Remove Presentation Remove Systems Review Remove Weak Development Team
article thumbnail

AI & the enterprise: protect your data, protect your enterprise value

CIO

I wrote, “ It may be even more important for the security team to protect and maintain the integrity of proprietary data to generate true, long-term enterprise value. This has made data even more of a target for bad actors and increased the damage resulting from malicious or accidental exposures. Years later, here we are.

article thumbnail

Simple sabotage for software

Erik Bernhardsson

You can of course make a series of obviously bad decisions, but you'd get fired quickly. Technology When joining, require a 6-18 months rewrite of core systems. Split systems along arbitrary boundaries: maximize the number of systems involved in any feature. Encourage communal ownership of systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The CIO’s primary job: Developing future IT leaders

CIO

But it is equally vital to identify those people who can develop into managers and create a path forward for them as well. In my most recent CIO.com article on nurturing high-performing teams , I made a comment that stirred some questions. And if people have bad managers, the results can be less than optimum.

article thumbnail

What is ERP? Enterprise resource planning systems explained

CIO

Enterprise resource planning (ERP) is a system of integrated software applications that manages day-to-day business processes and operations across finance, human resources, procurement, distribution, supply chain, and other functions. ERP systems improve enterprise operations in a number of ways. Key features of ERP systems.

Resources 179
article thumbnail

Insights from your JIRA data to help improve your team

Xebia

Many teams are using Atlassian’s JIRA as an issue tracker, which then becomes a valuable source of information for their daily operations. As a team leader utilizing JIRA, you probably have employed JIRA dashboards to monitor the status of work, usually in context of a (release) planning. “won’t fix”).

article thumbnail

There Is Only One Key Difference Between Observability 1.0 and 2.0

Honeycomb

For every request that enters your system, you write logs, increment counters, and maybe trace spans; then you store telemetry in many places. Under the hood, these are stored in various metrics formats: unstructured logs (strings), structured logs, time-series databases, columnar databases , and other proprietary storage systems.

article thumbnail

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Tenable

Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally. It also addresses errors and emergency protocols.