Sat.Oct 11, 2014 - Fri.Oct 17, 2014

article thumbnail

How to Have a Difficult Conversation

Let's Grow Leaders

'When I ask leaders why they’re not telling people what they need to know, the most consistent response I get is “ Sh e or he didn’t ask.” Quite frankly that’s a cop-out. Yeah sure–ideally everyone would be ASKING for feedback. If you’re not asking, start asking now. It may be the only thing standing between you and the truth.

How To 180
article thumbnail

Positive Change: Because That’s The Way It’s Always Been…

General Leadership

'As leaders, we are charged with guiding our organizations to success. Whatever that mark of success may be be, it most definitely involves positive change. To be successful, we must question everything and never allow the mindset… Because That’s The Way It’s Always Been Around Here. The best way to explain this to any organization is to present the gorilla experiment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Interview: The Four Workplace Conversations

Change Starts Here

'In this episode, workplace communication expert Skip Weisman shares the four conversations that happen at work, three of which create low morale, low productivity and kill profits. Which one works? Listen to find out The Four Workplace Conversations, how and why they occur and specific strategies to move to the one “right” conversation.

article thumbnail

Strata Hadoop World 2014: Watch Live Streaming Here

CTOvision

'If you could not make it to Strata-Hadoop World 2014 in NYC you can still watch streaming video of the keynotes. To do that visit our Hadoop World video streaming page here: https://ctovision.com/strata-hadoop-world-2014-watch-live-streaming-here/. Be sure to bookmark it! Here is the schedule of keynotes: Thursday Keynote Welcome. 8:45am–8:55am Thursday, 10/16/2014.

Big Data 110
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Leaders Weigh in on Achieving Breakthrough Results – A Frontline Festival

Let's Grow Leaders

'Welcome back to the Let’s Grow Leaders Frontline Festival. Our October Festival is all about Achieving Breakthrough Results. Thanks to Joy and Tom Guthrie of Vizwerx Group for the great pic and to all our contributors! Culture and Teamwork. “Talent wins games, but teamwork and intelligence wins championships.” – Michael Jordan.

More Trending

article thumbnail

Leading Past The Target

Terry Starbucker

'It was so much fun we didn’t want it to be over. We were having a great ride on this roller coaster, and the cool thing was, there were more thrilling twists and turns ahead of us. But reality had intervened, and we had to stop – and, on top of that, all the riders had to go their separate ways. It was July of 2010, and I was playing a round of golf with my core management team in Billings, Montana.

Metrics 108
article thumbnail

The Data Impact Awards: This is the “academy awards” of data solutions

CTOvision

'Editor’s note: Last night Cloudera held the 2014 Data Impact Awards. I was very proud to be a judge and honored to be a presenter. The most interesting part for me was reviewing the many impactful nominations, especially those that are directly tied to saving lives, curing disease, finding fraud, and helping the department of defense and the intelligence community support national security missions.

Data 109
article thumbnail

4 Reasons Underdogs Will Rule the World

Let's Grow Leaders

'The playing field was clearly uneven, but the “visiting team” had chosen to come and play by our rules: An underdog team at it’s finest. I was teaching executive presence and communication to MBA students, 30% for whom English is their second language. The final assignment was TEDdy talks, 5 minute speeches in the style of TED. I knew the assignment was stacked in favor of the American students.

article thumbnail

A Day Short of Missing History

General Leadership

'“You can never cross the ocean until you have the courage to lose sight of the shore”. Christopher Columbus. It’s a seldom discussed fact that Christopher Columbus nearly missed his chance to make the history books in his 1492 discovery of the “New World.” Had his ship sailed on yet one day longer without sighting land, they would have turned around and headed back to Spain on the 12 th of October.

Journal 148
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Establishing Goals that Balance Stretch and Reality

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

Some Graphical Context on Passwords: Are their days numbered?

CTOvision

'The graphic below from Ping Identity provides some interesting context on passwords in cyber security. The use of passwords as a first line of defense is a faulty security posture. Statistics prove that relying on our ability to create unique, but easy to remember passwords for 10, 20 or even more applications is too difficult. Further, imposing password standards actually encourages insecure user behavior and results in frustrated users and gaping security holes.

article thumbnail

52 Ways to Feel Less Overworked and Overwhelmed

Next Level Blog

'Wow, it has been quite a launch week for "Overworked and Overwhelmed: The Mindfulness Alternative". The response to the book in terms of sales, reader reviews and responses and media coverage has been overwhelming (in a really good way). I''ll share more on Friday about what I''ve learned from talking with people about why they''re interested in the book along with some of their stories.

Media 86
article thumbnail

3 Ways That CIOs Can Do A Better Job Of Hiring The Right Person

The Accidental Successful CIO

'When A CIO hires someone, they want to do it correctly Image Credit. When you have the CIO job you realize that your success rests not on the importance of information technology, but rather firmly on the shoulders of those people who are on your team. What this means is that the process of hiring someone is a critical step in your career. Hire the right person and you’ll move forward, hire the wrong person and you may stumble or even be asked to leave the firm.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Networking One To One

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Network 101
article thumbnail

Pew Report: Gigabit Connectivity & Vivid Telepresence

CTOvision

'On 9 October 2014, Pew Research Center published a report , “Killer Apps in the Gigabit Age”, to share conclusions from a study that surveyed hundreds of information technology experts in order to identify and understand the implications of higher gigabit connectivity in our future. Participants responded to the question, “Will there be new, distinctive, and uniquely compelling technology applications that capitalize upon significant increases in bandwidth in the US between now and 2025?

Report 108
article thumbnail

Wow, What a Week – Thank You!!!

Next Level Blog

'Have you ever worked hard on something really important to you and worried if anyone was going to notice when you finished it? I think most of us have had that experience. To be really honest with you, I had that experience a couple of weeks ago as we counted down to the launch of my new book, "Overworked and Overwhelmed: The Mindfulness Alternative".

84
article thumbnail

A Compelling Vision is an Anchor

QAspire

'Management has a lot to do with answers. Leadership is a function of questions. And the first question for a leader always is: ‘Who do we intend to be?’ Not ‘What are we going to do?’ but ‘Who do we intend to be?’ - Max DePree. Specific, measurable and time bound goals are important to set expectations on results and drive performance in short term.

article thumbnail

Monetizing Analytics Features

Think your customers will pay more for data visualizations in your application? Five years ago, they may have. But today, dashboards and visualizations have become table stakes. Turning analytics into a source of revenue means integrating advanced features in unique, hard-to-steal ways. Download this white paper to discover which features will differentiate your application and maximize the ROI of your analytics.

article thumbnail

Sponsored Video: 5 Tips to Build a Sense of Community on Your Business Blog

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

New Technologies Used To Combat Ebola

CTOvision

'Here at CTOvision we have been getting several questions from government executives and analysts regarding our views of technologies that are relevant to the current Ebola crisis. We are compiling lists and would welcome your inputs on that. We have already seen some great visualizations from firms like ICG using the LUX platform to visualize ship movements in ways that could be very helpful in assessing the spread of Ebola and also assessing where s.

article thumbnail

Mindful Mondays: The Choice That Saved Husamettin’s Life

Next Level Blog

'Last week, I had one of the more interesting and amazing conversations I’ve ever had with a cab driver. His name was Husamettin. I’ve been in New York for the past week for a series of client meetings and interviews related to the launch of my new book. (Be sure to check out the special launch week offer at the end of this post.) On the way to one of those interviews, I was talking with Husamettin about how he stays sane navigating the crazy traffic of Manhattan.

Meeting 61
article thumbnail

Tree Cause Analysis!

Mills Scofield

'Thank you Irene Becker for sharing your blog with me! What if we started doing Tree Cause Analysis ! "Root Cause Analysis ( RCA ) – sounds like a blast doesn’t it? We can all agree it’s important and should be a habit we adopt in our organizations, but few of us do it. Why? It takes time, self-reflection (personal and organizational), analysis and… it’s focused on the negative, what didn’t work, what didn’t go well.

article thumbnail

A Tale of Two Case Studies: Using LLMs in Production

Speaker: Tony Karrer, Ryan Barker, Grant Wiles, Zach Asman, & Mark Pace

Join our exclusive webinar with top industry visionaries, where we'll explore the latest innovations in Artificial Intelligence and the incredible potential of LLMs. We'll walk through two compelling case studies that showcase how AI is reimagining industries and revolutionizing the way we interact with technology. Some takeaways include: How to test and evaluate results 📊 Why confidence scoring matters 🔐 How to assess cost and quality 🤖 Cross-platform cost vs. quality tr

article thumbnail

Active and Reactive Approaches to Get a Board Seat

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

94
article thumbnail

Ebola Models: Prediction on the Spread of the Virus

CTOvision

'The second person in the U.S. infected with the Ebola virus was just announced. There is concern surrounding the spread of the virus throughout the United States. The second nurse reportedly flew to Ohio for the weekend, before returning to Texas with symptoms of the virus. The Ebola virus has not spread with as much intensity as previous viruses, such as measles and Spanish influenza.

Research 107
article thumbnail

POODLE vulnerability assessment

Coalfire

Vulnerability Summary: The POODLE vulnerability is due to a bug in SSL protocol, whereas Heartbleed and Shellshock were vulnerability due to a bug in software. Heartbleed and Shellshock were confined to systems that ran vulnerable versions of software, whereas POODLE affects any system running any software that implements SSL 3.0, which is a widely implemented protocol used to provide encrypted network transmissions.

article thumbnail

The Depth of Knowledge

The Programmer's Paradox

A few decades back, I decided that I wanted to know more about quantum physics. I've always been driven to indulged my curiosity of various disciplines, it's been a rather long-standing obsession since I was a kid. I went out to the bookstores (remember those :-) and bought a huge stack of books on what might be best described as the 'philosophy' underpinning quantum physics; stuff like the wave/particle duality and Schrödinger's rather unfortunate cat.

Study 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The First Complete Strategy Execution Program (Summarized)

Six Disciplines

'The critical question for every business leader is, “ How do I build an organization that consistently executes its strategy?”. The answer: it takes a complete program. The reasons other approaches do not last is that they are missing key elements. Technology (i.e., performance mangement software) alone is not enough. Training, by itself, is not adequate.

article thumbnail

Pre-Event Video Context for FedCyber 2014

CTOvision

'The video embedded below and at this link provides some pre-event context on FedCyber: FedCyber is an annual cybersecurity event hosted by Matt Devost & Bob Gourley that brings together several hundred attendees to advance the dialogue on critical enterprise and federal government challenges. We would love to see you there! Please join us at [link].

Video 105
article thumbnail

Web-Scale Wish: A Non-Profit Datacenter Makeover

Nutanix

The right technology in the right hands has the power to change lives and organizations. This holiday season, Nutanix will gift web-scale converged infrastructure to a non-profit organization chosen by you, our community.