SlideShare a Scribd company logo
1 of 156
Download to read offline
KILLING ZOMBIE
SOFTWARE
please design software to
die gracefully
http://www.flickr.com/photos/scottpoborsa/
PART ONE
WELCOME TO THE
ZOMBIE
APOCALYPSE
whether you work in a
mega MNC or a sexy lean
start-up
today’s software
professional is at the
heart of a zombie
apocalypse.
for the last 30 years,
we’ve learned how to
build more stuff, faster
but we’ve spent very
little time learning how
to get rid of it.
the result is platform
sprawl
with software products
and features that are
long dead, but which still
walk the earth
“grawwww”
this is not sustainable.
if we don’t act now, the
zombies will win
this deck hopes to start a
discussion about how we
escape the apocalypse
and kill all those software
zombies!
IDEA ONE
ALL SOFTWARE
NEEDS TO DIE
here is a law of nature.
all software needs to die.
either the business needs
will change
or newer technologies
will arise
either way, all software
will eventually become
obsolete.
(and when I say eventually,
given biz / innovation speed, I
mean 3-5 years for a big firm
and 6 – 12 months for a small
one)
so, knowing this
one thing is clear
we need a graceful way
to get rid of obsoleting
software.
IDEA TWO
IT IS HARD TO KILL
SOFTWARE
unfortunately, shuffling
off this mortal code is not
so easy.
killing software can be
near impossible.
there are technical
reasons for why this is
true.
for example, in complex
platforms where many
bits of software interact
upstream, downstream,
and service to service
changing one piece can
have profound impact
across the sprawl.
decoupling a dying
technology can become a
feat of engineering
like a mad game of jenga.
and there are people
reasons too.
killing software can easily
look like (or actually be)
killing jobs.
newer business flows or
gadgetry render existing
personal skill sets
obsolete.
making way for the new
is scary and/or
threatening to the people
that own it.
moreover, there are
budgetary reasons
supporting all this legacy
software is extremely
expensive.
we spend so much
keeping the platform
afloat, that we’ve
nothing left to dig
ourselves out of the hole
we’re in.
(today some firms spend 60-
70% of their IT budget
maintaining the existing
platform)
IDEA THREE
IT IS EASY TO
MAKE NEW
SOFTWARE
worse yet, not only are
we not killing software,
but we’ve just enjoyed 30
years of high-speed
build-out.
so for every 1 zombie we
failed to kill, 9 more
future zombies arose.
in the growing
economies from 1980 to
2008, businesses simply
threw money at the
platform.
the mantra was build,
build, build!!!!
and where we could not
grow organically
we merged, and we
acquired
adding duplicative
software on top of
duplicative software.
as a result
organizations today are
living with massive and
intractable platform
sprawls
made up of dozens,
hundreds, and in many
cases thousands of
vestigial bits of software
of which, perhaps, 30% is
actually needed
which means that 70% of
our software is
ZOMBIE SOFTWARE!!!!!!
IDEA FOUR
ZOMBIES SUCK
zombie software eats you
alive, starting with the
brain
since only 30% of your
budget can be spent on
Innovation
PS: In many firms, ¾ of that 30% is spent meeting
regulatory enhancements, not really innovation
not much innovation
actually happens
and even the innovation
that can happen
is burdened with the
huge technical barrier to
entry
of integrating with the
legacy platform from
birth
and who wants to work
in a neighbourhood full
of zombies
in today’s zombie sprawl
your best, most highly-
paid geek superstars will
be as bored as sh*t
finally, all this vestigial
technology creates great
complexity
and complexity means
greater risk of failure
and longer times
diagnosing and
recovering from failure
which means bigger
support organizations
which means less money
to innovate
which means life sucks
PART TWO
HOW TO KILL
ZOMBIE
SOFTWARE
when you think of it this
way
zombie killing looks to be
one of the most
important core skills of
today’s technologist
but what weapons can
you wield
as a master zombie slayer
i’m proposing 5 weapons
but I welcome feedback
from the crowd if you
have creative ideas
WEAPON ONE
Admit that you
have a Problem
the first thing you
need to do is to
quantify how bad
things are
because otherwise,
the budget holders
will continue to ignore
you.
knowing how bad
things are means
cleaning up your
application inventory
so that you really
know how much
you’ve got, and how
much it costs.
I know
MIS data cleaning is
really, really, really,
really, really, really,
really, really, really,
boring work
but if you want to be a
master zombie slayer,
it’s part of the job
come to terms with
spreadsheets
make them your
friends
most importantly, stop
sniping and take small,
steady steps.
once you know how
bad your problem is
it’s time to budget for
resolution
this means business
cases, time/cost/benefit
estimates, lobbying,
negotiation, and
prioritization
but remember
technology is the one
that said it wanted to
think like the business
so here is your chance
get involved with your
business partners
and start solving this
business problem
WEAPON TWO
Design for
Deprecation
most software
development life cycle
plans
look a lot like the Iraq
War
no exit plan.
with no exit plan
it’s no wonder that we
cannot kill zombie
software.
while it is probably fair
for developers in the
trenches
to leave the high-level
platform strategy to
power-point-pushers
it is our responsibility
to make the right
strategic decisions with
day-to-day code
and that means
designing exit plans
into your code.
my advice is to add a
project checkpoint into
your development
process.
before you deploy your
code into the platform
make sure you have
built in the means to
deprecate it gracefully
better yet, add a
chapter to your
business requirements
document
and work through the
exit plan with the
business
and if you are one of
them new fangled,
fancy, agile punks
then explicitly build exit
into your scrum
WEAPON THREE
Encapsulate
one of the most
important design-for-
deprecation tools is
encapsulation
you remember that
thing the prof in object-
oriented design 101
kept going on about
encapsulation means
that you create air-tight
black boxes with clear
fully-functional
interfaces
when you want to
replace a black box, it is
easy because nothing
in the surrounding
platform cares about
what is inside
because they never
knew what was inside
in the first place
so long as you
implement the original
interface, you can kill
off the original code
and replace it without
disruption.
add to that the driver
design pattern, and
we’re ready to roll on a
zombie-slaying
expedition.
and encapsulation
works at every level of
zoom, like a fractal
it works for
functions, objects,
applications, services,
hardware, networks,
business units (think
outsourcing), or whatever
all that said, my point is
this
as a matter of
professional pride,
don’t allow your code
to go into production
without encapsulation
WEAPON FOUR
Know Your Enemy
Ok, so I get that when
you push your
software into the wild
things get squishy
for example, other
software grabs your
output, reformats it
and sends it out as
input into something
else.repeat()
and you quickly lose
track of who depends
on you
now I am not saying I
have a perfect
answer, but a master
zombie slayer will
work it out for their
project
if latency is not an
issue, log third party
requests so you know
who to notify when
you need to exit
this could even be
done manually with a
register owned and
managed by the
application owner
whatever the case, a
master zombie slayer
will make sure that
she does not
contribute to
platform spaghetti
WEAPON FIVE
Nuke and Restart
we invest too much
of our emotion and
identity into our
things
it is a human
biological fixed action
pattern to fall pray to
the fallacy of sunk
costs
what I am trying to
say is, don’t be afraid
to rip it all down and
start again
we don’t do that
enough with our
platforms
we fix and mend
and fix and mend
until all that is left
is…well…a zombie
i am not actually
proposing build for
the sake of build
but I am saying that
we don’t consider the
option enough
and that starting
from scratch is often
a cheaper, better
option
certainly, anyone who
has used the
minimum viable
product model
knows that version 1
is necessarily wrong
and that version 2 should
be designed from the
ground up or it will be
forever tied to the faulty
assumptions you
uncovered in the MVP
anyway, just seriously
consider the option from
time to time so you know
you are not throwing
good money after bad
PART THREE
OUT
if you’ve gotten this
far
wow!
but don’t stop here
please join me in the
discussion
give me your ideas on
new weaponry
i’ll add it to this deck
and we can build
something really
useful
SHARE THIS DECK
& FOLLOW ME(please-oh-please-oh-please-oh-please)
stay up to date with my future
slideshare posts
http://www.slideshare.net/selenasol/presentations
https://twitter.com/eric_tachibana
http://www.linkedin.com/pub/eric-tachibana/0/33/b53
CLICK HERE FOR MORE!!!!

More Related Content

Similar to Killing Zombie Software - Technology Exit Planning

Big guns for small guys (reloaded)
Big guns for small guys (reloaded)Big guns for small guys (reloaded)
Big guns for small guys (reloaded)Jorge López-Lago
 
Minecraft Moodding Community Analysis
Minecraft Moodding Community AnalysisMinecraft Moodding Community Analysis
Minecraft Moodding Community AnalysisCecilia Lucero
 
A Big Dashboard of Problems.pdf
A Big Dashboard of Problems.pdfA Big Dashboard of Problems.pdf
A Big Dashboard of Problems.pdfTravisMcPeak1
 
From DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysFrom DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysOri Pekelman
 
Stay Anonymous app report
Stay Anonymous app reportStay Anonymous app report
Stay Anonymous app reportZx MYS
 
What every developer can learn from startups
What every developer can learn from startupsWhat every developer can learn from startups
What every developer can learn from startupsOleg Podsechin
 
The World Of Computer Programming
The World Of Computer ProgrammingThe World Of Computer Programming
The World Of Computer ProgrammingAshley Gomez
 
It is difficult
It is difficultIt is difficult
It is difficultPVS-Studio
 
Building real things for real people 2009
Building real things for real people 2009Building real things for real people 2009
Building real things for real people 2009Justin Ferrell
 
Nt1310 Unit 2 Individual Assignment
Nt1310 Unit 2 Individual AssignmentNt1310 Unit 2 Individual Assignment
Nt1310 Unit 2 Individual AssignmentCathy Baumgardner
 
Reactive Microservice Architecture with Groovy and Grails
Reactive Microservice Architecture with Groovy and GrailsReactive Microservice Architecture with Groovy and Grails
Reactive Microservice Architecture with Groovy and GrailsSteve Pember
 
Resisting The Feature Creature
Resisting The Feature CreatureResisting The Feature Creature
Resisting The Feature CreatureChristian Heilmann
 
Rapid Prototyping 2015: Its a Mad Mad World
Rapid Prototyping 2015: Its a Mad Mad WorldRapid Prototyping 2015: Its a Mad Mad World
Rapid Prototyping 2015: Its a Mad Mad WorldMarti Gold
 
Microinteractions
MicrointeractionsMicrointeractions
MicrointeractionsDan Saffer
 
'10 Great but now Overlooked Tools' by Graham Thomas
'10 Great but now Overlooked Tools' by Graham Thomas'10 Great but now Overlooked Tools' by Graham Thomas
'10 Great but now Overlooked Tools' by Graham ThomasTEST Huddle
 

Similar to Killing Zombie Software - Technology Exit Planning (20)

Big guns for small guys (reloaded)
Big guns for small guys (reloaded)Big guns for small guys (reloaded)
Big guns for small guys (reloaded)
 
Minecraft Moodding Community Analysis
Minecraft Moodding Community AnalysisMinecraft Moodding Community Analysis
Minecraft Moodding Community Analysis
 
A Big Dashboard of Problems.pdf
A Big Dashboard of Problems.pdfA Big Dashboard of Problems.pdf
A Big Dashboard of Problems.pdf
 
From DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysFrom DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed Apidays
 
Clever Messenger Review
Clever Messenger Review Clever Messenger Review
Clever Messenger Review
 
Stay Anonymous app report
Stay Anonymous app reportStay Anonymous app report
Stay Anonymous app report
 
TxJS 2011
TxJS 2011TxJS 2011
TxJS 2011
 
What every developer can learn from startups
What every developer can learn from startupsWhat every developer can learn from startups
What every developer can learn from startups
 
The World Of Computer Programming
The World Of Computer ProgrammingThe World Of Computer Programming
The World Of Computer Programming
 
Software piracy
Software piracySoftware piracy
Software piracy
 
It is difficult
It is difficultIt is difficult
It is difficult
 
Building real things for real people 2009
Building real things for real people 2009Building real things for real people 2009
Building real things for real people 2009
 
Designing bots
Designing botsDesigning bots
Designing bots
 
Nt1310 Unit 2 Individual Assignment
Nt1310 Unit 2 Individual AssignmentNt1310 Unit 2 Individual Assignment
Nt1310 Unit 2 Individual Assignment
 
Reactive Microservice Architecture with Groovy and Grails
Reactive Microservice Architecture with Groovy and GrailsReactive Microservice Architecture with Groovy and Grails
Reactive Microservice Architecture with Groovy and Grails
 
Resisting The Feature Creature
Resisting The Feature CreatureResisting The Feature Creature
Resisting The Feature Creature
 
Rapid Prototyping 2015: Its a Mad Mad World
Rapid Prototyping 2015: Its a Mad Mad WorldRapid Prototyping 2015: Its a Mad Mad World
Rapid Prototyping 2015: Its a Mad Mad World
 
Microinteractions
MicrointeractionsMicrointeractions
Microinteractions
 
'10 Great but now Overlooked Tools' by Graham Thomas
'10 Great but now Overlooked Tools' by Graham Thomas'10 Great but now Overlooked Tools' by Graham Thomas
'10 Great but now Overlooked Tools' by Graham Thomas
 
Essay On Software Development
Essay On Software DevelopmentEssay On Software Development
Essay On Software Development
 

More from Eric Tachibana

Intellectual property for entrepreneurs
Intellectual property for entrepreneursIntellectual property for entrepreneurs
Intellectual property for entrepreneursEric Tachibana
 
7Vs and Business Model Validation
7Vs and Business Model Validation7Vs and Business Model Validation
7Vs and Business Model ValidationEric Tachibana
 
Key Person Risk and Succession Planning Workshop
Key Person Risk and Succession Planning WorkshopKey Person Risk and Succession Planning Workshop
Key Person Risk and Succession Planning WorkshopEric Tachibana
 
Advice for Corporate Accelerator Mentors
Advice for Corporate Accelerator MentorsAdvice for Corporate Accelerator Mentors
Advice for Corporate Accelerator MentorsEric Tachibana
 
An Intro to the Financial Services Industry
An Intro to the Financial Services IndustryAn Intro to the Financial Services Industry
An Intro to the Financial Services IndustryEric Tachibana
 
Making the most of your start up mentor workshop - dbs hotspot accelerator
Making the most of your start up mentor workshop - dbs hotspot acceleratorMaking the most of your start up mentor workshop - dbs hotspot accelerator
Making the most of your start up mentor workshop - dbs hotspot acceleratorEric Tachibana
 
Corporate values conversation workshop
Corporate values conversation workshopCorporate values conversation workshop
Corporate values conversation workshopEric Tachibana
 
Rethinking Annual Performance as Workshops
Rethinking Annual Performance as WorkshopsRethinking Annual Performance as Workshops
Rethinking Annual Performance as WorkshopsEric Tachibana
 
Talent Planning Workshop
Talent Planning WorkshopTalent Planning Workshop
Talent Planning WorkshopEric Tachibana
 
Kuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employeesKuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employeesEric Tachibana
 
AWS_asset_configuration_management_whitepaper
AWS_asset_configuration_management_whitepaperAWS_asset_configuration_management_whitepaper
AWS_asset_configuration_management_whitepaperEric Tachibana
 
Steal this idea - 10 Great Start-up Ideation Accelerators
Steal this idea - 10 Great Start-up Ideation AcceleratorsSteal this idea - 10 Great Start-up Ideation Accelerators
Steal this idea - 10 Great Start-up Ideation AcceleratorsEric Tachibana
 
Being on the board of directors - Why it sucks and how to improve it
Being on the board of directors - Why it sucks and how to improve itBeing on the board of directors - Why it sucks and how to improve it
Being on the board of directors - Why it sucks and how to improve itEric Tachibana
 
Talent management strategy
Talent management strategyTalent management strategy
Talent management strategyEric Tachibana
 
Social influence for startups marketers
Social influence for startups marketersSocial influence for startups marketers
Social influence for startups marketersEric Tachibana
 
Information wants to be free
Information wants to be freeInformation wants to be free
Information wants to be freeEric Tachibana
 

More from Eric Tachibana (20)

Intellectual property for entrepreneurs
Intellectual property for entrepreneursIntellectual property for entrepreneurs
Intellectual property for entrepreneurs
 
7Vs and Business Model Validation
7Vs and Business Model Validation7Vs and Business Model Validation
7Vs and Business Model Validation
 
Key Person Risk and Succession Planning Workshop
Key Person Risk and Succession Planning WorkshopKey Person Risk and Succession Planning Workshop
Key Person Risk and Succession Planning Workshop
 
Beautiful Song Lyrics
Beautiful Song LyricsBeautiful Song Lyrics
Beautiful Song Lyrics
 
Advice for Corporate Accelerator Mentors
Advice for Corporate Accelerator MentorsAdvice for Corporate Accelerator Mentors
Advice for Corporate Accelerator Mentors
 
An Intro to the Financial Services Industry
An Intro to the Financial Services IndustryAn Intro to the Financial Services Industry
An Intro to the Financial Services Industry
 
Making the most of your start up mentor workshop - dbs hotspot accelerator
Making the most of your start up mentor workshop - dbs hotspot acceleratorMaking the most of your start up mentor workshop - dbs hotspot accelerator
Making the most of your start up mentor workshop - dbs hotspot accelerator
 
Corporate values conversation workshop
Corporate values conversation workshopCorporate values conversation workshop
Corporate values conversation workshop
 
Rethinking Annual Performance as Workshops
Rethinking Annual Performance as WorkshopsRethinking Annual Performance as Workshops
Rethinking Annual Performance as Workshops
 
Workshops that Work
Workshops that WorkWorkshops that Work
Workshops that Work
 
Talent Planning Workshop
Talent Planning WorkshopTalent Planning Workshop
Talent Planning Workshop
 
What if Trump Won?!?
What if Trump Won?!?What if Trump Won?!?
What if Trump Won?!?
 
Kuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employeesKuala Lumpur CTO Summit - How to fire employees
Kuala Lumpur CTO Summit - How to fire employees
 
AWS_asset_configuration_management_whitepaper
AWS_asset_configuration_management_whitepaperAWS_asset_configuration_management_whitepaper
AWS_asset_configuration_management_whitepaper
 
Steal this idea - 10 Great Start-up Ideation Accelerators
Steal this idea - 10 Great Start-up Ideation AcceleratorsSteal this idea - 10 Great Start-up Ideation Accelerators
Steal this idea - 10 Great Start-up Ideation Accelerators
 
Being on the board of directors - Why it sucks and how to improve it
Being on the board of directors - Why it sucks and how to improve itBeing on the board of directors - Why it sucks and how to improve it
Being on the board of directors - Why it sucks and how to improve it
 
Optical illusions
Optical illusionsOptical illusions
Optical illusions
 
Talent management strategy
Talent management strategyTalent management strategy
Talent management strategy
 
Social influence for startups marketers
Social influence for startups marketersSocial influence for startups marketers
Social influence for startups marketers
 
Information wants to be free
Information wants to be freeInformation wants to be free
Information wants to be free
 

Recently uploaded

IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeNeo4j
 
Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesShyamsundar Das
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxJoão Esperancinha
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024Mind IT Systems
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native BuildpacksVish Abrams
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?AmeliaSmith90
 
Why Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfWhy Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfBrain Inventory
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadIvo Andreev
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmonyelliciumsolutionspun
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...OnePlan Solutions
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilVICTOR MAESTRE RAMIREZ
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLAlluxio, Inc.
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxAutus Cyber Tech
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Jaydeep Chhasatia
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntelliSource Technologies
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIIvo Andreev
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptkinjal48
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsJaydeep Chhasatia
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyRaymond Okyere-Forson
 

Recently uploaded (20)

IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security Challenges
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptx
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native Buildpacks
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?
 
Why Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfWhy Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdf
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-Council
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in Trivandrum
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptx
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptx
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AI
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.ppt
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human Beauty
 

Killing Zombie Software - Technology Exit Planning