December, 2016

article thumbnail

The half-life of code & the ship of Theseus

Erik Bernhardsson

As a project evolves, does the new code just add on top of the old code? Or does it replace the old code slowly over time? In order to understand this, I built a little thing to analyze Git projects, with help from the formidable GitPython project. The idea is to go back in history historical and run a git blame (making this somewhat fast was a bit nontrivial, as it turns out, but I’ll spare you the details, which involve some opportunistic caching of files, pick historical points spread out in

Linux 224
article thumbnail

9 Ways to Strengthen Your Personal Brand

Let's Grow Leaders

If you Google you, do you like who shows up? Do you feel like you’ve got a powerful message to share, but without the right positioning, find yourself talking to the metaphorical mute button? Are you having trouble outgrowing an outdated reputation at work? Or maybe you’re just looking to get a better seat at the table. 9 Ways to Strengthen Your Winning Well Brand.

Games 198
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tune-In Tonight – 9pm Eastern – SiriusXM Radio Ch125

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. Turn your radio dials to SiriusXM Channel 125 tonight at 9pm Eastern (6pm Pacific) for the #GeneralLeadership Hour on the David Webb Show! On the first Wednesday of every month, we strive to bring you the opportunity to engage with our team and our guests virtually and on-the-air with the radio program and live Twitter stream.

article thumbnail

The Report The Cybersecurity Commission Should Have Sent To the President and President Elect

CTOvision

Bob Gourley. On 1 December The Commission on Enhancing National Cybersecurity issued their key deliverable, the report on Securing and Growing The Digital Economy. That is a good report. For policy-makers new to cybersecurity the introduction recaps issues the nation has been dealing with for quite some time now. And the many recommendations are things we should all support.

Report 132
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

What is Your Company’s Human Operating System?

N2Growth Blog

I bet if I asked you what your company is all about you’d give me that same ol’ rehearsed elevator pitch. You’d be able to tell me what it does and why it’s important. But, if I asked you how. You just might stall. The answers on “ how ” a business does what it does lies in its unique combination of systems that governs how it executes its mission.

More Trending

article thumbnail

The half-life of code & the ship of Theseus

Erik Bernhardsson

As a project evolves, does the new code just add on top of the old code? Or does it replace the old code slowly over time? In order to understand this, I built a little thing to analyze Git projects, with help from the formidable GitPython project. The idea is to go back in history historical and run a git blame (making this somewhat fast was a bit nontrivial, as it turns out, but I’ll spare you the details, which involve some opportunistic caching of files, pick historical points spread out in

Linux 100
article thumbnail

Five Ways to Win Well with Your Assistant

Let's Grow Leaders

He’s in the background responding to emails, setting appointments, or fixing your website. She’s overseeing projects, and clicking off those daily/weekly/monthly tasks that you may forget about while you focus on what YOU do best. He’s the glue that keeps things together, she’s the one who graciously gatekeeps, protecting your time and workload when she can.

article thumbnail

Leading Teams to Greatness – Part 3

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “Good tactics can save even the worst strategy. Bad tactics will destroy even the best strategy.” -Gen George Patton. Planning for greatness is very important, but just like the surfer sitting in the lineup at some point you have to actually drop in and ride the waves.

article thumbnail

Clearing up Lingering Confusion Around What Big Data Really Is

CTOvision

Brigg Patten. Big data is a buzz term in many industries, but many people still do not understand the concept of it. Data analysis tools can benefit any company, and new tools are being invented every year. The tools are designed for specific industries, and a company's staff may need specialized training. An elearning company can give everyone an interactive learning experience.

Big Data 126
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Positive Illusions May Be A Leader’s Secret Weapon

N2Growth Blog

What’s the secret to a long-term relationship? “Overlooking the negative and focusing on the positive,” says Helen Fisher, a best-selling author on relationships and a fellow at the Kinsey Institute. Speaking on NPR’s Diane Rehm Show , Fisher says that brain scans of couples averaging 20 years revealed the parts of the brain that were active were those linked to empathy, self-control, and an ability to overlook negative, that is, “positive illusions.”.

Games 110
article thumbnail

Reach For Greatness: The 12 Steps To The Leadership Summit

Terry Starbucker

I’ve been fortunate enough over the course of my 34-year career to have arrived at what I call the leadership summit – a high place of great business success and personal satisfaction, and a fulfilling culmination of years of effort, determination, and dedication. On many occasions since that achievement I’ve been asked the “ How did you do it?

article thumbnail

The Complete Guide to Cross Cultural Design

Toptal

Designing across cultural boundaries has broad implications and presents challenges Google Translate can’t solve. Cultural tendencies, values, and taboos must be considered in addition to language.

Culture 111
article thumbnail

5 Questions to Help You Resolve Your Conflict

Let's Grow Leaders

We’d both been looking forward to it–our first Thanksgiving together. We’d each been the primary holiday cooks in our previous marriage, which can feel lonely and overwhelming at times. But not this year. Now we had each other. We’d planned the perfect menu the week before while eating sushi over candlelight. We’d had fun shopping.

How To 173
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

3 Elements of A Shared Mental Model…The Thunderbird Way

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. The secret of happiness is: find something more important. than you are and. dedicate your life to it. Daniel Dennett, Philosopher. The U.S.A.F. Thunderbirds move in unison, seemingly thinking and acting as one…at over 1,000 miles-per-hour.

article thumbnail

Quick Look On Report of the President’s Commission on Cybersecurity

CTOvision

Bob Gourley. The report of the President's Commission on Enhancing Cybersecurity has just been posted to the White House Website. You can download the report here ). My quick thoughts: If you are a technologist or a security expert or have been tracking security issues, you can skip the first 10 pages. You know the state of things. This section is not meant for you.

Report 115
article thumbnail

We’ve Lost Our Collective Identity and It’s Killing Your Business

N2Growth Blog

Leading an U.S.-based business during these volatile times in our history has never been more challenging. Race relations are being tested every day across the country. There’s a threat that emerging public policy may wipe-out a large portion of the lower-end labor force. The direction of international business dealings is in question as the promise of new trade laws and tariffs looms.

article thumbnail

Developers’ side projects

Joel on Software

Pretty much 100% of developers working for other people end up signing some kind of “proprietary invention agreement,” but almost all of them misunderstand what’s going on with that agreement. Most developers think that the work they do at work belongs to their employer, but anything they work on at home or on their own time is theirs.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

How to Make an Android and iOS App in C# on a Mac

Toptal

In the past few years, Microsoft has pulled a few aces from up its sleeve. Yes, they messed up Skype, failed with smartphones, and almost succeeded with tablets. But, they did some really amazing things as well. Relinquishing their closed empire approach, they open-sourced.NET, joined the Linux Foundation, released SQL Server for Linux, and created this great new tool called Visual Studio for Mac.

Linux 107
article thumbnail

4 UGLY Conversations to With Your Team Before Year End

Let's Grow Leaders

The second half of December is a great time for recognition, celebration, white elephant gifts and other fun. Yes, yes, please do all that, but don’t stop there. The best holiday gift you can give your team is to “own the ugly.” To help your team have the tough conversations they’re longing to have. To stare squarely in the face of what’s not working and clear the decks for a remarkable 2017.

article thumbnail

Anarchy in the Workplace

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “…truly successful decision making relies on a balance between deliberate and instinctive thinking”. -Malcolm Gladwell, from Blink. What do you think of when you read the title? Do you think of an organization that lacks regulation, rules and policies, and a requirement to gather a large amount of information to be analyzed before making a decision?

Policies 149
article thumbnail

Cyber Intelligence and Defense for the Public Sector, Part 3: The Rise of Active Defense

CTOvision

Marty Meehan. Historically, the public sector has focused on a narrow set of cyber threats. Espionage and insider threat were among the primary focus areas given limited public-facing services and air-gapped infrastructure. However, as recent high-profile breaches have illustrated, the infrastructure at federal agencies today is far more integrated than ever before, and transparency initiatives have increased the amount of public-facing data and services.

Analysis 111
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

7 Essentials for Any Woman on a Business Trip

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Travel 103
article thumbnail

How to Change a Struggling Culture

Steve Farber

Mitch Luciano had worked for Trailer Bridge for three years, and things weren’t going well for the Florida-based logistics company. They had churned through three CEOs in as many years, and the business was generating about a one percent annual return on investment. They needed to turn things around, and they needed to do it fast. In 2014 the company’s board moved Luciano into the president role (he didn’t want the CEO title, and who could blame him?

Culture 99
article thumbnail

A Node.js Guide to Actually Doing Integration Tests

Toptal

Your software isn’t fully tested until you write integration tests for it. While unit tests help ensure that functions are properly written, integration tests help ensure that the system is working properly as a whole. In this article, Toptal Software Engineer Luka Blažecki uses Node.js to explain why integration testing is important for every development platform and how to write clean, composable integration tests.

Testing 104
article thumbnail

Five Ways to Win Well with Your Assistant

Let's Grow Leaders

He’s in the background responding to emails, setting appointments, or fixing your website. She’s overseeing projects, and clicking off those daily/weekly/monthly tasks that you may forget about while you focus on what YOU do best. He’s the glue that keeps things together, she’s the one who graciously gatekeeps, protecting your time and workload when she can.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Holiday Break – We’ll Be Back on January 9th!

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “ As we express our gratitude, we must never forget that the highest appreciation is not to utter words, but to live by them.” John Fitzgerald Kennedy. It’s that festive time of the year when we pause to spend time with our families and focus on what is important: our relationships.

article thumbnail

Cyber Intelligence and Defense for the Public Sector, Part 2: The Growth and Importance of Threat Intelligence

CTOvision

Marty Meehan. As attested to in our previous post in this series, the dynamic nature of today’s cyber threats has led to the evolution of cyber threat intelligence as an essential component of every enterprise’s cyber risk reduction strategy. Threat intelligence provides organizations with the information needed to make smarter, data driven decisions about protecting their sensitive information and IT assets.

Analysis 106
article thumbnail

Why leaders need to engage employees

Lead on Purpose

Many managers have an unspoken expectation that employees are responsible for motivating themselves. Their idea goes like this: since the company pays them, they should do what they’re told, and happily complete any task put in front of them.

Company 99