Sat.Mar 31, 2018 - Fri.Apr 06, 2018

article thumbnail

Foreword to Accelerate

Martin Fowler

Nicole Forsgren, Jez Humble, and Gene Kim have just published their book Accelerate. I think this will be the most important software book this year (yes more than this ). Not just does it give solid advice on the practices you need to create a top class software delivery capability, it backs that advice with a depth of scientific analysis unusual in our field.

Analysis 198
article thumbnail

How do you solve a problem like ransomware? Invest up front

The Parallax

Ransomware is hardly a cutting-edge form of malicious software. It infects a victim’s computer or phone, then encodes the data with a key that the attacker shares only after a ransom has been extorted from the victim. It has been around for nearly 30 years. Yet it manages to plague major organizations across the globe, from Boeing to Baltimore. Ransomware remains a lucrative business for hacker extortionists , who typically target organizations such as hospitals or utilities they believe would h

Network 186
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How companies around the world apply machine learning

O'Reilly Media - Data

Strata Data London will introduce technologies and techniques; showcase use cases; and highlight the importance of ethics, privacy, and security. The growing role of data and machine learning cuts across domains and industries. Companies continue to use data to improve decision-making (business intelligence and analytics) and for automation (machine learning and AI).

article thumbnail

Project Management: How to Hold the Best Accountability Conversations

Let's Grow Leaders

Project management isn’t for the faint of heart. You’re pressured from above to produce results and from below to cultivate relationships with your project teams. And in between, you’ve got scope creep, stakeholder politics, and vaguely supported contingency plans. You can become […]. The post Project Management: How to Hold the Best Accountability Conversations appeared first on Let's Grow Leaders.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

One Easy Way To Speed up your Rails Tests and RSpec

NeverFriday

There comes a time in the life of every Ruby on Rails project where you and your team will end up with long running tests. Rails tests can contain factories, fixtures and lots of setup procedures before tests are executed, and all of these can contribute to major slowness in the test runs. I’ve seen four ways of dealing with slow running tests in Rails: start deleting tests (or mark them as skip-able): the drawback is your test coverage drops and you may end up with more bugs. use more int

Testing 124

More Trending

article thumbnail

It’s time for data ethics conversations at your dinner table

O'Reilly Media - Data

In an era where fake news travels faster than the truth, our communities are at a critical juncture. With 2.5 quintillion records of data created every day, people are being defined by how they travel, surf the internet, eat, and live their lives. We are in the midst of a “data revolution,” where individuals and organizations can store and analyze massive amounts of information.

article thumbnail

5 Ways to Drive Results Through Fear and Intimidation

Let's Grow Leaders

You’re on the fast track. You don’t need sustained results, you need quick wins. Results matter. You’ve got a review coming up. With a few simple tactics, you can get your organization performing in no time. You’ll be promoted and someone else […]. The post 5 Ways to Drive Results Through Fear and Intimidation appeared first on Let's Grow Leaders.

article thumbnail

Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases

CTOvision

None of us wanted this cyber war. But now that it is here all of us are targets. Even before the cyber war we were being overwhelmed with data. The average citizen is surrounded with information from TV, radio, entertainment, the Internet, social media, co-workers, neighbors, family, schools, the government as well as old sources […].

Internet 123
article thumbnail

The eight practices for Containerized Delivery on the Microsoft stack – PRACTICE 1: Small, reusable image layers

Xebia

This post is originally published as article within SDN Magazine on October 13th, 2017. During the past year I supported several clients in their journey toward Containerized Delivery on the Microsoft stack. In this blogseries I’d like to share the eight practices I learned while practicing Containerized Delivery on the Microsoft stack using Docker, both in a Greenfield and […].

Windows 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

One-click Login with Blockchain: A MetaMask Tutorial

Toptal

Online users are becoming increasingly resistant to traditional email/password registration processes. One-click social logins via Facebook, Google, or GitHub are better, but they come with data privacy trade-offs. This article introduces a one-click, cryptographically-secure login flow using MetaMask, with all data stored on the app's own back-end.

article thumbnail

Collaboration – Can We Really Trust You?

Let's Grow Leaders

It’s easy to talk about collaboration. It’s much harder to do it. After visiting one of our clients in Guatemala City, Karin, Sebastian, and I traveled to Antigua, Guatemala where my daughter owns a clothing design business. She took us to Hobbitengango, […]. The post Collaboration – Can We Really Trust You? appeared first on Let's Grow Leaders.

Travel 134
article thumbnail

The Stack Overflow Age

Joel on Software

Hi, everyone! A lot of stuff has happened since I was writing all those blog posts about Aeron chairs 18 years ago. Some of those blog posts are old enough to go to college. And, also: Stack Overflow will be ten years old soon! Wow! So I thought it would be cool to get the old band back together for a little reunion tour over the next few weeks. I want to catch you all up on some stuff but mostly I want to tell the story of Stack Overflow in a not-completely-disorganized way.

Internet 102
article thumbnail

The eight practices for Containerized Delivery on the Microsoft stack – PRACTICE 2: Multi-stage builds

Xebia

This post is originally published as article within SDN Magazine on October 13th, 2017. During the past year I supported several clients in their journey toward Containerized Delivery on the Microsoft stack. In this blogseries I’d like to share eight practices I learned while practicing Containerized Delivery on the Microsoft stack using Docker, both in a Greenfield and in a Brownfield […].

Windows 100
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Five Strategies for Getting the Most From AI: An MIT Sloan Management Review Webinar

CTOvision

Thursday 12 April 2018, Jacques Bughin, author of the MIT Sloan Management Review article "Five Management Strategies for Getting the Most From AI" will discuss this article and the supporting work of he McKinsey Global Institute around this question of capitalizing on AI. Using industry examples and findings from the Institute’s research, he’ll offer strategies for […].

article thumbnail

How to Have Tough Conversations at Work: An Interview

Let's Grow Leaders

As we travel the world keynote speaking and working with leaders across a variety of organizations and contexts, we find one of the biggest challenges across cultures is how to have productive, difficult conversations. I was delighted to grab a few minutes for […]. The post How to Have Tough Conversations at Work: An Interview appeared first on Let's Grow Leaders.

How To 119
article thumbnail

How Outsourcing Helps Entrepreneurs Build Businesses

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

94
article thumbnail

The eight practices for Containerized Delivery on the Microsoft stack – PRACTICE 3: Keep your Windows Containers up-to-date

Xebia

This post is originally published as article within SDN Magazine on October 13th, 2017. During the past year I supported several clients in their journey toward Containerized Delivery on the Microsoft stack. In this blogseries I’d like to share eight practices I learned while practicing Containerized Delivery on the Microsoft stack using Docker, both in a Greenfield and in […].

Windows 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What is Risk Attitude of Stakeholders?

SCRUMstudy

Stakeholder(s) is a collective term that includes customers, users, and sponsors, who frequently interface with the Product Owner, Scrum Master, and Scrum Team to provide them with inputs and facilitate creation of the project’s product, service, or other result. Stakeholder(s) influence the project throughout the project’s development. Thus it is important to understand the risk attitude of the stakeholders.

SCRUM 90
article thumbnail

4 Go Language Criticisms

Toptal

Go is quickly becoming one of the most popular languages: It currently ranks 19 in the TIOBE programming community index, and powers popular software like Kubernetes, Docker, and Heroku CLI. However, for all its simplicity, Go may still be missing some things. In this article, Toptal Freelance Go Developer Sergei Peshkov shares his concerns about why Go is still far from perfect and how we can make it better.

article thumbnail

Tips for Female Business Owners on Ending Workplace Toxicity

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Company 91
article thumbnail

The eight practices for Containerized Delivery on the Microsoft stack – PRACTICE 4: Group Managed Service Accounts

Xebia

This post is originally published as article within SDN Magazine on October 13th, 2017. During the past year I supported several clients in their journey toward Containerized Delivery on the Microsoft stack. In this blogseries I’d like to share eight practices I learned while practicing Containerized Delivery on the Microsoft stack using Docker, both in a Greenfield and in […].

Groups 100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

What The Board Needs To Know About Artificial Intelligence

CTOvision

No matter what the business, Artificial Intelligence (AI) is going to have an impact. It is changing the way consumers consume, changing the way companies create and changing the way industries create value. C-suite executives and members of boards are rightly concerned with assessing what about AI they should accelerate into their companies and what […].

article thumbnail

How to be Confident at Work

Career Advancement

“One important key to success is self-confidence. An important key to self-confidence is preparation. ~Arthur Ashe~. Grayson asks: I’m naturally a shy person , and I want to learn how to be confident at work. I know that confidence is key to coming across as a leader , and I definitely want to advance. How can I stop blending into the background and start exuding self-assurance?

How To 81
article thumbnail

Master Hot Design Trends with These Photoshop Tutorials

Toptal

Visual design experiments often become popular design trends and suddenly they are seen everywhere. Here are a number of hot graphic design trends and some of the top tutorials on how to create them.

Trends 81
article thumbnail

The eight practices for Containerized Delivery on the Microsoft stack – PRACTICE 5: Secure Containerized Delivery

Xebia

This post is originally published as article within SDN Magazine on October 13th, 2017. During the past year I supported several clients in their journey toward Containerized Delivery on the Microsoft stack. In this blogseries I’d like to share eight practices I learned while practicing Containerized Delivery on the Microsoft stack using Docker, both in a Greenfield and in […].

Windows 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Energy Pipeline Operations Affected By Cyberattack

CTOvision

All the facts are not in regarding the attack announced by the US natural gas pipeline operator Energy Transfer Partners (operator of over 71,000 miles of pipeline). But we do know that operations were affected by the attack and that the attack was against its back office systems in charge of orders, shipping, billing. Operations […].

Energy 76
article thumbnail

How to be Confident at Work

Career Advancement

“One important key to success is self-confidence. An important key to self-confidence is preparation. ~Arthur Ashe~. Grayson asks: I’m naturally a shy person , and I want to learn how to be confident at work. I know that confidence is key to coming across as a leader , and I definitely want to advance. How can I stop blending into the background and start exuding self-assurance?

How To 81
article thumbnail

CMS Web Design: A Guide to Dynamic Content Applications

Toptal

A lion’s share of websites and apps in the online media space are powered by content management systems (CMS). The optimal way to design for these applications is putting content first, style second.