Sat.Apr 16, 2022 - Fri.Apr 22, 2022

article thumbnail

Creating a data-powered culture

Capgemini

Data provides answers, but people drive change. “Culture eats strategy for breakfast.” The famous quote by Peter Drucker is a perfect call out here as no matter how detailed and solid your data-powered vision and strategy are if the people executing it don’t nurture the data culture then your journey is likely to fail. Becoming a data-driven organization isn’t just about data or technology, it is about transforming the way decisions are made based on deep analysis of facts rather than intu

Culture 98
article thumbnail

How DevSecOps Teams Can Level Up

DevOps.com

In 2019, I wrote a post detailing the traits of DevSecOps—the practice can be defined as the process of security automation in which IT and security are more de-siloed. DevSecOps introduces a more intentional culture wherein security-by-design principles are baked into the software development process early on. All in all, the aim is to have […].

Culture 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zambian card issuing startup Union54 raises $12M led by Tiger Global

TechCrunch

Zambian card issuing fintech Union54 has raised $12 million in a seed extension round led by Tiger Global. Other participating investors in this financing round include existing ones such as Vibe VC and new investors Earl Grey Capital and Packy Mccormick’s Not Boring Capital. It’s been only six months since Union54, whose API allows African software companies to issue and manage their debit cards without needing a bank or third-party processor, announced its seed round of $3 million,

Banking 343
article thumbnail

Protected: Lightning Talks: Your Chance to Share at Agile2022

Agile Alliance

There is no excerpt because this is a protected post. The post Protected: Lightning Talks: Your Chance to Share at Agile2022 first appeared on Agile Alliance.

Agile 242
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Three practices managers can use gamification to drive enterprise change

Xebia

Managers within enterprise organizations are a success factor for enterprise change (sources). However, they do find themselves on a challenging playing field. Part of this playing field is that they are both managing people while at the same time being managed themselves. Changing hard controls, such as reward schemes and changing the organization architecture, are not always available for managers as tools to achieve enterprise change.

More Trending

article thumbnail

AWS launches new $30M accelerator program aimed at minority founders

TechCrunch

Amazon Web Services (AWS) today launched a new program, AWS Impact Accelerator , that will give up to $30 million to early-stage startups led by Black, Latino, LGBTQIA+ and women founders. The Amazon company claims that the three-year initiative will help recipients build successful businesses while “accelerating” growth in their respective markets.

AWS 287
article thumbnail

Hunting Rootkits with eBPF: Detecting Linux Syscall Hooking Using Tracee

Aqua Security

Today, cloud native platforms are increasingly using eBPF-based security technology. It enables the monitoring and analysis of applications’ runtime behavior by creating safe hooks for tracing internal functions and capturing important data for forensic purposes. Tracee is an open source runtime security and forensics tool for Linux that is powered by eBPF and is more optimized for secure tracing.

Linux 142
article thumbnail

Never stop learning – Thoughts after four years with our epic team

Xebia

On New Year’s Eve, I raised a glass (the last one for January) on four fantastic years at Xpirit (Part of Xebia) On a regular basis, I validate what I’m doing, both personal and professional. There’s definitely going to be a five-year celebration. My job gets a solid 10 out of 10. Actually, the only situation that could make me hesitate would be the F1 Red Bull team offering me the same job.

Budget 130
article thumbnail

Checkmarx Finds Malicious Open Source PyPi Repository

DevOps.com

Checkmarx, a provider of a platform for testing application security, this week disclosed it has discovered a malicious instance of a PyPi repository for Python code that has been downloaded more than 70,000 times. Tzachi Zorenshtain, head of supply chain security, said this discovery represents another instance where cybercriminals have made available a malicious copy […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Why SaaS is bucking the venture slowdown

TechCrunch

As the global startup market digests a changing valuation environment and climate for venture investment, not every sector is taking the same amount of damage. One is indeed faring better than the rest. It’s not the flashiest sector in startupland. Instead, it’s the tried-and-true software-as-a-service (SaaS) category that appears to be in the best shape to fend off a slowdown in private-market investment.

Biotech 251
article thumbnail

Telco 5G Returns Will Come from Enterprise Data Solutions

Cloudera

This blog post was written by Dean Bubley , industry analyst, as a guest author for Cloudera. . Communications service providers (CSPs) are rethinking their approach to enterprise services in the era of advanced wireless connectivity and 5G networks, as well as with the continuing maturity of fibre and Software-Defined Wide Area Network (SD-WAN) portfolios. .

article thumbnail

React-native 0.68 with new architecture

Xebia

Since 2018 React Native team has been investing a lof of time and effort to re-build the current framework architecture. Last March 30, 2022 React Native version 0.68 was launched with a whole new main core implementation to get closer to Google Flutter framework. In this article I’ll try to keep things simple and explain the following main topics: Current architecture.

article thumbnail

Microsoft Taps vFunction to Refactor Java Apps for Azure

DevOps.com

Microsoft has teamed up with vFunction to make it easier to convert monolithic Java applications into a set of microservices that can be deployed on the Microsoft Azure cloud. The Microsoft Services Industry Solutions group is making available the Java Refactoring Service, through which IT teams will be able to both lift and shift Java […]. The post Microsoft Taps vFunction to Refactor Java Apps for Azure appeared first on DevOps.com.

Azure 133
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Manila-based MadEats is more than a ghost kitchen startup

TechCrunch

MadEats , Y Combinator alum, claims to be the first “‘full-stack’ delivery-only startup in the Philippines,” with their own virtual storefront, ghost kitchens and fleet of drivers. More than that, they also conceptualize and launch their own brands, making them a delivery-only restaurant group. The company announced today it has raised $1.7 million in seed funding led by JAM Fund, Crystal Towers Capital, Starling Ventures, MAIN and Rebel Fund.

article thumbnail

Open-source regulation—good idea?

TechBeacon

Earlier this year, the open-source community came under the scrutiny of a US Senate committee investigating a serious vulnerability in Log4j, a widely used, Java-based logging utility. Government experts say the vulnerability, called Log4Shell, was one of the most severe and widespread cybersecurity risks they've ever seen. The question is what to do now about security risks in open-source software—if anything.

article thumbnail

Understanding Your Options Following the Microsoft Program Changes

TechSoup

In April 2022, Microsoft took a major step in the direction of its cloud-first model for nonprofits , an effort to align Microsoft philanthropy efforts with the security and operational capabilities of cloud computing. Most donated, on-premises licenses were moved into discounted offers. It's the latest reason nonprofits are much better off moving to the cloud and leveraging its significant advantages.

Nonprofit 112
article thumbnail

Nurturing a Developer-Centric Culture

DevOps.com

The tech world is constantly, rapidly changing and many tech companies are growing up. They are adding to their product portfolios, increasing the number of employees, servicing more users, expanding global reach and more. Typically, when an organization grows up, it doesn’t happen overnight. It takes a lot of hard work, onboarding new talent and […].

Culture 131
article thumbnail

Monetizing Analytics Features

Think your customers will pay more for data visualizations in your application? Five years ago, they may have. But today, dashboards and visualizations have become table stakes. Turning analytics into a source of revenue means integrating advanced features in unique, hard-to-steal ways. Download this white paper to discover which features will differentiate your application and maximize the ROI of your analytics.

article thumbnail

UPSIDE Foods bites into $400M round to serve cultivated meat later this year

TechCrunch

We’ve heard a lot about foodtech companies introducing new types of food products to fill the gap in what is expected to be a global food shortage in the next 30 years. Much of the focus over the past six years or so was on the technology to create these new foods and not so much on how companies will make enough of it. Now we are seeing companies taking on the scalability of these products.

article thumbnail

How to close OSS attack vectors in your supply chain

TechBeacon

In a software supply chain attack, a bad actor makes a malicious modification to a software component in the supply chain. This later affects any other software that uses the malicious component as a dependency.

How To 121
article thumbnail

Leverage Docker to Produce Classic Deployment Artifacts

Dzone - DevOps

Traditionally, deployment artifacts were types of archives that were transferred to the target environment and installed there. They could be simple.zip archives with binaries, Java's.jar or.war files, or simply.exe executables, among others. It is worth saying that this approach implied preliminary preparation, like installing and configuring all software dependencies.

Training 111
article thumbnail

ForAllSecure Adds Free Testing Tools for OSS

DevOps.com

ForAllSecure is investing to make open source software (OSS) more secure and is making available free, personal-use versions of its Mayhem application security testing tools infused with artificial intelligence (AI) capabilities to anyone using GitHub repositories. Company CEO David Brumley said anyone who integrates Mayhem into a qualified GitHub repository being used to build open […].

Testing 126
article thumbnail

A Tale of Two Case Studies: Using LLMs in Production

Speaker: Tony Karrer, Ryan Barker, Grant Wiles, Zach Asman, & Mark Pace

Join our exclusive webinar with top industry visionaries, where we'll explore the latest innovations in Artificial Intelligence and the incredible potential of LLMs. We'll walk through two compelling case studies that showcase how AI is reimagining industries and revolutionizing the way we interact with technology. Some takeaways include: How to test and evaluate results 📊 Why confidence scoring matters 🔐 How to assess cost and quality 🤖 Cross-platform cost vs. quality tr

article thumbnail

Strike Security lands $5.4M seed funding to make pen testing more accessible

TechCrunch

Strike Security, a continuous penetration testing platform that combines automation with ethical hackers , has secured a $5.4 million seed investment to make bug hunting more accessible to small businesses. Santiago Rosenblatt, the 25-year-old founder and CEO of Strike , has already racked up two decades of cybersecurity experience. “I started hacking when I was six-and-a-half,” he tells TechCrunch.

Testing 248
article thumbnail

Article: Dynamic Value Stream Mapping to Help Increase Developer Productivity

InfoQ Culture Methods

We explore the value stream optimization technique that has proven useful across a number of industries yet is still emerging in the software field. Explore a number of dynamic value stream map practical cases, and see the industry differences in value stream usage between Lean and Agile By Pavel Azaletskiy.

article thumbnail

Escalation of Cybercrime-As-A-Service Has Major Ramifications

CEO Insider

As technology evolves, so does cybercrime. In fact, most people do not realize that today’s cybercriminals leverage the same technologies, business models, and service offerings that ordinary, non-criminal enterprises use. Similar to the software-as-a-service (SaaS) model where consumers access software and services in exchange for a monthly or recurring fee, the market for cybercrime-as-a-service (CaaS) […].

article thumbnail

SolarWinds Unveils Unified Observability Platform

DevOps.com

SolarWinds this week launched an observability platform that makes available a range of tools and technologies that the company has developed and acquired via a common user interface. Rohini Kasturi, chief product officer for SolarWinds, said the SolarWinds Hybrid Cloud Observability platform also makes an observability platform affordable for a much wider range of organizations. […].

Cloud 124
article thumbnail

Revolutionizing Contact Centers: Next-Gen Tech for Enhanced CX

Speaker: Liran Meir Frenkel, Performance Management and RPA Sr Product Marketing Manager at NICE; Harpreet Makan, Practice Director at Everest Group; & Santhosh Kumar, Practice Director at Everest Group

As contact centers navigate the challenges of delivering excellence within budget constraints and adapting to evolving employee expectations, optimizing agent tasks becomes crucial. Discover a holistic approach across three pillars - people, process, and technology - that is essential to excel in this dynamic landscape, and explore how next-gen technologies such as generative AI, performance analytics, and process intelligence play a pivotal role in transforming contact centers into advanced CX

article thumbnail

How Zenly made social maps cool again — and what’s next

TechCrunch

Zenly has always felt like the small social app that could become the next big thing. But it turns it Zenly is quietly becoming a social giant without anyone paying much attention — at least until now. Originally designed in Paris, the app was acquired by Snap back in 2017. But that acquisition was just the beginning of Zenly’s insane growth story. According to the company’s internal data, the app has now reached 35 million monthly active users.

Social 246
article thumbnail

2022 Cloud Native Threat Report: Key Trends in Cyber Attacks

Aqua Security

As companies continue to adopt cloud native technologies at a rapid pace, an increasing number of cyber threats are targeting the cloud native environment. To defend against these threats, security practitioners must stay abreast of attackers’ evolving tactics, techniques, and procedures. For its 2022 Cloud Native Threat report, Aqua’s Team Nautilus analyzed attacks that were observed in the wild over the past year to highlight the latest developments in the threat landscape.

Report 105
article thumbnail

Don’t Forget These Points in Your DevOps Transformation

Dzone - DevOps

DevOps is a working methodology widely used today, combining good development (Dev) and operations (Ops) practices to deliver value to customers continuously. Adopting this methodology generally requires a multi-level restructuring (human, process, and technological). To promote its adoption and implementation, it is essential to consider some crucial points in the DevOps transformation of your company.

DevOps 105