Wed.Jan 23, 2019

Why Alert Fatigue Remains a Database Performance Threat

The Crazy Programmer

Unlike a decade ago, databases have become more complex than before, but so have the means to spot performance issues evolved.

Agile Q&A: Team Qualities

Agile Alliance

I recently received a question about the basic qualities Agile teams should have via the website. I replied with a reader’s digest version to the requester and promised a more complete answer in a blog post. Here’s that more complete answer. Basic qualities for an Agile team What are basic qualities should Agile teams have? … Continued. People agile teams


CTOvision Publisher Bob Gourley on Risks of Unsecure Artificial Intelligence Technology


The risks of non-secure AI are growing. Security for AI needs to include concepts from traditional IT security but the nature of new machine learning methods and architectures brings new risks and therefore a need for new solutions. Francis Rose of Govmatters.TV interviewed Bob Gourley of OODA LLC on what is similar and different about […]. Artificial Intelligence CTO News

Creating strong passwords: why it’s vital and how to do it.


Have you been pwned? Creating strong passwords: why it’s vital and how to do it. Infosec researcher Troy Hunt has revealed last week that 773 million email addresses have been shared in a “a popular hacker forum” – along with a very large number of plain text passwords.

The 5 Levels of Analytics Maturity

Basic dashboards used to be enough to thrill end users. But over time, modern capabilities have emerged—and bare-minimum features are no longer cutting it. How have analytics changed? And where do your BI offerings fall? Find out sophisticated ways to future-proof your application. Brought to you by Logi Analytics.

AppDynamics Applies AIOps to Automate IT

AppDynamics, a unit of Cisco, today announced it is melding the worlds of AIOps and application performance management (APM) with the launch of Cognition Engine.

More Trending

Identifying Cloud Migraines Before Cloud Migration: 6 Tips

Migrating to the cloud isn’t as simple as signing up for a SaaS application or deploying applications on a cloud infrastructure or platform; there are other factors at play.

Cloud 68

Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords


A little over two weeks have passed since we celebrated New Year without having to hear about a data breach in progress. The wait is finally over. In what’s being called the largest data breach literally ever, which in an era where data breaches are almost commonplace really means something, we have a breach that leaked almost […].


Top websites to follow

I'm Programmer

Here are list of top websites to follow and keep updated yourself. We hope you will enjoy it. Business & Startups.

B2B 52

Trojan malware is back and it’s the biggest hacking threat to your business


Trojan malware attacks against business targets have rocketed in the last year, as cybercriminals alter their tactics away from short-term gain and in-your-face ransomware attacks towards more subtle, long-term campaigns with the aim of stealing information including banking information, personal data, and even intellectual property. Figures from security company Malwarebytes Labs in a new report suggest […].


Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

Encrypted data

I'm Programmer

The post Encrypted data appeared first on I'm Programmer. Programming Funny Images Programming Jokes Data Encryption Difference Between Encryption and Decryption Encrypted data encryption and decryption encryption and decryption algorithm

Data 52

Choosing the Right Software Partner, Part 3: Evaluating Experience

Atomic Spin

Experience is the best teacher. When evaluating custom software development partners, it’s important to know if your potential partner has a track record of success with companies like yours and projects of similar complexity.

5 Simple Yet Effective Ways to Increase Data Security


Business data is more than propriety information. Most small businesses hold customer credit card information on file and maintain electronic employee records, as well as manage their banking online. And a breach of this data disrupts basic operations and damages your reputation not to mention probably costing you thousands of dollars. Symantec, in fact, recently released […].


Four short links: 23 January 2019

O'Reilly Media - Ideas

NLP, Verified Software, LiveJournal, and Personal CRM. Zero-Shot Transfer Across 93 Languages (Facebook) -- we have significantly expanded and enhanced our LASER (Language-Agnostic SEntence Representations) toolkit. We are now open-sourcing our work, making LASER the first successful exploration of massively multilingual sentence representations to be shared publicly with the NLP community. The toolkit now works with more than 90 languages, written in 28 different alphabets.

5 Early Indicators Your Embedded Analytics Will Fail

Many application teams leave embedded analytics to languish until something—an unhappy customer, plummeting revenue, a spike in customer churn—demands change. But by then, it may be too late. In this White Paper, Logi Analytics has identified 5 tell-tale signs your project is moving from “nice to have” to “needed yesterday.". Brought to you by Logi Analytics.

Ransomware in Health Care: 5 Tips to Avoid Being a Victim


Read Marcus Chung list top five tips for the healthcare sector to avoid being a victim of ransomware on Security Boulevard : Every person, from the newest employee to the CEO, can either strengthen or weaken an organization’s security posture. For this reason, healthcare companies need to help their employees take precautions against the latest ransomware […].


Postman Announces Growing Adoption for API Development Tools

Ranked highest for industry awareness, nearly six million developers and 200,000 companies now use Postman worldwide SAN FRANCISCO–January 23, 2019–Postman, the only complete API development environment, today announced that adoption of its award-winning API tool has reached nearly six million developers and more than 200,000 companies worldwide. Combined with the highest awareness among API […].

Tools 48

StackRox Adds Kubernetes-Specific Security Capabilities

The New Stack

When we last checked in with container security firm StackRox , it was focused on covering the entire lifecycle from build to runtime , with a feedback loop to better add security information earlier in the process.


WhiteHat Security Launches New ‘Essentials’ Product Line for High-speed, Fully-automated Security Testing with Comprehensive Code Coverage

AN JOSE, Calif.–(BUSINESS –(BUSINESS WIRE)–WhiteHat Security, the leading application security provider committed to securing digital business, today announced the general availability (GA) of its new ‘Essentials’ product line, with the launch of two solutions: Sentinel Source Essentials Edition and Sentinel SCA Essentials Edition. The streamlined ‘Essentials’ products have been created to help organizations meet the needs […].

Why “Build or Buy?” Is the Wrong Question for Analytics

Every time an application team gets caught up in the “build vs buy” debate, it stalls projects and delays time to revenue. There is a third option. Partnering with an analytics development platform gives you the freedom to customize a solution without the risks and long-term costs of building your own. Learn when and why it makes sense to build, buy, or take a combined approach to embedded BI. Brought to you by Logi Analytics.

Server Security: What to Look for in 2019

Armughan Ahmad - Dell EMC

Following a challenging year for server security, one big question remains: where is the industry headed in 2019? How do we rethink our approach in the wake of Spectre & Meltdown? What are the dangers on the horizon, and what sort of innovation can businesses use to combat them?

Two Different Kinds of Training (admittedly a rant)

Net Objectives

The prevalent kind of Agile team training is: here’s what to do follow it until you understand it you can fill in the blanks, but don’t change the foundation if you do, we can take no responsibility for results because then you’re not doing what we said To me this smells of “we know more … Continue reading "Two Different Kinds of Training (admittedly a rant)". Learning Teaching Coaching Team Level Agile


Discover All the Opportunities around Dell EMC Microsoft Solutions

Armughan Ahmad - Dell EMC

Learn how three compelling events will help you drive customer conversations around the need to modernize their Microsoft application environments. Have you investigated the key reasons why you should be embracing and driving customer conversations around new Dell EMC Microsoft Solutions?

The Third Leg of Emergent Design: Acceptance Test-Driven Development (ATDD)

Net Objectives

In previous posts I discussed that the first leg of emergent design is TDD which provides code quality & sustainability. The second leg is design patterns which provide insights into handling variation. The third leg is ATDD which provides us a way of discovering and clarifying the value we’ll get. The essence of agility is … Continue reading "The Third Leg of Emergent Design: Acceptance Test-Driven Development (ATDD)". ATDD Design Patterns Emergent Design TDD Technical Agility

New Study: 2018 State of Embedded Analytics Report

Why do some embedded analytics projects succeed while others fail? We surveyed 500+ application teams embedding analytics to find out which analytics features actually move the needle. Read the 6th annual State of Embedded Analytics Report to discover new best practices. Brought to you by Logi Analytics.

CodeSOD: Internal Validation

The Daily WTF

If you’re doing anything financial in Brazil, you have to manage “ CNPJ ” numbers. These numbers are unique identifiers for every business and every branch of that business, along with a pair of check-digits to validate that it’s a correct code. Everyone from banks to accountants to businesses needs to track and manage these. When Patria joined a microscopic startup as an intern. The startup made an accounting package, and thus needed to track CNPJs.

The Future of Agile

Net Objectives

Let’s consider some of the things Agile has demonstrated to be of value: Having self-organizing small teams Building incrementally Taking an iterative approach However, an organization is not merely a collection of small teams, it must: Have a vision to guide what is built Have collaboration across teams We thus need an eco-system that illuminates … Continue reading "The Future of Agile". Agile at Scale Lean-Agile

Agile 40

Off-The-Shelf Hacker: Tips for Your Next Tech Conference Proposal

The New Stack

It’s that time of year again, the tech conference proposal season. If you’ve ever wanted to showcase your latest techno-gadget or hacker technique to an eager audience, now is the time to get going. I submitted a couple of pitches a few days ago.

Server Name Indication (SNI) Support Now in Ambassador: Serve Multiple TLS Certificates from the…

Daniel Bryant

Server Name Indication (SNI) Support Now in Ambassador: Serve Multiple TLS Certificates from the Same IP Ambassador 0.50

The Complete Predictive Analytics Lifecycle for Application Teams

Speaker: Sriram Parthasarathy, Senior Director of Predictive Analytics, Logi Analytics

Applications with predictive analytics are able to deliver massive value to end users. But what steps should product managers take to add predictive analytics to their applications? In this webinar, we’ll walk through an end-to-end lifecycle of embedding predictive analytics inside an application. Find out how a real-world application decided what predictive questions to ask, sourced the right data, organized resources, built models, deployed predictive analytics in production, and monitored model performance over time.

Automation and ‘The Software Defined Delivery Manifesto’

The New Stack

Pulumi sponsored this podcast. Software developers have been doing it all wrong — or maybe not, depending on whom you talk to.


Why CIOs Should Care About Two Factor Authentication

The Accidental Successful CIO

Everybody needs two factor authentication, but just exactly what is it? Image Credit: Dave Crosby. As everyone in the CIO position knows, keeping the company’s systems and applications secure is a top priority and has a lot to do with the importance of information technology.

How I Created a Telegraf Plugin to Monitor Solar Panels

The New Stack

InfluxData sponsored this post. Julius Marozas. Julius is a student at the Kaunas University of Technology Gymnasium in Lithuania. He is interested in home automation, internet of things as well as functional programming. Last year, he completed his studies at the NFQ Academy, where he improved his skills in web development. He uses Home Assistant on a Synology NAS server to make his home smarter.