|By Avi Rosenthal||
|March 15, 2014 04:56 PM EDT||
If you think that you know better than others, you probably will not Adapt.
Example 1: A Bank
Few years ago, instead of receiving Web Page with one of my bank account reports, I received an error message.
As the report was consistently displayed correctly, it looks like a bug correction implemented with insufficient Regression Tests.
I notified the bank about the problem. They ignored my report and tried to find my incapability to use a Web Site (after more than 30 years in IT, including many years of using their Web Site).
After a week or two I identified the circumstances in which the report is not displayed correctly: It happens if and only if, the report should be displayed in more than one Web Page.
I send to the bank my analysis + the error message.
Unfortunately, I was not able to correct the bug without Source Code.
The result: Customers, including myself, had to wait two weeks for correction of a bug I could fix in an hour or two, if I could access the Source Code.
example 2: Another Bank
I found that a bank performed a transaction in a bank account I managed, without an order to do it. As the activity was an activity no customer would ask a bank to do, I thought that I had to go to talk to the clerk, who performed it.
Together we found the mistake the bank performed and corrected it. It was a mistake not an intention to steal money from the account.
However, based on my background in Computers Security Systems (Including Penetration Test in another bank), I easily found that someone (probably a bank employee) could use the same mechanism for criminal actions.
I even knew that an American bank programmer was convicted and jailed for stealing customers money using a similar mechanism to the mechanism used innocently in my account.
The Systems should be changed in order to identify unreasonable Orders and check them automatically or manually.
I wrote to the bank expecting that they will fix the vulnerability and thank me. I thought they probably pay me a little amount of money, which I intended to donate to an organization helping children suffering from cancer.
The bank thought that they new better: They ignored my message.
Do I post Spam?
I will list my writing experience and you will answer the question.
My writing activity includes:
1. An article based on my Masters Thesis in Psychology, written by me and my thesis moderator. He is a university Professor. The article was published in Hebrew in a local Scientific Journal.
2. Many articles on various Information Technology topics, which were published in local and European journals and local Web Sites.
3. Three blogs. The other two are written in Hebrew.
4. I participated in ebizq SOA Forum writing my opinion on questions asked.
5. I wrote about 100 articles in the Hebrew Wikipedia. A month ago I received a price for improving a stub article, during a competition for improving stub articles.
6. More than hundreds of posts in Facebook, Twitter, Googl+ and Linkedin (including many Linkedin groups).
Some of the posts received Comments, Likes and Shares.
Yesterday, I tried to post in Linkedin. I received a message that because someone (or some people) reported that a post of mine is Spam, the post will not displayed, but will be submitted to The Group Leader, who will check the post and decide to publish it or not to publish it.
What is the Problem?
There are two Linkedin Groups types:
1. Groups whose policy is to moderate posts prior to publishing.
The group leader is aware of posts he has to moderate. He will probably moderate the posts shortly after they were submitted.
As a member of many Groups of this type, I submitted posts which were published. Nothing was changed due to flagging a post of mine as Spam.
2. Groups whose policy is to publish automatically
The problem is that in those groups the group leader is unaware of Posts waiting moderation. According to Linkedin message it could take weeks until they approve my post and publish it.
Timing could be a significant factor for Posts Publishing.
Linkedin message send to me, recommended applying to Group Leaders and asking them to remove the restriction, so my posts could be published automatically.
I am a member of too many Groups of that type. I prefer to write this post instead of applying to all groups leaders.
It is not a personal problem. Any body's viable posts could be marked as Spam intentionally or unintentionally.
Is Linkedin Spam detection limited?
The answer to this question is Yes.
Linkedin should use the approach used by Anti-Spam Software, based on Bayesian algorithms.
If someone posted many posts and get Likes and Comments do not hurry to restrict him, just because one or few readers marked it as a Spam (intentionally or unintentionally).
On the other hand, if someone posted only 5 posts and many people marked every post as Spam stop him, by a mechanism similar to the mechanism used to stop me or even more extreme procedure.
It should be a gradual process based on additional information.
It looks like Linkedin's approach resembles the approach the Banks in example 1 and example 2 adopted.
According to the answer they send to me, when I suggested that they will improve their Spam detection algorithm, they stick to the current approach.
As anyone can mark any post as Spam, probably they may change their algorithm only after someone will intentionally mark as Spam many posts by leading contributors.
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
Jul. 1, 2015 07:15 PM EDT Reads: 2,520
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of...
Jul. 1, 2015 05:00 PM EDT Reads: 2,226
Conferences agendas. Event navigation. Specific tasks, like buying a house or getting a car loan. If you've installed an app for any of these things you've installed what's known as a "disposable mobile app" or DMA. Apps designed for a single use-case and with the expectation they'll be "thrown away" like brochures. Deleted until needed again. These apps are necessarily small, agile and highly volatile. Sometimes existing only for a short time - say to support an event like an election, the Wor...
Jul. 1, 2015 05:00 PM EDT Reads: 1,650
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Jul. 1, 2015 03:00 PM EDT Reads: 1,949
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect t...
Jul. 1, 2015 02:30 PM EDT Reads: 1,198
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Jul. 1, 2015 02:21 PM EDT Reads: 659
Summer is finally here and it’s time for a DevOps summer vacation. From San Francisco to New York City, our top summer conferences list is going to continuously deliver you to the summer destinations of your dreams. These DevOps parties are hitting all the hottest summer trends with Microservices, Agile, Continuous Delivery, DevSecOps, and even Continuous Testing. Move over Kanye. These are the top 5 Summer DevOps Conferences of 2015.
Jul. 1, 2015 01:00 PM EDT Reads: 1,001
Sharding has become a popular means of achieving scalability in application architectures in which read/write data separation is not only possible, but desirable to achieve new heights of concurrency. The premise is that by splitting up read and write duties, it is possible to get better overall performance at the cost of a slight delay in consistency. That is, it takes a bit of time to replicate changes initiated by a "write" to the read-only master database. It's eventually consistent, and it'...
Jul. 1, 2015 12:00 PM EDT Reads: 1,710
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 1, 2015 11:45 AM EDT Reads: 1,034
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Jul. 1, 2015 10:30 AM EDT Reads: 863
Cloud Migration Management (CMM) refers to the best practices for planning and managing migration of IT systems from a legacy platform to a Cloud Provider through a combination professional services consulting and software tools. A Cloud migration project can be a relatively simple exercise, where applications are migrated ‘as is’, to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or busine...
Jul. 1, 2015 10:00 AM EDT Reads: 1,924
Data center models are changing. A variety of technical trends and business demands are forcing that change, most of them centered on the explosive growth of applications. That means, in turn, that the requirements for application delivery are changing. Certainly application delivery needs to be agile, not waterfall. It needs to deliver services in hours, not weeks or months. It needs to be more cost efficient. And more than anything else, it needs to be really, dc infra axisreally, super focus...
Jul. 1, 2015 10:00 AM EDT Reads: 1,981
The most often asked question post-DevOps introduction is: “How do I get started?” There’s plenty of information on why DevOps is valid and important, but many managers still struggle with simple basics for how to initiate a DevOps program in their business. They struggle with issues related to current organizational inertia, the lack of experience on Continuous Integration/Delivery, understanding where DevOps will affect revenue and budget, etc. In their session at DevOps Summit, JP Morgenthal...
Jul. 1, 2015 09:32 AM EDT Reads: 650
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction. ...
Jul. 1, 2015 09:00 AM EDT Reads: 890
Many people recognize DevOps as an enormous benefit – faster application deployment, automated toolchains, support of more granular updates, better cooperation across groups. However, less appreciated is the journey enterprise IT groups need to make to achieve this outcome. The plain fact is that established IT processes reflect a very different set of goals: stability, infrequent change, hands-on administration, and alignment with ITIL. So how does an enterprise IT organization implement change...
Jun. 29, 2015 12:45 PM EDT Reads: 2,819
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations migh...
Jun. 28, 2015 05:00 PM EDT Reads: 2,050
At DevOps Summit NY there’s been a whole lot of talk about not just DevOps, but containers, IoT, and microservices. Sessions focused not just on the cultural shift needed to grow at scale with a DevOps approach, but also made sure to include the network ”plumbing” needed to ensure success as applications decompose into the microservice architectures enabling rapid growth and support for the Internet of (Every)Things.
Jun. 28, 2015 01:00 PM EDT Reads: 1,920
Mashape is bringing real-time analytics to microservices with the release of Mashape Analytics. First built internally to analyze the performance of more than 13,000 APIs served by the mashape.com marketplace, this new tool provides developers with robust visibility into their APIs and how they function within microservices. A purpose-built, open analytics platform designed specifically for APIs and microservices architectures, Mashape Analytics also lets developers and DevOps teams understand w...
Jun. 27, 2015 11:00 AM EDT Reads: 1,948
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud envir...
Jun. 26, 2015 12:00 PM EDT Reads: 2,257
Sumo Logic has announced comprehensive analytics capabilities for organizations embracing DevOps practices, microservices architectures and containers to build applications. As application architectures evolve toward microservices, containers continue to gain traction for providing the ideal environment to build, deploy and operate these applications across distributed systems. The volume and complexity of data generated by these environments make monitoring and troubleshooting an enormous chall...
Jun. 26, 2015 12:00 PM EDT Reads: 1,562