Tue.Jul 10, 2018

article thumbnail

Doing good data science

O'Reilly Media - Data

Data scientists, data engineers, AI and ML developers, and other data professionals need to live ethical values, not just talk about them. The hard thing about being an ethical data scientist isn’t understanding ethics. It’s the junction between ethical ideas and practice. It’s doing good data science. There has been a lot of healthy discussion about data ethics lately.

Data 177
article thumbnail

The Power of Observation: 6 Ways to Show Up Helpful

Let's Grow Leaders

I just got off the phone with a frustrated CEO, who was fired up after a half day of observation in one of his call centers. “Karin, Why don’t these managers GET IT? I just left a visit to one of our […]. The post The Power of Observation: 6 Ways to Show Up Helpful appeared first on Let's Grow Leaders.

125
125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Present and Future of AI in Design [Infographic]

Toptal

AI has become an over-hyped buzzword and the design world is no exception. Instead of resisting it, designers will soon be co-creating with AI. It will make them smarter.

109
109
article thumbnail

Stop Drowning in Big Data: How to Gain Insights with a Complementary Approach of Technologies from AI to IoT

CTOvision

The 21st century is all about data, and IoT devices excel at producing it. The world has generated more data in 2017 than in the previous 5000 years added together. When you feel your data analysts cannot handle the amount of data, or that their analysis is one step behind, machine learning may be your [.].

IoT 63
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

For Founders Raising Capital: Thinking Through the Implications of Convertible Notes

Toptal

Convertible notes have become an increasingly popular and common method for raising capital by startups, but how well do founders truly understand the implications of going down this route? In this article, Toptal Finance Expert Jeffrey Briggs outlines the basics of convertible note structures, and runs through the pros and cons of using them to raise money for new entrepreneurial ventures.

88

More Trending

article thumbnail

New Name + New Coding Score + New User Profile ??

CodeSignal

Since we launched back in 2014, we’ve created a diverse community of developers who learn new coding skills and practice for technical interviews on our platform every day. We learned a lot over these years and one of our top priorities is still to make our platform as useful to our users as possible. We want our brand and our products to best reflect why we exist, what we believe in, and where we’re headed.

article thumbnail

Chinese and US tech giants compete for emerging markets, Microsoft’s plan for Dynamics, How to turn cyber risks into an opportunity, Walmart to use blockchain to track delivery

CTOvision

The following are some of the enterprise tech topics we are following: Chinese and US tech giants go at it in emerging markets Emerging markets are where the action is and both the US and Chinese companies are competing for market share in countries like India, Russia, South Africa, etc. However, there is a vast [.].

article thumbnail

Some thoughts on diversity

Ron Jeffries

A discussion of my personal values in the light of way too many 'well-reasoned' but mistaken notions on diversity.

Social 75
article thumbnail

CodeSOD: Is the Table Empty?

The Daily WTF

Sean has a lucrative career as a consultant/contractor. As such, he spends a great deal of time in other people’s code bases, and finds things like a method with this signature: public boolean isTableEmpty(). Already, you’re in trouble. Methods which operate directly on “tables” are a code-smell, yes, even in a data-driven application. You want to operate on business objects , and unless you’re a furniture store, tables are not business objects.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Cloud-Scale Visibility Tools: The Right Stuff

Kentik

This series of guest posts has concentrated on the numerous challenges facing enterprise IT managers as businesses embrace digital transformation and migrate IT applications from private data centers into the cloud. The recurring theme has been the critical need for new tools and technologies for gaining visibility into cloud-scale applications, infrastructure and networks.

Tools 45
article thumbnail

Sponsored Post: Datadog, InMemory.Net, Triplebyte, Etleap, Scalyr, MemSQL

High Scalability

Who's Hiring? Twitch's commerce team in San Francisco is looking to hire senior developers to keep up with rapidly increasing demand for our Subscriptions and Payment platform. Engineers will be tasked with building new products and features to solve business and ecommerce challenges as we're dealing with engaging problems at a massive scale and will create solutions that impact millions of people around the world.

Metrics 43
article thumbnail

Boost SDS Performance and Cut Costs with Smarter Networking Solutions

Dell EMC

Modern data centers are undergoing a transformation. What used to be an environment focused on client/server technologies and a mixture of closed and open system server, storage and networking devices is changing from both an IT and workforce perspective. The new data center is focused around serving the unique needs of cloud computing, virtualization, automation and mobile computing.

Network 42
article thumbnail

Why you should never try to beat or fool the DISC Assessment

The Recovering Engineer

One question I often get when I'm discussing use of the DISC assessment and profile report is this: “Can you fool (or beat) the DISC assessment?” The short answer to that question is: Yes, you can “beat” the DISC assessment. The question I would ask in response is: While you can do that, why would you? The best use of the DISC model is to develop better self-awareness personally and better understanding of others so that you can communicate, build teams, lead, and resolve

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The New Data Center Stack

Dell EMC

One of the many benefits of working at Dell Technologies is simultaneously having access to the brightest minds in compute, storage and networking. Even better, we get to put these big brains together to think about IT in terms of end-to-end infrastructure, not discrete silos. The breadth of our portfolio provides us with the opportunity to think about how to solve our customers’ problems rather than how to protect our own technology silos.

article thumbnail

The Playbook for NATO Success, Briefed by a Former SACEUR

The Cipher Brief

This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. ?. Cipher Brief Members engage in high-level conversations about national and global security issues every day. If you’re not already a member, you should be. ?. If you are experiencing any issues with signing up or signing in, please drop an email to support@thecipherbrief.com. ?.

37
article thumbnail

There And Back Again: A Honeycomb Tracing Story

Honeycomb

In our previous post about Honeycomb Tracing, we used tracing to better understand Honeycomb’s own query path. When doing this kind of investigation, you typically have to go back and forth, zooming out and back in again, between your analytics tool and your tracing tool, often losing context in the process. To avoid this annoying and time-consuming context-switch, use Honeycomb to do everything you need!

Storage 40
article thumbnail

The Secret to Serendipity

Steve Farber

Put down the book you’re reading right now, at least for a minute. Don’t spend another dime on a motivational seminar. Here’s the unvarnished secret to all good fortune, karma and serendipity. This secret produces the same productive outcome in any country, industry, company, culture or family. It applies to every race, color, religious creed, national origin, ancestry, sex, sexual orientation, age, genetic information, military service, or disability.

Culture 45
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.