Is Machine Learning Really AI?
CTOvision
AUGUST 17, 2020
There’s so much being said about machine learning (ML), but perhaps the train has left the station with whether many ML projects are truly AI: One of the downsides to […].
CTOvision
AUGUST 17, 2020
There’s so much being said about machine learning (ML), but perhaps the train has left the station with whether many ML projects are truly AI: One of the downsides to […].
Martin Fowler
AUGUST 18, 2020
The write ahead log maintains every update to persistent store. It can grow indefinitely over time. Segmented Log allows dealing with smaller files at a time, but total disk storage can grow indefinitely if not checked. A Low-Water Mark acts an index in the write ahead log showing which portion of the log can be discarded.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Let's Grow Leaders
AUGUST 20, 2020
Communication is tricky, even during “normal” circumstances, but it’s even more important now. You know we’re huge believers in 5×5 communication. Communicating anything that’s important five times, five different ways and are always on the lookout for great communication techniques to make […]. The post Communication Techniques for Challenging Times: A Frontline Festival appeared first on Let's Grow Leaders.
Agile Alliance
AUGUST 18, 2020
My guest for this interview was Sebastián Ismael, a software professional and visiting lecturer from Argentina. Sebastián has been been with Grupo Esfera, a boutique software consulting company in Buenos Aires, for eight years. The firm serves very large companies in Argentina and elsewhere. He is passionate about the technical side of Agile, specially eXtreme … Continued.
Advertisement
IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d
The Crazy Programmer
AUGUST 17, 2020
Hello everyone, So today we’re going to see the possible reasons and solutions for the error “ ValueError: invalid literal for int() with base 10 ” in Python. The main reason for this error is that in our program, we’re passing a non-integer value to a place where the interpreter expects an integer value. To understand the above lines, let’s take an example. age = int(input("Enter your age: ")) When you run the above line, the interpreter will ask you to enter your age, when you will enter the a
CTO Universe brings together the best content for CTOs from the widest variety of industry thought leaders.
Let's Grow Leaders
AUGUST 17, 2020
Awareness and intention will help stop remote work from stealing your life It’s not your imagination: if the pandemic shifted your job to working from home, odds are, you’re working longer hours. For many of the leaders we’ve spoken with over the […]. The post How to Stop Remote Work from Stealing Your Life appeared first on Let's Grow Leaders.
N2Growth Blog
AUGUST 17, 2020
This article was co-authored by Laura Musgrave , Kevin Bijas, and Jeffrey Cohn. “People over 45 basically die in terms of new ideas.” said venture capitalist Vinod Khosla in 2011. “People under 35 are the people who make change happen,” he further asserted. Taking the exact opposite tack, in a recent CNBC interview, Alan Patricof , founder of Greycroft Partners, an elite venture capital firm, said: “academic studies show that the success rate of entrepreneurs who start at the age of 60 a
CTOvision
AUGUST 19, 2020
Practitioners in the closely related domains of robotics and machine learning have long had a problem when it comes to fielding real-world solutions. Systems need to be trained to operate […].
Martin Fowler
AUGUST 19, 2020
When we are using Leader and Followers, we need to ensure that messages between the leader and each follower are kept in order, with a retry mechanism for any lost messages. We need to do this while keeping the cost of new connections low, so that opening new connections doesn't increase the system's latency. A Single Socket Channel maintains the order of the requests sent to a server by using a single TCP connection.
Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage
Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.
Let's Grow Leaders
AUGUST 21, 2020
Your team may have vital information, solutions, or ideas that would make a tremendous difference – if you only knew what they were thinking. In this episode, you’ll get a powerful tool to draw out your team’s best ideas. The post How to Draw Out Your Team’s Best Ideas appeared first on Let's Grow Leaders. Your team may have vital information, solutions, or ideas that would make a tremendous difference – if you only knew what they were thinking.
Agile Alliance
AUGUST 18, 2020
Welcome to a world where Modern Software Requirements are not only simple & intuitive, but also fun to create. You’ll end this session cum workshop with something which you’d like to try as soon as you go back to your work next week. User Stories were created as part of eXtreme Programming more than 20 … Continued.
CTOvision
AUGUST 20, 2020
Read Jeffrey N. Rosenthal and David J. Oberly’s article about how companies can combat insider threat through remote workers on Law: Insider threats—i.e., security risks originating from within an organization—have […].
Martin Fowler
AUGUST 20, 2020
When the state needs to be updated by multiple concurrent clients, we need it to be safely updated with one at a time changes. Generally locks are used to protect against concurrent modifications. But if the tasks being performed are time consuming, like writing to a file, blocking all the other calling threads until the task is completed can have severe impact on overall system throughput and latency.
Advertisement
Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.
OverOps
AUGUST 21, 2020
This is our definitive guide to where OverOps’ continuous reliability solution fits into your CI/CD pipeline. Confused about all the different vendors in our ecosystem? You’re not alone. The Cloud Native landscape contains over 1,400 projects and companies, and you literally have to zoom in to be able to see all the logos. So it’s no surprise that engineering teams are overwhelmed by vendor proliferation: Kid: I want a really difficult puzzle for my birthday Me: pic.twitter.com/y5dzjL6mIv
The Parallax
AUGUST 20, 2020
Hackers may be stereotyped as introverts, but at hacker conventions as big as DefCon to more local confabs, you’re almost certain to run across at least a few, and sometimes dozens, of hackers hunched over tables of metal locks and key cylinders, poking at their innards with thin metal picks and rakes. The art of lock-picking, many of them will tell you, is hacker philosophy made real, but the longtime hacker sport has faced an uncertain future since the coronavirus pandemic shuttered the
CTOvision
AUGUST 18, 2020
Read Derek Manky explain how companies can focus on threats using artificial intelligence on Dark Reading : Organizations that perform threat hunting or threat intelligence services should be aware of […].
TechBeacon
AUGUST 17, 2020
One in five of your customers and potential customers—nearly 20% of US citizens—have a physical or cognitive impairment. Are your applications meeting their accessibility needs?
Advertisement
Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.
Confluent
AUGUST 21, 2020
Apache Kafka® is one of the most popular event streaming systems. There are many ways to compare systems in this space, but one thing everyone cares about is performance. Kafka […].
The Parallax
AUGUST 20, 2020
Hackers may be stereotyped as introverts, but at hacker conventions as big as DefCon to more local confabs, you’re almost certain to run across at least a few, and sometimes dozens, of hackers hunched over tables of metal locks and key cylinders, poking at their innards with thin metal picks and rakes. The art of lock-picking, many of them will tell you, is hacker philosophy made real, but the longtime hacker sport has faced an uncertain future since the coronavirus pandemic shuttered the
CTOvision
AUGUST 18, 2020
Read Nallan Sriraman explain how data quality can enhance trust in artificial intelligence on Forbes : Companies now more than ever rely on data to create trustworthy insights to make […].
DevOps.com
AUGUST 20, 2020
A multi-cloud strategy offers the best possible scenario for ensuring business continuity and helping improve innovation Business problems are not “one size fits all,” and neither are cloud architectures. Organizations are looking for specific solutions that deliver on their bespoke needs—a driver for many of them shifting from one cloud provider to working with multiple […].
Advertisement
Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.
TechBeacon
AUGUST 18, 2020
One of the many technologies included under the umbrella of artificial intelligence, machine learning is defined by Wikipedia as "a field of computer science that gives computers the ability to learn without being explicitly programmed.".
David Walsh
AUGUST 18, 2020
When I wanted to refresh my React.js skills, I quickly moved to create a dashboard of cryptocurrencies, their prices, and and other aspects of digital value. Getting rolling with React.js is a breeze — create-react-app {name} and you’re off and running. Getting the API working isn’t quick, especially if they don’t accept cross-origin requests.
O'Reilly Media - Ideas
AUGUST 18, 2020
So you need to redesign your company’s data infrastructure. Do you buy a solution from a big integration company like IBM, Cloudera, or Amazon? Do you engage many small startups, each focused on one part of the problem? A little of both? We see trends shifting towards focused best-of-breed platforms. That is, products that are laser-focused on one aspect of the data science and machine learning workflows, in contrast to all-in-one platforms that attempt to solve the entire space of data workflow
DevOps.com
AUGUST 18, 2020
At organizations of all sizes, DevOps is becoming immensely popular to harmonize operations between IT and software development units. The digital world is progressing rapidly, and with that, the need to upgrade skills has become a necessity. Based on research from Allied Market, the DevOps market worldwide revenue was $3.36 billion in 2017 and is […].
Advertisement
“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.
TechBeacon
AUGUST 20, 2020
When cloud computing was new, questions swirled around the ability of cloud service providers to keep their infrastructure secure. As more and more businesses began migrating to the cloud, it became apparent that the major cloud service providers were better equipped than most organizations to secure their networks. But questions remain, and customers of cloud services continue to seek better ways to secure their data.
David Walsh
AUGUST 19, 2020
When experimenting with unicode property escapes, to identify accented letters in strings , it reminded me of a question I had a few years ago: what is the best way to identify and then replace emojis in a string? I first noticed this practice when using emojis in Facebook — sometimes Facebook would replace an emoji with one of their own custom images, likely because another device may not support that emoji.
Dzone - DevOps
AUGUST 21, 2020
In recent polls we’ve conducted with engineers and leaders, we’ve found that around 70% of participants used MTTA and MTTR as one of their main metrics. 20% of participants cited looking at planned versus unplanned work, and 10% said they currently look at no metrics. While MTTA and MTTR are good starting points, they're no longer enough. With the rise in complexity, it can be difficult to gain insights into your services’ operational health.
Let's personalize your content