Digital transformation mindcandy 12 December 2024
Today’s topics are integration first, dataOps, DNA storage, data, data engineering, advanced manufacturing, AI-empowered citizen developers and cyber security.
Why An Integration-First Strategy Is Key For Businesses To Thrive
How All-In-One Software Can (Negatively) Impact Customers
Unlocking the Future of Data! Discover the New Era of DataOps
https://www.jomfruland.net/unlocking-the-future-of-data-discover-the-new-era-of-dataops/
There’s a notable shift toward incorporating operational practices specifically designed for data environments like MLOps and the burgeoning LLMOps.
This French DNA data startup wants to store all of humanity’s data in something as small as a data center rack
Biomemory is building solutions “for the next century and beyond”
From Lakehouse architecture to data mesh
https://adevinta.com/techblog/from-lakehouse-architecture-to-data-mesh/
The transformative initiatives have been fundamental in converting Adevinta Spain’s lakehouse architecture into a distributed infrastructure aligned with data mesh principles
Data engineering – Hasura: Defeating the data doom loop with supergraph architecture
Many organisations find themselves trapped in a “data doom loop,” where increasing complexity and inefficiency erode trust in data.
Future Trends in Global Advanced Manufacturing
https://thebossmagazine.com/future-trends-global-advanced-manufacturing/
Four major trends: 1. Flexible Manufacturing, 2. From “Physical” to “Information”, 3. From “Group” to “Individual”, 4. Interconnected Manufacturing
How AI-empowered ‘citizen developers’ help drive digital transformation
A shortage of software talent and a rise in user-friendly automation technologies have companies cultivating “citizen developers” — nontechnical employees who use domain expertise and creativity to develop apps, configure automations, and build data analyses that can drive value across the enterprise.
Cybersecurity: Doomed To Fail?
https://www.thecipherbrief.com/column_article/cybersecurity-doomed-to-fail
Close to the entirety of our efforts to counter cyberattacks are devoted exclusively to defensive measures, with almost no discussion of offensive measures.