Sat.Jul 25, 2020 - Fri.Jul 31, 2020

Why Your Fast Release Cycles are Wasting Precious Developer Time

OverOps

OverOps surveyed over 600 engineering professionals for the 2020 State of Software Quality Report and found that the struggle to balance release speed and quality hurts developer productivity. TL;DR: Download the findings from our 2020 State of Software Quality survey. It used to be said that if you’re not breaking things, you’re not moving fast enough.

Survey 100

How to securely authenticate with SCRAM in Postgres 13

The Citus Data

Making security easy to use is crucial because hard-to-use security is likely to be neglected entirely. SCRAM with channel binding is a variation of password authentication that is almost as easy to use, but much more secure. In basic password authentication, the connecting client simply sends the server the password. Then the server checks that it’s the right one, and allows the client to connect.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to Achieve AWS Security in 10 Steps

DevOps.com

Looking to lock down your AWS cloud service? Here are the 10 steps to take for AWS security As more companies embrace the cloud, security is becoming a more significant challenge. Irrespective of size, organizations are increasingly realizing the importance of having proper cloud security practices in place. More and more companies are creating a […]. The post How to Achieve AWS Security in 10 Steps appeared first on DevOps.com.

AWS 85

A Developer’s Guide to CCPA, GDPR Compliance

DevOps.com

Here’s what developers need to know to ensure compliance with the two biggest privacy laws The digital landscape is continuously evolving, and privacy regulations such as CCPA (California Consumer Privacy Act) and the European Union’s GDPR (General Data Protection Regulation) are in effect to give consumers their fundamental right to data privacy. These regulations force […]. The post A Developer’s Guide to CCPA, GDPR Compliance appeared first on DevOps.com.

Facebook Causes Continue to Show Little Promise as Fundraising Tools

CVE-2020-10713: “BootHole” GRUB2 Bootloader Arbitrary Code Execution Vulnerability

Tenable

Recently disclosed vulnerability in GRUB2 bootloader dubbed “BootHole” could allow an attacker to gain silent malicious persistence by attacking the GRUB2 config file, grub.cfg. Background. On July 29, researchers at Eclypsium disclosed a high severity vulnerability in the GRand Unified Bootloader (GRUB) version 2. Dubbed “BootHole,” the flaw affects the GRUB2 bootloader in Windows and Linux devices using Secure Boot. Image Source: Eclypsium. Analysis.

Linux 72

More Trending

A Proactive Look at Active Learning Packages

Dataiku

If data acquisition is the very first step of any machine learning project, unfortunately, data doesn’t always come with the label of interest for the task at hand. It is often a very cumbersome task to ( correctly!) label the data — and that’s where active learning comes in. Featured Tech Blog

Product Ownership - Top Ten Points

Scrum.org

In May 2019, I spoke at the Agile Manchester conference, where I presented my talk "The Product Owner's Toolbox". I asked the audience a question, "What is the main worry for a Product Owner?". Then gave people them 1 minute to thinking about what their answer would be. Using the Liberating Structure 25/10 , the audience identified the common issues that Product Owners face and how they potentially could be solved. . .

SCRUM 181

Beyond the Transaction: How to Make Business Shifts Successful

CEO Insider

Lots of companies move from private to public and public to private. Consider this: Dealogic reports there were 175 Initial Public Offerings (IPOs) in 2019, while 47 firms were taken private. And deals involving public companies being taken private by domestic private equity sponsors increased more than 27 percent over 2018. I’ve been a CFO at […].

Azure Virtual Machine Tutorial

The Crazy Programmer

So in this article, we’ll learn the following things: What is a Virtual Machine? Why we use Virtual Machines? How to create a Virtual Machine? How to use a Virtual Machine in your Computer System? Prerequisites: Microsoft Azure Subscription. Good Internet Connection. So let’s start with the first question. What is a Virtual Machine?

Azure 138

Intelligent Process Automation: Boosting Bots with AI and Machine Learning

Across all sectors, companies are learning that they can transform their businesses by embracing Intelligent Process Automation, or IPA. With the pairing of AI and RPA, IPA adds a new layer of intelligent decision-making processes to automated RPA tasks. By automating repetitive work, and adding the ability to automate intelligent decision making, intelligent automation frees up your most valuable resources – your employees – to spend more time on higher value and more strategic work. But in order to reap the rewards of Intelligent Process Automation, organizations must first educate themselves and prepare for the adoption of IPA. In our ebook, Intelligent Process Automation: Boosting Bots with AI and Machine Learning.

Introducing the Agile2020 Experience Reports

Agile Alliance

We were already busy writing and reviewing experience reports when the Agile2020 conference was cancelled in early June. Towards the end of March, we’d selected twenty experience reports (out of 88 submissions). Each report author was then paired with a shepherd who had advocated for their report. Shepherds volunteer their time to give constructive advice … Continued. Process 2020 experience reports assessments domain-driven design visual models

Report 166

Why are Artificial Intelligence systems biased?

CTOvision

Read Subbarao Kambhapati take a look at why artificial intelligence technology is biased on The Hill: A machine-learned AI system used to assess recidivism risks in Broward County, Fla., often […].

[VLOG] My Job Title Is Product Owner But Am I The Product Owner?

Scrum.org

What's up awesome people. I hope you had a great weekend. Recently I received many questions from people who has the job title Product Owner in the company who was not sure whether they really are the Product Owner. It is quite ironic to see in our industry how many people have the job title Product Owner but not really the Product Owner. So hopefully today's vlog helps you identify who is the real Product Owner in the company. Enjoy and have a great week folks.

How to Make a Body or Object in VR (Virtual Reality)?

The Crazy Programmer

If you’ve enjoyed gaming using an Oculus Rift S or Sony PlayStation headset, then you’ve had a hands-on experience of VR. Nowadays, the concept of virtual reality or VR is finding across-the-board applications, including healthcare, defense, aerospace, and many other industries. However, no other sector makes use of VR as much as the gaming industry. In this article, we will walk you through the basics of ‘how to make a body or object in VR?”

VR 153

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

Noticing Inequity and Exploring the Problem in Open Space

Agile Alliance

A recap of our July 10th event In order to explore Growing Racial Equity in the Agile Community for Black Lives, it felt natural to use a design thinking approach. When faced with a compelling problem, it’s instinctive to want to offer a solution as quickly as we can. When faced with challenging problems around … Continued. The Alliance racial equity

Agile 152

Increased scrutiny forces tech to clean up its language

The Parallax

Hackers generally love to embrace change, from executing new exploits to reconsidering past paradigms. But like most of the technology world, the cybersecurity companies that use it have been slow to abandon exclusionary language that has returned to the spotlight, thanks to the Black Lives Matter protests.

Experiment: Make the Cost of Low Autonomy Transparent with Permission Tokens

Scrum.org

In our book?—? the Zombie Scrum Survival Guide ?—?we we dive deep into what causes Zombie Scrum; something that looks like Scrum from a distance, but lacks a beating heart. We also offer 40+ experiments to recover from Zombie Scrum. In this series, we share some of the experiments from the book and many that didn’t make the final cut (but are still very useful). Self-organization is more likely to take off when teams have autonomy to come up with their own solutions.

SCRUM 136

What are AI and machine learning adding to threat intelligence – brains, brawn or both?

CTOvision

Read Ariadna Miret take a look at what artificial intelligence and machine learning bring to threat intelligence on Security Boulevard : Too much information and not enough time. This, and […].

6 Steps to Improving Your Application’s Analytics Experience

No one designs bad dashboards and reports on purpose. So why do so many applications have terrible analytics experiences? Download this ebook for secrets to creating dashboards and reports your users will love.

Source Control Management

DevOps.com

The post Source Control Management appeared first on DevOps.com. Blogs ROELBOB humor satire SCM SCM tools source control management tech humor

Tools 85

Delivery Experiences Supported by Agile

Agile Alliance

I had the pleasure to interview Diego Garagorry from Montevideo, Uruguay. Diego is a prominent member of the Agile Community in South America and was one of the organizers of the Agiles 2015 Conference in Uruguay. Diego is the current VP of Delivery for Globant, a company that builds software products for multiple clients in … Continued. Process agile software development

Agile 120

2 - Fondations de Scrum

Scrum.org

Pour bien comprendre les fondations de Scrum, nous partons du postulat que nous créons et maintenons des systèmes complexes : un système informatique, une campagne marketing, une stratégie de vente, etc. Les fondations de Scrum sont : les Valeurs Scrum et l’empirisme. Valeurs Scrum. Les valeurs Scrum sont sont fondamentales pour obtenir un état d'esprit adapté aux défis de création de produits complexes, car il vous permettent de vous sentir en sécurité pour essayer et apprendre.

SCRUM 136

Experts: Devastating ransomware attack on Garmin highlights danger of haphazard breach responses

CTOvision

GPS titan Garmin is still recovering from the fallout of the devastating ransomware attack that has crippled its website, disrupted customer support, disabled apps, and paused communications since late July […].

86

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

Pair Programming

DevOps.com

The post Pair Programming appeared first on DevOps.com. Blogs ROELBOB another late night in tech coding coding mistakes humor pair programming parody programming satire software development

Redefining Agile: Shift to Virtual, Return to the Office

Agile Alliance

Focus on Steps, not Leaps

Scrum.org

We often try to make massive change once we realize something isn't right and this doesn't normally go so well. When it comes to making progress everyone wants to LEAP; take BIGGER steps. The bigger the improvement, the happier we are. But it doesn't work like that in reality. Yes, it would be : Great to run 10 kms in 35 mins, every time you get out to run. Awesome to beat that goal of sub 4 hour marathon(42.2 kms) with just few months of training.

SCRUM 132

5G Security in an IoT Architecture

CTOvision

Read Roland Atoui take a look at the security of 5G in an Internet of Things architecture on IoT for All : 5G is in its early stages (available in […].

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.