Sat.Dec 13, 2014 - Fri.Dec 19, 2014

article thumbnail

5 Times It’s Better to Say No

Let's Grow Leaders

'It’s almost always easier to say yes than no–in the short run. Yes, it’s okay for you to treat me that way. Yes, I’ll stay late tonight and miss dinner again– after all my wife won’t say no. Yes, it’s okay skip my workout. Yes, your work is fine (even though it could be better.). A close second to expectation violations , the inability to say no is one of the top sources of intrapersonal and interpersonal conflict in organizations.

article thumbnail

Monday Quote:

General Leadership

'“Leadership is a potent combination of strategy and character. But if you must be without one, be without strategy.” Norman Schwarzkopf … Read the rest. The post Monday Quote: appeared first on General Leadership.

Strategy 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

FBI Provides An Update On #SonyHack Investigation Including Some Tech Details On Attribution

CTOvision

'By Bob Gourley. The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the past I have to tell you they do not go public like this unless they have evidence. It is true they have been wrong before, and it is a very American trait to be skeptical of government assessments.

Malware 139
article thumbnail

A brief history of Hadoop at Spotify

Erik Bernhardsson

I was talking with some data engineers at Spotify and had a moment of nostalgia. 2008. I was writing my master’s thesis at Spotify and had to run a Hadoop job to extract some data from the logs. Every time I started running the job, I kept hearing this subtle noise. I kept noticing the correlation for a few days but I was too intimidated to ask. Finally people starting cursing that their machines had gotten really slow lately and I realized we were running Hadoop on the developer’s desktop machi

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Leaders Share about Dreams and Callings-A Frontline Festival

Let's Grow Leaders

'Welcome back to the Let’s Grow Leaders Frontline Festival. Our November Festival is all about Dreams and Callings. Thanks to Joy and Tom Guthrie of Vizwerx Group for the great pic and to all our contributors! Finding Our Dreams and Callings. “There are those who look at things the way they are and ask, ‘Why?’ I dream of things that never were and ask, ‘Why not?

More Trending

article thumbnail

Examining New Mission-Focused Capabilities Coming From The Cloudera And Intel Engineering Partnership

CTOvision

'By Bob Gourley. The video at this link and embedded below captures the content and dialog of a webinar which examined new capabilities of Cloudera and Intel , with a focus on capabilities that provide a full stack solution to many key enterprise mission needs. The webinar included insights by Cloudera’s Senior Director of Technology Webster Mudge and Intel’s Enterprise Technology Specialist Ed Herold, plus questions from an informed audience.

article thumbnail

A brief history of Hadoop at Spotify

Erik Bernhardsson

I was talking with some data engineers at Spotify and had a moment of nostalgia. 2008. I was writing my master’s thesis at Spotify and had to run a Hadoop job to extract some data from the logs. Every time I started running the job, I kept hearing this subtle noise. I kept noticing the correlation for a few days but I was too intimidated to ask. Finally people starting cursing that their machines had gotten really slow lately and I realized we were running Hadoop on the developer’s desktop machi

article thumbnail

How to Handle Your Boss’ Negative Feedback (even in you disagree)

Let's Grow Leaders

'Amy was dreading her performance review. She’d just be in the job a year, and her interactions with her imperfect boss were becoming more tense and intense with each passing month. The truth was, she questioned his approach to running the department, and he wasn’t listening to her ideas. She didn’t love his suggestions, and often reacted defensively to his feedback, making matters worse.

How To 150
article thumbnail

Why Great Leaders Have Selective Amnesia, and 3 Ways They Use It

Terry Starbucker

'George Santayana. I’m sure you’ve heard this famous quote many times: “Those who cannot remember the past are condemned to repeat it” – George Santayana. Indeed, it’s a very powerful message about learning from the past. However, I would offer that this quote should be amended to truly reflect using history to a leader’s advantage: “Those who learn best from wisely selected amnesia are destined to greatness”.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Game Change: Three Reasons Why #SonyHack Will Change Security

CTOvision

'By Anup Ghosh. Editor’s note: As an advisor to Invincea I closely track not only their capabilities but the context they provide the community. Anup Ghosh, CEO of Invincea published well reasoned context on the Sony Hack at the Invincea blog, it is reposted below for your consideration. – bg. Let’s be honest. As wild as this year has been in InfoSec, none of us, and I mean nobody, anticipated the events that unfolded this week with the Sony hack: A major studio cancels a theatrical

Security 112
article thumbnail

Luigi talk tomorrow

Erik Bernhardsson

At NYC Data Science meetup ! Unfortunately the space is full but the talk will be livestreamed – check out the meetup web page for a link tomorrow.

Data 100
article thumbnail

Interview: IGNITE Your Communication Style to Gain Influence and Impact

Change Starts Here

'In this episode, Debora McLaughlin, author of The Renegade Leader and and Running in High Heels , joins the show to share her easy to remember I.G.N.I.T.E. model for increasing your influence and impact at work. Listen in to also learn how communication impacts your influence, and how you can evaluate whether you might need to alter your communication style.

105
105
article thumbnail

Why Pleasing Others May Hinder Your Career Growth

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Recorded Future Launches New Cyber Threat Insights Report: Valuable context for defenders

CTOvision

'By Bob Gourley. Recorded Future has launched a new free service for cyber defenders which I am finding valuable for situational awareness. This new cyber daily provides technical indicators and context around vulnerabilities making them more understandable and helping put them in context. My view is their report can be helpful to both security executives and more operational and tactical defenders since it can help both prioritize actions and discuss the need to mitigate specific concerns.

Report 110
article thumbnail

Luigi talk tomorrow

Erik Bernhardsson

At NYC Data Science meetup ! Unfortunately the space is full but the talk will be livestreamed – check out the meetup web page for a link tomorrow.

Data 100
article thumbnail

Top 10 Posts from 2014

Nathan Magnuson

'It’s been another great year for Everyday Leadership. Visitors stopped by from nearly every country. My Trusted Leadership Advisor ebook finally got posted (check it out, it’s free!). Thanks for making it another a great year! Here are the top 10 posts from 2014. And incidentally, you can also see the top 10 posts from every other year as well.

eBook 79
article thumbnail

To Ensure Business Growth Keep Asking Yourself This Question

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

The quotable @ScottMcNealy said: Trying to run a business without awareness of the cyber threat is asking to be fired

CTOvision

'By Bob Gourley. The book The Cyber Threat was written to provide business and government executives insight into the nature of the dynamic adversaries attacking our networks. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a defense during attack. Reading this book will teach you things your adversaries wish you did not know and in doing so will enhance your ability to defend against cyber attack.

article thumbnail

How to Avoid the Disaster of Leadership Vertigo

Next Level Blog

'Is there a gap between how you view the impact of your leadership and the way others view or experience it? If there is, then you''re suffering from what leadership expert, speaker and author Tanveer Naseer calls "leadership vertigo." That''s actually the title of a new book that Naseer has co-authored with S. Max Brown. As Tanveer explains it in a recent conversation he had with me, leadership vertigo occurs when your brain tells you one thing and the facts tell you another.

article thumbnail

The Publish-Subscribe Pattern on Rails: An Implementation Tutorial

Toptal

The publish-subscribe pattern] (or pub/sub, for short) is a messaging pattern where senders of messages (publishers), do not program the messages to be sent directly to specific receivers (subscribers). Instead, the programmer "publishes" messages (events), without any knowledge of any subscribers there may be. This article provides insight in how to use the pub/sub pattern, in Rails, to communicate messages between different system components without these components knowing anything about each

article thumbnail

Smart Risk-Taking Tips for Entrepreneurs

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Your Enterprise has too many Cyber-ish People

CTOvision

'By John Scott. Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. etc, but really should it be? It seems more like a jobs program that moves headcount from one part of the enterprise to the expensive nerdy-side. Sitting through a number of presentations at various cyber conferences recently I’m struck that many enterprises cyber security planning comes down to having ‘the best people’

article thumbnail

Mindful Mondays: Reflect, Then Project

Next Level Blog

'We''re very close to the time of year when people start thinking about New Year’s Resolutions. There’s just something about that blank calendar (or at least more blank than your end of 2014 calendar) that makes hope spring forth that the coming year will be different in the ways that matter most. It’s a good exercise for sure. As the Cheshire Cat said to Alice, “If you don’t know where you’re going, any road will take you there.

article thumbnail

Building Real-Time, Multi-Platform Mobile Applications: Examples Using Ionic Framework and Firebase

Toptal

This article provides step by step guide for building hybrid multi-platform real-time mobile application using the Ionic Framework and the Firebase.

Mobile 80
article thumbnail

Why Compassionate Objectivity is Important

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

Revolutionizing Contact Centers: Next-Gen Tech for Enhanced CX

Speaker: Liran Meir Frenkel, Performance Management and RPA Sr Product Marketing Manager at NICE; Harpreet Makan, Practice Director at Everest Group; & Santhosh Kumar, Practice Director at Everest Group

As contact centers navigate the challenges of delivering excellence within budget constraints and adapting to evolving employee expectations, optimizing agent tasks becomes crucial. Discover a holistic approach across three pillars - people, process, and technology - that is essential to excel in this dynamic landscape, and explore how next-gen technologies such as generative AI, performance analytics, and process intelligence play a pivotal role in transforming contact centers into advanced CX

article thumbnail

DDN raises the bar as data intensive analytics push storage systems

CTOvision

'By Dan Cybulski. It is no secret that today’s data intensive analytics are stressing traditional storage systems. The capacity of individual drives continues to increase while performance sees little change. As such, organizations are leveraging horizontal scale and non-volatile memory (NVM) technology (i.e. SSD) to bolster the performance of traditional storage platforms and support the ever-increasing IOPS and bandwidth requirements of their applications.

Storage 104
article thumbnail

Luigi Presentation @ NYC Data Science, Dec 16, 2014

Erik Bernhardsson

More Luigi presentations!

Data 100
article thumbnail

Why The Singapore Stock Exchange Problem Is The CIO’s Fault

The Accidental Successful CIO

'Bad things have been happening at the Singapore Stock Exchange Image Credit: Reuters. Stock exchanges are challenging businesses to run. The people who use stock exchanges, stock traders, banks, brokers, etc. move very fast. The phrase “time is money” was invented to describe these people. They have a desperate need to be able to communicate with other people in a very rapid and very reliable way.