is a Virtual Machine? Why we use Virtual Machines? How to create a Virtual Machine? How to use a Virtual Machine in your Computer System? Prerequisites: Microsoft Azure Subscription. Good Internet Connection. So let’s start with the first question. What is a Virtual Machine?

Azure 138

Kubernetes Troubleshooting: 7 Essential Steps for Delivering Reliable Applications


A step-by-step guide for delivering more reliable software in today’s increasingly complex and fast moving environment. This post is based on a recent webinar created in collaboration with the Cloud Native Computing Foundation, together with Brandon Groves and Ben Morrise from the OverOps engineering team. If you think of the shift to microservices and containers as an evolution rather than a revolution then you’ve reached the right place!

6 Steps to Improving Your Application’s Analytics Experience

No one designs bad dashboards and reports on purpose. So why do so many applications have terrible analytics experiences? Download this ebook for secrets to creating dashboards and reports your users will love.

What EARN IT and LAED mean for encryption

The Parallax

Is encryption the biggest impediment to law enforcement’s ability to stop sexual predators of children? For the advocates of the EARN IT Act, which would loosen the rules protecting Internet services’ use of encryption, it most certainly is.

Can Quality Hurt Software Projects?

Agile Alliance

I recently had the pleasure to interview Carlos Blé from the Canary Islands in Spain. Carlos is a software crafter with almost two decades of experience in software development and has been involved with the Software Craftsmanship community for more than a decade.

Coach the Person - Not the Problem


Part of the role of being a Scrum Master is to be a coach; to the team, the organsiation and the individual. So How Do You Become an Effective coach? . In a previous post I said that the first skill is to know how to listen , as without being able to listen you can't truly understand.

Magellan Health Data Breach Victim Tally Reaches 365K Patients


The extent of the ransomware attack that hit Arizona-based Magellan Health in April became clear this week, with eight Magellan Health affiliates and healthcare providers reporting breaches stemming from the […].

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

? Knock Your Innovation Program Out of the Park


It’s in our nature to support a cause that’s bigger than ourselves—we’re social creatures after all, so we’re at our best when we work together towards a common goal. However, out of left field came the global health pandemic, and collaboration has since taken a major hit at a time when creative ideas

Lessons from the Recent Facebook iOS SDK Crash


On July 10, popular apps like Spotify and Tinder suffered crashes due to a Facebook SDK issue. OverOps CTO Tal Weiss breaks down a few key learnings development teams can take from this mishap. The recent Facebook iOS SDK crash highlights how a code or environment change by another company (e.g.

Mobile 193

Beyond Anonymous: Where Hacktivism is going in 2020

The Parallax

Hacktivism is alive and well, if a bit weird, in 2020, says Gabriella Coleman, a cultural anthropologist specializing in hacker culture at McGill University. At the end of June, Twitter banned the account of the hacker collective Distributed Denial of Secrets (DDoSecrets) and blocked links to “ BlueLeaks ,” the group’s data trove of 270 gigabytes of data containing internal records from more than 200 police departments.

Self-Organization Eats Agile at Scale for Breakfast

Agile Alliance

2020 experience reports

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.