Sat.Aug 29, 2020 - Fri.Sep 04, 2020

article thumbnail

Deployed To Production Is Not Enough

Henrik Warne

You have developed a new feature. The code has been reviewed, and all the tests pass. You have just deployed this new feature to production. So on to the next task, right? Wrong. Most of the time, you should check that the feature behaves as expected in production. For a simple feature it may be enough to just try it out. But many features are not easily testable.

article thumbnail

Communicate to be Understood, Not Just Heard

Agile Alliance

One of my favorite quotes from the famous Irish playwright, George Bernard Shaw, is: “The single biggest problem in communication is the illusion that it has taken place.” Have you ever been in a conversation with someone where, after listening for several minutes, you still haven’t figured out what their point is? This problem can … Continued.

Agile 328
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Impact of Artificial Intelligence on Workspaces

CTOvision

Read how artificial intelligence is impacting workspaces according to Calum Chace on Forbes : It is a truth universally acknowledged that artificial intelligence will change everything. In the next few […].

article thumbnail

A short review of Coup 53

Martin Fowler

Coup 53 is a recent documentary of the American-led coup against Mohammad Mosaddegh, the leader of Iran in 1953. It's a worthwhile telling of an oft-overlooked piece of history, even if the meta-narrative that drives the documentary isn't properly examined.

354
354
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Kubernetes Security Risks and Protection Methods

The Crazy Programmer

Kubernetes are tools that organizations can implement into their containers to automate a wide range of app deployments. However, being able to deploy these applications so effectively and efficiently comes with the downside of potential risks. These risks are often in the form of attacks from hackers who are looking to steal data, mine cryptocurrencies, disrupt services, and more.

More Trending

article thumbnail

Beyond the Basics: Online Meetings that Don’t Suck Your Soul

Let's Grow Leaders

We don’t hate online meetings – we hate soul-sucking wastes of time After months of online meetings, video conferences, Zoom, and Teams meetings, you’ve mastered the basics: You’ve got light in front of you (not behind you) so we can see you […]. The post Beyond the Basics: Online Meetings that Don’t Suck Your Soul appeared first on Let's Grow Leaders.

Meeting 249
article thumbnail

Time to Think IoT Data, Not Endpoints

CTOvision

Read why Gary Audin says that it is time to realign focus from thinking about the endpoint devices to the Internet of Things data that is produced on IoT Evolution […].

IoT 198
article thumbnail

BCA vs B.Tech – Which is Better?

The Crazy Programmer

Students who are interested in computer’s are many times confused what career choice to choose when taking their first steps in adulthood. Many students are amazed with a wide range of options for college and programme. If you are in the same boat and have recently passed your graduation and you seem to have the passion for computers, then BCA and B.Tech will be rolling in your mind.

Course 211
article thumbnail

Leading and Succeeding With Accountability with Thandi Orelyn

N2Growth Blog

Thandi Orelyn is a South African lawyer and business executive who has been active mainly in the financial sector. She is a co-founder and executive director of Peotona Group Holdings. Thandi chairs the board of BP Southern Africa and serves on the boards of Toyota S.A. and Toyota Financial Services (South Africa). She has also served as a non-executive director of the South African Reserve Bank.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Get More Creative In Your Remote Team Communication

Let's Grow Leaders

Want to be more creative in your remote team communication? Start here. If you’re like most managers we talk with, you face the perfect trifecta of remote team communication challenges. First, you’ve got A LOT to communicate. With so much change, keeping […]. The post How to Get More Creative In Your Remote Team Communication appeared first on Let's Grow Leaders.

How To 215
article thumbnail

AI is here. This is how it can benefit everyone

CTOvision

Read Kate MacDonald and Lofred Madzou explain how artificial intelligence can benefit everyone on World Economic Forum Blog: AI can be used to enhance the accuracy and efficiency of decision-making […].

article thumbnail

5 Common Pentesting Mistakes

The Crazy Programmer

Penetration testing (or pentesting) is one of the most effective means of unearthing weaknesses and flaws in your IT infrastructure. It exposes gaps so you can plug them before a malicious party takes advantage. Whereas the benefits of pentesting are clear, a pentest is only as effective as its planning and execution. . Substandard pentesting will not only yield results that add no value but could also endanger the very infrastructure it’s meant to help protect.

Testing 179
article thumbnail

8 lessons from the Garmin ransomware attack

TechBeacon

In late July, a ransomware attack on Garmin brought the company's business to its knees. The attack forced the business, a major player in the GPS smartwatch and wearables market, to shut down Garmin Connect, the website used by users to sync data about activities such as runs and bike rides, as well as its aviation database services, some production lines in Asia, as well as its call centers.

Marketing 145
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Critical Controls for DevOps: Best Practices for Continuous Security

DevOps.com

In relentless pursuit of automation and velocity, DevOps teams can reduce the software development cycle and ensure that their products are responsive to client feedback. However, this quest for perfection may compromise security, leaving room for vulnerabilities or misconfigurations that can create huge problems later on. Ensuring security integration throughout the life cycle while retaining […].

DevOps 141
article thumbnail

OODA Research Report: Deception in Cyber

CTOvision

OODA has just published a new research report titled Deception in Cyber. This report looks at the deception technology market including market leaders, use cases for deployment, as well as […].

Research 162
article thumbnail

DockerHub News — And the Impact for Us Developers

Dzone - DevOps

But First: What's the News? So what is this DockerHub? DockerHub is a cloud-based repository where popular Docker images can be published and used by other users for their needs. So far it is the central repository similar to the maven-Central for the Java world. Access was free, and there were no further restrictions on storage space and duration of storage.

article thumbnail

How containers can lift your DevOps game

TechBeacon

The shift toward a DevOps approach is a challenging task that can be short-circuited for reasons as varied as a static environment, slow processes, inconsistent deployments, and cultural hurdles. DevOps requires changes in many areas, and as organizations demand that DevOps empower faster, predictable, agile delivery, many have turned to containers, which can bring a much-needed power boost to a DevOps transformation.

DevOps 145
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Low-Code: An Oasis During Developer Drought

DevOps.com

Key insights from Mendix’s 2020 Developer Drought Index You may have heard that Silicon Valley is in the midst of a developer drought. But the Valley is not alone; developer talent across the U.S. heartland has dried up. In fact, the top 10 U.S. counties with the highest developer demand per capita aren’t even in […]. The post Low-Code: An Oasis During Developer Drought appeared first on DevOps.com.

article thumbnail

Regulated Blockchain: A New Dawn in Technological Advancement

CTOvision

Read why James Jorner says that for blockchain to be widely accepted there has to be some regulation on Entrepreneur : There is no doubting the fact that there are […].

article thumbnail

Two Types of Behavior to Influence for Change to Happen

Change Starts Here

During change, there are two types of behavior we need to influence in order to get the result we’re striving for. I’ll call them Future State Behaviors and Change Behaviors, to describe their relationship to the change initiative.

124
124
article thumbnail

The question you may ask yourself is: what does it take?

CEO Insider

In this crisis, leaders are faced with an unprecedented set of simultaneous challenges. They have had and are having to deal with human, health management, operational, financial, strategic challenges, as well as sometimes public policy and public opinion challenges, for which there is no playbook and there has been no training. As a result, they […].

Policies 136
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Remote work requirement exposes the corporate digital divide

DXC

Like many others, my family and I have done our best to enjoy the unexpectedly large amount of time we have together at home due to social distancing guidelines. Adjusting to the new normal, we have relied heavily on Internet access not only for work and school, but to stay sane and keep the peace. […]. The post Remote work requirement exposes the corporate digital divide appeared first on DXC Blogs.

article thumbnail

Microsoft says the pandemic has changed the future of cybersecurity in these five ways

CTOvision

Cybersecurity has shot to the top of business agendas in recent months, as the sudden shift of workforces from the office to the home highlighted a host of new threats […].

144
144
article thumbnail

Civil Society Is Critical in the Fight Against the COVID-19 Pandemic

TechSoup

Nana Afadzinu is the executive director of West Africa Civil Society Network, a partner in the TechSoup Global Network. The economic, social, and political impact of the COVID-19 pandemic in West Africa has been heavy and will have long-lasting effects. Our biggest hopes for a healthy future rest not only on our beloved healthcare workers, but also on a strong civil society.

article thumbnail

Radar trends to watch: September 2020

O'Reilly Media - Ideas

Compared to the last few months, there are relatively few items about COVID. And almost no items about Blockchains, though the one item I’ve listed (China’s Blockchain Services Network) may be the most important item here. On the other hand, I’m seeing a steady stream of articles about various forms of no-code/low-code programming. While many programmers scoff at the idea of programming-without-programming, spreadsheets are an early example of low-code programing.

Trends 135
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DevOps: Driving Innovation With Old Habits

DevOps.com

DevOps can help drive cost-efficiency, greater productivity and innovation When software development and IT operations merge and work in a state of harmony, they create a flow that we call continuous product delivery. Ideal for project managers, this flow is the elixir to innovation and enables the agility needed to respond to changing market requirements. […].

DevOps 134
article thumbnail

The Intelligence Workstation of the Future: A webinar overview

CTOvision

On Wednesday 16 September 2020 at 130pm Eastern I’ll be presenting on a topic aimed a modernizing the contributions of technology to critical enterprise missions. This webinar on the Intelligence […].

article thumbnail

Creating a Serverless Environment for Testing Your Apache Kafka Applications

Confluent

If you are taking your first steps with Apache Kafka®, looking at a test environment for your client application, or building a Kafka demo, there are two “easy button” paths […].

Testing 133