Sun.Apr 08, 2018

article thumbnail

How Great Leaders Simplify Decision-Making (And Just Get Stuff Done)

Terry Starbucker

Back in 1987, when I was hired by Jack Kent Cooke at the ripe young age of 27 to be the COO of a cable TV company, he wasted very little time to initiate me into the world of executive management. During our very first meeting, before I could even take a sip of my first cup of coffee, Cooke looked me straight in the eye, and said. “My boy, there are two kinds of people in the business world, doers and thinkers.

Analysis 122
article thumbnail

Risk Management in Program and Portfolio

SCRUMstudy

Managing risk must be done proactively, and it is an iterative process that should begin at project inception and continue throughout the life of the project. The process of managing risk should follow some standardized steps to ensure that risks are identified, evaluated, and a proper course of action is determined and acted upon accordingly. In a Scrum environment, risks are generally minimized, largely due to the work being done in Sprints whereby a continuous series of Deliverables is produc

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

In Defense Of 3% Of Google’s Employees And Their (And Everyone’s) Right To Have Opinions

CTOvision

On 4 April the New York Times and then many others reported that thousands of Google employees signed an open letter asking Google to stop working on an Artificial Intelligence project with the US military. The letter, addressed to Google's chief executive Sundar Pichai, sought to cancel any involvement anyone from Google might have with […].

article thumbnail

Time for Transformational Cybersecurity Part II

Marv's Smart Future

The last post, Transformational Cyber Security Part I, discussed exciting inventions that turn cybersecurity upside-down by preventing malware from freeloading CPU instructions in a properly configured software defined data center (SDDC), thereby rendering on-premise cyber attacks null and void.

Malware 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Getting Qt 5.9 working on Windows (eventually)

Successful Software

I have had Qt 5.5 and 5.6 installed on my development machines for some time. Now that I have purchased a new Mac development box (an iMac with a lickably beautiful 27″ screen) I thought it was a good time to update to a more recent version of Qt. I went for Qt 5.9, rather than Qt 5.10, as 5.9 has been designated as an LTS ( long term support ) release.

Windows 40
article thumbnail

Superintelligence: a balanced approach

Pandora's Brain

A couple of recent events made me think it would be good to post a brief but (hopefully) balanced summary of the discussion about superintelligence. Can we create superintelligence, and if so, when? Our brains are existence proof that ordinary matter organised the right way can generate general intelligence – an intelligence which can apply itself to any domain.