Sat.Aug 15, 2020 - Fri.Aug 21, 2020

article thumbnail

Is Machine Learning Really AI?

CTOvision

There’s so much being said about machine learning (ML), but perhaps the train has left the station with whether many ML projects are truly AI: One of the downsides to […].

article thumbnail

Distributed Systems Pattern: Low-Water Mark

Martin Fowler

The write ahead log maintains every update to persistent store. It can grow indefinitely over time. Segmented Log allows dealing with smaller files at a time, but total disk storage can grow indefinitely if not checked. A Low-Water Mark acts an index in the write ahead log showing which portion of the log can be discarded.

System 232
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Communication Techniques for Challenging Times: A Frontline Festival

Let's Grow Leaders

Communication is tricky, even during “normal” circumstances, but it’s even more important now. You know we’re huge believers in 5×5 communication. Communicating anything that’s important five times, five different ways and are always on the lookout for great communication techniques to make […]. The post Communication Techniques for Challenging Times: A Frontline Festival appeared first on Let's Grow Leaders.

255
255
article thumbnail

Applying Acceptance Test Driven Development (ATDD) in a Bank

Agile Alliance

My guest for this interview was Sebastián Ismael, a software professional and visiting lecturer from Argentina. Sebastián has been been with Grupo Esfera, a boutique software consulting company in Buenos Aires, for eight years. The firm serves very large companies in Argentina and elsewhere. He is passionate about the technical side of Agile, specially eXtreme … Continued.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Solve “ValueError: invalid literal for int() with base 10” in Python

The Crazy Programmer

Hello everyone, So today we’re going to see the possible reasons and solutions for the error “ ValueError: invalid literal for int() with base 10 ” in Python. The main reason for this error is that in our program, we’re passing a non-integer value to a place where the interpreter expects an integer value. To understand the above lines, let’s take an example. age = int(input("Enter your age: ")) When you run the above line, the interpreter will ask you to enter your age, when you will enter the a

More Trending

article thumbnail

How to Stop Remote Work from Stealing Your Life

Let's Grow Leaders

Awareness and intention will help stop remote work from stealing your life It’s not your imagination: if the pandemic shifted your job to working from home, odds are, you’re working longer hours. For many of the leaders we’ve spoken with over the […]. The post How to Stop Remote Work from Stealing Your Life appeared first on Let's Grow Leaders.

How To 246
article thumbnail

Gray Versus Green: Who Makes the Better Start-Up CEO?

N2Growth Blog

This article was co-authored by Laura Musgrave , Kevin Bijas, and Jeffrey Cohn. “People over 45 basically die in terms of new ideas.” said venture capitalist Vinod Khosla in 2011. “People under 35 are the people who make change happen,” he further asserted. Taking the exact opposite tack, in a recent CNBC interview, Alan Patricof , founder of Greycroft Partners, an elite venture capital firm, said: “academic studies show that the success rate of entrepreneurs who start at the age of 60 a

article thumbnail

New AWS Service Lets Any User Create Simulated Worlds To Train Robots, ML and AI

CTOvision

Practitioners in the closely related domains of robotics and machine learning have long had a problem when it comes to fielding real-world solutions. Systems need to be trained to operate […].

Training 184
article thumbnail

Distributed Systems Pattern: Single Socket Channel

Martin Fowler

When we are using Leader and Followers, we need to ensure that messages between the leader and each follower are kept in order, with a retry mechanism for any lost messages. We need to do this while keeping the cost of new connections low, so that opening new connections doesn't increase the system's latency. A Single Socket Channel maintains the order of the requests sent to a server by using a single TCP connection.

System 255
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Draw Out Your Team’s Best Ideas

Let's Grow Leaders

Your team may have vital information, solutions, or ideas that would make a tremendous difference – if you only knew what they were thinking. In this episode, you’ll get a powerful tool to draw out your team’s best ideas. The post How to Draw Out Your Team’s Best Ideas appeared first on Let's Grow Leaders. Your team may have vital information, solutions, or ideas that would make a tremendous difference – if you only knew what they were thinking.

How To 190
article thumbnail

Beyond User Stories: Modern Software Requirements need a Visual Model of Representation

Agile Alliance

Welcome to a world where Modern Software Requirements are not only simple & intuitive, but also fun to create. You’ll end this session cum workshop with something which you’d like to try as soon as you go back to your work next week. User Stories were created as part of eXtreme Programming more than 20 … Continued.

Software 150
article thumbnail

Combating Insider Threats Posed by Remote Workers in the Time of COVID-19

CTOvision

Read Jeffrey N. Rosenthal and David J. Oberly’s article about how companies can combat insider threat through remote workers on Law: Insider threats—i.e., security risks originating from within an organization—have […].

article thumbnail

Distributed Systems Pattern: Singular Update Queue

Martin Fowler

When the state needs to be updated by multiple concurrent clients, we need it to be safely updated with one at a time changes. Generally locks are used to protect against concurrent modifications. But if the tasks being performed are time consuming, like writing to a file, blocking all the other calling threads until the task is completed can have severe impact on overall system throughput and latency.

System 244
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Where Does OverOps Fit in the CI/CD Pipeline?

OverOps

This is our definitive guide to where OverOps’ continuous reliability solution fits into your CI/CD pipeline. Confused about all the different vendors in our ecosystem? You’re not alone. The Cloud Native landscape contains over 1,400 projects and companies, and you literally have to zoom in to be able to see all the logos. So it’s no surprise that engineering teams are overwhelmed by vendor proliferation: Kid: I want a really difficult puzzle for my birthday Me: pic.twitter.com/y5dzjL6mIv

article thumbnail

Tough tumbler: Lock-picking vs. the pandemic shutdown

The Parallax

Hackers may be stereotyped as introverts, but at hacker conventions as big as DefCon to more local confabs, you’re almost certain to run across at least a few, and sometimes dozens, of hackers hunched over tables of metal locks and key cylinders, poking at their innards with thin metal picks and rakes. The art of lock-picking, many of them will tell you, is hacker philosophy made real, but the longtime hacker sport has faced an uncertain future since the coronavirus pandemic shuttered the

Security 130
article thumbnail

Climbing the “Pain Pyramid” with Artificial Intelligence

CTOvision

Read Derek Manky explain how companies can focus on threats using artificial intelligence on Dark Reading : Organizations that perform threat hunting or threat intelligence services should be aware of […].

article thumbnail

Why you should build accessibility in from the start

TechBeacon

One in five of your customers and potential customers—nearly 20% of US citizens—have a physical or cognitive impairment. Are your applications meeting their accessibility needs?

Meeting 145
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Benchmarking Apache Kafka, Apache Pulsar, and RabbitMQ: Which is the fastest?

Confluent

Apache Kafka® is one of the most popular event streaming systems. There are many ways to compare systems in this space, but one thing everyone cares about is performance. Kafka […].

System 145
article thumbnail

Tough tumbler: Lock-picking vs. the pandemic shutdown

The Parallax

Hackers may be stereotyped as introverts, but at hacker conventions as big as DefCon to more local confabs, you’re almost certain to run across at least a few, and sometimes dozens, of hackers hunched over tables of metal locks and key cylinders, poking at their innards with thin metal picks and rakes. The art of lock-picking, many of them will tell you, is hacker philosophy made real, but the longtime hacker sport has faced an uncertain future since the coronavirus pandemic shuttered the

Security 130
article thumbnail

How Can Data Quality Enhance Trust In Artificial Intelligence?

CTOvision

Read Nallan Sriraman explain how data quality can enhance trust in artificial intelligence on Forbes : Companies now more than ever rely on data to create trustworthy insights to make […].

article thumbnail

What It Takes to Succeed in a Multi-Cloud Environment 

DevOps.com

A multi-cloud strategy offers the best possible scenario for ensuring business continuity and helping improve innovation Business problems are not “one size fits all,” and neither are cloud architectures. Organizations are looking for specific solutions that deliver on their bespoke needs—a driver for many of them shifting from one cloud provider to working with multiple […].

Cloud 145
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Machine learning and data warehousing: What it is, why it matters

TechBeacon

One of the many technologies included under the umbrella of artificial intelligence, machine learning is defined by Wikipedia as "a field of computer science that gives computers the ability to learn without being explicitly programmed.".

article thumbnail

Simple Node.js Proxy

David Walsh

When I wanted to refresh my React.js skills, I quickly moved to create a dashboard of cryptocurrencies, their prices, and and other aspects of digital value. Getting rolling with React.js is a breeze — create-react-app {name} and you’re off and running. Getting the API working isn’t quick, especially if they don’t accept cross-origin requests.

article thumbnail

Why Best-of-Breed is a Better Choice than All-in-One Platforms for Data Science

O'Reilly Media - Ideas

So you need to redesign your company’s data infrastructure. Do you buy a solution from a big integration company like IBM, Cloudera, or Amazon? Do you engage many small startups, each focused on one part of the problem? A little of both? We see trends shifting towards focused best-of-breed platforms. That is, products that are laser-focused on one aspect of the data science and machine learning workflows, in contrast to all-in-one platforms that attempt to solve the entire space of data workflow

article thumbnail

Skills Every DevOps Professional Needs to Succeed

DevOps.com

At organizations of all sizes, DevOps is becoming immensely popular to harmonize operations between IT and software development units. The digital world is progressing rapidly, and with that, the need to upgrade skills has become a necessity. Based on research from Allied Market, the DevOps market worldwide revenue was $3.36 billion in 2017 and is […].

DevOps 145
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The state of cloud security and privacy: 5 key trends to watch

TechBeacon

When cloud computing was new, questions swirled around the ability of cloud service providers to keep their infrastructure secure. As more and more businesses began migrating to the cloud, it became apparent that the major cloud service providers were better equipped than most organizations to secure their networks. But questions remain, and customers of cloud services continue to seek better ways to secure their data.

Cloud 139
article thumbnail

Match Emojis with Regular Expressions

David Walsh

When experimenting with unicode property escapes, to identify accented letters in strings , it reminded me of a question I had a few years ago: what is the best way to identify and then replace emojis in a string? I first noticed this practice when using emojis in Facebook — sometimes Facebook would replace an emoji with one of their own custom images, likely because another device may not support that emoji.

143
143
article thumbnail

Here Are the Metrics you Need to Understand Operational Health

Dzone - DevOps

In recent polls we’ve conducted with engineers and leaders, we’ve found that around 70% of participants used MTTA and MTTR as one of their main metrics. 20% of participants cited looking at planned versus unplanned work, and 10% said they currently look at no metrics. While MTTA and MTTR are good starting points, they're no longer enough. With the rise in complexity, it can be difficult to gain insights into your services’ operational health.

Metrics 137