Sat.Jul 27, 2019 - Fri.Aug 02, 2019

article thumbnail

Getting to the Heart of Digital Accessibility

A List Apart

121
121
article thumbnail

EventStorming cheat sheet

Xebia

EventStorming is the smartest approach to collaborate beyond silo boundaries. The power of EventStorming comes from a diverse multi-disciplined group of people who, together, have a lot of wisdom and knowledge. While it originally was invented for a workshop to model domain-driven design aggregates, it now has a broader spectrum. From gaining a big-picture problem […].

Groups 124
article thumbnail

Evolution of Netflix Conductor:

Netflix Tech

v2.0 and beyond By Anoop Panicker and Kishore Banala Conductor is a workflow orchestration engine developed and open-sourced by Netflix. If you’re new to Conductor, this earlier blogpost and the documentation should help you get started and acclimatized to Conductor. Netflix Conductor: A microservices orchestrator In the last two years since inception, Conductor has seen wide adoption and is instrumental in running numerous core workflows at Netflix.

Lambda 76
article thumbnail

Is DevOps in the Enterprise Real?

DevOps.com

Is DevOps in the enterprise real? The short answer is yes, but you may assume it’s only relevant to the world’s leading cloud companies because they’re the ones that make the headlines. DevOps offers the promise of agility, quality and ultimately better-performing software. While DevOps processes can increase agility, and agile approaches are a great […].

DevOps 103
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Book Review: Designing Data-Intensive Applications

Henrik Warne

What a great book Designing Data-Intensive Applications is! It covers databases and distributed systems in clear language, great detail and without any fluff. I particularly like that the author Martin Kleppmann knows the theory very well, but also seems to have a lot of practical experience of the types of systems he describes. There is so much to learn for me in this book, so I have summarized the main points from each chapter, with a special emphasis on what I found most interesting.

More Trending

article thumbnail

How to Talk With Your Boss When You Totally Disagree

Let's Grow Leaders

Talk with your boss when you disagree—you might be surprised at the results I was seething. The CEO had just asked my team to do something that I felt lacked integrity, was unprincipled, manipulative, and put our clients in a bad position. […]. The post How to Talk With Your Boss When You Totally Disagree appeared first on Let's Grow Leaders.

How To 200
article thumbnail

Why Best Practices – Aren’t

N2Growth Blog

My thesis is a simple one; Don’t copy – create. Don’t benchmark against others – benchmark against a unique and better version of you. Don’t compete against how others do things, compete against your own thinking. More than 20 years ago I coined the term “ next” practices in an effort to focus people forward in their thinking.

article thumbnail

Engagement Is Not Enough to Eliminate Resistance

Change Starts Here

A common theme of change management is to involve people in the process of change as early as possible. Do change with people, not to them. If people help identify the issues with the current state and develop solutions, then resistance will be eliminated. After all, it’s hard to resist something you create, right? Nope.

article thumbnail

Types of Cryptography

The Crazy Programmer

“Cryptography is the standard of encrypting all the data and information by converting Plain text into cipher text for secure communication.” Encryption is the key to secure all our data and information while we communicate with others over any transmission channel. Now, you might be thinking why this encryption matters a lot? Data is something that is important in each field.

Network 106
article thumbnail

Prepare Now: 2025s Must-Know Trends For Product And Data Leaders

Speaker: Jay Allardyce, Deepak Vittal, and Terrence Sheflin

As we look ahead to 2025, business intelligence and data analytics are set to play pivotal roles in shaping success. Organizations are already starting to face a host of transformative trends as the year comes to a close, including the integration of AI in data analytics, an increased emphasis on real-time data insights, and the growing importance of user experience in BI solutions.

article thumbnail

How Managers Can Reclaim Their Lost Soul

Let's Grow Leaders

In a recent leadership development program, we talked about “manager soul loss” – the isolation, bitterness, and despair that seeps into many leaders’ hearts. We share the stages of soul loss and symptoms to look out for to help leaders identify and prevent them […]. The post How Managers Can Reclaim Their Lost Soul appeared first on Let's Grow Leaders.

article thumbnail

Software Compliance Teams Can Learn a Lot from DevSecOps

DevOps.com

Many argue that application security should be the responsibility of a security team. However, while security professionals can contribute, developers are usually the only ones with the technical ability to fix software security vulnerabilities. The same goes for software compliance. When it comes down to it, only developers are equipped to build applications in compliance […].

article thumbnail

What Does it Mean When We Talk About the “Future of Work”?

BrainStation Technology

We’ve written about preparing for the future of work and future-proofing your workforce , but we haven’t answered a fundamental question: what do we mean when we talk about the “future of work?” . Let’s take a closer look at a number of factors that have turned this into an important topic of discussion. First: . The Definition of Work is Changing. Officially, the definition of work is “to perform work or fulfill duties regularly for wages or salary.

Survey 105
article thumbnail

Security best-practices for CI/CD

CircleCI

CI/CD pipelines are at the core of daily operations for many businesses today. These processes, when set up correctly, help to keep the delivery process consistent by automating many manual tasks and providing visibility into how the software is being worked on. CI/CD is also the place in your technology stack where your infrastructure has access to many different resources, from development and production environment to analytics keys and code signing credentials.

article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

What To Do When You’re Losing Your Soul

Let's Grow Leaders

What do you do when you feel like you’re losing your leadership soul? You don’t like how you’re treating people. You’re not living up to your own values. Or you’re overwhelmed and not sure you can get the results you’re accountable […]. The post What To Do When You’re Losing Your Soul appeared first on Let's Grow Leaders.

article thumbnail

CAP Theorem No Match for Mainframes

DevOps.com

One of the biggest problems in modern distributed computing is data management. These days data are spread out all over the place. As a result, getting the data you need, exactly when you need it, becomes a problem. Wider distribution creates more network latency. If you have a system in which some machines are in […]. The post CAP Theorem No Match for Mainframes appeared first on DevOps.com.

Network 107
article thumbnail

How to Implement a Successful DevOps Strategy at Your Organization

OverOps

article thumbnail

Why Best Practices – Aren’t

N2Growth Blog

My thesis is a simple one; Don’t copy – create. Don’t benchmark against others – benchmark against a unique and better version of you. Don’t compete against how others do things, compete against your own thinking. More than 20 years ago I coined the term “ next” practices in an effort to focus people forward in their thinking.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

A Road to Better Agile Testing

Toptal

The yearly World Quality Report created by Capgemini shows that 42% of survey respondents list a “lack of professional test expertise” as a challenge in applying testing to Agile development. While the advent of Agile has brought the increased speed of iterations for software development, in some cases this has come at the cost of quality.

Agile 88
article thumbnail

GitLab Research Reveals DevOps and Cybersecurity Disconnects

DevOps.com

DevOps and cybersecurity teams have a complicated relationship, which impacts code quality, research shows Finger-pointing has long been the name of the game when it comes to cybersecurity failures. After all, who should be responsible when so-called bad code or bad practices are blamed for the latest incident? A recent survey by DevOps lifecycle tool […].

Research 106
article thumbnail

When It Comes to Leading Your Business, Should You Lean on Data or Instinct?

CEO Insider

For every business that is buoyed by the power of big data, countless others are drowning in it. According to Forrester, about 60% to 73% of enterprise data goes unused. It’s no wonder that Debra Bass, president of global marketing services for Johnson & Johnson, argues that many marketers should be diagnosed with “InfoObesity.” Instead […].

Data 83
article thumbnail

It's time to get smart about IT asset management

TechBeacon

With mounting pressure to pare IT budgets, CIOs are constantly on the lookout to find ways to reduce waste in their capital expenditures. One area that's ripe for pruning is IT's garden of assets, especially its software.

Budget 80
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Get an out-of-the-box solution for the most important services in your pipeline

CircleCI

Monolithic architectures are the result of the continued growth of modern applications’ size and complexity. When apps were small, things such as eliminating bugs or adding new features, updating the UI or UX, or implementing additional security were projects that were done by the same team. There would be a central repository that housed all of the code for all of the business’s needs all in one place.

article thumbnail

Game On: Gamification for the Win

DevOps.com

Staying competitive in today’s fast-moving digital economy is easier said than done. Operating in a digital environment requires a significant shift in company culture and an agile software environment that accelerates time to value. Creating a DevOps environment helps companies keep pace, but it requires a workforce that is empowered, excited and motivated.

Games 99
article thumbnail

Why Personal Core Values are Vital to the Success of Your Journey and Business

CEO Insider

Go Beyond Crafting a Mission Statement and Actually Live Out Your Beliefs: Years ago, I launched upon a journey from being a typical “Type A” CEO to becoming a more dedicated father, a more effective leader, and an overall better human being. During this pilgrimage of self-discovery, I came to the bitter realization that, while […].

79
article thumbnail

How Your Product Team Can Integrate Security Throughout Software Development Lifecycles

CTOvision

Read Harshit Agarwal explain how you can integrate security throughout software development lifecycle on Information Security Buzz : Integrating security into DevOps to deliver DevSecOps is no easy task: It requires changing the team’s mindset, processes, and technology. Each company’s ultimate goal should be to keep DevOps collaborative and agile, which means making security silent […].

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

5 ways to shift your app sec team's focus to the supply chain

TechBeacon

On April 12, 2017, four computers at utility-software firm Piriform, previously compromised, quietly reached out to the Internet and downloaded and installed a remote-access Trojan known as ShadowPad.

article thumbnail

The Challenge of Securing Open Source Applications

DevOps.com

As enterprises have increased their reliance on applications over the years, there has been a significant rise in the use of reusable software components such as third-party libraries and open source code. This makes perfect sense, as this development method makes it possible to add value to applications and other software offerings quickly and easily. […].

article thumbnail

Complete Guide to HL7 Standards

Datica

HL7 (Health Level 7) is one of the most commonly used healthcare standards worldwide, supporting clinical practice and the evaluation, delivery, and management of health services. HL7 provides a framework that helps govern how electronic health information is retrieved, shared, exchanged and integrated. The standards define how patient information is structured, packaged and communicated between disparate parties and also sets the data types, structure, and language needed for seamless integrat