Trending Articles

article thumbnail

Where’s the ROI for AI? CIOs struggle to find it

CIO

Finding the return on investment for AI remains elusive for many organizations, even as they rush to adopt the technology. Difficulties estimating or demonstrating the value of AI technologies to the business have been or will be a top barrier to their implementation, according to a recent Gartner survey of more than 700 IT leaders at organizations that have adopted or plan to adopt AI.

article thumbnail

Test-Driving HTML Templates

Martin Fowler

When building a server-side rendered web application, it's valuable to test the HTML that's generated through templates. While these can be tested through end-to-end tests running in the browser, such tests are slow and more work to maintain than unit tests. My colleague Matteo Vaccari has written an article on how to use TDD to test drive these templates using xunit-style tools which can be run easily from the command line or as part of build scripts.

Testing 266
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

You Need New Skills to Make a Career Pivot. Here’s How to Find the Time to Build Them.

Harvard Business Review

With any significant change in your career comes the need for new skills. But that’s even more true when you want a radical career change. In these situations, it’s going to take more than listening to a few webinars to build the knowledge you need get to where you want to go. You must set aside a significant amount of time for self-directed learning, formal training, or even a second job to gain the skills for the big leap.

How To 133
article thumbnail

Linguistic Lumberjack: Attacking Cloud Services via Logging Endpoints (Fluent Bit - CVE-2024-4323)

Tenable

Tenable Research has discovered a critical memory corruption vulnerability dubbed Linguistic Lumberjack in Fluent Bit, a core component in the monitoring infrastructure of many cloud services. Key takeaways Fluent Bit is a logging utility heavily used by all major cloud providers. Tenable Research discovered a critical vulnerability dubbed Linguistic Lumberjack (CVE-2024-4323) within Fluent Bit’s built-in HTTP server that could potentially allow for denial of service, information disclosure, or

article thumbnail

10 Rules for Managing Apache Cassandra

It’s no surprise that Apache Cassandra has emerged as a popular choice for organizations of all sizes seeking a powerful solution to manage their data at a scale—but with great power comes great responsibility. Due to the inherent complexity of distributed databases, this white paper will uncover the 10 rules you’ll want to know when managing Apache Cassandra.

article thumbnail

Defining DevSecOps for IoT

DevOps.com

By embedding security practices at every stage of the IoT development lifecycle, from design through deployment, organizations can significantly enhance the security and integrity of their IoT ecosystems.

IoT 111

More Trending

article thumbnail

Testing the contents of generated HTML

Martin Fowler

Matteo Vaccari continues his testing of template-generated HTML by describing tests for the contents of that HTML. He shows how to gradually build up the template, using Test-Driven Development in Go and Java.

Testing 188
article thumbnail

How Artists Can Transition into the Business World

Harvard Business Review

The creator economy has given many young people an opportunity to eschew a more traditional career path and monetize their talents via social media. But, what if, you’ve discovered your priorities have evolved and you are now considering a job in the business world? The daunting process of reassessing your goals and then converting your value to this new space can feel overwhelming.

Media 122
article thumbnail

Are PSYOPS in Cyberspace a Viable Tool Against Adversaries?

Ooda Loop

A recent article revealed that the U.S. National Security Agency (NSA) would try to counter prolific ransomware gangs beyond using cyber responses, and also include psychological warfare into its toolbox.

Tools 102
article thumbnail

The 49-Year Unicorn Backlog

Crunchbase News

If the current sluggish pace of IPOs and acquisitions continues, it would take more than 49 years for every U.S. unicorn to generate an exit. That was the finding from an analysis of recent exits for American companies on the Crunchbase Unicorn Board. Over the past 12 months, just 15 private, venture-backed companies valued at $1 billion more have gone public or gotten acquired.

Exercises 105
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

“Íbamos a hacer una transformación TI, pero nos dimos cuenta de que requeríamos una del organigrama de la compañía”

CIO

El camino hacia la nube no es uno fácil, está lleno de obstáculos y llegar a buen puerto requiere de una estrategia a largo plazo bien pensada. Ese fue el foco de las conversaciones que tuvieron lugar en el Cloud & Infrastructure Forum 2024 , organizado por IDC y Foundry con el patrocinio de DE-CIX, que se llevó a cabo el pasado 21 de mayo en Madrid.

article thumbnail

Why you should use SQLite

InfoWorld

Lift the hood on most business applications, and you’ll find they have some way to store and use structured data. Whether it’s a client-side app, an app with a web front end, or an edge-device app, chances are a business application needs a database. In many cases, an embedded database will do. Embedded databases are lightweight, compact, and portable—and for some applications, they are a better choice than a traditional server.

article thumbnail

How Your Business Should Tap into the Creator Economy

Harvard Business Review

Creators aren’t just changing marketing. They’re transforming product development, too. Creators can drive demand for specialized products, accelerating product life cycles and even changing what customers actually value. Companies that recognize the power of creators can choose from four strategies, including partnering with creators or acting as suppliers.

Strategy 107
article thumbnail

Woman Accused of Helping North Korean IT Workers Infiltrate Hundreds of US Firms

Ooda Loop

As a part of an effort to disrupt a North Korean IT workers scheme, the U.S. government announced charges, seizures, arrests, and reward incentives. A network of North Korean IT workers has earned millions of dollars for North Korea by infiltrating hundreds of companies.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

#783 Becoming a Leader that Crushes Technical Debt with Juan Orlandini, CTO at Insight

Modern CTO

Today we’re talking to Juan Orlandini, CTO at Insight of North America. We discuss what he’s realized recently as a CTO coach, what he’s learned about aging, and just spend time catching up with an old friend of the show. All of this right here, right now, on the Modern CTO Podcast! To learn more about Insight, check out their website here. Have feedback about the show?

CTO Coach 117
article thumbnail

Big tech companies commit to new safety practices for AI

CIO

Sixteen big users and creators of artificial intelligence (AI) technology — including heavy hitters such as Microsoft, Amazon, Google, Meta, and OpenAI — have signed up to the Frontier AI Safety Commitments, a new set of safety guidelines and development outcomes for the technology. They revealed the commitments on Tuesday, as two days of talks on AI were set to begin at the AI Seoul Summit in Korea.

Company 296
article thumbnail

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

Tenable

Background Cloud cryptomining has become an emerging trend in recent years, powered by the scalability and flexibility of cloud platforms. Unlike traditional on-premises infrastructure, cloud infrastructure allows attackers to quickly deploy resources for cryptomining, making it easier to exploit. One of the most common cryptomining threats for cloud environments is the Kinsing malware.

Malware 114
article thumbnail

3 Ways to Make a Request That Doesn’t Feel Coercive

Harvard Business Review

Research shows that people feel more pressured to agree to requests than we realize, frequently agreeing to do things they would rather not do, such as taking on burdensome, low-promotability work tasks. As a manager, what can you do to ensure that your employees aren’t taking things on because they feel like they have to, but because they actually want to?

Research 106
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Error'd: ABQ is the bomb

The Daily WTF

This week we have an unusual number of submissions involving dates or timestamps. That is, the usual sorts of error'ds, but unusually many of them. Gerald E. chuckled "I do love the back to the future movies. But now I can see Beck from the future." Steven J. Pemberton , as his mother calls him, snarked about Utilita: "I received this letter from my energy supplier on 10th May, telling me they were going to install a smart meter at my house on 3rd May.

Airlines 111
article thumbnail

VCs Have Mostly Shut The Door On Smart Homes

Crunchbase News

Startup investors have not done especially well betting on smart homes. Over the years, a growing number of well-funded companies have folded or failed to thrive betting on adoption of connected-home technologies such as smart windows, lighting, security systems and kitchens. And the misses continue. Earlier this month, smart-home upstart Brilliant disclosed that it laid off its entire staff while it seeks a buyer.

Energy 90
article thumbnail

Epicor announces Grow portfolio to weave AI into ERP

CIO

ERP vendor Epicor is introducing integrated artificial intelligence (AI) and business intelligence (BI) capabilities it calls the Grow portfolio. Grow will reimagine how AI-powered ERP software can and should serve the supply chain industries and their workers, delivering more than 200 adaptive industry use cases, it said at its Insights 2024 user conference in Nashville, Tennessee.

article thumbnail

Microsoft Infuses AI into DevOps Workflows

DevOps.com

Microsoft this week added a bevy of tools to its portfolio that infuses generative artificial intelligence (AI) into DevOps workflows.

DevOps 105
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Is Your Mindset About Generative AI Limiting Your Professional Growth?

Harvard Business Review

Generative artificial intelligence (GenAI) has garnered immense publicity over the past few months. Some believe it’s a passing fad or a threat to human creativity. For young professionals, it’s the source of a unique dilemma: Do you “buy into the hype” of AI and use it as a guidepost for your professional development and ambitions? Or do you stick to the beaten path, focusing on building more traditional skills and pursuing more conventional trajectories?

article thumbnail

Accelerating AI Innovation with Dell AI Factory Advancements

Dell EMC

Welcome to the Dell AI Factory, the industry's one-stop-shop to accelerate your path to AI outcomes.

article thumbnail

IBM previews watsonx Code Assistant for Enterprise Java Applications

InfoWorld

IBM has previewed its upcoming watsonx Code Assistant for Enterprise Java Applications at its annual Think conference. The generative AI -based code assistant is aimed at accelerating Java application lifecycle with capabilities such as code generation, code explanation, and test generation, underpinned by IBM’s open source Granite family of large language models (LLMs).

article thumbnail

IT leaders look beyond LLMs for gen AI needs

CIO

With the generative AI gold rush in full swing, some IT leaders are finding generative AI’s first-wave darlings — large language models (LLMs) — may not be up to snuff for their more promising use cases. LLMs, with their advanced ability to comprehend and generate text, have become a near stand-in for generative AI in the collective mindshare. Along with code-generating copilots and text-to-image generators, which leverage a combination of LLMs and diffusion processing, LLMs are at the core of m

article thumbnail

10 Rules for Managing Apache Kafka

Without proper guidance, it’s easy to miss out on Kafka’s full capabilities. While not the easiest technology to optimize, Kafka rewards those willing to explore its depths. Under the hood, it is an elegant system for stream processing, event sourcing, and data integration. Download this white paper to learn the 10 critical rules that will help you optimize your Kafka system and unlock its full potential.

article thumbnail

The State Department’s Cyber Strategy Seeks to Build Coalitions Against China

Ooda Loop

At the RSA cybersecurity conference, the Secretary of State announced the release of the Department’s new International Cyberspace & Digital Policy Strategy whose four goals are to advance economic prosperity; enhance security and address cybercrime; promote human rights, democracy, and the rule of law; and other transnational challenges.

Strategy 111
article thumbnail

Your Personal Brand Needs a Refresh. Here’s Where to Start.

Harvard Business Review

In a fast-changing world, it requires both a strategy and disciplined execution to stand out and remain relevant. And since your own career interests, goals, and objectives are likely changing more rapidly than ever, don’t assume that your internal state of mind is reflected in your public brand. Indeed, there’s often a lag between our self-perception and how others view us, and we have to consciously focus on closing that gap to achieve the brand or reputation we seek.

Strategy 121
article thumbnail

Building Toward Unified Observability

DevOps.com

Observability, AI and automation can help organizations achieve proactive IT management and eschew traditional monitoring. Here’s what’s involved.