June, 2018

article thumbnail

Cover design for the Refactoring 2nd Ed

Martin Fowler

We've got a cover design for the second edition of Refactoring. As with any book in my signature series, I needed to decide which bridge would feature in the photo.

280
280
article thumbnail

OKRs: A Simple But Awesome Strategy to Get Stuff Done

Evolution4all

The goal of OKRs is for every member of the organisation – from the key stakeholders and leaders down to the team members – understand the objectives of the company through a set of defined, specific and measurable actions. With today’s complex nature of organisations, team members often find themselves feeling lost amidst the rapid changes that they deal with every day.

Strategy 247
article thumbnail

6 Log Management Tools You NEED to Know (And How to Use Them)

OverOps

Without the right tools to aggregate and parse your log data, finding and understanding the information you’re looking for is nearly impossible. There are endless uses for logs because the logs themselves are endless. Application logs, security logs, BI logs, Lincoln logs (Ok, maybe not)… Setting aside security, BI and childhood fun for a moment, even looking specifically at uses for application logs alone, there are countless uses.

Tools 221
article thumbnail

Primer: What DDoS attacks could mean for IoT

The Parallax

When a headline screams something like “worst DDoS ever,” it’s often accurate. Distributed denial-of-service attacks, which deluge targeted sites or services with traffic to force them offline, have been growing in strength and scope for decades. And although organizations can do certain things to mitigate the impact of an attack, our seemingly ever-increasing usage of Internet-connected devices is likely only inviting more DDoS trouble.

IoT 210
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Managing risk in machine learning models

O'Reilly Media - Data

The O’Reilly Data Show Podcast: Andrew Burt and Steven Touw on how companies can manage models they cannot fully explain. In this episode of the Data Show , I spoke with Andrew Burt , chief privacy officer at Immuta , and Steven Touw , co-founder and CTO of Immuta. Burt recently co-authored a white paper on managing risk in machine learning models , and I wanted to sit down with them to discuss some of the proposals they put forward to organizations that are deploying machine learning.

More Trending

article thumbnail

Employee Too Valuable to Fire? 6 Leadership Strategies

Let's Grow Leaders

Is Anyone Ever Too Valuable to Fire? Have you ever worked with an obnoxious colleague who seemed to be protected because the employee was considered too valuable to fire? Maybe you’re a team leader who has one of these brilliant bullies on […]. The post Employee Too Valuable to Fire? 6 Leadership Strategies appeared first on Let's Grow Leaders.

article thumbnail

Missing the point about microservices – it's about testing and deploying independently

Erik Bernhardsson

Ok, so I have to first preface this whole blog post by a few things: I really struggle with the term microservices. I can’t put my finger on exactly why. Maybe because the term is hopelessly ill-defined, maybe because it’s gotten picked up by the hype train. Whatever. But I have to stick to some type of terminology so let’s just roll with it. This blog post might be mildly controversial, but I’m throwing it out there because I’ve had this itchy feeling for so long and I can’t get rid of it.

article thumbnail

How Continuous Delivery Broke Your Application Reliability – and What You Need to Do to Fix It

OverOps

More frequent deployments are great, but maintaining high-quality code while implementing them is a whole different story. Everyone is talking about moving towards an automated workflow, and there’s no wonder. We all want to deploy more features and capabilities to our products and applications, and we want to do it as quickly as we can. However, automation is not something that we should take lightly as it comes with some risks that shouldn’t be ignored.

article thumbnail

On doctors’ orders, Israel plans a health care CERT

The Parallax

TEL AVIV—If you listen to doctors who faced the WannaCry ransomware attack on the front lines of emergency rooms across England last year, it’s a minor miracle that the inadequate care it caused didn’t result in any patient deaths. Israel has chosen to heed their warning by creating a health care cyber emergency response yeam, or CERT, to lay out how administrators and doctors should respond to the next destructive cyberattack.

Internet 207
article thumbnail

Prepare Now: 2025s Must-Know Trends For Product And Data Leaders

Speaker: Jay Allardyce, Deepak Vittal, and Terrence Sheflin

As we look ahead to 2025, business intelligence and data analytics are set to play pivotal roles in shaping success. Organizations are already starting to face a host of transformative trends as the year comes to a close, including the integration of AI in data analytics, an increased emphasis on real-time data insights, and the growing importance of user experience in BI solutions.

article thumbnail

Lessons learned turning machine learning models into real products and services

O'Reilly Media - Data

Why model development does not equal software development. Artificial intelligence is still in its infancy. Today, just 15% of enterprises are using machine learning, but double that number already have it on their roadmaps for the upcoming year. With public figures like Intel’s CEO stating that every company needs a machine learning strategy or risks being left behind, it’s just a matter of time before machine learning enters your organization, too—if it hasn’t already.

article thumbnail

Agile Portfolio Management Definition: How To Run Your Company at Its Fullest Potential

Luis Goncalves

It’s interesting that a lot of IT projects are considered as failures even though the development teams were able to submit the output on time and within budget. As it turns out, these projects were not considered as successes since they didn’t meet the demands or standards of the stakeholders. There was also minimal coordination between the project team and the investors.

Agile 174
article thumbnail

Employee Engagement – Avoid This Tremendous Leadership Mistake

Let's Grow Leaders

Employee Engagement – Play the Game, Don’t Game the Score When you see low employee engagement scores, what is your first reaction? I spoke with a company executive who was upset with his engagement scores. “The numbers are horrible,” he said. “Can […]. The post Employee Engagement – Avoid This Tremendous Leadership Mistake appeared first on Let's Grow Leaders.

article thumbnail

Organisational Mastery Blueprint

Evolution4all

During the past few years of my career, we have been developing an approach to help executive leaders enable organisational mastery in their companies. Today, we are announcing that Evolution4all ´s Organisational Mastery Blueprint has arrived. We are very proud of what we have created and we believe in its results, as we use the exact same approach to run our own company.

SCRUM 145
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

How to Measure the Reliability of Your Software Throughout the CI/CD Workflow

OverOps

Overcome the challenge of maintaining code quality in a CI/CD workflow with Continuous Reliability. CI/CD practices encourage frequent code integration in development, speed up preparations for new releases and automate deployments. And with this new tooling, these parts of the software development lifecycle have all improved and accelerated. At the same time, the data that we use to evaluate the overall quality of a new release and of our application as a whole hasn’t changed much at all.

Software 157
article thumbnail

FBI?s router reboot call reminds us why to check for updates

The Parallax

On May 25, the FBI issued a clarion call to a broad swath of Wi-Fi router owners: To clear out a potential botnet malware infection, reboot your router. The malware, VPNFilter, allowed hackers to snoop on all traffic passing through the router, including stealing website log-ins, as well as disable the device. But the reboot was only a temporary fix: Router owners must update their router firmware to fully eliminate the potential infection, a much harder task than simply turning the router off a

Malware 188
article thumbnail

Testing machine learning interpretability techniques

O'Reilly Media - Data

The importance of testing your tools, using multiple tools, and seeking consistency across various interpretability techniques. Interpreting machine learning models is a pretty hot topic in data science circles right now. Machine learning models need to be interpretable to enable wider adoption of advanced predictive modeling techniques, to prevent socially discriminatory predictions, to protect against malicious hacking of decisioning systems, and simply because machine learning models affect o

article thumbnail

Communities of Practice Measurement: Focusing on the Right Metrics to Grow Your Company?s Knowledge Capital

Luis Goncalves

Making Sense of Your Company’s Knowledge Capital – Communities of Practice Measurement. Several factors affect the growth of a business or an organisation such as; the economic conditions in a country, changes in government policies, changes in the industry factors, and the competence of the team. In most cases, it’s virtually impossible to control the first three factors.

Metrics 173
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Remote Leaders: How to Use the Right Tool at the Right Time

Let's Grow Leaders

Why Richness and Scope Matter to Long-Distance Leaders With the ever-increasing role of remote workers, we’re pleased to bring you a guest post from Wayne Turmel, co-author of The Long-Distance Leader: Rules for Remarkable Remote Leadership. Technology is critical to leading a long-distance […]. The post Remote Leaders: How to Use the Right Tool at the Right Time appeared first on Let's Grow Leaders.

Tools 158
article thumbnail

Crossing the bounded context, events-first, the REST is not needed

Xebia

Technical design decision can have a severe impact on companies their communication structure. Conway’s law explains; “Any organization that designs a system (defined more broadly here than just information systems) will inevitably produce a design whose structure is a copy of the organization’s communication structure.” Such is the story also with a microservices architecture.

article thumbnail

Supercharge Your Splunk Analytics with OverOps

OverOps

How Can OverOps Help You Gain More From Splunk? Most companies, organizations, and developers know and probably use, Splunk. It helps aggregate and simplify data for dev and ops teams, allowing them to capture, index, and correlate real-time data in a searchable repository. Splunk does so by utilizing log files. These usually hold a massive amount of information that can be important and even critical when things go wrong.

Analytics 140
article thumbnail

WannaCry vs. the ER doc: On the front lines of a ransomware outbreak

The Parallax

TEL AVIV—Dr. Tony Bleetman wears several hats, splitting his time as an emergency physician in London and Tel Aviv. He’ll tell you right off the bat that he’s no expert in cybersecurity. But he’s had an experience that few hackers can claim: He was on the front lines of the WannaCry outbreak , where the ransomware directly affected the treatment of hospital patients.

Malware 176
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

The blockchain beyond bitcoin

O'Reilly Media - Data

Taking blockchain technology private for the enterprise. Blockchain technologies have been made popular by the creation of bitcoin, but how exactly can a blockchain benefit an enterprise? A blockchain provides an immutable store of facts. This model delivers significant value in the face of regulatory oversight by providing irrevocable proof that transactions occurred.

article thumbnail

6 Git Aha Moments

Henrik Warne

When I switched jobs four years ago, I went from using subversion (svn) to using git as the version control system. Even though I am a pretty quick learner, it took me a quite a while to really understand git. I read a lot on how git works, but even so, I didn’t always realize what the implications were for how to use git. Here are six big “aha moments” I had on how to use git.

Examples 120
article thumbnail

Forced Ratings – Awful Problems and What Leaders Do Instead

Let's Grow Leaders

Forced Ratings Cause More Problems Than They Fix Recently we were working with senior leaders in a global company who faced a challenging morale problem. They hired talented capable people who were producing good work – but their talent was leaving. Leaders […]. The post Forced Ratings – Awful Problems and What Leaders Do Instead appeared first on Let's Grow Leaders.

AWS 157
article thumbnail

Sprint Planning

Agile Alliance

Sprint planning is an event that occurs at the beginning of a sprint where the team determines the product backlog items they will work on during that sprint and discusses their initial plan for completing those product backlog items.

114
114
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

On-Demand Webinar: Quality Gates and Feedback Loops in Continuous Delivery

OverOps

Code quality gates and contextual feedback loops are the CI/CD building blocks that define the emerging practice of Continuous Reliability (CR). They can be the difference between hoping your code might work in production to knowing it will. In this webinar , we will demonstrate how you can implement CR and use it to answer questions like: When is it safe to promote code from one environment to another?

article thumbnail

At S(h)ecurity, a focus on infosec industry imbalance (Q&A)

The Parallax

If the current state of cybersecurity—from APT hackers to rogue botnets to hacked gas stations—feels overwhelming, it might be because companies have been devaluing their women and minority employees. And it’s past time to knock that off, says Vijaya Kaza, Lookout Mobile Security’s chief development officer. “The time has come when we need to take it up a notch here,” she said during a phone call with The Parallax prior to Lookout’s Day of S(h)ecurity, the fourth gender and diversity development

Security 157
article thumbnail

The real value of data requires a holistic view of the end-to-end data pipeline

O'Reilly Media - Data

The O’Reilly Data Show Podcast: Ashok Srivastava on the emergence of machine learning and AI for enterprise applications. In this episode of the Data Show , I spoke with Ashok Srivastava , senior vice president and chief data officer at Intuit. He has a strong science and engineering background, combined with years of applying machine learning and data science in industry.