Sat.Oct 06, 2018 - Fri.Oct 12, 2018

article thumbnail

The hacker's guide to uncertainty estimates

Erik Bernhardsson

It started with a tweet: New years resolution: every plot I make during 2018 will contain uncertainty estimates — Erik Bernhardsson (@fulhack) January 7, 2018. Why? Because I’ve been sitting in 100,000,000 meetings where people endlessly debate whether the monthly number of widgets is going up or down, or whether widget method X is more productive than widget method Y.

Groups 267
article thumbnail

How social science research can inform the design of AI systems

O'Reilly Media - Data

The O’Reilly Data Show Podcast: Jacob Ward on the interplay between psychology, decision-making, and AI systems. In this episode of the Data Show , I spoke with Jacob Ward , a Berggruen Fellow at Stanford University. Ward has an extensive background in journalism, mainly covering topics in science and technology, at National Geographic , Al Jazeera, Discovery Channel, BBC, Popular Science , and many other outlets.

Research 215
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Difference between Top-down and Bottom-up Approach in Programming

The Crazy Programmer

Here you will learn about difference between top-down and bottom-up approach. Today we are going to have a comparative study of the two approaches being used in field of structured and object oriented programming. We shall start with a brief understanding of the both followed by comparison and conclusion. Image Source. When talking in terms of computer science and programming, the algorithms we use to solve complex problems in a systematic and controlled way are designed on the basis of two appr

article thumbnail

7 Steps to Stop the Drama – a Leader’s Ultimate Guide

Let's Grow Leaders

Life is crazy; work doesn’t have to be. Stop the drama and get back to work. Do you work with a drama addict? Are you desperate to stop the drama and focus on real work? Maybe you have a boss who thrives […]. The post 7 Steps to Stop the Drama – a Leader’s Ultimate Guide appeared first on Let's Grow Leaders.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How to apply Agile Testing Quadrants in a retrospective format

Xebia

Agile Test Quadrants (Adaptations by Gojko Adži?) I’ve been successfully using the Agile test quadrants in retrospectives to stimulate in-depth team discussions on software quality and its improvement. The quadrant model was originally developed by Brian Marick, and then popularized by Lisa Crispin and Janet Gregory in their book, “Agile Testing: A Practical Guide for Agile […].

Agile 157

More Trending

article thumbnail

Django Custom Webpage

The Crazy Programmer

In this tutorial, we’re going to create our first custom webpage in django. The main goal of this article for you to understand the whole flow of information in django website like if someone asks for specific url then how do we route them into the correct places and ultimately give them back some HTML. So before starting this article I am assuming that you’ve started the local server using python3 manage.py runserver command in project directory.

Examples 113
article thumbnail

6 Ways to Ensure Your Leadership Training Makes You a Better Leader

Let's Grow Leaders

You’ve invested the time and effort to go to leadership training. So how do you ensure the work you’ve done will make you a better leader? How do you get feedback from your team on what’s working (and what’s not?) What steps […]. The post 6 Ways to Ensure Your Leadership Training Makes You a Better Leader appeared first on Let's Grow Leaders.

Training 174
article thumbnail

The Impact of Blockchain Technology on Financial Services

OTS Solutions

The Impact of Blockchain Technology on Financial Services. Blockchain development has created substantial changes in the financial sector and how people conduct financial transactions. This may revolutionize the economy and has already impacted global financial services. Technical innovations have improved the speed and processes necessary in the financial sector.

article thumbnail

The hacker's guide to uncertainty estimates

Erik Bernhardsson

It started with a tweet: New years resolution: every plot I make during 2018 will contain uncertainty estimates — Erik Bernhardsson (@fulhack) January 7, 2018. Why? Because I’ve been sitting in 100,000,000 meetings where people endlessly debate whether the monthly number of widgets is going up or down, or whether widget method X is more productive than widget method Y.

Groups 100
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

6 Tips to Make Your Business Data Backups Secure

The Crazy Programmer

Today’s enterprises are heavily dependent on technology and data to facilitate routine operations. The loss of systems and data can cripple an organization for days and in the worst case, run it out of business. That’s why data backups are so essential. But not just any backup will do. Many business leaders and IT executives believe that the very existence of a process for replicating and storing business data is more than enough to keep the organization’s data secure.

Backup 113
article thumbnail

Are people overly infatuated with Deep Learning, and can it really deliver?

CTOvision

One of the factors often credited for this latest boom in artificial intelligence (AI) investment, research, and related cognitive technologies, is the emergence of Deep Learning AI algorithms, and the corresponding large volumes of big data and computing power that makes Deep Learning a reality. However, deep learning is just an approach to machine learning […].

article thumbnail

How to Create an ERC20 Token the Simple Way

Toptal

The humble ERC20 token specification has become the de facto standard for Ethereum tokens. If you come across an Ethereum smart contract, chances are it’s ERC20-compliant. In this guide, Toptal Freelance Ethereum Developer Gilad Haimov demonstrates how you can create and deploy your own ERC20 token in under an hour.

How To 107
article thumbnail

5 Industries that Have Been Radically Changed by Technology

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Industry 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mark-A-Thon

Hacker Earth Developers Blog

Mark-A-Thon. The post Mark-A-Thon appeared first on HackerEarth Blog.

article thumbnail

The 2018 SINET 16 Awardees: Every one worth watching

CTOvision

We have written before about the Security Innovation Network (SINET). SINET is an organization laser focused on advancing cybersecurity innovation through public-private collaboration. Every year SINET oversees a process designed to find and highlight innovative companies. The process includes soliciting nominations for innovative firms, leveraging volunteer judges from across the technology executive community, and then […].

article thumbnail

Understanding the Nuances of Typeface Classification

Toptal

Possibly with the exception of color, the typeface styles used in a design have a greater impact on the way a user perceives that design than virtually any other individual design element.

article thumbnail

Stripe’s Will Larson on Designing a Performance Management System from Scratch

Gitprime

GitPrime elevates engineering leadership with objective data. In this interview series, Engineering Leaders talk about how to build high performing teams. “In Engineering, we tend to hold this idea that these people systems—career ladders, performance reviews, calibration—are these evil things that aren’t very valuable. They’re thought of as bureaucracy.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

How to Get and Set CSS Variable Values with JavaScript

David Walsh

CSS variables are a very welcome addition to the language, despite them being incredibly basic. Sure we could use SASS or stylus but languages should never count on developers relying on frameworks and toolkits to accomplish what we know we need. And just like every other part of a webpage, you can get and manipulate CSS variable values — let’s check out how!

How To 93
article thumbnail

Exhaustion is Not a Status Symbol

Agile42

In her book, The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are , Brene Brown shares her 10 Guideposts of Wholehearted Living. Number 7 on that list is “ Cultivating Play and Rest: Letting Go of Exhaustion as a Status Symbol and Productivity as Self-Worth ”. This resonates strongly with the 8th agile principle about sustainable pace.

SCRUM 92
article thumbnail

Chatbot UX – Design Tips and Considerations

Toptal

Conversational user interfaces are a new frontier that requires thoughtful consideration. The design process should include defining the purpose of the chatbot, and other design considerations to create a successful user experience.

106
106
article thumbnail

6 Months, 945 Data Breaches, 4.5 Billion Records

CTOvision

Only six months and nearly 4.5 billion data records have already been breached. From Adidas (two million records compromised) to Facebook (up to two billion accounts scraped), 2018 has seen more than its fair share of massive global data breaches. Now a new report by digital security specialists Gemalto reveals that 945 data breaches led to […].

Data 82
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Gallmaker: New Attack Group Eschews Malware to Live off the Land

Symantec

A new attack group is targeting government, military, and defense sectors in what appears to be a classic espionage campaign.

Groups 110
article thumbnail

How To Minimize Your Business Taxes

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

How To 89
article thumbnail

5 Things You Have Never Done with a REST Specification

Toptal

The existence of RESTful APIs is a popular myth in web development—but it's a myth we can work with. The right tools can help keep documentation consistent and streamline automated testing. In this article, Toptal Freelance JavaScript Developer Alexander Zinchuk explores several time-saving approaches to developing REST APIs, with examples in Node.js and Ruby on Rails.

article thumbnail

IoT analytics guide: What to expect from Internet of Things data

CTOvision

Read Bob Violino explain how companies will face challenges like data capture, data governance, and availability of services while creating an IoT analytics environment on Network World : The growth of the Internet of Things (IoT) is having a big impact on lots of areas within enterprise IT, and data analytics is one of them. Companies […].

IoT 81
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Modern Data Protection Provides Essential Support for Successful IT Transformation

Dell EMC

A modernized data protection strategy enables customers to more efficiently transform their IT – delivering benefits all round. In the fourth of a series of blogs inspired by influential research published by industry analyst ESG, we learn how modern data protection strategies, tools and processes enable and support IT Transformation. Modernizing the IT environment is a fundamental step that companies of all sizes must take on their journey towards achieving IT Transformation – and that includ

Data 84
article thumbnail

Agile Architecture: It’s Not a Free-for-All

Accenture

I’ve been thinking about Agile architecture recently, since a seasoned consultant friend (Payson Hall of Catalysis, Inc.) sent me a literal cry for help. I’m going to begin by quoting his email at length because what he wrote is so descriptive of a certain challenge and mindset. “Children running around…” I love it! Read on…. Help me Obi-Wan-Halim… you are my only hope!

article thumbnail

Hold the Framework – Exploring Dependency Injection Patterns

Toptal

There are two dominant patterns of implementation for inversion of control. Which one is better, and is there a middle path to be found between them? How should you approach IoC to get the most out of your code? Join Toptal Java Developer Martin Coll in exploring the familiar and unknown landscape of IoC development.