Sat.Jul 25, 2020 - Fri.Jul 31, 2020

article thumbnail

Why Your Fast Release Cycles are Wasting Precious Developer Time

OverOps

OverOps surveyed over 600 engineering professionals for the 2020 State of Software Quality Report and found that the struggle to balance release speed and quality hurts developer productivity. TL;DR: Download the findings from our 2020 State of Software Quality survey. It used to be said that if you’re not breaking things, you’re not moving fast enough.

article thumbnail

How to securely authenticate with SCRAM in Postgres 13

The Citus Data

Making security easy to use is crucial because hard-to-use security is likely to be neglected entirely. SCRAM with channel binding is a variation of password authentication that is almost as easy to use, but much more secure. In basic password authentication, the connecting client simply sends the server the password. Then the server checks that it’s the right one, and allows the client to connect.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Achieve AWS Security in 10 Steps

DevOps.com

Looking to lock down your AWS cloud service? Here are the 10 steps to take for AWS security As more companies embrace the cloud, security is becoming a more significant challenge. Irrespective of size, organizations are increasingly realizing the importance of having proper cloud security practices in place. More and more companies are creating a […].

AWS 140
article thumbnail

A Developer’s Guide to CCPA, GDPR Compliance

DevOps.com

Here’s what developers need to know to ensure compliance with the two biggest privacy laws The digital landscape is continuously evolving, and privacy regulations such as CCPA (California Consumer Privacy Act) and the European Union’s GDPR (General Data Protection Regulation) are in effect to give consumers their fundamental right to data privacy.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CVE-2020-10713: “BootHole” GRUB2 Bootloader Arbitrary Code Execution Vulnerability

Tenable

Recently disclosed vulnerability in GRUB2 bootloader dubbed “BootHole” could allow an attacker to gain silent malicious persistence by attacking the GRUB2 config file, grub.cfg. Background. On July 29, researchers at Eclypsium disclosed a high severity vulnerability in the GRand Unified Bootloader (GRUB) version 2. Dubbed “BootHole,” the flaw affects the GRUB2 bootloader in Windows and Linux devices using Secure Boot.

More Trending

article thumbnail

A Proactive Look at Active Learning Packages

Dataiku

If data acquisition is the very first step of any machine learning project, unfortunately, data doesn’t always come with the label of interest for the task at hand. It is often a very cumbersome task to ( correctly!) label the data — and that’s where active learning comes in.

article thumbnail

Beyond the Transaction: How to Make Business Shifts Successful

CEO Insider

Lots of companies move from private to public and public to private. Consider this: Dealogic reports there were 175 Initial Public Offerings (IPOs) in 2019, while 47 firms were taken private. And deals involving public companies being taken private by domestic private equity sponsors increased more than 27 percent over 2018. I’ve been a CFO at […].

How To 97
article thumbnail

Azure Virtual Machine Tutorial

The Crazy Programmer

So in this article, we’ll learn the following things: What is a Virtual Machine? Why we use Virtual Machines? How to create a Virtual Machine? How to use a Virtual Machine in your Computer System? Prerequisites: Microsoft Azure Subscription. Good Internet Connection. So let’s start with the first question. What is a Virtual Machine? In simple words, If we use a Computer machine over the internet which has its own infrastructure i.e.

Azure 249
article thumbnail

Qlik Sense vs. Tableau: Self-service analytics tools compared

CIO

Business intelligence (BI) and analytics platforms have long been a staple for business, but thanks to the rise of self-service BI tools, responsibility for analytics has shifted from IT to business analysts, with support from data scientists and database administrators.

Analytics 277
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Introducing the Agile2020 Experience Reports

Agile Alliance

We were already busy writing and reviewing experience reports when the Agile2020 conference was cancelled in early June. Towards the end of March, we’d selected twenty experience reports (out of 88 submissions). Each report author was then paired with a shepherd who had advocated for their report. Shepherds volunteer their time to give constructive advice … Continued.

Report 221
article thumbnail

Why Courageous Cultures are More Important Now than Ever (and more)

Let's Grow Leaders

No more safe silence – build courageous cultures for a brighter, bolder future We’ve spent the past three years researching, interviewing, and working with leaders of big and fast-growing companies, nonprofits, and government organizations around the globe to bring you Courageous Cultures: […]. The post Why Courageous Cultures are More Important Now than Ever (and more) appeared first on Let's Grow Leaders.

Culture 190
article thumbnail

Increased scrutiny forces tech to clean up its language

The Parallax

Hackers generally love to embrace change, from executing new exploits to reconsidering past paradigms. But like most of the technology world, the cybersecurity companies that use it have been slow to abandon exclusionary language that has returned to the spotlight, thanks to the Black Lives Matter protests. Terms such as “whitelist” and “blacklist,” which refer to lists of approved or blocked websites, IP addresses, privileges, and services—or “master&#x

article thumbnail

What are AI and machine learning adding to threat intelligence – brains, brawn or both?

CTOvision

Read Ariadna Miret take a look at what artificial intelligence and machine learning bring to threat intelligence on Security Boulevard : Too much information and not enough time. This, and […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Delivery Experiences Supported by Agile

Agile Alliance

I had the pleasure to interview Diego Garagorry from Montevideo, Uruguay. Diego is a prominent member of the Agile Community in South America and was one of the organizers of the Agiles 2015 Conference in Uruguay. Diego is the current VP of Delivery for Globant, a company that builds software products for multiple clients in … Continued.

Agile 176
article thumbnail

7 Steps to Build a More Courageous, Innovative Culture

Let's Grow Leaders

Are you looking to build a more courageous, innovative culture? Do you want an innovative culture where the default is to speak up – where everyone at every level consistently shares ideas and best practices? A courageous, innovative culture where: Teams at […]. The post 7 Steps to Build a More Courageous, Innovative Culture appeared first on Let's Grow Leaders.

Culture 157
article thumbnail

Increased scrutiny forces tech to clean up its language

The Parallax

Hackers generally love to embrace change, from executing new exploits to reconsidering past paradigms. But like most of the technology world, the cybersecurity companies that use it have been slow to abandon exclusionary language that has returned to the spotlight, thanks to the Black Lives Matter protests. Terms such as “whitelist” and “blacklist,” which refer to lists of approved or blocked websites, IP addresses, privileges, and services—or “master” and 

article thumbnail

3 Key Issues With Hybrid Cloud Transformation

DevOps.com

The cloud has fractured. Nowadays, it is nearly impossible to scale a cloud-agnostic digital transformation initiative. The reality is that most enterprises adopt a hybrid cloud arrangement. Whether designed strategically or throughout years of competing vendors and technology influences, hybrid cloud environments, and the problems therein, seem a mainstay for modern IT.

Cloud 145
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Noticing Inequity and Exploring the Problem in Open Space

Agile Alliance

A recap of our July 10th event In order to explore Growing Racial Equity in the Agile Community for Black Lives, it felt natural to use a design thinking approach. When faced with a compelling problem, it’s instinctive to want to offer a solution as quickly as we can. When faced with challenging problems around … Continued.

Agile 223
article thumbnail

React Test-driven Development: From User Stories to Production

Toptal

Employing a test-driven development (TDD) approach in React projects tends to be straightforward, especially with the aid of Jest and Enzyme. However, there are a few things to look out for. In this article, Toptal JavaScript Developer Dave Hyungmok Lee demonstrates his React TDD process, from epics and user stories to development and production.

article thumbnail

Article: How to Get Hired as a Machine Learning Engineer

InfoQ Culture Methods

To become a machine learning engineer, you have to interview. You have to gain relevant skills from books, courses, conferences, and projects. Include technologies, frameworks, and projects on your CV. In an interview, expect that you will be asked technical questions, insight questions, and programming questions. When given a technical task, demonstrate your skills as if you already had the job.

article thumbnail

New Relic Makes Revamped APM Platform More Affordable

DevOps.com

New Relic has revamped its application performance management (APM) platform as part of an effort to make observability more accessible and affordable. Bill Staples, chief product officer for New Relic, said New Relic One has been updated to provide a new user interface designed to make it easier to navigate and explore an observability platform […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Courageous Cultures Interview with Karin Hurt

Let's Grow Leaders

Karin Hurt joins us in-studio for the first time ever to talk about Courageous Cultures: How to Build Teams of Micro-Innovators, Problem Solvers, and Customer Advocates. In this episode, find out why business leaders are responding passionately to Courageous Cultures, why courageous […]. The post Courageous Cultures Interview with Karin Hurt appeared first on Let's Grow Leaders.

Culture 115
article thumbnail

Data analytics 101: What it means, and why it matters

TechBeacon

Incorporating analytics into the enterprise toolkit can be straightforward or complex, relatively inexpensive or a multimillion-dollar initiative. It all depends on what you want to accomplish.

Analytics 136
article thumbnail

Secure SDLC 101

Synopsys

Learn about the phases of a software development life cycle, plus how to build security in or take an existing SDLC to the next level: the secure SDLC. The post Secure SDLC 101 appeared first on Software Integrity Blog.

SDLC 133
article thumbnail

MuseDev Offers DevOps-Optimized Security Code Analyzer

DevOps.com

MuseDev today announced it has made available on GitHub under an early access program a code analysis tool dubbed Muse that is designed to surface cybersecurity issues as pull requests are made from the repository. Company CEO Stephen Magill said rather than waiting to discover cybersecurity issues after an application is deployed, Muse makes it […].

DevOps 138
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Why are Artificial Intelligence systems biased?

CTOvision

Read Subbarao Kambhapati take a look at why artificial intelligence technology is biased on The Hill: A machine-learned AI system used to assess recidivism risks in Broward County, Fla., often […].

article thumbnail

Continuous delivery: What it is, and why it matters

TechBeacon

Continuous delivery (CD) "is the ability to get changes of all types—including new features, configuration changes, bug fixes and experiments—into production, or into the hands of users, safely, and quickly in a sustainable way.".

article thumbnail

Stop Monday-itis by changing the way you work

CEO Insider

Monday morning strikes fear (or at least a flat mood) into the minds of many. If you are suffering from a case of Monday-itis, browsing employment websites might be overtaking the time spent doing your actual job. But here’s the good news: research conducted by the University of New South Wales and behavioural science consultancy […]. License and Republishing: The views expressed in this article Stop Monday-itis by changing the way you work are those of the author Dr.

Research 125