2017

Make a resolution to clean up your digital act? Here’s how

The Parallax

Did you get hacked in 2017? Chances are you did, thanks to Equifax’s inability to protect the data of more than 143 million of its customers. As a result, you might be feeling frustrated, vulnerable, even angry—not exactly a positive way to ring in the new year.

Benefits of Continuous Delivery

Henrik Warne

During my career as a software developer, I have seen the release frequency increasing steadily. When I started, it would take 12 to 18 months for new features to reach the customer. Years later the frequency increased, so deployment to production happened every three weeks.

The eigenvector of "Why we moved from language X to language Y"

Erik Bernhardsson

I was reading yet another blog post titled “Why our team moved from to ” (I forgot which one) and I started wondering if you can generalize it a bit. Is it possible to generate a N * N contingency table of moving from language X to language Y? Someone should make a N*N contingency table of all engineering blog posts titled "Why we moved from to " — Erik Bernhardsson (@fulhack) January 25, 2017. So I wrote a script for it.

The Rise of Test Impact Analysis

Martin Fowler

Paul Hammant shines a light on Test Impact Analysis: a modern way of speeding up the test automation phase of a build. It works by analyzing the call-graph of the source code to work out which tests should be run after a change to production code. Microsoft has done some extensive work on this approach, but it's also possible for development teams to implement something useful quite cheaply.

The 5 Levels of Analytics Maturity

Basic dashboards used to be enough to thrill end users. But over time, modern capabilities have emerged—and bare-minimum features are no longer cutting it. How have analytics changed? And where do your BI offerings fall? Find out sophisticated ways to future-proof your application. Brought to you by Logi Analytics.

Password Rules Are B t

Coding Horror

Of the many, many, many bad things about passwords , you know what the worst is? Password rules. If we don't solve the password problem for users in my lifetime I am gonna haunt you from beyond the grave as a ghost pic.twitter.com/Tf9EnwgoZv — Jeff Atwood (@codinghorror) August 11, 2015.

More Trending

The Cost Center Trap

LeanEssays

In the 1960’s, IT was largely an in-house back-office function focused on process automation and cost reduction. Today, IT plays a significant strategic and revenue role in most companies, and is deeply integrated with business functions.

Why The Right Change Often Feels Wrong

Scott Berkun

On Tuesdays I write about the top voted question on Ask Berkun (see the lovely archive ). This week’s question came from J.R. via email]: What is a favorite theory that you wish more people understood? A favorite theory I wish was more well known is the Satir Change Model.

Continuous Delusion at the Infrastructure Layer

CloudScaling

In the DevOps mythos or worldview, continuous delivery (“CD”) is considered one of the holy mantras. Unfortunately, many take CD to an extreme that is unwarranted and not even reflected in how the DevOps originators (e.g. Amazon, Google) operate.

Hadoop Delegation Tokens Explained

Cloudera Engineering

Apache Hadoop’s security was designed and implemented around 2009, and has been stabilizing since then. However, due to a lack of documentation around this area, it’s hard to understand or debug when problems arise.

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

5 Cybersecurity Need-to-Knows When Preventing Expensive Data Breaches

CTOvision

Carol M. Evenson. Security breaches can happen to any organization. As more and more companies utilize mobile technology to access and connect with resources the threat of a security breach increases exponentially.

2017 in cybersecurity and privacy news

The Parallax

From rampant ransomware to the Equifax breach to geopolitical machinations, it’s hard not to be a cynic about the past 12 months of security and privacy news. But a few important highlights might help convince you not to throw your phone and laptop into the nearest trash fire.

Programming for Grade 8

Henrik Warne

For the past two months, I have been helping my son’s grade 8 class to learn to program. All students wrote Python programs and got a feel for what programming is. This post has details on how we organized the course, code examples and lessons learned. Background.

Language pitch

Erik Bernhardsson

Here’s a fun analysis that I did of the pitch (aka. frequency) of various languages. Certain languages are simply pronounced with lower or higher pitch. Whether this is a feature of the language or more a cultural thing is a good question, but there are some substantial differences between languages. Hertz (or Hz, or ), is the standard way to measure audio frequency. Typical human speech ranges between 50 Hz and 300 Hz. Most men typically range between 85-180Hz, and most women between 165-255Hz.

5 Early Indicators Your Embedded Analytics Will Fail

Many application teams leave embedded analytics to languish until something—an unhappy customer, plummeting revenue, a spike in customer churn—demands change. But by then, it may be too late. In this White Paper, Logi Analytics has identified 5 tell-tale signs your project is moving from “nice to have” to “needed yesterday.". Brought to you by Logi Analytics.

Roy sells ThoughtWorks to Apax

Martin Fowler

ThoughtWorks, my employer, had some big news to share today. Our founder and owner, Roy Singham, has decided to sell ThoughtWorks to Apax - a private equity firm based in London. Apax wishes the current management team to continue running and growing ThoughtWorks, using the same model that's driven our growth and success for the last twenty-odd years.

195
195

I'm Loyal to Nothing Except the Dream

Coding Horror

There is much I take for granted in my life, and the normal functioning of American government is one of those things. In my 46 years, I've lived under nine different presidents. The first I remember is Carter.

CIOs Start To Become More Important

The Accidental Successful CIO

Companies are starting to realize the value of their CIOs Image Credit: las – initially. The importance of a CIO can be measured in a number of different ways. One such way is how often the CEO seeks out the CIO for consultation.

Budget 121

The End of Enterprise IT

LeanEssays

Two years ago, the employees at ING Netherlands headquarters – over 3,000 people from marketing, product management, channel management, and IT development – were told that their jobs had disappeared. Their old departments would no longer exist; small squads would replace them, each with end-to-end responsibility for making an impact on a focused area of the business. Existing employees would fill the new jobs, but they needed to apply for the positions. [1]

Why “Build or Buy?” Is the Wrong Question for Analytics

Every time an application team gets caught up in the “build vs buy” debate, it stalls projects and delays time to revenue. There is a third option. Partnering with an analytics development platform gives you the freedom to customize a solution without the risks and long-term costs of building your own. Learn when and why it makes sense to build, buy, or take a combined approach to embedded BI. Brought to you by Logi Analytics.

Why Remote Workers Fail

Scott Berkun

[On Tuesdays I write about the top voted question on Ask Berkun (see the archive ). This week’s question is from Regina [330 votes]: What gaps in communication exist in global virtual teams? Which I have simplified for your reading pleasure to why remote workers fail. ].

*aaS Backwards: Services as a Platform

CloudScaling

Semantics. You can’t get away from them. Any good argument worth having is full of nuance, articulated largely through differences in definitions. When there is no disagreement, like “alternative facts aren’t facts”, semantics don’t matter, because we all know it is just spin.

AWS 93

Performance comparison of different file formats and storage engines in the Apache Hadoop ecosystem

Cloudera Engineering

Zbigniew Baranowski is a database systems specialist and a member of a group which provides and supports central database and Hadoop-based services at CERN. This blog was originally released on CERN’s “Databases at CERN” blog, and is syndicated here with CERN’s permission. TOPIC.

3 Ways to Mitigate Insider Threat Risk Prior to an Employee’s Departure

CTOvision

We are seeing a disturbing insider threat trend impacting operations and causing reputational harm in the days leading up to an employee’s departure from an organization. For example, last week a Twitter employee deleted President’s Trump’s Twitter account prior to leaving the premises on his last day of employment. In September, a contractor was convicted […]. CTO Cyber Security News Cognitio

New Study: 2018 State of Embedded Analytics Report

Why do some embedded analytics projects succeed while others fail? We surveyed 500+ application teams embedding analytics to find out which analytics features actually move the needle. Read the 6th annual State of Embedded Analytics Report to discover new best practices. Brought to you by Logi Analytics.

Hackable software in the driver’s seat

The Parallax

SAN FRANCISCO—Cars and computers have an increasingly close yet complicated friendship. Specialized software now connects to everything from the brakes to the steering wheel to the door locks to the radio. And in newer models, it likely connects to the Internet too.

More Good Programming Quotes, Part 2

Henrik Warne

A good programming quote captures an insight about programming, often in a funny way. Many quotes are quite famous, but I like ones that are a bit less well-know. A while ago, I listed some favorites. Here are more good quotes I have found since then. Enjoy! Programming.

Learning from users faster using machine learning

Erik Bernhardsson

I had an interesting idea a few weeks ago, best explained through an example. Let’s say you’re running an e-commerce site (I kind of do ) and you want to optimize the number of purchases. Let’s also say we try to learn as much as we can from users, both using A/B tests but also using just basic slicing and dicing of the data. We are looking at how many people convert (buy our widgets) but a constant problem is there’s just too much uncertainty. How can we learn faster?

FAQ for Product-Mode Thinking

Martin Fowler

Sriram has added a FAQ to address the common questions he runs into from people learning about using products rather than projects to organize software development efforts.

The Complete Predictive Analytics Lifecycle for Application Teams

Speaker: Sriram Parthasarathy, Senior Director of Predictive Analytics, Logi Analytics

Applications with predictive analytics are able to deliver massive value to end users. But what steps should product managers take to add predictive analytics to their applications? In this webinar, we’ll walk through an end-to-end lifecycle of embedding predictive analytics inside an application. Find out how a real-world application decided what predictive questions to ask, sourced the right data, organized resources, built models, deployed predictive analytics in production, and monitored model performance over time.

To Serve Man, with Software

Coding Horror

I didn't choose to be a programmer. Somehow, it seemed, the computers chose me. For a long time, that was fine, that was enough; that was all I needed. But along the way I never felt that being a programmer was this unambiguously great-for-everyone career field with zero downsides.

The Beginning of a New Work Adventure – Joining panagenda!

elsua: The Knowledge Management Blog

. On January 20th, it will mark the 20th year anniversary since I started working in the IT industry. A lot has happened over the course of the last two decades both on a personal and work levels, as you can imagine, and, yet, it feels as if it was just yesterday.

Vulnerability vs. risk: Knowing the difference improves security

Kacy Zurkus - CSO Online

The future leaders of cybersecurity will be fluent in languages other than technology and will stop using fear to conflate the message of vulnerability versus risk. That’s the message that kicked off this year's (ISC)2 Security Congress conference. Donald Freese, deputy assistant director at the FBI, and Brandon Dunlap, managing director at Brightfly, talked about the difference between vulnerability and risk as they relate to leadership.