Author: dojo.live

dojo.live Recap 172 – AI digital diagnostic for humans and animals – AI’s impact on online grocery shopping

On this dojo.live recap show we are highlighting the key points from last week interviews. We had two shows: Real-World, AI-Based Digital Diagnostic Solutions for Human, Veterinary and Environmental Clinics and Labs with Ben Cahoon CEO @ Techcyte Grocery 3.0 with Henry Michaelson / Gabriel Nipote Co-Founder & CTO and Co-Founder & COO You can Read More…

Podcast: Grocery 3.0

Henry Michaelson is the Co-Founder and the Chief Technology Officer of Halla. Throughout his tenure as CTO, Henry has played a pivotal role in Halla’s growth and success. He spearheaded the development of Halla’s MVP, an AI grocery recommendation product, and supervised the creation of two mobile apps previously released by the company. Henry’s leadership Read More…

Podcast: Real-World, AI-Based Digital Diagnostic Solutions for Human, Veterinary and Environmental Clinics and Labs

Mr. Cahoon is a serial entrepreneur that earned an undergraduate degree in Computer Science and an MBA from Brigham Young University. For the past seven years he’s helped launch Techcyte working on everything from the product to projections, marketing, partnerships and funding. He’s worked in large ventures such as Intel, Lenovo and start-ups in Digital Read More…

Installation package managing and lighter working containers using Docker

SummaryAs a developer, it’s common to download tool packages that help us create projects, such as a language, a library, a framework, or a mix of all of those.If we add Docker to this combination, we can see the importance of downloading these packages since by default a Docker container has nothing inside it, and it is through an image that we communicate to Docker the packages that we need to download and install to work. Downloading and installation can take a long time, and the problem increases if this has to be repeated a number of times.

What is Zero Trust Data Security? Principles and Benefits

How do companies secure infrastructure when there is no traditional network edge? Now networks can be in the cloud, local, or a hybrid, with resources and users dispersed globally. Companies need the right technology practices in place to address the security concerns arising from complex and widespread infrastructure. Zero trust data protection is an approach companies can take to secure networks, but what is zero trust? Read on to learn the principles and benefits of zero trust data security. 

Decentralized Identity Principles, Applications, and Benefits

Centralized identity systems are vulnerable to many issues, such as constant attacks, data breaches, slow verification, and fraudulent activity. Malicious parties can easily fake credentials, leading to devastating consequences, while legitimate parties can get bogged down in bottlenecks created by manual verification systems. Decentralized identity, and decentralized identifiers (DID), enter as a verifiable cryptographic alternative to address these challenges, and many more, that centralized identity systems present. Encora created this guide to define decentralized identity, explain how it works, describe three major applications, and outline the benefits it unlocks. 

Deployment Guide for Serverless CI/CD

Now that cloud-based solutions are nearly ubiquitous, companies are looking for ways to achieve more autonomy and decouple from cloud-based providers. Serverless CI/CD is a technology practice that addresses the challenges and dynamics of tight coupling with a provider and integrating new code. This guide defines serverless CI/CD, explains the working principles, and examines why it is rising in popularity. 

Guide to Shift Left Security for the Enterprise

As companies advance digital transformation and move more assets to the cloud, app security and workload protection concerns rise. Hackers and malicious parties always look for vulnerabilities, and companies need the right technology practices. Traditionally, code is evaluated for security loopholes before it is released, but this is not always the best approach. Delaying security assessments and creating security measures until late in the development phase can raise costs, increase risks, and undermine the overall effectiveness of security. For the most effective results, application security must be prioritized early on and throughout the development lifecycle, and shift left security helps

Guide to Ethical Use of Data

Data is extensively available. Countless devices collect and track highly valuable information. The information is also commonly sensitive, highly personal, or proprietary information. It involves personal information, intellectual property, and other unique attributes. There is a strict mandate for a technology practice that balances the dialectics of privacy requirements with the benefits of using data for insights to improve business operations, advance research, and more. This is where data ethics comes into play. This guide defines data ethics, discusses the importance and principles of data ethics, and explores examples of ethical use of data. 

dojo.live Recap 170 – Creating High-Performance Teams with NeuEon Inc

On this dojo.live recap show we are highlighting the key points from last week interviews. We had one show: Proven Techniques for Creating High-Performance Teams with Scott Weiner, Fractional CTO, Transformation Practice Lead @ NeuEon, Inc. You can check out all the shows anytime right here: www.dojo.live/interviews/ Please follow us: @dojo.live #technology #culture #innovation #dojolive Read More…

Complete Guide to Ethical AI: History, Challenges, and Benefits

As more and more companies use AI to build scalable solutions, some surprising challenges are arising. AI models are trained on actual data, and real data is laden with biases of society. When the AI models are operationalized to issue lines of credit or enhance patient care, for example, the models have the power to shine a bright spotlight on areas of injustice. Questions arise about accountability, control, and humanity itself. And this is merely the beginning. Ethical AI is designed to leverage AI’s power for society’s betterment, establish specific guidelines to support this effort, and proactively mitigate risks. This guide

What is WebAssembly and How is it Used?

New solutions and sudden requirements are emerging amid rapid digital transformation across every industry and facet of life. Legacy systems must be enhanced or replaced to power new use cases. JavaScript has reigned as a coding language for over two decades. While it is still widely applicable, there is a growing need to minimize latency and lag time and enable new, superfast applications. In sweeps, WebAssembly is an answer to the needs and a driving force for unprecedented growth. But what is WebAssembly? This guide outlines the emerging technology practice, explains how WebAssembly works, discusses use cases, and highlights the benefits.