Sat.Apr 06, 2019 - Fri.Apr 12, 2019

article thumbnail

An Attempted Breach from the Attacker’s Point of View

Edgewise

Today’s news is full of data breaches and security incidents. What was once only of interest to a small portion of the technical world is now attracting more attention and questions from the non-technical population of the world. I first realized that times had changed when family members who had previously been adamantly uninterested in technology started asking me questions about a data breach they’d heard about through mass media.

Network 75
article thumbnail

A simple, effective test automation strategy

Xebia

In my whitepaper I wrote about different types of testing and what to consider when choosing a test automation strategy. More than a few readers asked how to put this advice into practice, and a good friend inspired me to write another blog post about it. DevOps teams automate everything. When you’re getting started with test automation, it’s […].

Testing 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

11 business intelligence certifications to advance your BI career

CIO

With data increasingly vital to business success, business intelligence (BI) continues to grow in importance. With a strong BI strategy and team, organizations can perform the kinds of analysis of business information necessary to help users make data-driven business decisions. BI encompasses numerous roles. BI analysts, with an average salary of $66,791 per year according to PayScale, provide application analysis and data modeling design for centralized data warehouses and extract data from dat

article thumbnail

Passing execution context to domain probes

Martin Fowler

Calls to instrumentation require various bits of execution context. Pete extends his discussion of domain probes to show how factory functions help simplify the data plumbing. more….

Data 263
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Agile Software Development Mistakes to Avoid

The Crazy Programmer

According to a survey taken of the Scrum Alliance, approximately 70 percent of all groups handling Agile software development believe there are issues present between various internal departments within the company. The fact is, Agile groups work at a much faster pace. In order to mark progress, they use various markets, and in some cases, this puts staff members in direct conflict with each other.

More Trending

article thumbnail

7 Can’t-Miss Topics to Explore at DevOps Days Seattle This April

OverOps

Along with sunny skies and fresh blooms, April will see DevOps Days returning to the heart of Downtown Seattle for the fourth consecutive year. This worldwide, community-based technical conference series has been organized by local volunteers since 2009. Seattle’s conference will feature two days of jam-packed info, curated talks and self-organized conversations spanning April 23-24.

DevOps 100
article thumbnail

Other implementations for domain-oriented observability

Martin Fowler

Pete completes his discussion of domain-oriented observability by comparing domain probes to using events and aspect-oriented programming. more….

article thumbnail

Difference between Primary Key and Foreign Key

The Crazy Programmer

A “key” is one of the most basic and important concepts of the Database Management System (DBMS); the keys helps us work easily with the records and the tables in our database by providing us with the ease of accessing and retrieving the data from the table. A primary key is the first key to be understood as it uniquely identifies the particular record of any table.

Examples 113
article thumbnail

How to Manage the Most Difficult Stakeholders

Let's Grow Leaders

Difficult stakeholders are a chance to grow your influence You look at the phone and your heart sinks. It’s the night before you’re supposed to wrap up your assignment and brief the leadership team on what you’ve done. It’s Bruce, a charismatic […]. The post How to Manage the Most Difficult Stakeholders appeared first on Let's Grow Leaders.

How To 167
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

5 DevOps Trends Worth Knowing in 2019

DevOps.com

DevOps today is more than the buzzword it was 10 years ago. Back then, the idea of combining development with production in your IT infrastructure was not common; the logistics were nonexistent and most of the time businesses decided it was far too much effort. However, if the last nine years has taught us anything, […]. The post 5 DevOps Trends Worth Knowing in 2019 appeared first on DevOps.com.

Trends 111
article thumbnail

Lamenting the passing of the Golden Age of presentation visuals

Martin Fowler

For a few years it was easy to give a talk with a visual accompaniment driven by my laptop next to me. But recently it's getting harder to do this, making me wonder if I should continue designing visuals at all.

172
172
article thumbnail

Why Less Communication is Better!

scruminc

“People were saying that groups needed to communicate more. Jeff (Bezos) got up and said, ‘No, communication is terrible!’” Alan Deutschman, 1 Aug 2014, Fast Company. The reason for this is that more communication doesn’t scale while just enough communication is essential to high performance of a team and particular teams of teams. More meetings and more reports cause higher decision latency, the primary cause of project failure.

SCRUM 111
article thumbnail

Leadership Formula for Sustained Results

Let's Grow Leaders

The four-step cadence that forms the backbone of your leadership credibility, influence, and keeps you and your team focused on results. The post Leadership Formula for Sustained Results appeared first on Let's Grow Leaders. The four-step cadence that forms the backbone of your leadership credibility, influence, and keeps you and your team focused on results.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Digital Transformation: Coming from Behind

DevOps.com

For many years, enterprises have been in a race to digitally transform how they work through the digitization of all areas of their business, to reduce costs and business frictions through creating efficiencies and delivering increased value to their customers. While many organizations have attempted a transformation, few have been successful. Research from the consultancy […].

article thumbnail

Is Your Business Ready for the Internet of Things?

CTOvision

Read why Aviva Leebow Wolmer says that adopting the Internet of Things is must for businesses on Entrepreneur : Ten years ago, it would have been strange to stand alone in a room and tell that someone named “Alexa” to order pizza — but today, most of us take in stride the virtual assistance that […].

Internet 101
article thumbnail

Open FaceTime Call from Command Line

David Walsh

Communication tools are always associated with UIs, and for good reason — if you want communication to be easy and intuitive, you need easy and intuitive interfaces. We need communication tools to provide the lowest barrier of entry, since not all users will be tech savvy. For tech experts like us, however, we love command line tools to automate just about everything.

Tools 108
article thumbnail

Partners in Design – A Guide to Client Empathy

Toptal

Being empathetic is not a selective practice. Designers know how to use empathy to uncover the behaviors and needs of a user. Those same methods and techniques can be used in client relationships.

How To 108
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Autonomous Testing’s Role in Agile DevOps

DevOps.com

DevOps testing, as an Agile methodology, is key to delivering testing and integration on a continuous basis, including continuous feedback, to enable better collaboration and quality. For too long, testing has progressed by small incremental steps, creating a quality assurance (QA) winter. We think it’s time for a revolution, so we have written and published […].

Agile 110
article thumbnail

The decentralised Web 3.0: How would the DWeb work?

CTOvision

Have you recently considered deleting your Facebook account, boycotting Amazon or trying to find an alternative to Google? You wouldn’t be alone. The tech giants are invading our privacy, misusing our data, strangling economic growth and helping governments spy on us. Yet because these few companies own so many of the internet’s key services, it […].

article thumbnail

Big Data & AI News | Google Cloud Next 19 | Day Two Recap

Linux Academy

Greetings one and all! Joe Lowery here, Google Cloud Training Architect, bringing you the news from the Day 2 Keynote at the Google Cloud Next ’19 conference in San Francisco. Today’s keynote presentation was jam-packed with tons of announcements and I’m happy to break it all down for you. Traffic Director. After a quick recap of Day 1, highlighting the release of Anthos (covered in our recent blog post by colleague Matt Ulasien), the “just released” proclamations came fast and furiously.

article thumbnail

The Future of Serverless is … Functionless?

Stackery

I’m in a position where I converse with our customers and cloud service providers, and I keep track of conversations happening through blogs and social media. I then sift through all this data to identify patterns and trends. Lately, I’ve seen some talk about an architectural pattern that I believe will become prevalent in the near future. I first heard about this pattern a few years ago at a ServerlessConf from a consultant who was helping a “big bank” convert to serverless.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

CloudBees Allies with Atos to Accelerate DevOps Adoption

DevOps.com

In a move that should accelerate adoption of best DevOps practices in the enterprise, CloudBees and Atos announced this week that the two are collaborating to advance adoption of continuous integration/continuous development (CI/CD) platforms on the Google public cloud. Announced at the Google Cloud Next 2019 conference, the alliance will result in the IT services […].

DevOps 107
article thumbnail

Yahoo data breach settlement effort reaches $117.5 million

CTOvision

Yahoo has once again attempted to settle a class-action lawsuit involving millions of users following one of the largest data breaches in history with a revised settlement figure of $117.5 million. On Tuesday, the proposed resolution to the lawsuit was made public. The revised figure of $117.5 million has been made in response to criticism made […].

Data 97
article thumbnail

An IDEA is Born: CableLabs Heads Up New Alliance That Will Bring Holodecks Into Your Living Room

CableLabs

CableLabs has joined forces with top players in cutting-edge media technology—Charter Communications, Light Field Lab, OTOY and Visby—to form the Immersive Digital Experiences Alliance (IDEA). Chaired by CableLabs’ Principal Architect and Futurist, Arianne Hinds , the alliance aims to facilitate the development of an end-to-end ecosystem for immersive media, including VR, AR, stereoscopic 3D and the much-talked-about light field holodeck, by creating a suite of display-agnostic, royalty-free spe

VR 104
article thumbnail

Angular Components 101 — an Overview

Toptal

While components have been available in Angular since the beginning, they’re still easy to mess up with common mistakes like people not using them at all, creating components instead of attribute directives, and more. In this article, Toptal Freelance JavaScript Developer Valters Valdersteins differentiates the correct and incorrect ways to use Angular components and illustrates them with examples.

Examples 104
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Modernize Mainframe Applications

DevOps.com

It’s easy to understand the current disillusionment around the term “digital transformation,” as it has been thrown around vaguely as the ultimate answer to business innovation without much recognition of the nuances of technological change. When it comes to mainframe systems, the issue here most likely can be traced back to the word “transformation.

article thumbnail

Insights for your enterprise approach to AI and ML ethics: Advice for the C-Suite

CTOvision

This post is the third in a series of three based on interviews of Courtney Bowman and Anthony Bak of Palantir. The first post laid a foundation which can help any organization seeking to establish an ethics policy and program around AI and ML. The second post picked up from there and dove into the […].

article thumbnail

Fintech fiddles as home burns: 97% of apps found insecure

TechBeacon

This is not fine. A white-hat researcher examined 30 financial apps, looking for information security issues—worryingly, all but one of them were insecure.

Fintech 110