Sat.Apr 06, 2019 - Fri.Apr 12, 2019

article thumbnail

An Attempted Breach from the Attacker’s Point of View

Edgewise

Today’s news is full of data breaches and security incidents. What was once only of interest to a small portion of the technical world is now attracting more attention and questions from the non-technical population of the world. I first realized that times had changed when family members who had previously been adamantly uninterested in technology started asking me questions about a data breach they’d heard about through mass media.

Network 75
article thumbnail

A simple, effective test automation strategy

Xebia

In my whitepaper I wrote about different types of testing and what to consider when choosing a test automation strategy. More than a few readers asked how to put this advice into practice, and a good friend inspired me to write another blog post about it. DevOps teams automate everything. When you’re getting started with test automation, it’s […].

Testing 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passing execution context to domain probes

Martin Fowler

Calls to instrumentation require various bits of execution context. Pete extends his discussion of domain probes to show how factory functions help simplify the data plumbing. more….

Data 276
article thumbnail

How OverOps Can be Used as a Learning Platform for Junior Developers

OverOps

Web applications are an extremely important part of our lives; We use them daily, and at this point, a huge portion of the world relies on them. With this, we have a rapidly growing customer base that is reliant on the functionality they provide. For those of us working to build and maintain these applications, we need to observe the application from multiple perspectives.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How to Build a Great Culture in a High Turnover World

Let's Grow Leaders

What’s the true cost of high turnover? How do you stop the exodus of great talent? What if you can’t? Just a few of the questions that keep coming up with almost every senior leader I speak with. It’s tricky. You can’t control […]. The post How to Build a Great Culture in a High Turnover World appeared first on Let's Grow Leaders.

Culture 201

More Trending

article thumbnail

Other implementations for domain-oriented observability

Martin Fowler

Pete completes his discussion of domain-oriented observability by comparing domain probes to using events and aspect-oriented programming. more….

article thumbnail

11 business intelligence certifications to advance your BI career

CIO

With data increasingly vital to business success, business intelligence (BI) continues to grow in importance. With a strong BI strategy and team, organizations can perform the kinds of analysis of business information necessary to help users make data-driven business decisions. BI encompasses numerous roles. BI analysts, with an average salary of $66,791 per year according to PayScale, provide application analysis and data modeling design for centralized data warehouses and extract data from dat

article thumbnail

How to Manage the Most Difficult Stakeholders

Let's Grow Leaders

Difficult stakeholders are a chance to grow your influence You look at the phone and your heart sinks. It’s the night before you’re supposed to wrap up your assignment and brief the leadership team on what you’ve done. It’s Bruce, a charismatic […]. The post How to Manage the Most Difficult Stakeholders appeared first on Let's Grow Leaders.

How To 185
article thumbnail

Difference between Primary Key and Foreign Key

The Crazy Programmer

A “key” is one of the most basic and important concepts of the Database Management System (DBMS); the keys helps us work easily with the records and the tables in our database by providing us with the ease of accessing and retrieving the data from the table. A primary key is the first key to be understood as it uniquely identifies the particular record of any table.

Examples 113
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Lamenting the passing of the Golden Age of presentation visuals

Martin Fowler

For a few years it was easy to give a talk with a visual accompaniment driven by my laptop next to me. But recently it's getting harder to do this, making me wonder if I should continue designing visuals at all.

173
173
article thumbnail

5 DevOps Trends Worth Knowing in 2019

DevOps.com

DevOps today is more than the buzzword it was 10 years ago. Back then, the idea of combining development with production in your IT infrastructure was not common; the logistics were nonexistent and most of the time businesses decided it was far too much effort. However, if the last nine years has taught us anything, […]. The post 5 DevOps Trends Worth Knowing in 2019 appeared first on DevOps.com.

Trends 111
article thumbnail

Two in Three Hotel Websites Leak Guest Booking Details and Allow Access to Personal Data

Symantec

Hospitality services’ websites may leak your booking details, allowing others to view your personal data or even cancel your reservation.

Hotels 112
article thumbnail

Why a data scientist is not a data engineer

O'Reilly Media - Ideas

Or, why science and engineering are still different disciplines. "A scientist can discover a new star, but he cannot make one. He would have to ask an engineer to do it for him.". –Gordon Lindsay Glegg, The Design of Design (1969). A few months ago, I wrote about the differences between data engineers and data scientists. I talked about their skills and common starting points.

article thumbnail

Prepare Now: 2025s Must-Know Trends For Product And Data Leaders

Speaker: Jay Allardyce, Deepak Vittal, Terrence Sheflin, and Mahyar Ghasemali

As we look ahead to 2025, business intelligence and data analytics are set to play pivotal roles in shaping success. Organizations are already starting to face a host of transformative trends as the year comes to a close, including the integration of AI in data analytics, an increased emphasis on real-time data insights, and the growing importance of user experience in BI solutions.

article thumbnail

Why Less Communication is Better!

scruminc

“People were saying that groups needed to communicate more. Jeff (Bezos) got up and said, ‘No, communication is terrible!’” Alan Deutschman, 1 Aug 2014, Fast Company. The reason for this is that more communication doesn’t scale while just enough communication is essential to high performance of a team and particular teams of teams. More meetings and more reports cause higher decision latency, the primary cause of project failure.

SCRUM 111
article thumbnail

Digital Transformation: Coming from Behind

DevOps.com

For many years, enterprises have been in a race to digitally transform how they work through the digitization of all areas of their business, to reduce costs and business frictions through creating efficiencies and delivering increased value to their customers. While many organizations have attempted a transformation, few have been successful. Research from the consultancy […].

article thumbnail

Fintech fiddles as home burns: 97% of apps found insecure

TechBeacon

This is not fine. A white-hat researcher examined 30 financial apps, looking for information security issues—worryingly, all but one of them were insecure.

Fintech 110
article thumbnail

From Apache Kafka to Amazon S3: Exactly Once

Confluent

At Confluent, we see many of our customers are on AWS, and we’ve noticed that Amazon S3 plays a particularly significant role in AWS-based architectures. Unless a use case actively requires a specific database, companies use S3 for storage and process the data with Amazon Elastic MapReduce (EMR) or Amazon Athena. But even if a use case requires a specific database such as Amazon Redshift, data will still land to S3 first and only then load to Redshift.

AWS 110
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Design Foundations – A Guide to Visual Hierarchy (with Infographic)

Toptal

Understanding and implementing visual hierarchy principles gives designers an advantage in creating persuasive designs that convey necessary information while creating a delightful user experience.

109
109
article thumbnail

Container Management

DevOps.com

The post Container Management appeared first on DevOps.com.

111
111
article thumbnail

Open FaceTime Call from Command Line

David Walsh

Communication tools are always associated with UIs, and for good reason — if you want communication to be easy and intuitive, you need easy and intuitive interfaces. We need communication tools to provide the lowest barrier of entry, since not all users will be tech savvy. For tech experts like us, however, we love command line tools to automate just about everything.

Tools 108
article thumbnail

The Future of Serverless is … Functionless?

Stackery

I’m in a position where I converse with our customers and cloud service providers, and I keep track of conversations happening through blogs and social media. I then sift through all this data to identify patterns and trends. Lately, I’ve seen some talk about an architectural pattern that I believe will become prevalent in the near future. I first heard about this pattern a few years ago at a ServerlessConf from a consultant who was helping a “big bank” convert to serverless.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Partners in Design – A Guide to Client Empathy

Toptal

Being empathetic is not a selective practice. Designers know how to use empathy to uncover the behaviors and needs of a user. Those same methods and techniques can be used in client relationships.

How To 108
article thumbnail

Autonomous Testing’s Role in Agile DevOps

DevOps.com

DevOps testing, as an Agile methodology, is key to delivering testing and integration on a continuous basis, including continuous feedback, to enable better collaboration and quality. For too long, testing has progressed by small incremental steps, creating a quality assurance (QA) winter. We think it’s time for a revolution, so we have written and published […].

Agile 111
article thumbnail

An IDEA is Born: CableLabs Heads Up New Alliance That Will Bring Holodecks Into Your Living Room

CableLabs

CableLabs has joined forces with top players in cutting-edge media technology—Charter Communications, Light Field Lab, OTOY and Visby—to form the Immersive Digital Experiences Alliance (IDEA). Chaired by CableLabs’ Principal Architect and Futurist, Arianne Hinds , the alliance aims to facilitate the development of an end-to-end ecosystem for immersive media, including VR, AR, stereoscopic 3D and the much-talked-about light field holodeck, by creating a suite of display-agnostic, royalty-free spe

VR 104
article thumbnail

Technical Skills

Ron Jeffries

A couple of people asked me to list all the technical skills required in order to do Agile Software Development. I can't do that, but I can do this.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Angular Components 101 — an Overview

Toptal

While components have been available in Angular since the beginning, they’re still easy to mess up with common mistakes like people not using them at all, creating components instead of attribute directives, and more. In this article, Toptal Freelance JavaScript Developer Valters Valdersteins differentiates the correct and incorrect ways to use Angular components and illustrates them with examples.

Examples 104
article thumbnail

CloudBees Allies with Atos to Accelerate DevOps Adoption

DevOps.com

In a move that should accelerate adoption of best DevOps practices in the enterprise, CloudBees and Atos announced this week that the two are collaborating to advance adoption of continuous integration/continuous development (CI/CD) platforms on the Google public cloud. Announced at the Google Cloud Next 2019 conference, the alliance will result in the IT services […].

DevOps 108
article thumbnail

A Nonprofit's Guide to Event Planning: 4 Essential Steps

TechSoup

Holding a fundraising event is a great way for nonprofits to earn support for their cause and attract new donors. For many nonprofit organizations, events play a key role in raising the funds needed to support the organization's projects. Events are definitely a fun way to fundraise; however, they also require a lot of hard work. The most effective fundraising events require thorough planning, collaboration between key staff members, and financial support to be successful.

Nonprofit 102