Sat.Sep 19, 2015 - Fri.Sep 25, 2015

article thumbnail

How To Get Their Attention

Let's Grow Leaders

I’ve written 640 blog posts and never had a response like I received from last Monday’s post, What Happens When We Really Listen. Notice I didn’t say “reaction,” I’m not counting up social shares or page views, I’m talking about real human beings from around the world reaching out in deeply personal ways. First was the executive who picked up the phone as soon as he read it. “I’ve never done this before, and I’m a bit surprised I’

How To 171
article thumbnail

Time Waits for Nobody

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “The best thing about the future is that it comes only one day at a time.”. Abraham Lincoln. Growing up my Grandfather always said, “Time waits for no one”. In 1979, Grandpa was forty-eight years my senior, so naturally his words went in one ear and out the other.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage by Richard Stiennon

CTOvision

With new technology, come new problems. Oft times, with the increasing demand for the latest and greatest tech, security is more of an after thought. What has been a consistent theme is developing the next best technology, and then figuring out how to protect it. Before the tests are run to find the gaps, a hacker already knows how to exploit the tech in every way possible.

Network 155
article thumbnail

Nearest neighbor methods and vector models – part 1

Erik Bernhardsson

This is a blog post rewritten from a presentation at NYC Machine Learning last week. It covers a library called Annoy that I have built that helps you do (approximate) nearest neighbor queries in high dimensional spaces. I will be splitting it into several parts. This first talks about vector models, how to measure similarity, and why nearest neighbor queries are useful.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Why to Be Overconfident (every now and then)

Let's Grow Leaders

The outdoor wedding on the water was beautiful, the bar was open and the line for the fanciest version of a port-o-pot I’ve ever seen was long. Which is why so many heard the screams of the little boy who couldn’t escape from the pottie on wheels. His cries grew more frantic as his dad and others tried to calm him down. “Lucas, it’s going to be okay… Just turn the knob… Please stop crying… ” Lucas stayed stuck.

More Trending

article thumbnail

Big Data Project Management: What’s In & What’s Out?

CTOvision

Here’s something to think about when you're planning a big data project: are you planning a project or a program ? Here's a simple distinction: A project typically has a beginning, middle, and end. A program is something ongoing and relatively permanent. Projects. Relatively self-contained big data projects may be tied to an ongoing process or program that is already developing or delivering a product or service.

Big Data 118
article thumbnail

Nearest neighbor methods and vector models – part 1

Erik Bernhardsson

This is a blog post rewritten from a presentation at NYC Machine Learning last week. It covers a library called Annoy that I have built that helps you do (approximate) nearest neighbor queries in high dimensional spaces. I will be splitting it into several parts. This first talks about vector models, how to measure similarity, and why nearest neighbor queries are useful.

article thumbnail

What Oregon Entrepreneurs Can Teach All Of Us About Leadership

Terry Starbucker

Since I moved to Portland in 2010 I’ve become fascinated with a particular kind of business person – Oregon entrepreneurs. So much so, that last year I started to write nearly as much about them as I did about my first love, leadership. Those stories have appeared here, and in the online magazine we launched in late 2014, Built Oregon. What was it about these people that could have possibly pulled me away from my true north, my quest to find the best of More Human leadership?

article thumbnail

The Foundation of Leadership: Leading Yourself

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “ Mastering Others is Strength; Mastering Yourself is True Power”. Lao Tzu. We’re taught from the beginning that leadership is about a person applying influence to guide and enlist the support others in achieving a goal.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

MIT Has Built a robot with human reflexes and powered by a human brain

CTOvision

Researchers from MIT's Department of Mechanical Engineering have designed an interface that takes advantage of a human's split-second reflexes allowing a humanoid to maintain its balance and complete tasks. Watching the video at this link will immediately bring to mind many disaster recovery/assistance scenarios and use cases that these robots can be controlled in.

article thumbnail

Presentations about Spotify music recommendations

Erik Bernhardsson

A couple of people in my old team have been around talking about how Spotify does music recommendations and put together some quite good presentations.

System 100
article thumbnail

4 Misconceptions of the Entrepreneur Lifestyle

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

Tuesday Time Machine: Motivating, Mentoring and Measuring

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. From Our Early Files: Originally Published. 24 Feb 2014. “Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity.” General George S. Patton, Jr.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Important Context On Key Cyber Security Issues From Admiral R

CTOvision

The video at this link and embedded below captures key parts of a a 24 Sep 2015 session of the Senate Select Committee on Intelligence with testimony by NSA Director Admiral Rogers. The exchanges allowed Admiral Rogers to offer expert testimony on a range of key issues including the need to simplify things for corporations in America seeking to coordinate with the government on issues of cybersecurity.

Video 115
article thumbnail

Presentations about Spotify music recommendations

Erik Bernhardsson

A couple of people in my old team have been around talking about how Spotify does music recommendations and put together some quite good presentations.

System 100
article thumbnail

Is Open Source Open to Women?

Toptal

The fact that women are underrepresented in tech is nothing new. However, while we've seen the gender diversity reports from companies like Google, Facebook, and many more, a look at the number of women in the open source community suggests that the numbers might be worse than these reports imply. In this post, Toptal COO Breanden Beneschott shares the results of a study looking at gender on GitHub and considers a few reasons why GitHub is so male-dominated, including a few ideas on how we can m

article thumbnail

Why Customers Equate Your Brand With User Experience

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

101
101
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

WayIn Success At Real-Time Digital Marketing Technology Generating More Buzz And More Funding

CTOvision

Editor's note: We have been tracking WayIn since their founding and are very proud to close to the founders and executives of this very savvy team. We are also proud that WayIn was a founding sponsor of our Synergy Forum, where we could expose them to a wide range of government executives who need to track this trend setting tech. For more on WayIn see the press release below.

article thumbnail

CIOs And The Art Of Succession Planning

The Accidental Successful CIO

CIOs Need To Plan For Who Comes Next Image Credit: Xiaojun Deng. Wow – it sure was hard to get the CIO job. Just think for a moment about all of the various positions you had to rise through in order to finally obtain the top spot in IT. You do realize that you are not the last CIO that your company is ever going to have – because of the importance of information technology there will be others who follow behind you.

Social 78
article thumbnail

Debugging Memory Leaks in Node.js Applications

Toptal

Memory leaks in long running Node.js applications are like ticking time bombs that, if left unchecked in production environments, can result in devastating outcomes. These bugs are often considered to be hard to find. However, with the right tools and a strategic approach, memory leaks can not only be solved but also avoided in the future. In this article, Toptal engineer Vladyslav Millier gives us insight into what memory leaks are, how some sophisticated debugging tools can be used to find mem

article thumbnail

Mindful Mondays: Don’t Write Yourself Off

Next Level Blog

Last week I had a vivid reminder of why, when a health crisis or some other kind of major life setback occurs, you should never write yourself off. As I shared here last year, I was diagnosed with MS in the summer of 2009. My primary form of exercise, head clearing and general sanity maintenance before MS was distance running. In the months surrounding my diagnosis, I went from running six or seven miles at a time to barely being able to walk around the block.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Watch Drones Build A Rope Bridge In Fight: Think of the use cases for this…

CTOvision

The video at this link and embedded below shows an incredible use of drones to construct a bridge that people can walk across. Doesn't that get your mind thinking about use cases for this technology? Imagine what it will be like when it matures? Here is more from the video description: The video shows quadrocopters autonomously assembling a rope bridge.

article thumbnail

How to build a world-class sales team

Lead on Purpose

Guest post by Adrian Terry A world-class sales team is a lot like a world-class football team.

How To 102
article thumbnail

Speeding up Application Development with Bootstrap

Toptal

Bootstrap, one of the most used HTML/CSS/JavaScript front-end frameworks, offers a little more than just fancy customizable user interface elements. It provides a great starting point for many types of projects, a plethora of components, and many nifty styles predefined for responsive layout and utility classes to help keep your HTML and CSS code clean.

article thumbnail

In 100 Words: Invisible Chains

QAspire

Once there was a circus Lion who was so tamed/trained that he never knew about his real strengths. He was then left in the jungle where real Lions lived. Upon seeing other Lions, the tamed Lion started running fiercely driven by fear until he saw his own reflection in a pond. He realized that he was also a Lion as powerful as others. Metal chains are easier to notice but mental chains of our past experiences, fixed beliefs and perceived limitations are invisible.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Survey On DoD Cybersecurity Rules: And book on The Cyber Threat for all organizations taking the survey

CTOvision

On 26 August 2015 the DoD promulgated new rules that apply to any contractor or subcontractor that does business with the DoD. These rules are in immediate effect. We are compiling information we will use in future reporting on CTOvision.com and also to provide as feedback to DoD on the new rules. We are looking for inputs from members of the Defense Industrial Base (DIB), which is any company providing anything to the DoD.

Survey 111
article thumbnail

If it’s not written down, it didn’t happen

Rapid BI

Picture this scene. You are asked to be a witness in court about an unfortunate incident that happened some time ago. You believe you can recall what happened, to who and when. The date of the case arises. You are sitting on the witness bench outside the court. People are walking backwards and forwards to […]. The post If it’s not written down, it didn’t happen appeared first on.

article thumbnail

Learn to Code: Wisdom and Tools for the Journey

Toptal

It's no surprise that more and more people, from all kinds of backgrounds, are deciding to learn to code. But, each person who tackles the task is soon faced with an unpleasant reality: Learning to program is hard. Contrary to expectations, the feeling of "I don't get it," may persist unabated long into the journey, making once bright-eyed beginners feel hopeless, lost, and ready to give up.

Tools 61