Sat.Jan 16, 2021 - Fri.Jan 22, 2021

From Build to Run: Pointers on Secure Deployment

Xebia

Our experience with resources on secure deployment Have you ever searched for resources on “Secure Software Deployment”? Most of the results revolve around the pentesting or putting security tools in your CI/CD pipeline.

Building a Machine Learning Application With Cloudera Data Science Workbench And Operational Database, Part 3: Productionization of ML models

Cloudera

In this last installment, we’ll discuss a demo application that uses PySpark.ML to make a classification model based off of training data stored in both Cloudera’s Operational Database (powered by Apache HBase) and Apache HDFS.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Inside The Mind Of A Data Scientist

Hacker Earth Developers Blog

Problem: There’s a port somewhere in the world that wants to maximize profits. Approach: Said port hires a data scientist to look at the numerous variables affecting ship movement and operational efficiency. All factors that affect profitability in the long run.

Data 130

Distributed Systems Pattern: State Watch

Martin Fowler

Clients are interested in changes to the specific values on the server. It's difficult for clients to structure their logic if they need to poll the server continuously to look for changes. If clients open too many connections to the server for watching changes, it can overwhelm the server. more….

System 233

Deliver Effective Online Education and Events Your Members Will Love

This guide identifies the biggest challenges for associations moving their training online and provides practical solutions so that you can hit the ground running. Download now to keep your members engaged and growing even in times of COVID-19.

How to Keep Your Software Safe From DLL Hijacking

The Crazy Programmer

For years, technology enthusiasts have used tools such as extreme injector to create DLL libraries to carry out specific jobs or processes. The main purpose of these types of libraries is to hijack the software it is being used on.

More Trending

Facilitating Retrospective in the Prison

Scrum.org

Remember the good old check-in activity for retrospectives called ESVP – Explorer, Shopper, Vacationer, Prisoner? I couldn’t imagine that “Prisoner” would become so literal for me - until I found myself in a real prison facilitating a Retrospective for a group of my cellmates, political prisoners.

Games 190

Zero-day black market shifting from selling vulnerabilities to access

The Parallax

One of the software success stories of the Covid-19 pandemic era has been that of videoconferencing service Zoom.

Mind the (skills) gap: Cybersecurity talent pool must expand to take advantage of quantum computing opportunities

CTOvision

The “second age” of quantum computing is poised to bring a wealth of new opportunities to the cybersecurity industry – but in order to take full advantage of these benefits, […]. News QuintessenceLabs

What’s New For Agile2021

Agile Alliance

If you’ve been to an Agile20XX event before, you know it’s an amazing conference where people from all over the world come together to discuss the latest in all things Agile — ranging from technical to management topics and everything in between.

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

22 Scrum Master Anti-Patterns from Job Ads: From Funny to What the Heck?

Scrum.org

TL; DR: Scrum Master Anti-Patterns from Job Ads. Job ads for Scrum Master positions reveal great insight into an organization’s progress on becoming agile. I analyzed more than 50 job ads for Scrum Master positions to gain these.

SCRUM 184

4 Ways to Scale DevOps in 2021

DevOps.com

January is a month often dedicated to planning, setting intentions and preparing ourselves professionally and personally for a fresh year. In my own capacity as a DevOps and SRE leader, many of the clients I work with will reinvigorate internal efforts to streamline how they work in Q1.

DevOps 114

Seven Legal Questions for Data Scientists

O'Reilly Media - Ideas

“[T]he threats to consumers arising from data abuse, including those posed by algorithmic harms, are mounting and urgent.” FTC Commissioner Rebecca K. Slaughter.

Data 107

Palantir Announces Demo Day To Be Held 26 Jan 2021

CTOvision

I’ve been treated to demos of Palantir since their earliest days and watched them bring things to market that no other organization could do. The capabilities they deliver are unique […]. CTO News Palantir

Realizing the Benefits of Automated Machine Learning

How are organizations using machine learning and artificial intelligence (AI) to derive business value? Renowned author and professor Tom Davenport explains the rise of automated machine learning, its benefits, and success stories from businesses that are already using it.

YDS: What Does a Scrum Master Do on Day One?

Scrum.org

On today’s episode of YOUR DAILY SCRUM: What does a Scrum Master do on day one? You're just starting a new Scrum Master role, and you see many opportunities to change and improve things. With so many options, it's hard to know where to begin.

SCRUM 175

How MLOps Can Help Get AI Projects to Deployment

DevOps.com

Did you know that most AI projects never get fully deployed? In fact, a recent survey by NewVantage Partners revealed that only 15% of leading enterprises have gotten any AI into production at all.

Survey 110

Digital Transformation is a Data Journey From Edge to Insight

Cloudera

Digital transformation is a hot topic for all markets and industries as it’s delivering value with explosive growth rates.

Data 98

Learning From Leaders: The OODA Loop Member Profile Series

CTOvision

One of my great joys of being the CTO at OODA is being able to continuously learn from a community that includes our own analysts and researchers but also a […].

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Fix Your Boring Daily Scrums

Scrum.org

Imagine Developers arriving at the Daily Scrum feeling like they want the monotony of it to end. They wish they hadn't had to bother to attend in the first place.

SCRUM 174

Enterprise Software Development Will Break the Speed Limit in 2021

DevOps.com

For some, 2020 was the year for software development speed … but not for everyone. Startups and SMEs climbed on board the CI/CD, shift-left and agile development train en masse – and reaped the benefits of faster iterations and tighter release schedules.

DNSpooq: Seven Vulnerabilities Identified in dnsmasq

Tenable

Researchers identify seven vulnerabilities in popular Domain Name System software. Background. On January 19, researchers from the JSOF Research lab disclosed seven vulnerabilities in dnsmasq , a widely used open-source application for network infrastructure.

LAN 87

Carahsoft to Bring Broadcom Cybersecurity Products to Public Sector

CTOvision

Carahsoft Technology will continue to market Broadcom’s application development and management tools and security offerings to public sector customers under a new global cybersecurity aggregator agreement between the companies. As Broadcom’s […]. News Broadcom Broadcom Inc. Carahsoft

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

YDS: How Do I Get Scrum Master Experience?

Scrum.org

On today's episode of YOUR DAILY SCRUM: How Do I Get Scrum Master Experience? A listener asked Todd and Ryan how to get Scrum Master experience after getting certified as a Professional Scrum Master.

SCRUM 150

Meme

DevOps.com

The post Meme appeared first on DevOps.com. Blogs ROELBOB a little humor can go a long way humor parody satire

95

Fostering community to help drive cultural change

Cloudera

2020 put on full display how humanity shows up in times of hardship. We saw everything from street celebrations to usher weary medical personnel home after long days fighting to save lives to places like food banks receiving more donations and volunteers than ever before.

GitHub’s head of HR resigns in light of termination of Jewish employee

CTOvision

A GitHub internal investigation has revealed the company made “significant errors of judgment and procedure” in the firing of the Jewish employee who cautioned his coworkers about the presence of […]. News GitHub

What is Contextual Analytics? The Next Evolution of Embedded Analytics

Download this white paper to learn what contextual analytics is, how BI platforms like Yellowfin revolutionize the way users discover insights from their data with native contextual analytics, and how it adds value to your software solution by elevating the user experience.

YDS: Can You Have Too Many Product Backlog Items?

Scrum.org

On today’s episode of YOUR DAILY SCRUM: Can you have too many Product Backlog Items? This comes up in our Product Owner class quite a bit. The short answer is: YES! But there are some ideas that we need to explore so that your Product Backlog is well understood and actionable.

SCRUM 148

Meet the Winners of the 2020 DevOps Dozen² Awards

DevOps.com

This is the moment you have all been waiting for. It is time to announce the honorees for the 2020 DevOps Dozen² Awards, and we couldn’t be more excited to share the names of the most outstanding leaders and tools in the DevOps community.

Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their Parts

Tenable

With the rise of daisy-chained cyberattacks, security teams must consider the contextual risk of each vulnerability, including its potential to be leveraged in a full system compromise. Faced with limited time and resources, every security team must prioritize threats.