Sat.Jan 05, 2019 - Fri.Jan 11, 2019

article thumbnail

Data architecture vs backend architecture

Erik Bernhardsson

article thumbnail

7 data trends on our radar

O'Reilly Media - Ideas

From infrastructure to tools to training, Ben Lorica looks at what’s ahead for data. Whether you’re a business leader or a practitioner, here are key data trends to watch and explore in the months ahead. Increasing focus on building data culture, organization, and training. In a recent O’Reilly survey , we found that the skills gap remains one of the key challenges holding back the adoption of machine learning.

Trends 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feature Flagging Poised for Wider Adoption

DevOps.com

Feature flags, also known as feature toggles, provide a means for DevOps teams to test and add new capabilities to their applications without having to take the entire application offline. The downside is they generally result in more branches of applications that need to be carefully managed within the context of a DevOps process. A […]. The post Feature Flagging Poised for Wider Adoption appeared first on DevOps.com.

DevOps 91
article thumbnail

Top Technologies Your Business Can Take Advantage of Today

OTS Solutions

Top Technologies Your Business Can Take Advantage of Today. To stay ahead of the curve in today’s market, businesses can’t rely on the quality of their services alone. They have to adopt cutting-edge technologies that give customers and employees the convenience they’ve come to expect from competitive firms. These are some of the top technologies your business can implement today to stay successful.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Protect Your Small Business from a Hacker Attack

The Crazy Programmer

Data breaches and compromised websites frequently used to spread malware can be risky for your business; including small businesses. In fact, small or medium-sized businesses are likely to suffer more consequences of cyber-attacks than large enterprises. Large enterprises have the benefit of huge financial reliance as well as organizational resources to combat any attacks.

More Trending

article thumbnail

6 Reasons Your Staff Keeps You in the Dark

Let's Grow Leaders

Do you ever feel like your staff keeps you in the dark? Do you ever wonder if they’re going out of their way to keep you out of their way? That seems ridiculous. AND, it’s entirely possible. Here’s the scary part if […]. The post 6 Reasons Your Staff Keeps You in the Dark appeared first on Let's Grow Leaders.

article thumbnail

Celebrating one year of Scrum Boosters!

Xebia

History In 2014 I started at Xebia in the business unit Agile Consultancy and Training (ACT). Colleague Nicole Belilos took me under her wings and helped me develop and grow within this group of Agile coaches. Together with Laurens Bonnema we formed a group who had experienced a lot of bad Scrum, fake Scrum, Scrum […]. The post Celebrating one year of Scrum Boosters!

SCRUM 100
article thumbnail

Types of Queues in Data Structure

The Crazy Programmer

Queue is an important structure for storing and retrieving data and hence is used extensively among all the data structures. Queue, just like any queue (queues for bus or tickets etc.) follows a FIFO mechanism for data retrieval which means the data which gets into the queue first will be the first one to be taken out from it, the second one would be the second to be retrieved and so on.

Data 153
article thumbnail

Increase Your Agile Knowledge With Questions Answered By Our Resident Content Curator

Agile Alliance

At Agile Alliance, we pride ourselves on the wealth of high-quality, in-depth Agile-related resources we offer you. But we also realize that sometimes too much of a good thing can be overwhelming. In order to help combat that issue, I'm proud to begin offering curated monthly emails on subjects of interest to you. I’ve identified … Continued.

Agile 136
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

The Danger When a Leader is Always Right

Let's Grow Leaders

When a leader is always right, they’re not effective. If you had been with me early in my career, you would have seen my growing frustration. My first job out of grad school was teaching and I had a class of students who […]. The post The Danger When a Leader is Always Right appeared first on Let's Grow Leaders.

article thumbnail

Data architecture vs backend architecture

Erik Bernhardsson

A modern tech stack typically involves at least a frontend and backend but relatively quickly also grows to include a data platform. This typically grows out of the need for ad-hoc analysis and reporting but possibly evolves into a whole oil refinery of cronjobs, dashboards, bulk data copying, and much more. What generally pushes things into the data platform is (generally) that a number of things are.

article thumbnail

Difference between Function and Procedure

The Crazy Programmer

Procedure: In computer programming a specific set of instructions together called a procedure. Depending on the programming language it can be called as subroutine, subprogram or a function. Function: It is one of the basic concept in programming of computer. As it name says, it performs a function (work). It can be either user defined or system defined.

article thumbnail

Blockchain Technology can be Critical to IoT Infrastructure Security

CTOvision

Read why Floyd DCosta says that blockchain technology could be a crucial cog in the Internet of Things infrastructure on Entrepreneur : The era of the Internet of things (IoT) is upon us and it is impacting our lives. Today, technology has pervaded into nearly all walks of life, and constant innovation has made it […].

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Influence Requires Trust: Three Ways to Be More Trustworthy

Change Starts Here

Trust is a necessary prerequisite of influence because it is the foundation of healthy relationships. Put simply, people are more likely to be influenced by someone they trust. On the other hand, the absence of trust creates resistance to change by creating doubt, uncertainty, and fear. In my Fundamentals of Influencing Change at Work course, […].

Course 109
article thumbnail

State Management in Angular Using Firebase

Toptal

Without proper state management, your Angular app will become a UX nightmare. But even with that solved, persisting state across sessions and devices can be tricky. This tutorial shows how to leapfrog that challenge using Firebase.

How To 111
article thumbnail

9 Pillars of Continuous Security Best Practices

DevOps.com

Without proper consideration given to security best practices, the continuous delivery of software changes facilitated by DevOps is risky. On the other hand, DevOps provides an opportunity to reduce security risks if security is integrated into the continuous delivery pipeline according to best practices. This blog enumerates best practices for security across nine pillars of […].

article thumbnail

Gradually, then suddenly

O'Reilly Media - Ideas

Technological change often happens gradually, then suddenly. Tim O'Reilly explores the areas poised for sudden shifts. There’s a passage in Ernest Hemingway’s novel The Sun Also Rises in which a character named Mike is asked how he went bankrupt. “Two ways,” he answers. “Gradually, then suddenly.”. Technological change happens much the same way. Small changes accumulate, and suddenly the world is a different place.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

1 Million Engineers Can’t Be Wrong: The Top Stories You Liked in 2018

OverOps

We’re taking a walk down memory lane to see which topics, trends and posts interested you in 2018. As part of our 2019 resolutions, we’ve decided we want to write more about the topics that interest you, our beloved audience. And in order to do that, we took a deep look into the top topics and posts that interested you throughout 2018. We made a list, checked it twice, and found out who’s mention-worthy (and who’s not).

article thumbnail

ActiveResource.js ORM: Building a Powerful JavaScript SDK For Your JSON API, Fast

Toptal

As simple as your RESTful API may be, even internal users will want a JavaScript package that will do all the heavy lifting for them. Why build each CRUD request by hand, or worse, deal with related resources using custom code for every scenario? With ActiveResource.js, you don't have to.

Resources 109
article thumbnail

Don’t Let Your DevOps Transformation Be a Parade of Tools

DevOps.com

Choosing the right DevOps tools should be a careful, thoughtful process. On May 12, 1848, a store owner named Sam Brannan held a “one-man parade” to announce the start of the San Francisco Gold Rush. “Gold! Gold from the American River!” Brannan shouted up and down the market street in San Francisco. He held his […]. The post Don’t Let Your DevOps Transformation Be a Parade of Tools appeared first on DevOps.com.

DevOps 109
article thumbnail

Announcing OODA: A Company Addressing Next Generation Security Challenges

CTOvision

Editor’s note: The below is from the press release for the launch of my new firm, OODA LLC. I’m very excited about this new venture and intend on making a positive difference in addressing several next generation security challenges. For more see: OODA.com Industry Veterans Launch New Company to Address Next Generation Security Challenges Security, […].

Company 93
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The state of test automation: 7 key trends to watch

TechBeacon

Prior to my Automation Guild conference each year, I survey the community about the issues they're struggling with. I also speak with many testing thought leaders on my weekly Test Talks podcast.

Testing 102
article thumbnail

Strength in Numbers – An Overview of Data-driven Design

Toptal

Data-driven UI design is both art and science. Understanding how to collect and analyze data and implement designs based on it is an important skill for beginner and expert designers alike.

Data 105
article thumbnail

How to Automate HIPAA Compliance with DevOps

DevOps.com

DevOps can help make HIPAA compliance more achievable Automating the provisioning of HIPAA-compliant server infrastructure enables compliant hosting service providers with the ability to provision and deploy infrastructure-as-code with minimal human intervention. Providing the automated process is thoroughly tested, revised and updated, it can offer a healthcare organization huge flexibility when enforcing a HIPAA-compliant server […].

article thumbnail

DevOps for Oracle Apps: 10 E-Business Suite Development Tips

Flexagon

The most effective development processes are tailored to the company and product IT teams are working with. The most effective teams develop standardized processes that help reduce errors and speed up the software delivery lifecycle, while increasing efficiency for their specific product. DevOps spans people, process, and technology, and can be integrated into every IT.

DevOps 92
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

How To Plan Your Offer Funnel Like A Pro

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

How To 102
article thumbnail

New tool automates phishing attacks that bypass 2FA

CTOvision

A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka –the English pronunciation of the Polish word for mantis– this new tool was created […].

Tools 92
article thumbnail

Survey Sees Need for More Consistent Approaches to DevOps

DevOps.com

DevOps is arguably one of the most disruptive forces driving transformation of IT processes in recent memory. But a new survey finds that while IT organizations are making progress, adoption of DevOps processes remains uneven at best. A survey of 2,419 IT professionals conducted by OverOps, a provider of code analysis tools, finds that 82 […].

Survey 107