September, 2017

article thumbnail

Eight Techniques to Help Your Middle Managers Cultivate Their “Sweet Spot” in Your Organization

Let's Grow Leaders

On paper, your middle managers are in your organization’s sweet spot. They’re the conduits between your strategic vision and the teams who implement that vision. In reality, however, your middle managers are in a tough place. They’re under increasing pressure–from above to […].

article thumbnail

The number of letters in the word for each number

Erik Bernhardsson

Just for fun, I generated these graphs of the number of letters in the word for each number. I really spent about 10 minutes on this (ok…possibly also another 40 minutes tweaking the plots): More languages!! I love how Spanish has a few super compact words: “cien mil” for 100,000 for instance. Only eight letters, versus English “one hundred thousand” (20 letters).

Lambda 152
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More Good Programming Quotes, Part 2

Henrik Warne

A good programming quote captures an insight about programming, often in a funny way. Many quotes are quite famous, but I like ones that are a bit less well-know. A while ago, I listed some favorites. Here are more good quotes I have found since then. Enjoy! Programming. “What one programmer can do in one month, two programmers can do in two months.” – Fred Brooks (maybe). “Hardware eventually fails.

article thumbnail

The Leadership Wisdom of Kung Fu

N2Growth Blog

You may not remember the hit TV series from the 70s that traced the adventures of a Shaolin Monk, Kwai Chang Caine (played by the late David Carradine) as he wanders the American West armed only with his spiritual training and skill in Kung Fu. But, if you were a young boy back then, as I was, there was really nothing better on TV! The showed aired on ABC from 1972 through 1975.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Leadership in Stasis

General Leadership

“It might look and seem beautiful and calm; there is a significant difference in ineffective leadership, lack of leadership, and leadership that is in stasis.” Joe Thornell Sr. . All three leadership situations are damaging to the organization and the people. Ineffective leadership shows some attempt at leading, however for any number of reasons, there is an inability to make things happen.

More Trending

article thumbnail

5 Top Leadership Articles for the Week of September 11, 2017

Let's Grow Leaders

Each week I read a number of leadership articles from various online resources and share them across social media. Here are the five leadership articles readers found most valuable last week. I have added my comment about each article and would like […].

article thumbnail

On the Equifax breach and how to really prevent identity theft

Erik Bernhardsson

A funny thing about being a foreigner is how you realize people take broken things for granted. I’m going to go out on a limb here claiming that the US has a pretty dumb banking system. I could talk about it all day, but right now I want to focus on a very particular piece of it: how to verify your identity online. Of course, since the Equifax breach, people are freaking out about the fact that your SSN are floating around all over internet.

How To 100
article thumbnail

Future UI Design Without Buttons

Toptal

Why do we still use buttons in our user interfaces? Technology has come so far and offers so many possibilities, there is no longer any reason to force our users to click the tiny rectangles we call "buttons.

article thumbnail

Speeding Change by Slowing Down

N2Growth Blog

I have always believed that the fastest path to the future is found through increasing velocity of change. I don’t believe I’ll get much push-back on that statement, but I’m rather certain I’ll encounter some resistance with my next one: Increasing velocity of change is best accomplished by slowing down. Most CEOs feel as if they’re in a race to change the future, and they would be correct.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Happy Labor Day

General Leadership

Taking a break to celebrate a respite from our labors today. We will return to our regularly scheduled programming tomorrow! Thanks for tuning in to GeneralLeadership.com where we bring Advice from America’s Most Trusted Leaders to YOU!… Read the rest.

article thumbnail

Operational Intelligence: The Next Generation of Business Intelligence

CTOvision

Today, enterprise software is more than a transactional system - it is a decision support tool that enables senior management to effectively run the business. But, given the various technologies available on the market now, it can be difficult for managers to figure out which data analytics tools are needed to optimize their business operations. […].

article thumbnail

One Easy Way to Encourage Your Team

Let's Grow Leaders

I took my bike to the cycling shop for a quick repair before heading out for a beautiful Saturday afternoon ride in Breckenridge. Recognizing me from the last time, the manager asked where I’d been riding so far this summer. I shared, […].

Energy 142
article thumbnail

On the Equifax breach and how to really prevent identity theft

Erik Bernhardsson

A funny thing about being a foreigner is how you realize people take broken things for granted. I’m going to go out on a limb here claiming that the US has a pretty dumb banking system. I could talk about it all day, but right now I want to focus on a very particular piece of it: how to verify your identity online. Of course, since the Equifax breach, people are freaking out about the fact that your SSN are floating around all over internet.

How To 100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Software Entropy Explained: Causes, Effects, and Remedies

Toptal

In this article, Toptal Freelance Developer Adam Wasserman explains what software entropy is, what causes it and how it manifests itself, and what can be done to prevent it or mitigate its effects.

Software 111
article thumbnail

The Value of Value Chain Analysis in Transforming Your Business

N2Growth Blog

I have a different take on value chain analysis. Most think of it as positioning a business within its ecosystem. I think of a value chain as a graphical representation of all of the work that must be done by a business or work area in order to provide its goods/services (i.e., “value”) to its customers. Value chains are a valuable means of presenting a normalized view of the business.

Analysis 108
article thumbnail

Vulnerability vs. risk: Knowing the difference improves security

Kacy Zurkus - CSO Online

The future leaders of cybersecurity will be fluent in languages other than technology and will stop using fear to conflate the message of vulnerability versus risk. That’s the message that kicked off this year's (ISC)2 Security Congress conference. Donald Freese, deputy assistant director at the FBI, and Brandon Dunlap, managing director at Brightfly, talked about the difference between vulnerability and risk as they relate to leadership.

article thumbnail

Want to Learn Big Data? These Courses Can Help

CTOvision

One of the best things about the explosion of different kinds of technology across the world, is the fact that many tech-related courses can be easily accessed. Whether you are looking to build your knowledge about big data or build a skill that could help you in your job, there are lots of ways to […].

article thumbnail

Monetizing Analytics Features

Think your customers will pay more for data visualizations in your application? Five years ago, they may have. But today, dashboards and visualizations have become table stakes. Turning analytics into a source of revenue means integrating advanced features in unique, hard-to-steal ways. Download this white paper to discover which features will differentiate your application and maximize the ROI of your analytics.

article thumbnail

5 Stages of Manager Soul Loss #WinningWell

Let's Grow Leaders

As we’ve travelled around the world sharing our Winning Well message– that yes, it is possible to get results that last without losing your soul– along with the tools to help, so many managers have shared, “well, I don’t think I’ve quite […].

Travel 119
article thumbnail

The number of letters in the word for each number

Erik Bernhardsson

Just for fun, I generated these graphs of the number of letters in the word for each number. I really spent about 10 minutes on this (ok…possibly also another 40 minutes tweaking the plots): More languages!! I love how Spanish has a few super compact words: “cien mil” for 100,000 for instance. Only eight letters, versus English “one hundred thousand” (20 letters).

Lambda 100
article thumbnail

The 10 UX Deliverables Top Designers Use

Toptal

Regardless of the environment, UX professionals need a set of deliverables to help facilitate communication, document work and provide artifacts. Here are 10 of the most common UX deliverables.

107
107
article thumbnail

Business Agility Is Really About Adaptability

N2Growth Blog

Most of my clients these days are seeking help in developing strategies that will enable them to become more agile and quick. But, many struggle to embrace the deeper implications of what that really means to build business agility. Sure, nearly everyone I speak with on the subject recognizes that business agility is about being able to readily respond to changes in the marketplace.

Agile 97
article thumbnail

A Tale of Two Case Studies: Using LLMs in Production

Speaker: Tony Karrer, Ryan Barker, Grant Wiles, Zach Asman, & Mark Pace

Join our exclusive webinar with top industry visionaries, where we'll explore the latest innovations in Artificial Intelligence and the incredible potential of LLMs. We'll walk through two compelling case studies that showcase how AI is reimagining industries and revolutionizing the way we interact with technology. Some takeaways include: How to test and evaluate results 📊 Why confidence scoring matters 🔐 How to assess cost and quality 🤖 Cross-platform cost vs. quality tr

article thumbnail

Searching for unicorns: Managing expectations to find cybersecurity talent

Kacy Zurkus - CSO Online

Attrition is up, and cyber attacks are on the rise. With continued burnout and a growing skills gap in an industry where mentorship is a lost art, how can enterprises prepare for resiliency? Feeding the pipeline to fill the jobs of today and tomorrow means IT leaders must change their hiring biases, broaden their gaze, and offer a workplace that appeals to millennials — because they are the future of cybersecurity.

article thumbnail

The Most Important Question Every Leader Must Answer – Before It Is Asked

Terry Starbucker

The manager slumps on his desk, frustrated and confused. In his mind, he has done everything right to manage his team to success. He carefully explained to them the task at hand and its deadline for completion, how it was supposed to get done (and by whom), and outlined the expected results. He monitored the resulting team activity and provided useful feedback.

Metrics 93
article thumbnail

5 Top Leadership Articles for the Week of September 4, 2017

Let's Grow Leaders

Each week I read a number of leadership articles from various online resources and share them across social media. Here are the five leadership articles readers found most valuable last week. I have added my comment about each article and would like […].

article thumbnail

Five Origins of Change and Their Impact on Urgency

Change Starts Here

A catalyst sparks the need for change. Whether that catalyst is an emergency, a problem, or an opportunity, the change initiative starts when an individual or group decides to do something about it. The level of urgency is the degree to which people believe change is imperative. Urgency comes from dissatisfaction or discomfort with the […].

Groups 92
article thumbnail

“Build vs Buy Analytics?” The Question ALL SaaS Leaders Need to Answer in 2024

As a SaaS leader, you know that the more metrics, insights, and analytics you add to your products, the more engagement you’ll have – and the stickier your product will become with customers. At what point do you decide to keep building your analytics in-house or invest in an embedded analytics solution? Read our Build vs. Buy Analytics guide to learn: Top 4 benefits of embedded analytics A quick cost comparison of in-house analytics development vs embedded analytics 10 considerations to help yo

article thumbnail

Working with Angular 4 Forms: Nesting and Input Validation

Toptal

Validating user inputs is an essential part of any robust web application. Angular 4 makes it especially easy for both template-driven and reactive forms. In this article, Toptal Freelance Angular Developer Igor Geshoski walks us through the different approaches in Angular 4 form validation and shows how even complex form validation can be done easily.

article thumbnail

The Ultimate Guide to Starting a WordPress Blog

CTOvision

Many are looking for the right way to start a blog. It can be a terrifying thought especially for those who have little to no technical knowledge. But, do not despair! Here is the most comprehensive guide on how to start a WordPress blog. The process is easy to follow whether you may be 20 […].

How To 91
article thumbnail

3 Vital Skills Every Leader Needs

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].