Sat.Jun 07, 2014 - Fri.Jun 13, 2014

article thumbnail

Why Some People Go the Extra Mile

Let's Grow Leaders

'Why do some people really give a damn, while others do just what they can to get by? Going the extra mile– doing more than is necessary –creates memorable magic. If it feels so good, why is it hard to come by? The HR term for this is “discretionary effort,” a close cousin of employee engagement. Discretionary effort is the level of effort people could give if they wanted to–above and beyond what is “required.” Such efforts are often done behind the scen

Energy 193
article thumbnail

A Positive Attitude is Contagious

General Leadership

'“The person who sends out positive thoughts activates the world around him positively and draws back to himself positive results.”. Norman Vincent Peale. A positive attitude is contagious! Do you believe that? I certainly do as I’ve seen it in action throughout my life. So we arrive at our fifth stop on our journey through SERVANT leadership. As a leader, it is amazing the impact you can have on your organization with your attitude; either positive or negative, you set the tone.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Leadership Lessons from 10 Inspiring Entrepreneurs

Terry Starbucker

'Photo by Mike Shur. Yesterday I was honored to once again be the emcee at the Oregon Entrepreneurs Network (OEN) 2nd Annual Summit , featuring 15 successful Oregon entrepreneurs sharing their stories in 12-minute “TED-style” speeches. The theme was the “School of Hard Knocks” – apt because the event was held in Portland’s cool and unique Kennedy School hotel and event center.

article thumbnail

White Paper: Three Big Data Blueprints

CTOvision

'By Bob Gourley. Enterprises everywhere have been seeking improved ways to make use of their data. Federal agencies have in many ways out on finding w enterprises and their leaders have been on the cutting edge of community efforts at big data, with most all agencies either executing on a comprehensive big data strategy or empowering technologist to explore and prove out possible solutions so a strategy can be developed.

Big Data 119
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

50 Questions That Engage Employees in Change

Change Starts Here

'Recently, I was going through some old boxes and found a journal from 2004 when I worked as an internal change agent in the role of Director of Organizational Effectiveness. Most of the notebook was filled with observations and ideas for how to implement that new role. Within its pages, I found a great list of questions I had used to increase employee engagement.

Journal 113

More Trending

article thumbnail

Do You Work Outside The Box?

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

104
104
article thumbnail

Great Reference Graphic To Keep Your Brain Engaged On All Elements Of Big Data

CTOvision

'By Bob Gourley. The reference below was provided by friends at Altamira. If you are an analyst, enterprise architect, CIO, CTO, CISO, CFO or even a business executive seeking insights into the nature of modern data solutions you will find the poster below to be a fantastic resource. Click to expand it to full view. Download and print and post on your wall to periodically review and to continue to ensure you are thinking of the many related elements of analytical solutions.

Big Data 118
article thumbnail

How you can inspire others to do great things

Lead on Purpose

'I’ve been thinking lately about how to motivate people and inspire them to step up, to take action, to do great things. I see so much opportunity for people, and yet so little motivation to make a difference.

article thumbnail

Avoid the Trenches

General Leadership

'“An army of a thousand is easy to find, but, ah, how difficult to find a good general.”. Chinese Proverb. In 1904, France and Britain signed the Entente Cordiale (the friendly understanding); shortly thereafter, Russia also agreed to join this alliance. As a result, the German military began to fear the possibility of a combined attack from France, Britain and Russia.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

9 out of 10 Employees Waste Time at Work – Infographic

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

104
104
article thumbnail

The Internet of (Secure) Things – Embedding Security in the IoT

CTOvision

'By George Romas. We’re seeing a glimmer of the future – the Internet of Things (IoT) – where anything and everything is or contains a sensor that can communicate over the network/Internet. The underlying technology enabling IoT is Machine-to-Machine (M2M) communications. Your running shoe tracks your workouts, sending the data to a mobile app. Your wristband tracks your daily activities, including sleep patterns.

IoT 113
article thumbnail

5 Golden Rules for Great Web API Design

Toptal

Web services and their APIs abound. Unfortunately, the vast majority are difficult to use. Reasons range from poor design, to lack of documentation, to volatility, to unresolved bugs, or in some cases, all of the above. Follow the guidance in this post to help ensure that your web API is clean, well-documented, and easy-to-use. Such APIs are truly rare and are therefore much more likely to be widely adopted and used.

81
article thumbnail

Check Out Today’s 200-Second Soundbite™ Video Spotlight!

General Leadership

'Colonel Chris P. Levy You explains you can learn almost as much about leadership from losers as you can from heroes. The good leaders in a person’s history are usually the ones that spring to mind when considering how to lead. I ask you to break from this habit and consider the leaders you would rather forget, the ones that still give you that feeling in the pit of your stomach or cause you to have nightmares.

Video 157
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Toni Nelson Joins the Women on Business Contributor Team

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

98
article thumbnail

White Paper: Automating Your Cyber Defenses Including Malware Removal

CTOvision

'By Bob Gourley. Threat actors are increasingly automating their attacks, making defense harder and overwhelming incident response teams. Defenders have long looked to automated discovery as a means to mitigate this threat, but until recently, mass automation and response/threat removal hasn’t been a viable option. With changes in technology, enterprise cyber security professionals can now leverage automated in-line response and recovery to enhance security.

Malware 109
article thumbnail

Mindful Mondays: What Good Did You Do You Today?

Next Level Blog

'I had been working in my hotel room in Wilmington, DE most of the day last Wednesday and decided to head up to the concierge lounge to see if they had anything I could eat for dinner. As I got on the elevator, there was already a gentleman in the car who seemed a little stressed out. You know, some heavy sighs, comments of “What a day,” and things like that.

Hotels 72
article thumbnail

200-Second Soundbite™ Podcast: Secret to Leadership

General Leadership

'Cruise over to PodBean to hear our latest 200-Second Soundbite entitled “The Secret to Leadership” or subscribe to our PodCast directly via iTunes at the following link. Associate Curator and GeneralLeadership.com CGO, Col Chris R. Stricklin shares the secret to leadership…Dynamic Followership. Dynamic Followers, simply, are followers who take charge of both their personal and professional development, ensure complete competency at their primary duty, actively manage their relationships

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Sponsored Video: Putting People and Community Back into CSR

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Video 86
article thumbnail

Register for 12 Jun 2014 Webinar: Automated Removal of Advanced Threats

CTOvision

'By Bob Gourley. If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Odds are you have concluded that the only way to mitigate the threat is through automation. Right? Please join us for a discussion on automated removal of cyber threats on Thursday June 12 at 11am eastern for a webinar that will provide insights on how to execute on automating for defense.

article thumbnail

The Many Interpreters and Runtimes of the Ruby Programming Language

Toptal

Which Ruby implementation is right for your project? While the reference implementation (Ruby MRI) remains the interpreter of choice, an alternate Ruby implementation may be right for your project, depending on your operational goals and constraints. This article showcases the Ruby interpreter implementations and runtimes available today, discussing the advantages and disadvantages of each.

article thumbnail

Why CIOs Need To Get Good At Reusing Technology

The Accidental Successful CIO

'Existing Information Technology Resources Can Be Reused Image Credit. I’m sure that you know that you shouldn’t throw things that can be recycled away. Save the planet and all of that. So this brings up an interesting question: as CIO how committed to recycling technology are you when the company is preparing to start up a brand new project?

article thumbnail

How to Leverage AI for Actionable Insights in BI, Data, and Analytics

In the rapidly-evolving world of embedded analytics and business intelligence, one important question has emerged at the forefront: How can you leverage artificial intelligence (AI) to enhance your application’s analytics capabilities? Imagine having an AI tool that answers your user’s questions with a deep understanding of the context in their business and applications, nuances of their industry, and unique challenges they face.

article thumbnail

Every Business Is Social (Like it or not)

Mills Scofield

'Mali Health Given the great comments on last week’s post and a Huffington Post article on the subject by Matt Murrie , I thought a follow-up was in order. The comments centered on two themes: Investment funding’s acceptance of “Social” as a viable type of business. Business Modeling – social vs. regular. Investment: Venture capitalists have traditionally funded for-profit businesses with a strong focus on ROI – Return on Investment vs.

Social 53
article thumbnail

Improving the USMC’s Legacy Logistics System (GCSS-MC): A Business Opportunity

CTOvision

'Industries that are interested in helping SPAWAR System Center Atlantic (SSC LANT) improve a bloated old legacy system will be interested in the Global Command Support System Marine Corps (GCSS-MC). SSC LANT has been hired by Marine Corps to make this system faster. This includes modernization of GCSS-MC’s engineering, infrastructure, logistics and program management.

System 104
article thumbnail

Business Techniques for Growth – Book Review

Rapid BI

'Written by Thomas H Gray, this book aims to give tools and techniques for smaller business owners. Book Structure: Motivation – self and others Compensation – for the owner and their team, Incentive plans and non financial rewards Improving Employee performance – a series of tools and techniques to improve the productivity and engagement of […].

Tools 51
article thumbnail

Please make sure you have offline backups

Coalfire

This ransomware has hit not only personal computers, but also organizations, including a town in New Hampshire. This particular attack was carried out when an employee opened a seemingly legitimate email attachment, once again reminding us of the ever-present danger of social engineering.

Backup 40
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

The Secrets to Successful Strategy Execution

Six Disciplines

'"A brilliant strategy, blockbuster product, or breakthrough technology can put you on the competitive map, but only solid execution can keep you there. ". So begins the Harvard Business review article "The Secrets to Successful Strategy Execution" written by executives from management consulting firm, Booz Allen Hamilton, Inc. According to the authors, "Execution is the result of thousands of decisions made every day by employees acting according to the information they have and their own self

article thumbnail

eBay Email Provides Explanation and Apology

CTOvision

'By Shannon Perry. In early May, eBay discovered that its network had recently been compromised, and on May 21 st a banner appeared on eBay.com acknowledging the breach and recommending that users change their passwords. Later that day, however, the banner disappeared, and throughout the week many users responded with frustration and disappointment at what many perceived to be a lack of transparency.

Banking 103
article thumbnail

Who owns training in your organization?

Rapid BI

'This is a perennial question, and from time to time the ownership and drive moves from one area to another. As a Training Manager I have operated within HR and Operations. And without doubt the best impact comes when Operations owns and indeed demands training. This does not mean to say that HR or a […].