How many times have you had to spell out your name to fellow colleagues and partners on the other side of the world, asked about the spelling of a new open source tool someone introduced you to, or tried to write down the latest DevOps buzzword everyone is using? 

Our guess is quite a lot. That’s why we put together the DevOps phonetic alphabet. Next time you have to spell something out, or you ask for the letters in a word, you will have your very own codeword index. Sure, there’s the NATO phonetic alphabet, but chances are developers will understand the word “QA” much quicker than “Quebec.” It’s also a quick way for developers to communicate with each other without others understanding (though, let’s face it, they rarely do anyway). 

Source de l’article sur DZONE


Introduction to Machine Learning Algorithms

There are two ways to categorize Machine Learning algorithms you may come across in the field.

  • The first is a grouping of algorithms by the learning style.
  • The second is a grouping of algorithms by a similarity in form or function.

Generally, both approaches are useful. However, we will focus in on the grouping of algorithms by similarity and go on a tour of a variety of different algorithm types.


Source de l’article sur DZONE (AI)

I am going to open up a controversial subject, the 10x developer myth.

This subject has been debated by the industry for decades, so why bring it up again?

Source de l’article sur DZone (Agile)

In many projects, the product development workflow has three main concerns: building, testing, and deployment. Each change to the code means something could accidentally go wrong, so in order to prevent this from happening developers adopt many strategies to diminish incidents and bugs. Jenkins, and other continuous integration (CI) tools are used together with a source version software (such as GIT) to test and quickly evaluate the updated code.

In this article, we will talk about Jenkins, applicable scenarios, and alternatives to automated testing, deployment, and delivering solutions.

Source de l’article sur DZONE

Back in 2016 (oh how time flies), the tech industry was abuzz with the word "chatbots." Many were dubbing chatbots as the "new apps", believing that they would completely transform the way we perceive mobile technology. Although we’ll refrain from making such decisive statements, it’s true that this technology has left quite the mark, particularly in the area of user experience. Instead of replacing apps, chatbots have demonstrated an ability to enhance UX. In order to better understand this use case, we’ve handpicked five particular apps that have harnessed the power of chatbots to increase engagement and bolster retention.

Yet before diving into some cool examples, let’s take a brief glance at the way they work, to understand their power and to see how far we’ve come in terms of upgrading the digital interface.


Source de l’article sur DZONE (AI)

I am sure you have heard that software developers are lazy. They don’t do much most of the time and only actually work a couple of hours over the day.

When you are in an assembly plant, for example, assembling televisions, it’s an issue in that type of work if someone stops doing his task for just a couple of minutes. Those couple of minutes will mean that fewer televisions will be produced and when we convert that to money, it will raise the cost of the product.

Source de l’article sur DZone (Agile)

This article is part of the Key Research Findings from the 2018 DZone Guide to IoT: Harnessing Device Data.

Introduction

For this year’s DZone Guide to IoT, we surveyed 522 software professionals on various aspect of the Internet of Things. From this data, we’ve created an article around the potentially waning popularity of IoT development. 

Source de l’article sur DZONE

This article illustrates how Geocoding uncovers the untapped value within generally overlooked insurance categories, such as Life and Annuity, and how it can help address modern-day business challenges remarked by Orszag. While Geocoding in Big Data is gaining prominence within Property and Casualty (P&C), we believe the real opportunity lies in the actuarial adoption of AI framework capable of processing consumable inputs that weren’t visible in the erstwhile "Ease of Geocoding" era.

Establishing this premise for Life and Annuity, we then pivot towards crafting a general purpose Geo-inclusive architecture that can help actuaries of all disciplines apply Machine Learning to solve new generation of business problems, such as, dwindling subscribers or risk-attributed challenges, such as, Adverse Selection.


Source de l’article sur DZONE (AI)

When it comes to application testing, many project managers and test leads do not routinely conduct performance and load testing early in the development lifecycle. Instead, they undertake performance, and load testing after the application is complete, at the point where functional testing is applied. In fact, in many organizations, the performance test is frequently the last step — almost an afterthought — conducted right before the application goes into production.

This approach creates a classic problem: late-stage testing. Whenever testers identify issues, developers must modify the long-finalized code to fix them. These code changes can impact other parts of the application, resulting in breaks. Addressing problems after-the-fact is time-consuming and expensive. Furthermore, any delay in releasing a new feature or a new app can directly impact revenue, competitive position, brand, and adoption.

Source de l’article sur DZone (Agile)

sshLooter – Script To Steal SSH Passwords

sshLooter is a Python script using a PAM module to steal SSH passwords by logging the password and notifying the admin of the script via Telegram when a user logs in rather than via strace which is not so reliable.

It also comes with an installation script install.sh to install all dependencies on a target host machine.

ssHLooter was inspired to steal SSH passwords via another script using Python to implement a PAM module to log failed attempts, the author just had to change the location where passwords were logged.

Read the rest of sshLooter – Script To Steal SSH Passwords now! Only available at Darknet.

Source de l’article sur Darknet