Sat.Aug 26, 2017 - Fri.Sep 01, 2017

article thumbnail

The software engineering rule of 3

Erik Bernhardsson

Here’s a dumb extremely accurate rule I’m postulating* for software engineering projects: you need at least 3 examples before you solve the right problem. This is what I’ve noticed: Don’t factor out shared code between two classes. Wait until you have at least three. The two first attempts to solve a problem will fail because you misunderstood the problem.

article thumbnail

DeCluttering – Your Way To Brilliance

General Leadership

“Keeping baggage from the past will leave no room for happiness in the future.” Wayne L. Misner. Here’s a tip to add brilliance, shine and value contribution to your work and your personal brand. Try it. I defy you to tell me it doesn’t get you noticed and known as an original workplace thinker when you work it right and apply it to a business direction, project and strategy piece.

Strategy 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Avoid Resentment When One Project Replaces Another

Change Starts Here

The wheels of progress require continuous improvement in organizations. What was once a change becomes the status quo. The people who implemented the existing way of working may feel like the latest change is trampling on their hard work. How do you help those who were involved in creating the current state to support the […].

How To 114
article thumbnail

Start Here to Inspire Your Team

Let's Grow Leaders

“David, it’s a mess.” Barb ran her hand through her hair and sighed. “I’ve been here 20 days and have met with people at every level and every department, asking what it’s going to take to turn things around.” What a Mess […].

Examples 104
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

The software engineering rule of 3

Erik Bernhardsson

Here’s a dumb extremely accurate rule I’m postulating* for software engineering projects: you need at least 3 examples before you solve the right problem. This is what I’ve noticed: Don’t factor out shared code between two classes. Wait until you have at least three. The two first attempts to solve a problem will fail because you misunderstood the problem.

More Trending

article thumbnail

Security chatbot empowers junior analysts, helps fill cybersecurity gap

Kacy Zurkus - CSO Online

The alarming number of unfilled jobs in information security has many leaders in the industry wondering how to solve the manpower problem. Awareness is part of the problem — in that the pipelines aren't getting filled fast because many young people don't know about jobs in security. A second problem of awareness, though, is the inherent problem in a majority of security operation centers (SOCs) — programming language.

Training 101
article thumbnail

 FBI vs Apple: History, Policy, Sovereignty and Individual Rights

CTOvision

Editor’s note: This is the third in a five-part series on this topic. This examination by Arnold Abraham provides insights and nuanced lessons from history, the law and the tech world that can inform all of us interested in both privacy and security. For a detailed legal analysis accompanying the article, please visit TheCyberLawTeam.com/publications-1 […].

article thumbnail

5 Ways to Obtain Funding for Small Business

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

TAM Methodology: An Explanation and Example of Total Addressable Market Analysis

Toptal

Total Addressable Market (TAM) sizing exercises have become very popular for assessing the potential of a business. TAM is, however, often miscalculated and misinterpreted. In this article, we will look at how to calculate it and its derivative subset waypoints of SAM and SOM. A working example will also be demonstrated for WeWork.

Examples 102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What Great Leadership Looks Like

Next Level Blog

In 2017, it can be difficult to find examples of great leadership. Today, though, I want to offer two of them. The first is of neighbors, volunteers, first responders, law enforcement, the National Guard and the U.S. Coast Guard pulling together to rescue each other in the greater Houston area. As I write this, I’m flying across the country watching CNN on the seatback TV.

article thumbnail

Break these Five Bad Social Media Habits at Work

Career Advancement

“Like all technology, social media is neutral but is best put to work in the service of building a better world.” ~ Simon Mainwaring ~. Ellen Asks: One of my friends told me the boss watched how much time we spent on social media. I don’t want to get in trouble. How can I tell if I have bad social media habits at work? Joel Answers: Social Media can keep us connected, speed communication, and increase productivity.

Media 67
article thumbnail

You Only Get One Chance to Recognize a Good First Impression

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Network 84
article thumbnail

Free eBooks All Designers Should Read

Toptal

A picture may be worth a thousand words, but a book contains that and more. These free eBooks may help designers grow as professionals, improve their skills, and expand their field of knowledge.

eBook 94
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

4 Lessons Businesses Can Learn From This Smart Lock Malfunction

CTOvision

The Internet of Things (IoT) is heavily built on the idea of connected households and associated gadgets. Many of the items we own interact with others, making our lives much more convenient. What happens when things go wrong, though? LockState, a provider of smart locks, found that out the hard way in early August when […].

IoT 61
article thumbnail

Introduction to App Automation for Better Productivity and Scaling

Dzone - DevOps

This article is featured in the new DZone Guide to Automated Testing. Get your free copy for more insightful articles, industry statistics, and more! Test automation can improve the development process of software in several cases. The automation of tests are initially associated with an increased effort, but the related benefits will quickly pay off.

article thumbnail

Why Starting a Distribution Company Might Be Your Best Opportunity

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Company 78
article thumbnail

Streamline Collaborative Design with Figma

Toptal

In recent years, as designers, we have a growing selection of tools to work with. One of them is Figma – the answer for collaborative work which, nowadays, we do more and more often.

Tools 87
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Best Practices for Federal DNS Security

CTOvision

Domain Name Systems are the core of every Federal network. Malicious actors depend on DNS to maneuver within systems and steal critical information – a whopping 91.3% of cyberattacks use DNS. With advanced persistent threats a growing trend, DNS security is a fundamental mission of every Federal IT security professional. BlueCat is providing a webinar […].

Trends 60
article thumbnail

What makes a learning organization?

Lead on Purpose

Amazon, Intuit, Airbnb, Disney, FedEx and Uber…what do these companies have in common? They know their customers. They don’t just know about their customers, they know why their customers ‘hire’ them and their products to do specific jobs.

article thumbnail

The Challenges Of Moving Old Applications Into A New Cloud

The Accidental Successful CIO

Moving to the cloud involves making a lot of important decisions Image Credit: Diego Di Salvo. You would think that by now, with all that has been written about the importance of information technology and the advantages of moving your IT operations into the cloud , the decision to move a company’s applications and storage into the cloud would be a no-brainer for the person with the CIO job.

article thumbnail

Maximum Flow and the Linear Assignment Problem

Toptal

The Hungarian graph algorithm solves the linear assignment problem in polynomial time. By modeling resources (e.g., contractors and available contracts) as a graph, the Hungarian algorithm can be used to efficiently determine an optimum way of allocating resources.

article thumbnail

“Build vs Buy Analytics?” The Question ALL SaaS Leaders Need to Answer in 2024

As a SaaS leader, you know that the more metrics, insights, and analytics you add to your products, the more engagement you’ll have – and the stickier your product will become with customers. At what point do you decide to keep building your analytics in-house or invest in an embedded analytics solution? Read our Build vs. Buy Analytics guide to learn: Top 4 benefits of embedded analytics A quick cost comparison of in-house analytics development vs embedded analytics 10 considerations to help yo

article thumbnail

Partners

The Agile Manager

"Greed and patience don't live together very well." -- Keith Jackson, ESPN 30 for 30, Who Killed the USFL? Businesses rely on a network of suppliers to operate and grow, including providers of components, back-office operations, distribution, marketing, retail, information technology and even office supplies. They do this for a variety of reasons, ranging from areas of specialty (assembling large finished goods is different from manufacturing small, precision components), depth of expertise (som

Travel 40
article thumbnail

NTA & IDS: BFFs 4EVA.

ProtectWise

It’s not uncommon to hear friends and colleagues talk about how they’re overworked and under water, but for security professionals, this is a daily and real struggle. Although there are dozens of products out there intended to ease their workload, one, in particular, is a frequent source of frustration: Intrusion Detection Systems (IDS).

article thumbnail

Security chatbot empowers junior analysts, helps fill cybersecurity gap

Kacy Zurkus - CSO Online

The alarming number of unfilled jobs in information security has many leaders in the industry wondering how to solve the manpower problem. Awareness is part of the problem — in that the pipelines aren't getting filled fast because many young people don't know about jobs in security. A second problem of awareness, though, is the inherent problem in a majority of security operation centers (SOCs) — programming language.

article thumbnail

Web Accessibility: Why W3C Standards Are Often Ignored

Toptal

The goal of this article is to introduce you to the underlying principles of accessibility and help you flawlessly implement web accessibility guidelines and standards on your next project. Even minor improvements can help your content rank better, reach more people, and improve the overall user experience.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Waterfall, Agile and Lean (Oh My!)

Cory Foy

For many people, the word “Waterfall” causes a visceral reaction – especially in the context of projects and organizations. Unfortunately, I’m starting to come across more places where “Agile” causes the same reaction of disgust and fear. The fundamental problem is that we’ve let bad management hide behind methodology and frameworks.

Agile 40
article thumbnail

Bullying at work, recognising it & its impact on innovation

Rapid BI

Bullying at work on the increase, Or so the reports and surveys tell us. What we do know is that where bullying exists, trust does not. We also know that innovation requires openness and trust. So what do we really have in our organisations - innovation OR bullying? The post Bullying at work, recognising it & its impact on innovation appeared first on RapidBI.

article thumbnail

Continuing the Original Vision of Greg Porter, PowerSchool Founder

PowerSchool

52