In this article, I will explain how to create a global function that can be access or reuse by other Transform Message Component within a Mule Application.

First, We need to create a Dataweave File (.dwl) and save it in src/main/resources/modules/. Now,we can define our global custom functions here by using the fun directive and global variable by using var directive. Also note thatthis dwl file should not contain an output directory, body expression, or the separator (—) between header and body sections.

Source de l’article sur DZONE

Of all of the technologies that underpin the 4th Industrial Revolution, AI has undoubtedly received the most hype in terms of its ability to transform the workplace. Breathless tomes have predicted the demise of millions of jobs as automated systems frogmarch their way through workplace after workplace.

Except the reality is somewhat different. A recent report on the state of digital transformation by MIT Sloan Management Review and Deloitte Digital suggests that progress is glacial. This is despite executives telling INSEAD researchers that AI and big data have the biggest potential for disruptive change.


Source de l’article sur DZONE (AI)

In a classical prediction use case, the predicted output is either a number (for regression) or category (for classification). A set of training data (x, y) where x is the input and y is the labeled output is provided to train a parameterized predictive model.

  • The model is characterized by a set of parameters w
  • Given an input x, for the model predicts y_hat = f(x; w) for regression, or the model predicts the probability of each possible class for classification
  • Define a Lost function L(y, y_hat) for regression, or L(y, P(y=a | x), P(y=b | x) …), find the parameters w to minimize L

This problem is typically viewed as an optimization problem and uses a gradient descent approach to solve it.


Source de l’article sur DZONE (AI)

L’usurpation d’identifiants d’appelant est un enjeu majeur dans les communications d’aujourd’hui. Connu dans le petit monde des adeptes du swatting, usurper l’identifiant d’un appelant pourrait aussi être employé pour perturber des secours. Explication. Télécommunicatio…

Cet article Phreaking : quand l’ARCEP veut combattre l’usurpation des identifiants d’appelant est apparu en premier sur ZATAZ.

Source de l’article sur Zataz

A company’s leaders must prepare for the selection, achievement, and continuous improvements of Agile delivery. Only the leadership can evolve and continuously grow the environments in which their people function. Moreover, only these mentors can design the atmosphere that promotes high-performing Agile teams to thrive and deliver excellence. Agile leaders, therefore, must show smarter ways of working so that their people will discover from their personal and professional standards, mentorship and intrinsic motivation. The quest to become an Agilest does not need to be hard. Many leaders have to attempt a new method of management. The process will need to prepare, enable, and challenge their people to attain the highest potential through Agile teachings and practices.

What is not so apparent to leaders is that their people’s knowledge of the processes alone won’t be enough. Agile leaders must take an actual role to guide the new way of working. How many times have I heard from leadership that, "You have my support and contact me if you have any questions"? That way of thinking is a recipe for disaster with Agile. Agile leaders need to involve themselves directly on a daily basis. Get out and walk around, attend daily stand-ups, pop in on Sprint Planning sessions and come to the Sprint Reviews. You want your people to see you are involved with and care about the success of the implementation.

Source de l’article sur DZone (Agile)

Education doesn’t have to be expensive — there are plenty of free courses to brush up on your IT skills that require nothing more than an internet connection and a laptop or smartphone. These eight online education providers offer free programs and courses on nearly any technical domain.

It’s a great way to dip your toe into a new topic with limited commitment, or to stay on top of developing trends and technologies in your industry. Whether you’re interested in changing the direction of your career, just starting out, trying to beef up your resume or just looking to stay on top of technology trends, any of these eight online education providers can help you without breaking the bank.

Source de l’article sur DZone (Agile)

Is Agile maturity a fad or a trend? How can an organization make an informed decision on what level of agility might become achievable before starting a transition? 

Our second webinar addressed the question of Agile maturity and detailed the survey results what indicates an Agile organization. Moreover, we introduced the ‘Agility Assessment Framework," an open source project which aims to provide Agile practitioners with the tools needed to answer these questions:

Source de l’article sur DZone (Agile)

Hiring technical talent has always been one of my most difficult tasks as a startup CTO. Development talent is in short supply for all company sizes, and we’ll see an estimated 30% increase in the number of development positions by 2026. Salaries have increased 15% in the last five years with a 2017 median salary of just over $103K, and salaries will continue to rise at a faster pace as the number of positions increases.

For these reasons, we had to look outside our established hiring channels when building our development team at CUE Marketplace. We needed reasonably-priced talent that could grow as we grew. Our company started in Boulder in a co-working space/coding school called Galvanize. We were lucky to have good candidates right outside our door. It’s been two years since our start, and now we have a solid development team full of boot camp grads. Here are five keys to our success in building that team.

Source de l’article sur DZone (Agile)

This article is featured in the new DZone Guide to API Management: Comparative Views of Real World Design. Get your free copy for more insightful articles, industry statistics, and more!

I remember the final commit like it was yesterday, even though it was several years ago. Six months of work building our application, and we were ready to launch. It followed all of the best practices, the code was perfect (OK, maybe adequate), and it was just in time for the big release. Like an episode of Silicon Valley, we waited to for the numbers— numbers that never came. Instead, after six months of work, we watched as customers expressed interest and then just walked away.

Source de l’article sur DZONE

Aqua Security has been actively participating in the open source community around Kubernetes security, including contributing significantly to the kube-bench project. We have followed that up with the release of the kube-hunter project, named for its ability to hunt for security weaknesses in Kubernetes clusters. Kube-hunter enables Kubernetes administrators, operators and security teams to identify weaknesses in their deployments and address those issues before attackers can exploit them.  

Kube-hunter augments the CIS validation for K8s deployments provided by kube-bench with discovery and penetration testing capabilities. In that respect it works much like an automated penetration testing tool — you give it the IP or DNS name of your Kubernetes cluster, and it will probe for security issues and alert you, for example, if your dashboard is open or your kubelets are accessible. Use kube-hunter to find Kubernetes installations in your environments, assess them for potential security risks, and receive suggestions on remediation for a wide range of vulnerabilities.

Source de l’article sur DZONE