2023

article thumbnail

An example of LLM prompting for programming

Martin Fowler

A couple of weeks ago I watched a fascinating Zoom call hosted by Xu Hao , Thoughtworks's Head of Technology in China. He showed an example of how he uses ChatGPT to help him code in a self-testing style. His initial prompt primes the LLM with an implementation strategy (chain of thought prompting). His prompt also asks for an implementation plan rather than code (general knowledge prompting).

Examples 362
article thumbnail

There Is No Software Maintenance

Henrik Warne

Every time I hear about software maintenance as a distinct activity, I cringe. That’s because it is based on the outdated notion that first software is developed, then it is maintained. But that is not how software development works today. Software development does not have the two phases development and maintenance – it is a continuous process.

Software 317
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Navigate Workplace Conflict: 3 Powerful Phrases to Foster Better Connection

Let's Grow Leaders

Recognize the Humanity in Others as You Navigate Workplace Conflict To effectively navigate workplace conflict, prioritize connecting with the human at the center of it all. Begin by acknowledging the situation and expressing your optimism about finding a resolution collaboratively. Consider using these impactful phrases to start a conversation focused on empathy and understanding as you navigate workplace disagreements. 1.

Survey 228
article thumbnail

All the Hard Stuff Nobody Talks About when Building Products with LLMs

Honeycomb

Earlier this month, we released the first version of our new natural language querying interface , Query Assistant. People are using it in all kinds of interesting ways! We’ll have a post that really dives into that soon. However, I want to talk about something else first. There’s a lot of hype around AI, and in particular, Large Language Models (LLMs).

Windows 145
article thumbnail

Apache Cassandra® NoSQL for the Relational DBA

Unleash the power of NoSQL with "Apache Cassandra® NoSQL for the Relational DBA." Learn from Lewis DiFelice, an experienced Professional Services Consultant at Instaclustr, as he shares his journey transitioning from SQL to managing a 40-node Cassandra cluster. Gain insights into Cassandra's architecture, configuration strategies, and best practices.

article thumbnail

Nobl9 Adds Tools to Make SLO Queries More Efficient

DevOps.com

At its SLOconf event today, Nobl9 added a Query Tester tool that validates whether queries made against the data its service level objectives (SLO) management platform collects will deliver meaningful results. Nobl9’s SLO management platform collects data in real-time from data sources such as New Relic, Datadog and Dynatrace to help customers meet SLOs.

Tools 144

More Trending

article thumbnail

Migrating Critical Traffic At Scale with No Downtime?—?Part 1

Netflix Tech

Migrating Critical Traffic At Scale with No Downtime — Part 1 Shyam Gala , Javier Fernandez-Ivern , Anup Rokkam Pratap , Devang Shah Hundreds of millions of customers tune into Netflix every day, expecting an uninterrupted and immersive streaming experience. Behind the scenes, a myriad of systems and services are involved in orchestrating the product experience.

Testing 140
article thumbnail

Bot Experience Engineer Is the Sexiest Job of the Next 10 Years

Dataiku

Thirteen years ago, 14 months after Geoffrey Hinton’s seminal deep learning tech talk , Google Chief Economist Hal Varian said that statisticians would be the sexiest job in the next 10 years. He was right, although we call them data scientists rather than statisticians. A new foundational machine learning model — deep learning — created demand for a new role to train those models.

article thumbnail

How To Go About Getting That Next CIO Job

The Accidental Successful CIO

Things have changed and perhaps for the better Image Credit: Temping Agency London I’m pretty sure that we are all experienced at getting another job. Very few people rise up in a single company and become CIO. However, perhaps it has been a while since you last went through the process of finding another job. If the itch to move on has once again struck you, then you are going to have to realize that things have changed.

How To 145
article thumbnail

CircleCI incident report for January 4, 2023 security incident

CircleCI

On January 4, 2023, we alerted customers to a security incident. Today, we want to share with you what happened, what we’ve learned, and what our plans are to continuously improve our security posture for the future. We would like to thank our customers for your attention to rotating and revoking secrets, and apologize for any disruption this incident may have caused to your work.

Report 145
article thumbnail

Future Focus: Constructing Unshakeable Stability in Your Manufacturing Supply Chain

Speaker: Jay Black, Senior Account Executive

We’ve all heard the buzzwords to describe new supply chain trends: resiliency, sustainability, AI, machine learning. But what do these really mean today? Over the past few years, manufacturing has had to adapt to and overcome a wide variety of supply chain trends and disruptions to stay as stable as possible. Stability has become key in this post-COVID world, and will remain key moving forward.

article thumbnail

CorePlague: Severe Vulnerabilities in Jenkins Server Lead to RCE

Aqua Security

Aqua Nautilus researchers have discovered a chain of vulnerabilities, dubbed CorePlague , in the widely used Jenkins Server and Update Center (CVE-2023-27898, CVE-2023-27905). Exploiting these vulnerabilities could allow an unauthenticated attacker to execute arbitrary code on the victim's Jenkins server, potentially leading to a complete compromise of the Jenkins server.

Research 141
article thumbnail

Comparing Engagement on Twitter and the Fediverse

Martin Fowler

My colleague Julien Deswaef recently compared engagement data for my Twitter and Mastodon posts. From this we can see that boosts and comments are very similar. Twitter does get significantly more likes, but considering I have nearly 20 times more Twitter followers than Mastodon, it’s a remarkably small difference.

Data 358
article thumbnail

Algorithmic Trading: A Practitioner’s Guide

Henrik Warne

I really enjoyed reading Algorithmic Trading: A Practitioner’s Guide by Jeffrey M. Bacidore. Before starting, I imagined it would cover various strategies for trading in the markets, along the lines of “buy on this condition, sell on this condition” But that is not what this book covers. What trade to make is always a given, typically from a portfolio manager.

Examples 307
article thumbnail

How to Blur Faces in a Video from Command Line

David Walsh

Privacy is always incredibly important, especially with visual media where you may not have the permission of individuals in the video. If you’re filming something in public, it’s likely you’ll catch someone’s face who simply doesn’t want or need to be identified. This recently got me to thinking: what’s the easiest way to blur faces in a video via command line?

Video 134
article thumbnail

Finding The Application Modernization Strategy That Is Right For Your Business

As a business leader, you understand the importance of modernizing your applications. However, it can be difficult to find the right strategy. This whitepaper can help you modernize your apps without disrupting your business.

article thumbnail

Confluent + Immerok: Cloud Native Kafka Meets Cloud Native Flink

Confluent

Introducing fully managed Apache Kafka® + Flink for the most robust, cloud-native data streaming platform with stream processing, integration, and streaming analytics in one.

Cloud 145
article thumbnail

How to Choose an Observability Data Pipeline

DevOps.com

A complete full-stack observability platform combines data from multiple sources to gain holistic insights into system behavior. In fact, organizations without a full observability solution could find themselves facing departmental silos since teams with different data sources cannot share insights. While a key step in observability is the ability to combine logging data with metrics, […] The post How to Choose an Observability Data Pipeline appeared first on DevOps.com.

Data 135
article thumbnail

The Russification of Ukrainian IP Registration

Kentik

Last summer we teamed up with the New York Times to analyze the re-routing of internet service to Kherson, a region in southern Ukraine that was, at the time, under Russian occupation. In my accompanying blog post , I described how that development mirrored what took place following Russia’s annexation of Crimea in 2014. Along with the Russian-held parts of eastern Ukraine, these regions have experienced a type of Russification , an assimilation where the Ukrainian residents of these regions hav

Internet 144
article thumbnail

Deploying a Sitecore instance on a “local” Kubernetes (k8s) setup

Perficient

Have you ever wondered about having a local Sitecore instance on a local deployment of k8s? I was curious and decided to dive headfirst into the unknown world of k8s virtualization on a local setup. In this blog series I will be sharing the details my journey, my findings the mistakes/successes, and the final state of my discovery. The Idea Having experience with developing/deploying Sitecore with Docker Containers, I was curious as to the possibility of doing the same using Kubernetes.

Linux 142
article thumbnail

From Hadoop to Data Lakehouse

Getting off of Hadoop is a critical objective for organizations, with data executives well aware of the significant benefits of doing so. The problem is, there are few options available that minimize the risk to the business during the migration process and that’s one of the reasons why many organizations are still using Hadoop today. By migrating to the data lakehouse, you can get immediate benefits from day one using Dremio’s phased migration approach.

article thumbnail

CEOWORLD magazine elected Deepak Ohri and Dr. Amit Kailashchandra Lath to their Board of Directors.

CEO Insider

CEOWORLD Magazine has announced the appointment of new members to its board of directors and executive council. Lebua Hotels & Resorts founder and CEO Deepak Ohri and Sharda Group of Companies CEO Dr. Amit Kailashchandra Lath have been chosen to join the board of directors and the executive council of CEOWORLD magazine, according to an announcement […] The post CEOWORLD magazine elected Deepak Ohri and Dr.

Hotels 133
article thumbnail

Attack Surface Risk, Challenges and Changes

Palo Alto Networks

While digitization has simplified many organizational tasks, it has simultaneously made other facets of business more complex, including an ever-growing attack surface. As the number of connected devices and online services continues to grow, identifying all of these assets and potential vulnerabilities is a challenge. Implementing effective security measures becomes more difficult, especially if you are relying on manual inventory processes.

Cloud 128
article thumbnail

CircleCI security alert: Rotate any secrets stored in CircleCI

CircleCI

We wanted to make you aware that we are currently investigating a security incident, and that our investigation is ongoing. We will provide you updates about this incident, and our response, as they become available. At this point, we are confident that there are no unauthorized actors active in our systems; however, out of an abundance of caution, we want to ensure that all customers take certain preventative measures to protect your data as well.

System 145
article thumbnail

First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters

Aqua Security

We have recently discovered the first-ever evidence that attackers are exploiting Kubernetes (K8s) Role-Based Access Control (RBAC) in the wild to create backdoors. The attackers also deployed DaemonSets to take over and hijack resources of the K8s clusters they attack. Our research suggests that this campaign is actively targeting at least 60 clusters in the wild.

Resources 135
article thumbnail

Failed Feedback Loops: Restoring Customer and Internal Alignment

Speaker: Evan Leong - CEO & Founder, Product Signals

Problem management and product management go hand in hand. One of the best ways to handle product challenges is through customer feedback! As product managers, we know the importance of customer feedback. But with how important feedback is, why do most organizations either fail to collect it or collect it inappropriately? How do successful businesses like Apple and Amazon use customer and market feedback to improve their products despite having thousands of customers and receiving thousands of m

article thumbnail

Modularizing React Applications with Established UI Patterns

Martin Fowler

I've been working in front-end software for over three decades. A perennial problem has been mixing non-UI logic into the UI framework itself, leading to code that's both hard to understand and near-impossible to test. Despite being the hot new thing, React is just as vulnerable to this problem as Swing and Turbo Pascal. My colleague Juntao Qiu writes about how to untangle such a mess.

article thumbnail

Cybersecurity Snapshot: A ChatGPT Special Edition About What Matters Most to Cyber Pros

Tenable

Since ChatGPT’s release in November, the world has seemingly been on an “all day, every day” discussion about the generative AI chatbot’s impressive skills, evident limitations and potential to be used for good and evil. In this special edition, we highlight six things about ChatGPT that matter right now to cybersecurity practitioners. 1 - Don’t use ChatGPT for any critical cybersecurity work yet Despite exciting tests of ChatGPT for tasks such as finding coding errors and software vulnerabiliti

Malware 138
article thumbnail

Article: Start Your Architecture Modernization with Domain-Driven Discovery

InfoQ Culture Methods

Successful projects start with robust discovery. What if your project is modernizing your tangled old legacy system or migrating all your workloads to the cloud? This article presents a guided approach to starting your next architecture modernization project with a Domain-Driven Discovery (DDD), illustrated with a medical supply company that is migrating its core systems to the cloud.

article thumbnail

Confluent Will Beat Your Cost of Running Kafka (or $100 on us)

Confluent

Running Kafka is costly, but Confluent has created a far more efficient product to lower your costs. Join the Cost Savings challenge to see for yourself.

140
140
article thumbnail

The Definitive Guide to Dashboard Design

Dashboard design can mean the difference between users excitedly embracing your product or ignoring it altogether. Great dashboards lead to richer user experiences and significant return on investment (ROI), while poorly designed dashboards distract users, suppress adoption, and can even tarnish your project or brand. That’s one of the many reasons we wrote The Definitive Guide to Dashboard Design—to help you avoid common pitfalls, including… Cramming too much onto one screen and expecting the u

article thumbnail

What’s the Difference Between DevOps and Platform Engineering?

DevOps.com

The DevOps space is buzzing with a new trend—platform engineering. Platform engineering has been gaining steam over the last few years but has really peaked in interest lately. In fact, according to a study conducted by Puppet Labs, 51% of organizations have adopted platform engineering or plan to do so in the next year. But […] The post What’s the Difference Between DevOps and Platform Engineering?

DevOps 138
article thumbnail

New Year, New BGP Leaks

Kentik

Only two days into the new year, and we had our first BGP routing leak. It was followed by a couple more in subsequent days. Although these incidents were brief with marginal operational impact on the internet, they are still worth analyzing because they shed light on the cracks in the internet’s routing system. In this blog post, I’m going to use some of Kentik’s unique capabilities to take a look at what happened, what the impacts were, and what might prevent these in the future.

Internet 145
article thumbnail

4 Data Privacy Compliance Articles You Should Read

TechBeacon

It's Data Privacy Week 2023! The purpose of this annual campaign by the National Cybersecurity Alliance (NCSA) is twofold: (1) to educate consumers on how to best protect their personal information and (2) to nudge businesses into adopting best practices for data privacy and data protection.