Sat.Aug 01, 2020 - Fri.Aug 07, 2020

article thumbnail

Patterns of Distributed Systems

Martin Fowler

Over the last few months, my colleague Unmesh Joshi has been running workshops to teach developers about distributed systems design. In this work he's been delving into many open-source distributed systems and identifying patterns. As he writes them up, he's publishing the patterns on my site. Today he's publishing an initial narrative article that ties the first batch of patterns together, and two of these patterns: Heartbeat and Generation Clock.

System 363
article thumbnail

5 Project Management Skills Every Developer Should Have

DevOps.com

The days of the siloed project manager and “skilled” development team are becoming a thing of the past, thanks to the increasing complexity of dev projects. In many cases, the knowledge gap between the project manager and the developer is large, making it nearly impossible for any non-technical person to effectively manage the entire scope […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Overcome One of the Biggest Challenges of Working From Home

Let's Grow Leaders

The Harvard Business Review article, The Implications of Working Without an Office covers great research about the benefits and challenges of working from home. I highly recommend it. If nothing else to validate those mixed emotions you’re having. Because if you’re like […]. The post How to Overcome One of the Biggest Challenges of Working From Home appeared first on Let's Grow Leaders.

How To 213
article thumbnail

Solve IndentationError: unindent does not match any outer indentation level

The Crazy Programmer

Majority of the time new Python developers face one common problem and that is of IndentationError: unindent does not match any outer indentation level and they are not able to figure out why this error occurred. In this post, I’ll be discussing some of the ways to overcome IndentationError. But before getting started, I’d like to tell you guys that Python is very strict about Indentation and if any of your code blocks is not indented, the interpreter is going to complain about the

Examples 209
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Patterns of Distributed Systems

Martin Fowler

Over the last few months, my colleague Unmesh Joshi has been running workshops to teach developers about distributed systems design. In this work he's been delving into many open-source distributed systems and identifying patterns. As he writes them up, he's publishing the patterns on my site. Today he's publishing an initial narrative article that ties the first batch of patterns together, and two of these patterns: Heartbeat and Generation Clock.

System 363

More Trending

article thumbnail

One Way Smart Leaders Avoid Micro-Managing Remote Team Members

Let's Grow Leaders

Avoid micro-managing remote team members by scheduling a clear finish Recently we spoke with Shawna, an executive who reflected on the past year and the shift to remote work, “We’ve exceeded our goals, but I also am sure that our failure to […]. The post One Way Smart Leaders Avoid Micro-Managing Remote Team Members appeared first on Let's Grow Leaders.

Culture 208
article thumbnail

How can vendors and end users ensure cloud security?

CTOvision

As rates of cloud adoption surge, in part due to the Covid-19 pandemic, Nick Ismail takes a look at how can organizations, and vendors ensure cloud security on Information Age: […].

Cloud 164
article thumbnail

Distributed Systems Pattern: Leader and Followers

Martin Fowler

In a distributed system, it's often best to not make all the nodes equal. Unmesh shows how a leader can simplify coordination across a cluster, and how choosing that leader is often tricky.

System 300
article thumbnail

Growing Racial Equity: Finding Our Way to Action

Agile Alliance

It’s exciting to see Design Thinking work in navigating a path to social change. A journey where listening has led to empathy and understanding, onto myriad solution ideas. We are finding our way to action. Our global designathon for Growing Racial Equity in the Agile Community for Black Lives left us again hopeful. It has … Continued.

Agile 153
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Leading when “What Were They Thinking?”

Let's Grow Leaders

It can be frustrating when your team’s behavior doesn’t make any sense. But those moments where you wonder “What were they thinking?” are also opportunities. In this episode, you’ll get a way forward for the next time you wonder “What were […]. The post Leading when “What Were They Thinking?” appeared first on Let's Grow Leaders.

177
177
article thumbnail

Internet of Things devices: Stick to these security rules or you could face a ban

CTOvision

Insecure Internet of Things devices and other connected products could be banned if they fail to meet basic security standards to be used in homes and businesses. Proposals from the Department […].

Internet 161
article thumbnail

Distributed Systems Pattern: High-Water Mark

Martin Fowler

Unmesh adds High-Water Mark to his collection of patterns. The high-water mark is an index into the log file that records the last log entry that is known to have successfully replicated to a Quorum of followers. The leader also passes on the high-water mark to its followers during its replication. All servers in the cluster should only transmit data to clients that reflects updates that are below the high-water mark. more….

System 212
article thumbnail

Software Craftsmanship

Agile Alliance

I had the great pleasure to interview Sandro Mancuso, one of the most prominent representatives of the Software Craftsmanship community. Sandro is the author of “The Software Craftsman”, one of the most read books in the field. Besides being a popular author, he is an entrepreneur who co-founded Codurance, a software company that serve clients … Continued.

Software 152
article thumbnail

Prepare Now: 2025s Must-Know Trends For Product And Data Leaders

Speaker: Jay Allardyce, Deepak Vittal, and Terrence Sheflin

As we look ahead to 2025, business intelligence and data analytics are set to play pivotal roles in shaping success. Organizations are already starting to face a host of transformative trends as the year comes to a close, including the integration of AI in data analytics, an increased emphasis on real-time data insights, and the growing importance of user experience in BI solutions.

article thumbnail

See You There: 2 Can’t-Miss DevOps Events to Round Out Your Summer

OverOps

Close out your summer with two FREE virtual conferences – GitLab Commit and DevOps World – jam-packed with sessions from your favorite industry thought leaders and chances to win a $200 Visa gift card. As summer speeds by and 2021 looms, COVID-19 has seemingly shown no signs of stopping – but that won’t stop us from connecting with our fellow DevOps enthusiasts.

DevOps 130
article thumbnail

32% Of IT Budgets Will Be Dedicated To The Cloud By 2021

CTOvision

These and many other fascinating insights are from the recently published IDG Cloud Computing Survey 2020. You can download a copy here for free (PDF, 12 pp., opt-in). The survey’s […].

Budget 139
article thumbnail

Dear Staging: We’re Done

DevOps.com

Dear Staging, I’ve been thinking a lot lately, and I’ve come to the decision that it’s time for us to go our separate ways. Our time of working together in the software delivery process has come and gone, and I just can’t look past your shortcomings anymore. I would say it’s not you, it’s me, […]. The post Dear Staging: We’re Done appeared first on DevOps.com.

Software 145
article thumbnail

Agile Mindset : Nail it then Scale it!

Agile Alliance

It is essential to have a growth mindset (which resonates with Agile mindset) when we want to see our organization to grow and the value which it is offering to our Eco-system. My talk will cover difference of Growth and Fixed Mindset, and how we can foster our mindsets into growth mindsets. PLEASE LOG IN … Continued.

Agile 152
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Close your cybersecurity skills gap with untapped talent

TechBeacon

Across all industries and organizations of all sizes, the cybersecurity skills gap continues to pose challenges. Changes to the economy and to the workplace due to the COVID-19?pandemic are compounding the problem.

Industry 145
article thumbnail

Promise.allSettled

David Walsh

The Promise object has many useful functions like all , resolve , reject , and race — stuff we use all the time. One function that many don’t know about is Promise.allSettled , a function that fires when all promises in an array are settled, regardless of whether any of the promises are resolved or rejected. Promise.all is great but then isn’t called if a project is rejected: Promise.all([ Promise.resolve(1), Promise.resolve(true), Promise.reject("Boooooo"), ]).then(_ => consol

145
145
article thumbnail

Are We Nearing the End of IT Service Outages?

DevOps.com

Over the last two decades, the evolution of IT has been more like something a revolution—in some cases, the transformation even unpinning real-life uprisings. Today we’re acutely aware of advances in technology and the internet, particularly as the global COVID-19 pandemic creates a sweeping reliance on tele-everything and online commerce to sustain companies’ livelihood.

article thumbnail

Arriving at better backlog

Agile Alliance

Scrum seduces with its simplicity, common sense and short, but sweet “manual” in form of the scrum guide promising to do “twice the work in half the time”. Yet while it puts a lot of emphasis on the execution, it remains quiet on the topic of defining backlog. In all the rush of getting things … Continued.

SCRUM 152
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Critical API security risks: 10 best practices

TechBeacon

With the meteoric rise of microservices and the rush to build more applications more quickly, APIs are being used more than ever to connect services and transfer data. But with a growing number of smaller application "pieces" trying to communicate with each other, APIs (your own and those from third parties) are becoming increasingly challenging to secure.

article thumbnail

Expanding the Future (of Dev Tooling) with AI

David Walsh

I’m writing to share some news that I’m genuinely excited about, not even just for me but for the rest of the developer community. Many of you know that I’ve been working with companies all over the world for nearly a decade, helping their developers learn JS and build excellence in their development team culture. I’ve always considered myself so fortunate and blessed to be able to engage with such a broad range of JS developers.

Tools 145
article thumbnail

How to Build Accessibility-First Design Culture

DevOps.com

When it comes to digital experiences, every one of us can recount a frustrating interaction with a website or app. For the 61 million American adults with disabilities, lack of website accessibility can transform a frustrating experience to one that inhibits essential activities such as working, shopping and socializing. To improve customer experiences and ensure […].

Culture 145
article thumbnail

The Transformation of a Transformation Agent: How becoming an agile coach challenged everything I thought I knew

Agile Alliance

Coaching 297
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

How Traditional Machine Learning Is Holding Cybersecurity Back

CTOvision

Read why Stephen Salinas says that tradition machine learning is holding back cybersecurity innovation on Infosec Magazine : While global cybersecurity spending now surpasses $100 billion annually, 64 percent of […].

article thumbnail

What you need to know about digital transformation

TechBeacon

Digital transformation is nothing short of a complete makeover. It involves the injection of digital technology into virtually every aspect of an organization, its business processes, and its culture. And the process is accelerating.

article thumbnail

Top Pressing Concerns for CI/CD in 2020

DevOps.com

The tech landscape is changing rapidly. With the need for increased development velocity, CI/CD has become ubiquitous among most organizations. Yet, with the growing number of microservices, CI/CD may be tough to wrangle without the right strategy. At the same time, it’s difficult to keep pace with the constant evolution around CI/CD. So, what is […].