Data architecture vs backend architecture
Erik Bernhardsson
JANUARY 9, 2019
O'Reilly Media - Ideas
JANUARY 8, 2019
From infrastructure to tools to training, Ben Lorica looks at what’s ahead for data. Whether you’re a business leader or a practitioner, here are key data trends to watch and explore in the months ahead. Increasing focus on building data culture, organization, and training. In a recent O’Reilly survey , we found that the skills gap remains one of the key challenges holding back the adoption of machine learning.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
DevOps.com
JANUARY 7, 2019
Feature flags, also known as feature toggles, provide a means for DevOps teams to test and add new capabilities to their applications without having to take the entire application offline. The downside is they generally result in more branches of applications that need to be carefully managed within the context of a DevOps process. A […]. The post Feature Flagging Poised for Wider Adoption appeared first on DevOps.com.
OTS Solutions
JANUARY 10, 2019
Top Technologies Your Business Can Take Advantage of Today. To stay ahead of the curve in today’s market, businesses can’t rely on the quality of their services alone. They have to adopt cutting-edge technologies that give customers and employees the convenience they’ve come to expect from competitive firms. These are some of the top technologies your business can implement today to stay successful.
Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage
Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.
The Crazy Programmer
JANUARY 9, 2019
Data breaches and compromised websites frequently used to spread malware can be risky for your business; including small businesses. In fact, small or medium-sized businesses are likely to suffer more consequences of cyber-attacks than large enterprises. Large enterprises have the benefit of huge financial reliance as well as organizational resources to combat any attacks.
CTO Universe brings together the best content for CTOs from the widest variety of industry thought leaders.
Let's Grow Leaders
JANUARY 10, 2019
Do you ever feel like your staff keeps you in the dark? Do you ever wonder if they’re going out of their way to keep you out of their way? That seems ridiculous. AND, it’s entirely possible. Here’s the scary part if […]. The post 6 Reasons Your Staff Keeps You in the Dark appeared first on Let's Grow Leaders.
Xebia
JANUARY 11, 2019
History In 2014 I started at Xebia in the business unit Agile Consultancy and Training (ACT). Colleague Nicole Belilos took me under her wings and helped me develop and grow within this group of Agile coaches. Together with Laurens Bonnema we formed a group who had experienced a lot of bad Scrum, fake Scrum, Scrum […]. The post Celebrating one year of Scrum Boosters!
The Crazy Programmer
JANUARY 8, 2019
Queue is an important structure for storing and retrieving data and hence is used extensively among all the data structures. Queue, just like any queue (queues for bus or tickets etc.) follows a FIFO mechanism for data retrieval which means the data which gets into the queue first will be the first one to be taken out from it, the second one would be the second to be retrieved and so on.
Agile Alliance
JANUARY 7, 2019
At Agile Alliance, we pride ourselves on the wealth of high-quality, in-depth Agile-related resources we offer you. But we also realize that sometimes too much of a good thing can be overwhelming. In order to help combat that issue, I'm proud to begin offering curated monthly emails on subjects of interest to you. I’ve identified … Continued.
Advertisement
Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.
Let's Grow Leaders
JANUARY 8, 2019
When a leader is always right, they’re not effective. If you had been with me early in my career, you would have seen my growing frustration. My first job out of grad school was teaching and I had a class of students who […]. The post The Danger When a Leader is Always Right appeared first on Let's Grow Leaders.
Erik Bernhardsson
JANUARY 9, 2019
A modern tech stack typically involves at least a frontend and backend but relatively quickly also grows to include a data platform. This typically grows out of the need for ad-hoc analysis and reporting but possibly evolves into a whole oil refinery of cronjobs, dashboards, bulk data copying, and much more. What generally pushes things into the data platform is (generally) that a number of things are.
The Crazy Programmer
JANUARY 7, 2019
Procedure: In computer programming a specific set of instructions together called a procedure. Depending on the programming language it can be called as subroutine, subprogram or a function. Function: It is one of the basic concept in programming of computer. As it name says, it performs a function (work). It can be either user defined or system defined.
CTOvision
JANUARY 7, 2019
Read why Floyd DCosta says that blockchain technology could be a crucial cog in the Internet of Things infrastructure on Entrepreneur : The era of the Internet of things (IoT) is upon us and it is impacting our lives. Today, technology has pervaded into nearly all walks of life, and constant innovation has made it […].
Advertisement
If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.
Change Starts Here
JANUARY 8, 2019
Trust is a necessary prerequisite of influence because it is the foundation of healthy relationships. Put simply, people are more likely to be influenced by someone they trust. On the other hand, the absence of trust creates resistance to change by creating doubt, uncertainty, and fear. In my Fundamentals of Influencing Change at Work course, […].
Toptal
JANUARY 9, 2019
Without proper state management, your Angular app will become a UX nightmare. But even with that solved, persisting state across sessions and devices can be tricky. This tutorial shows how to leapfrog that challenge using Firebase.
DevOps.com
JANUARY 8, 2019
Without proper consideration given to security best practices, the continuous delivery of software changes facilitated by DevOps is risky. On the other hand, DevOps provides an opportunity to reduce security risks if security is integrated into the continuous delivery pipeline according to best practices. This blog enumerates best practices for security across nine pillars of […].
O'Reilly Media - Ideas
JANUARY 10, 2019
Technological change often happens gradually, then suddenly. Tim O'Reilly explores the areas poised for sudden shifts. There’s a passage in Ernest Hemingway’s novel The Sun Also Rises in which a character named Mike is asked how he went bankrupt. “Two ways,” he answers. “Gradually, then suddenly.”. Technological change happens much the same way. Small changes accumulate, and suddenly the world is a different place.
Advertisement
Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.
OverOps
JANUARY 8, 2019
We’re taking a walk down memory lane to see which topics, trends and posts interested you in 2018. As part of our 2019 resolutions, we’ve decided we want to write more about the topics that interest you, our beloved audience. And in order to do that, we took a deep look into the top topics and posts that interested you throughout 2018. We made a list, checked it twice, and found out who’s mention-worthy (and who’s not).
Toptal
JANUARY 7, 2019
As simple as your RESTful API may be, even internal users will want a JavaScript package that will do all the heavy lifting for them. Why build each CRUD request by hand, or worse, deal with related resources using custom code for every scenario? With ActiveResource.js, you don't have to.
DevOps.com
JANUARY 6, 2019
Choosing the right DevOps tools should be a careful, thoughtful process. On May 12, 1848, a store owner named Sam Brannan held a “one-man parade” to announce the start of the San Francisco Gold Rush. “Gold! Gold from the American River!” Brannan shouted up and down the market street in San Francisco. He held his […]. The post Don’t Let Your DevOps Transformation Be a Parade of Tools appeared first on DevOps.com.
CTOvision
JANUARY 9, 2019
Editor’s note: The below is from the press release for the launch of my new firm, OODA LLC. I’m very excited about this new venture and intend on making a positive difference in addressing several next generation security challenges. For more see: OODA.com Industry Veterans Launch New Company to Address Next Generation Security Challenges Security, […].
Advertisement
“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.
TechBeacon
JANUARY 9, 2019
Prior to my Automation Guild conference each year, I survey the community about the issues they're struggling with. I also speak with many testing thought leaders on my weekly Test Talks podcast.
Toptal
JANUARY 8, 2019
Data-driven UI design is both art and science. Understanding how to collect and analyze data and implement designs based on it is an important skill for beginner and expert designers alike.
DevOps.com
JANUARY 11, 2019
DevOps can help make HIPAA compliance more achievable Automating the provisioning of HIPAA-compliant server infrastructure enables compliant hosting service providers with the ability to provision and deploy infrastructure-as-code with minimal human intervention. Providing the automated process is thoroughly tested, revised and updated, it can offer a healthcare organization huge flexibility when enforcing a HIPAA-compliant server […].
Flexagon
JANUARY 8, 2019
The most effective development processes are tailored to the company and product IT teams are working with. The most effective teams develop standardized processes that help reduce errors and speed up the software delivery lifecycle, while increasing efficiency for their specific product. DevOps spans people, process, and technology, and can be integrated into every IT.
Advertisement
Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.
Women on Business
JANUARY 7, 2019
We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].
CTOvision
JANUARY 10, 2019
A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka –the English pronunciation of the Polish word for mantis– this new tool was created […].
DevOps.com
JANUARY 10, 2019
DevOps is arguably one of the most disruptive forces driving transformation of IT processes in recent memory. But a new survey finds that while IT organizations are making progress, adoption of DevOps processes remains uneven at best. A survey of 2,419 IT professionals conducted by OverOps, a provider of code analysis tools, finds that 82 […].
Let's personalize your content