– Interview with Ivan Jelić When supply chains strain and economic forecasts remain uncertain, many executives turn to AI in search of clarity. But while ambition is high, few manage to translate AI potential into scalable, operational outcomes. Ivan Jelić, Group CEO and Managing Director for Switzerland & Germany at Joyful Craftsmen, has spent the past decade helping companies do exactly that. In the conversation that follows, Ivan shares his perspective on why so many AI initiatives struggle, how to choose the right partners, and what it takes to make AI a long-term lever for growth. Many AI initiatives never…
Author: drweb
AI is no longer a niche capability – it is a leadership catalyst. As Microsoft continues to push boundaries with tools like Azure and Fabric, the demands on today’s tech leaders are shifting from execution to orchestration.Gone are the days when leadership was about optimizing operations or protecting the status quo. Modern leaders must be architects of adaptability, guiding their teams through complexity with vision, responsibility, and digital fluency.“The measure of intelligence is the ability to change.” — Albert EinsteinMicrosoft Fabric exemplifies this evolution. By weaving together data, governance, and analytics into a unified ecosystem, it challenges leaders to rethink…
DevOps.com is now providing a weekly DevOps jobs report through which opportunities for DevOps professionals will be highlighted as part of an effort to better serve our audience.Our goal in these challenging economic times is to make it just that much easier for DevOps professionals to advance their careers.Of course, the pool of available DevOps talent is still relatively constrained, so when one DevOps professional takes on a new role, it tends to create opportunities for others.The five job postings shared this week are selected based on the company looking to hire, the vertical industry segment and naturally, the pay…
When starting out with Linux, you may encounter the terms “services” and “daemons” quite frequently, which refer to background processes that play a key role in keeping the system running smoothly, often without requiring any direct user input. Understanding how these components work can help you better manage your system and troubleshoot common issues more efficiently. In this beginner-friendly overview, we’ll explain what services and daemons are, how they function within Linux, and what tools are available to help you control them effectively. What Are Services and Daemons in Linux? Let’s break down what they are, how they differ, and…
A friend was asking for help with some data analysis. This was in PowerBI, and the source data was PII. I asked them to mask the data for me to work with but realized that’s a chore. I could mock it myself with AI.This is part of a series of experiments with AI systems.The ProcessI started by building a table. It’s what I often do to solve problems. I could have asked the AI, but I wasn’t sure what I wanted and across 5 minutes or so I was thinking about the problem and what data was needed.This is a…
Cary, North Carolina, July 10th, 2025, CyberNewsWireIndustry’s Most Comprehensive Mobile Application Penetration Testing Program Addresses Real-World Mobile Security Challenges.INE Security, a leading provider of cybersecurity education and cybersecurity certifications, today launched its significantly enhanced eMAPT (Mobile Application Penetration Testing) certification. The updated certification delivers the industry’s most comprehensive and practical approach to mobile application security testing. CSO Magazine recently recognized eMAPT among the Top 16 OffSec, pen-testing, and ethical hacking certifications for 2025, noting that the eMAPT certifications “offer hands-on training and up-to-date curricula, equipping offensive security professionals with their choice of specialized or broad skill credentialing.” The publication specifically…
This May, the UK government and National Cyber Security Centre (NCSC) introduced the Software Security Code of Practice, a timely and commendable initiative aimed at strengthening the security of software that underpins the UK’s digital infrastructure. Grounded in a “secure by design” philosophy, this code encourages software producers to embed security at every stage of the development lifecycle. This approach has long been championed by those of us working to advance cyber resilience across the industry. Understanding the Code’s Ambition This code of practice outlines 14 principles encompassing secure design, development, build environment security and safe deployment and maintenance practices. Its core…
I am responding late to a T-SQL Tuesday invite from John Sterrett. John’s call is about various ways to grow young data community/speakers. I am going to take a detour for a bit and talk about what held us together as a community for the past 2 decades or so. We worked on a fantastic product – Microsoft SQL Server. It was thriving and growing in strides. Every new release would bring amazing features and stuff to discuss/talk about in a lot of detail. Jobs were plentiful if you claimed expertise in any one area of this vast product. People…
Agentic artificial intelligence, software that can gather context, reason about goals and then act without minute-by-minute human supervision, is no longer science fiction inside DevOps pipelines. Tools like GitHub Copilot, once mere autocomplete sidekicks, now ship with ‘agent’ modes that can open pull requests, roll back failed deployments and chat with incident dashboards while the rest of us sleep. Microsoft says enterprise usage of such agents has more than doubled since 2024. Early adopters are celebrating breathtaking cycle-time reductions, but each new autonomous capability also moves critical decision-making out of human sightlines, subtly reshaping the security surface. This article explores both sides…
Software Bill of Materials (SBOM) is a way to capture the names and versions of all the components used to build an application. It’s a critical tool for software composition analysis (SCA) because it helps us map known vulnerabilities to the components we rely on. Given that 80 to 90% of software application code comes from third-party components, keeping track of these vulnerabilities and updating to patched versions is a vital part of managing the risks these components introduce. If you ask most SCA vendors, they’ll tell you that’s the whole game: Track your components, patch when needed and you’ve…
