General knowledge vs. expertise

How much technology does a software architect need to understand?

Is a good software architect like an octopus, forcing its tentacles into everyone’s code? How can the architect be an authority in all technologies used by a system? We discuss the age-old problem of broad vs. focused knowledge with three veteran software architects.

Debunking common vendor security claims

Myths and realities behind security analytics

Security software vendors tend to exaggerate the potential of their tools – to put it mildy. Using real-world attack examples, Niara’s Karthik Krishnan explains why so many enterprise systems are being breached and what cyber security technology is really capable of.

You call that DevOps?

Is DevOps the new black?

DevOps is cool. Correction: DevOps is mainstream. Correction: DevOps has broken through the mainstream and is now quickly catching up on “Agile”, “Big Data” and the almighty “Cloud” as an excessively used buzzword. So how much substance is there to the hype of DevOps?

How to teach computers to learn

Machine learning – An introduction for programmers

If you search Google Scholar for “machine learning”, it returns over 1,800,000 publications. As the buzz around this technology grows, so too does its complexity. Sebastian Raschka, author of Packt’s “Python Machine Learning”, introduces us to the three types of machine learning.

Get your head out of the sand

Securing the BYOD transformation

By 2017 half of all employees with be required to bring their own device to work. Yet around a third of enterprises have yet to implement a BYOD security policy. David Goldschlag, SVP of Strategy for Pulse Secure looks at the security challenges and best practices needed for successful BYOD deployment.