Sat.Jun 13, 2020 - Fri.Jun 19, 2020

The 6 Core Skills of a Good Data Scientist


The term “ data scientist ” was coined in 2008 by two LinkedIn analysts to describe their work deriving business value from the masses of data being generated by their website.

Why API Security Is Different and How the OpenAPI Spec Can Help

The New Stack

The Linux Foundation sponsored this post. To find out more about critical issues and future solutions in the API security space, I talked with Dmitry Sotnikov , Chief Product and Marketing Officer at 42Crunch.

Linux 100

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Agile Methods Are No Match For Outdated Leadership

Agile Alliance

Three Key Leadership Plays to Succeed with Agile Two groups of leaders Not too long ago, I was talking to a potential client, let’s call him Steve, who was interested in “going Agile”. Steve informed me that he was already very knowledgeable about Agile.

Agile 230

A Glimpse into the AI-Enabled Future


Where is AI heading in the future? Read Ronald Schmelzer’s article in Forbes talking about the vision for the AI-Enabled Future: The pace of artificial intelligence continues inexorably forward. Every […].

From Build to Buy: The Path to Better Analytics for Your Application

Speaker: Ardeshir Ghanbarzadeh, Senior Product Marketing Manager, Logi Analytics

Making the transition from building your analytics in-house to investing in a third-party embedded solution can be complicated.Watch this webinar with Ardeshir Ghanbarzadeh, Senior Product Marketing Manager at Logi Analytics, for tips on making the transition as smooth as possible, and getting on the right path to better analytics for your app!

Clustering: How it Works (in Plain English!)


In the previous two posts in the How They Work (in Plain English!) series, we went through a high level overview of machine learning and took a deep dive into two key categories of supervised learning algorithms — linear and tree-based models.

More Trending

Jira Kills the Sprint Backlog

. If you were in my class, you probably remember the exercise, where participants list roles, artifacts and events in Scrum. There is one particular case, that started appearing about 7 years ago.


What Kind of Education Does a Programmer Need?

The Crazy Programmer

Algorithm theory, mathematical statistics, and analysis, information theory, graphs, basics of physics – all these are directions and subjects necessary for becoming in practical programming. Yes, a lot of knowledge is required, and there are even more areas of work for the carrier.

Survey Shows Accelerated Shift to Cloud, With Caveats

A survey of 250 IT leaders published by Snow Software, a provider of software asset management software, finds 91% are changing their cloud strategy in the wake of the economic downturn brought on by the COVID-19 pandemic.

13 Evolving And Emerging Uses For Blockchain Technology


Many consumers may have heard of blockchain technology, especially in relation to cryptocurrency. However, they may not be aware of its full potential and impact across industries. Blockchain has the […].

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

How to Prove the Value of Scrum Masters to the Organization?

As part of The Liberators Network , we organize meetups that allow participants to give & get help around challenges they face with unleashing their organization’s superpowers. All meetups focus on peer-to-peer coaching, building networks, and the sharing of experiences.

Supporting People Through Change

Agile Alliance

A few weeks ago, I stood in the alley talking to my neighbor about the coronavirus situation (from an appropriate distance). “It can’t get worse,” he said. “It It can always get worse,” I responded.

Investment Report: India’s Crowning Investment Heartland is Rajasthan

CEO Insider

This tiger cub is indeed roaring to GO! INDIA has been ranked amongst the top 5 countries in the world to invest in the business in the year 2020 by the CEOWORLD magazine.

Report 112

Cybersecurity’s Greatest Insider Threat Is In The C-Suite


Read why Louis Columbus says that the C-Suite is the biggest insider threat risk on Forbes : C-level based breaches, phishing, and fraud attempts are increasing today. Cybercriminals are learning […].


How to Choose the Best Embedded Analytics Solution to Modernize Your Application

If you are looking to modernize your application to improve competitiveness, then one of the quickest wins you can have is to embed sophisticated analytics that will wow your existing and prospective customers.

Scrum and Organizational Design in practice

"Scrum and Organizational Design in practice" is my contribution to Gunther Verheyen book "97 Things Every Scrum Practitioner Should Know" published by O'Reilly Media and resumes my latest experience as Scrum Practitioner on how to make a company's transformation implicit rather than explicit. .


Agile Planet: A Travelguide to the Agile Universe

Agile Alliance

Agile 173

The EU’s Plans to Build a Wall Around GDPR-Protected Data

An ambitious German- and French-lead European Union (EU) initiative could wrestle tighter management, and eventually, control of data from commercial cloud providers. The project, dubbed as “Gaia-X,” is also intended to offer firewall-like protection for data sources from the EU.

Stuck Between a Data Breach and a Ransom


Read Tomas Meskauskas explains what businesses can do when they are stuck between a data breach and a ransom on Security Boulevard : 2020 will be remembered for a whole […].

Data 117

Why Smoking Costs Employers More Than They Realize

Your employees are smoking, and at a cost of $7,000 per year for each employee who smokes, that adds up - fast! This free report will show you how an effective cessation program pays for itself.

Zero bug policy. A fast way for paying back technical debt.

image by beta news. At many customers I visit, I see a lot of effort being put into classification and managing bugs. Their bug-list may contain more than thousands of items, all neatly documented with screenshots, ways to reproduce and a severity and impact classification.

Why Agile Should Not Forget About Software Crafters

Agile Alliance

Continuing my series of interviews with Latam Agile Luminaries, this time I had the great pleasure to interview Ana Carmona from Barcelona, Spain.

Agile 165

Cloudera’s commitment to address workplace inequality with deliberate and decisive action

Cloudera Engineering

The past days and weeks have shone a spotlight on the tragic injustices in our society. Our nation is recognizing and rebelling against a long history of systemic racism. We’ve ignored it for far too long. Willful apathy is the only way we could have reached this point.

Protecting Unmanaged & IoT Devices: Why Traditional Security Tools Fail


Read why traditional security tools fail to protect unmanaged and Internet of Things devices on Threat Post : We are currently experiencing the single largest explosion of network-enabled devices that […].

IoT 119

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

Remote Agile Transitions — The Top-Ten Challenges

TL; DR: Remote Agile Transitions. We are used to saying the Scrum is a perfect probe for organizations, as it will reliably discover all dysfunctionalities.

Agile 217

Mechanics of Adapting Virtual Work, Health, and Safety

Agile Alliance

Given the risk that public policies and practices will be less than ideal or reliable in many jurisdictions, firms will need to be ready where appropriate to make their own assessments of the risks and innovate rapidly to develop new solutions to specific health and safety challenges. webcast

CVE-2020-11896, CVE-2020-11897, CVE-2020-11901: Ripple20 Zero-Day Vulnerabilities in Treck TCP/IP Libraries Disclosed


Researchers discovered 19 new zero-day vulnerabilities in a TCP/IP software library developed by Treck. Dubbed Ripple20, the batch includes CVE-2020-11901, which has the potential to take control of an internet-connected device.

IoT 107

Too Big to Cyber Fail?


Read Jason Crabtree explain how systemic cyber-risk threatens US banks and financial services companies on Dark Reading : Even with COVID-19 dominating the headlines, biologic viruses are just one type […].

5 Signs It's Time to Replace Your Homegrown Analytics

If you built your analytics in house, chances are your basic features are no longer enough for your end users. Is it time to move on to a more robust analytics solution with more advanced capabilities? Follow this free guide for tips on making the build to buy transition.