Sat.Mar 31, 2018 - Fri.Apr 06, 2018

article thumbnail

Foreword to Accelerate

Martin Fowler

Nicole Forsgren, Jez Humble, and Gene Kim have just published their book Accelerate. I think this will be the most important software book this year (yes more than this ). Not just does it give solid advice on the practices you need to create a top class software delivery capability, it backs that advice with a depth of scientific analysis unusual in our field.

Analysis 214
article thumbnail

How do you solve a problem like ransomware? Invest up front

The Parallax

Ransomware is hardly a cutting-edge form of malicious software. It infects a victim’s computer or phone, then encodes the data with a key that the attacker shares only after a ransom has been extorted from the victim. It has been around for nearly 30 years. Yet it manages to plague major organizations across the globe, from Boeing to Baltimore. Ransomware remains a lucrative business for hacker extortionists , who typically target organizations such as hospitals or utilities they believe would h

Network 186
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How companies around the world apply machine learning

O'Reilly Media - Data

Strata Data London will introduce technologies and techniques; showcase use cases; and highlight the importance of ethics, privacy, and security. The growing role of data and machine learning cuts across domains and industries. Companies continue to use data to improve decision-making (business intelligence and analytics) and for automation (machine learning and AI).

article thumbnail

Project Management: How to Hold the Best Accountability Conversations

Let's Grow Leaders

Project management isn’t for the faint of heart. You’re pressured from above to produce results and from below to cultivate relationships with your project teams. And in between, you’ve got scope creep, stakeholder politics, and vaguely supported contingency plans. You can become […]. The post Project Management: How to Hold the Best Accountability Conversations appeared first on Let's Grow Leaders.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

One Easy Way To Speed up your Rails Tests and RSpec

NeverFriday

There comes a time in the life of every Ruby on Rails project where you and your team will end up with long running tests. Rails tests can contain factories, fixtures and lots of setup procedures before tests are executed, and all of these can contribute to major slowness in the test runs. I’ve seen four ways of dealing with slow running tests in Rails: start deleting tests (or mark them as skip-able): the drawback is your test coverage drops and you may end up with more bugs. use more int

Testing 124

More Trending

article thumbnail

Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases

CTOvision

None of us wanted this cyber war. But now that it is here all of us are targets. Even before the cyber war we were being overwhelmed with data. The average citizen is surrounded with information from TV, radio, entertainment, the Internet, social media, co-workers, neighbors, family, schools, the government as well as old sources […].

Internet 123
article thumbnail

Collaboration – Can We Really Trust You?

Let's Grow Leaders

It’s easy to talk about collaboration. It’s much harder to do it. After visiting one of our clients in Guatemala City, Karin, Sebastian, and I traveled to Antigua, Guatemala where my daughter owns a clothing design business. She took us to Hobbitengango, […]. The post Collaboration – Can We Really Trust You? appeared first on Let's Grow Leaders.

Travel 156
article thumbnail

One-click Login with Blockchain: A MetaMask Tutorial

Toptal

Online users are becoming increasingly resistant to traditional email/password registration processes. One-click social logins via Facebook, Google, or GitHub are better, but they come with data privacy trade-offs. This article introduces a one-click, cryptographically-secure login flow using MetaMask, with all data stored on the app's own back-end.

article thumbnail

The eight practices for Containerized Delivery on the Microsoft stack – PRACTICE 1: Small, reusable image layers

Xebia

This post is originally published as article within SDN Magazine on October 13th, 2017. During the past year I supported several clients in their journey toward Containerized Delivery on the Microsoft stack. In this blogseries I’d like to share the eight practices I learned while practicing Containerized Delivery on the Microsoft stack using Docker, both in a Greenfield and […].

Windows 100
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Stack Overflow Age

Joel on Software

Hi, everyone! A lot of stuff has happened since I was writing all those blog posts about Aeron chairs 18 years ago. Some of those blog posts are old enough to go to college. And, also: Stack Overflow will be ten years old soon! Wow! So I thought it would be cool to get the old band back together for a little reunion tour over the next few weeks. I want to catch you all up on some stuff but mostly I want to tell the story of Stack Overflow in a not-completely-disorganized way.

Internet 102
article thumbnail

5 Ways to Drive Results Through Fear and Intimidation

Let's Grow Leaders

You’re on the fast track. You don’t need sustained results, you need quick wins. Results matter. You’ve got a review coming up. With a few simple tactics, you can get your organization performing in no time. You’ll be promoted and someone else […]. The post 5 Ways to Drive Results Through Fear and Intimidation appeared first on Let's Grow Leaders.

article thumbnail

Five Strategies for Getting the Most From AI: An MIT Sloan Management Review Webinar

CTOvision

Thursday 12 April 2018, Jacques Bughin, author of the MIT Sloan Management Review article "Five Management Strategies for Getting the Most From AI" will discuss this article and the supporting work of he McKinsey Global Institute around this question of capitalizing on AI. Using industry examples and findings from the Institute’s research, he’ll offer strategies for […].

article thumbnail

The eight practices for Containerized Delivery on the Microsoft stack – PRACTICE 2: Multi-stage builds

Xebia

This post is originally published as article within SDN Magazine on October 13th, 2017. During the past year I supported several clients in their journey toward Containerized Delivery on the Microsoft stack. In this blogseries I’d like to share eight practices I learned while practicing Containerized Delivery on the Microsoft stack using Docker, both in a Greenfield and in a Brownfield […].

Windows 100
article thumbnail

Prepare Now: 2025s Must-Know Trends For Product And Data Leaders

Speaker: Jay Allardyce, Deepak Vittal, and Terrence Sheflin

As we look ahead to 2025, business intelligence and data analytics are set to play pivotal roles in shaping success. Organizations are already starting to face a host of transformative trends as the year comes to a close, including the integration of AI in data analytics, an increased emphasis on real-time data insights, and the growing importance of user experience in BI solutions.

article thumbnail

How Outsourcing Helps Entrepreneurs Build Businesses

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

94
article thumbnail

How to Have Tough Conversations at Work: An Interview

Let's Grow Leaders

As we travel the world keynote speaking and working with leaders across a variety of organizations and contexts, we find one of the biggest challenges across cultures is how to have productive, difficult conversations. I was delighted to grab a few minutes for […]. The post How to Have Tough Conversations at Work: An Interview appeared first on Let's Grow Leaders.

How To 141
article thumbnail

What is Risk Attitude of Stakeholders?

SCRUMstudy

Stakeholder(s) is a collective term that includes customers, users, and sponsors, who frequently interface with the Product Owner, Scrum Master, and Scrum Team to provide them with inputs and facilitate creation of the project’s product, service, or other result. Stakeholder(s) influence the project throughout the project’s development. Thus it is important to understand the risk attitude of the stakeholders.

SCRUM 90
article thumbnail

The eight practices for Containerized Delivery on the Microsoft stack – PRACTICE 3: Keep your Windows Containers up-to-date

Xebia

This post is originally published as article within SDN Magazine on October 13th, 2017. During the past year I supported several clients in their journey toward Containerized Delivery on the Microsoft stack. In this blogseries I’d like to share eight practices I learned while practicing Containerized Delivery on the Microsoft stack using Docker, both in a Greenfield and in […].

Windows 100
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Tips for Female Business Owners on Ending Workplace Toxicity

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Company 91
article thumbnail

4 Go Language Criticisms

Toptal

Go is quickly becoming one of the most popular languages: It currently ranks 19 in the TIOBE programming community index, and powers popular software like Kubernetes, Docker, and Heroku CLI. However, for all its simplicity, Go may still be missing some things. In this article, Toptal Freelance Go Developer Sergei Peshkov shares his concerns about why Go is still far from perfect and how we can make it better.

article thumbnail

What The Board Needs To Know About Artificial Intelligence

CTOvision

No matter what the business, Artificial Intelligence (AI) is going to have an impact. It is changing the way consumers consume, changing the way companies create and changing the way industries create value. C-suite executives and members of boards are rightly concerned with assessing what about AI they should accelerate into their companies and what […].

article thumbnail

The eight practices for Containerized Delivery on the Microsoft stack – PRACTICE 4: Group Managed Service Accounts

Xebia

This post is originally published as article within SDN Magazine on October 13th, 2017. During the past year I supported several clients in their journey toward Containerized Delivery on the Microsoft stack. In this blogseries I’d like to share eight practices I learned while practicing Containerized Delivery on the Microsoft stack using Docker, both in a Greenfield and in […].

Groups 100
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

How to be Confident at Work

Career Advancement

“One important key to success is self-confidence. An important key to self-confidence is preparation. ~Arthur Ashe~. Grayson asks: I’m naturally a shy person , and I want to learn how to be confident at work. I know that confidence is key to coming across as a leader , and I definitely want to advance. How can I stop blending into the background and start exuding self-assurance?

How To 81
article thumbnail

Master Hot Design Trends with These Photoshop Tutorials

Toptal

Visual design experiments often become popular design trends and suddenly they are seen everywhere. Here are a number of hot graphic design trends and some of the top tutorials on how to create them.

Trends 81
article thumbnail

Energy Pipeline Operations Affected By Cyberattack

CTOvision

All the facts are not in regarding the attack announced by the US natural gas pipeline operator Energy Transfer Partners (operator of over 71,000 miles of pipeline). But we do know that operations were affected by the attack and that the attack was against its back office systems in charge of orders, shipping, billing. Operations […].

Energy 76
article thumbnail

The eight practices for Containerized Delivery on the Microsoft stack – PRACTICE 5: Secure Containerized Delivery

Xebia

This post is originally published as article within SDN Magazine on October 13th, 2017. During the past year I supported several clients in their journey toward Containerized Delivery on the Microsoft stack. In this blogseries I’d like to share eight practices I learned while practicing Containerized Delivery on the Microsoft stack using Docker, both in a Greenfield and in […].

Windows 100
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

How to be Confident at Work

Career Advancement

“One important key to success is self-confidence. An important key to self-confidence is preparation. ~Arthur Ashe~. Grayson asks: I’m naturally a shy person , and I want to learn how to be confident at work. I know that confidence is key to coming across as a leader , and I definitely want to advance. How can I stop blending into the background and start exuding self-assurance?

How To 81
article thumbnail

CMS Web Design: A Guide to Dynamic Content Applications

Toptal

A lion’s share of websites and apps in the online media space are powered by content management systems (CMS). The optimal way to design for these applications is putting content first, style second.

article thumbnail

Maximize The Value Of Your 2018 RSA Show Visit

CTOvision

Planning, deploying and operating a cybersecurity architecture is a difficult because it requires understanding so many different disciplines. The key to having a functional security architecture is integrating identity, access control, endpoint protection and file encryption systems together (across data center and cloud environments). The importance of getting everything right is even more critical with […].