Sat.Nov 01, 2014 - Fri.Nov 07, 2014

article thumbnail

Does it Matter if They Like You?

Let's Grow Leaders

'Conventional managerial wisdom says, “It doesn’t matter if they like you, as long as they respect you.” I can also hear the echo of countless bosses and mentors over the years, “You’re not here to be liked.” “If you worry about whether they like you, they won’t respect you.” I get the sentiment and, as with anything else, it’s a matter of degree.

Journal 181
article thumbnail

5 Leadership Lessons from Surfing

General Leadership

'“The best surfer out there is the one having the most fun” Phil Edwards. legendary surfer. When we returned to Hawaii after 13 years away, one of the first things I wanted to do was get back on my surfboard. After a little shopping around I found the perfect board: a basic, reasonably priced board, and then set off to re-conquer the Hawaiian surf.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

My Favorite Leadership Pep Talk

Terry Starbucker

'The Scene: Sally is about to start her first day as the manager of a division of a service company. She’s called a team meeting that will have her entire staff of 75 in attendance. Before heading to work, she meets her mentor and friend Terry for coffee, and a some last-minute advice. After finishing his almond milk latte, Terry gives Sally a leadership pep talk… “Sally, there comes a time after you’ve gone to school, read the books, found a mentor, attended the seminars, an

article thumbnail

Second Factor Authentication With Security Keys

CTOvision

'With the movement of our personal and business critical data to the ‘cloud’, and directed attacks on that data, many of us make use of stronger security through use two-factor authentication. I know everyone reading this has two-factor turned on for iCloud, Google Services, and DropBox! But using this two-factors can be a pain. Depending on which service, you use Google Authenticator, have a code sent via SMS, get a plain old phone call, the RSA key fob, or rely on email and then type your six

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

7 Ways Overconfidence is Sabotoging Your Career

Let's Grow Leaders

'Frank is bright, confident, with an MBA from a top 25 and a long-track record of success. He moved up quickly and has a wall full of awards. He’s checked all the boxes: special assignments, line and staff jobs, late nights; but the last three promotions have gone to someone else. When he asks why, he’s told to “Be patient,” and that “Your time will come.” Hardly actionable feedback.

More Trending

article thumbnail

Three Main Impact Zones of Change

Change Starts Here

'As you embark on implementing a change in your organization, it’s important to identify who will be impacted – not just those who are the primary targets of the change, but others in your organization who are impacted by or who have an impact on the change. There may be many individuals or groups who may not be obvious stakeholders in your project whom you need to address and influence.

article thumbnail

Pew: Cyber Attacks Likely to Increase

CTOvision

'The blurring lines between physical and cyber systems, coverage of data monitoring from the Edward Snowden revelations, and the deluge of cyber attacks in 2014 have resulted in new levels of American interest in cybersecurity. A few examples of this attention are the speculations around the implementation of Stuxnet, the government’s creation of Cyber Command, and the media’s coverage of the many thefts of information from digital databases and the cloud.

Internet 111
article thumbnail

An Easy Way to Discuss Dysfunctional Behavior at Work

Let's Grow Leaders

'Whether your team is just starting up, or has the battle scars of a team fighting for results, they need to find a way to talk about the behaviors getting in their way. Great leaders look for ways to make this conversation easier. Dysfunctional behavior can be hard to talk about because it feels so personal. Many times people wait to have important difficult conversations until the issue has escalated.

Exercises 146
article thumbnail

Monday Quote:

General Leadership

'“The day the soldiers stop bringing you their problems is the day you stopped leading them. They have either lost confidence that you can help them or concluded that you do not care. Either case is a failure of leadership.”. Colin Powell. by … Read the rest. The post Monday Quote: appeared first on General Leadership.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

3 Strategies for Effectively Communicating with Your Customers

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Strategy 107
article thumbnail

The Threat Brief: Providing daily context on threats to your mission

CTOvision

'The newly revised formats and enhanced reporting of our daily ThreatBrief have caused readership to take off. We really appreciate and are amazed at the response. There are threats to your business and mission needs. Tracking them can give you insights that drive your decisions. This is the operating thesis behind ThreatBrief. Our goal is to make this product your most anticipated read of the day.

article thumbnail

4 Steps for Extreme Feedback

Steve Farber

'It’s the oldest skill in the management texts: listen to your employees. Seek their input. But it’s not enough to ask for feedback; you have to be genuinely interested in the response—especially if you think you won’t like it. Those posing as leaders seek feedback because HR has ordered them to do it, not because they’re really interested. Extreme Leaders will not only use 360-degree assessments (which can be powerful tools when used effectively), but they seek extreme feedback face-to-face bec

article thumbnail

Five Questions for Leaders Who Would Rather Be Effective Than Right

Next Level Blog

'During the opening session of a new leadership development program last week, I asked the participants to share the biggest leadership lesson they’ve learned in their careers so far. There were a lot of interesting answers. One participant shared one that really stuck with me because I think it’s so true. The lesson was it’s not enough to have the right idea, you have to influence other people to believe that it’s the right idea.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

5 Simple Ways for Small Businesses to Give Back

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

U.S.-Japan Rebalancing

CTOvision

'The United States and Japan just released their Interim Report on the Revision of the Guidelines for U.S. – Japan Defense Cooperation. (Available here: [link] Anyone who works U.S.-Japan interoperability issues (from policy to technology) will be interested in the language contained in the report, which is basically an action item from the last U.S. – Japan Security Consultative Committee (SCC) (aka: 2+.

article thumbnail

Git Workflows for Pros: A Good Git Guide

Toptal

Git can support your project not just with version control, but also with collaboration and release management. Understanding how workflow patterns can help or hinder a project will give you the knowledge to evaluate and adapt your project's Git processes effectively.

84
article thumbnail

3 Tips For CIOs To Become Better Negotiators

The Accidental Successful CIO

'Negotiating is how CIOs can get what they want Image Credit. It’s interesting to realize just how important the skill of negotiating is to CIOs. Sure, we all know about the importance of information technology , but when you think about it, we spend a great deal of our time negotiating no matter if it is with vendors , other departments, or even members of our IT team.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

8 Office Gadgets to Improve Your Productivity and Attitude

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

106
106
article thumbnail

Cyber Attacks Likely to Increase (Part 2)

CTOvision

'The blurring lines between physical and cyber systems, accusations of data monitoring from Snowden revelations, and the the deluge of cyber attacks in 2014 have resulted in new levels of American interest in cybersecurity and digitalization. A few examples of this attention are the speculations around the implementation of Stuxnet, the government’s creation of Cyber Command, and the media’s coverage of the many thefts of information from the cloud and digital databases.

Internet 104
article thumbnail

Is Leadership Easy or Difficult?

Nathan Magnuson

'One of the things that disappoints me the most is hearing someone tell me they don’t want to be a leader. It’s unfortunate because I believe that everyone not only has the ability to be leader but also the responsibility to make a leadership contribution in the role they are in. But in this context, they usually associate leadership with a management-type position.

article thumbnail

Mindful Mondays: What You Can Learn About Focus from the World Series MVP

Next Level Blog

'If I ever write another book, I want to interview Madison Bumgarner for it. That dude knows how to focus and I’d love to know more about how he does it. As you may have seen last week, the San Francisco Giants starting pitcher came on the mound in the 5th inning of game seven of the World Series and pitched for the rest of the game. The scene was set in Kansas City and the Giants had a 3-2 lead over the Royals when Bumgarner took over.

Games 69
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Queen Bees in the Workplace

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

102
102
article thumbnail

Mirror API Tutorial: Google Glass for Web Developers

Toptal

Wouldn’t it be great to develop for Google Glass without learning a new programming language, and even by just using knowledge common to all web developers? Yes, it is possible! This article will introduce you to web development techniques you can use to build application used on Google Glass.

article thumbnail

Functional and Reactive Domain Modeling

Ruminations of a Programmer

Manning has launched the MEAP of my upcoming book on Domain Modeling. The first time I was formally introduced to the topic was way back when I played around with Erik Evans' awesome text on the subject of Domain Driven Design. In the book he discusses various object lifecycle patterns like the Factory, Aggregate or Repository that help separation of concerns when you are implementing the various interactions between the elements of the domain model.

article thumbnail

5 Lessons from an Office on the Edge

Mills Scofield

'Kris Ansin is the executive director of Mali Health Organizing Proje ct - an amazing company increasing access to primary maternal and child healthcare in Mali. This past year, Mali repelled an Islamic coup and had it''s first case of Ebola, hopefully contained. To say Kris lives in a complex and complicated world is an understatement. This is his story of what he''s learned living and working at the edge. ~~~~~~~~~~~~~~~~~~~~~~~~.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Waste Your Time with a Side Project, Seriously

Women on Business

'We''ve Moved! Update your Reader Now. This feed has moved to: [link] If you haven''t already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

101
101
article thumbnail

When Your Best Ideas are Shot Down

QAspire

'It is very likely that your best ideas will get shot down. It happened with me a few years ago. I went to the boss with my bright idea that had potential to generate additional revenue for the organization. My idea was shot down at first. No wonder, I was disappointed. When our best ideas are shot down, there are reasons behind it. Sometimes, you are not able to explain the idea in a way that it generates the required buy-in.

Trends 43
article thumbnail

Using SWOT During Times of Economic Uncertainty

Six Disciplines

'Tough times require tough decisions. During times of economic uncertainty, strategy refinement and execution need to become the top priority for business leaders. How to start? Begin by doing a SWOT Analysis. SWOT is a strategic planning tool used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in your business. The aim of any SWOT analysis is to identify the key internal and external factors that are important to achieving your strategy.