Thu.Jun 07, 2018

article thumbnail

Employee Too Valuable to Fire? 6 Leadership Strategies

Let's Grow Leaders

Is Anyone Ever Too Valuable to Fire? Have you ever worked with an obnoxious colleague who seemed to be protected because the employee was considered too valuable to fire? Maybe you’re a team leader who has one of these brilliant bullies on […]. The post Employee Too Valuable to Fire? 6 Leadership Strategies appeared first on Let's Grow Leaders.

article thumbnail

The real value of data requires a holistic view of the end-to-end data pipeline

O'Reilly Media - Data

The O’Reilly Data Show Podcast: Ashok Srivastava on the emergence of machine learning and AI for enterprise applications. In this episode of the Data Show , I spoke with Ashok Srivastava , senior vice president and chief data officer at Intuit. He has a strong science and engineering background, combined with years of applying machine learning and data science in industry.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT: The technology Redefining Mobile App Development Industry

OTS Solutions

The Effect of IoT on Mobile App Development Industry. The Internet of Things (IoT) is a rapidly rising field in the realm of the computer industry that is affecting mobile app development industry. For the first time, individuals and companies can create an interconnected ecosystem of devices controlled from a central device. Ranging from the realm of wearables and fitness devices to household goods and utilities, the Internet of Things spans a variety of devices.

IoT 100
article thumbnail

How to Influence Change When Employees are Represented by a Union

Change Starts Here

Trade and labor unions traditionally organize workers in search of better wages, benefits, and employment conditions. From a management perspective, they are often seen as increasing expenses, adding bureaucracy, and stifling improvements – not great conditions for implementing change. While unions in the US are on the decline, they still have a strong presence in […].

How To 93
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

The True ROI of UX: Convincing the Executive Suite

Toptal

UX designers often need to persuade executives on the ROI of a UX initiative. In this example scenario, the UX team presented the projected ROI of a UX redesign to make a convincing case.

Examples 101

More Trending

article thumbnail

Haxe: Cross-platform Development's Best-kept Secret

Toptal

The modern, cross-platform programming language Haxe is well-known in some circles, yet many developers have never heard of it. Since it first appeared in 2005, it's been battle-tested by its loyal—if rather quiet—following. In this article, Toptal Freelance Software Engineer Kevin Bloch explores the Haxe ecosystem and how to transpile some sample code.

article thumbnail

7 Things You Need to Know About Agile Product Management

Accenture

This article was a collaborative effort by George Schlitz, Ryan Keawekane, and Adam Asch. In this 2015 article Tom Goodwin wrote: “Uber, the world’s largest taxi company, owns no vehicles. Facebook, the world’s most popular media owner, creates no content. Alibaba, the most valuable retailer, has no inventory. And Airbnb, the world’s largest accommodation provider, owns no real estate.

article thumbnail

The Most Exciting Asset Class in Private Equity? Search Funds from the Investor’s Perspective

Toptal

In the current low interest rate environment, investors have been increasingly moving towards alternative asset classes, particularly private equity which continues to attract the lion’s share of investor capital. But could a relatively unknown, niche new asset class hold the key for outsized market performance? In this article, Toptal Finance Expert Toby Clarence-Smith uncovers the world of search fund investing, reviewing some of the key aspects of the asset class from the investor standpoint

article thumbnail

Orchestrating Experiences

A List Apart

A note from the editors: It’s our pleasure to share this excerpt from Chapter 2 (“Pinning Down Touchpoints”) of Orchestrating Experiences: Collaborative Design for Complexity by Chris Risdon and Patrick Quattlebaum, available now from Rosenfeld Media. If you embrace the recommended collaborative approaches in your sense-making activities, you and your colleagues should build good momentum toward creating better and valuable end-to-end experiences.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Build a CI/CD Pipeline With Visual Studio

Dzone - DevOps

This article will demonstrate how to build a complete CI/CD pipeline in Visual Studio and deploy it to Azure using the new Continuous Delivery Extension for Visual Studio. Using CI allows you to merge the code changes in order to ensure that those changes work with the existing code base and allows you to perform testing. On the other hand, using CD, you are repeatedly pushing code through a deployment pipeline where it is built, tested, and deployed afterward.

article thumbnail

A Cyber Engineering Primer: Vulnerability Management Lifecycle

Coalfire

According to the SANS Institute, “Vulnerability management is the process in which vulnerabilities in IT are identified and the risks of these vulnerabilities are evaluated. This evaluation leads to correcting the vulnerabilities and removing the risk or a formal risk acceptance by the management of an organization.

article thumbnail

Instrument Your Ruby App In Minutes with the Honeycomb Beeline for Ruby

Honeycomb

You’ve always been able to get observability for your Ruby apps by instrumenting them with our SDK, affectionately known as libhoney , but we know instrumenting code you’ve already written is nobody’s favourite job. If only there were some way to automate the repetitive parts, so you could get instant insight into what your app is doing in production, and then focus your effort on augmenting that insight with the information that’s unique to your app!

article thumbnail

Top 8 Languages You Can Learn to Strengthen Your CV

Strategy Driven

You can be absolutely brilliant in your field of work and yet miss out on the most lucrative career opportunities abroad, just because you don’t know the right language. Now, what if you are not the absolute best in your field? Most of us are not and that’s okay, but what it means is you probably can’t afford to miss out on any opportunity that could come your way, including that lucrative offer outside the country.

article thumbnail

Monetizing Analytics Features

Think your customers will pay more for data visualizations in your application? Five years ago, they may have. But today, dashboards and visualizations have become table stakes. Turning analytics into a source of revenue means integrating advanced features in unique, hard-to-steal ways. Download this white paper to discover which features will differentiate your application and maximize the ROI of your analytics.

article thumbnail

INFOGRAPHIC: Data Scientist vs. Data Engineer by Cognilytica

CTOvision

As AI increasingly gains popularity among enterprises, companies are actively seeking data scientists who possess data science skills. Many enterprises confuse the roles of data scientists and data engineers. Even though some traits, skills, programming languages and tools are shared by both roles, the overall roles and core skill sets are different and are not [.].