Sat.Sep 05, 2015 - Fri.Sep 11, 2015

article thumbnail

How to Get Your Team Fired Up About a Change

Let's Grow Leaders

The minute I walked into their building, I could feel the excitement reverberating from the walls. Everyone was buzzing about the unveiling of their new company name, branding, and messaging. The IT Guy explained that they were “no longer” a start-up (true), and the designer clearly articulated how these changes were to take the company into the next phase of their growth.

article thumbnail

Priorities: A Different Approach

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “The key is not to prioritize what’s on your schedule, but to schedule your priorities” Stephen Covey. Leadership theories often espouse the significance of developing, communicating, and making decisions based on priorities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Time To Spread The Word on Internet of Things Dangers: Read what FBI and DHS Cyber Centers Need Us All To Know

CTOvision

The DHS National Cybersecurity and Communications Integration Center (NCCIC) is playing an increasingly important role in collaborating across multiple sectors of the economy and across government in sharing important advisories and alerts. The FBI led Internet Crime Complaint Center (IC3) is playing an increasingly important role in helping consumers and victims of fraud know the reality of the threats facing them from cyberspace.

Internet 142
article thumbnail

Antipodes

Erik Bernhardsson

I was playing around with D3 last night and built a silly visualization of antipodes and how our intuitive understanding of the world sometimes doesn’t make sense. Check out the visualization at bl.ocks.org ! Basically the idea is if you fly from Beijing to Buenos Aires then you can have a layover at any point of the Earth’s surface and it won’t make the trip longer.

100
100
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

How To Move a Team From Forming to High Performing in < 48 Hours

Let's Grow Leaders

Our MBA Orientation committee debated whether was this too much pressure. The second week on campus, teams of first year MBA students would have 48 hours to research and make recommendations on a real business challenge for a large, high-profile company and package and communicate their recommendation to a high-profile audience. Clearly, it’s more than a “game” when potential employers and university leadership are involved.

More Trending

article thumbnail

New DoD Rules For Contractors Focus On Enhancing Security and Incident Response

CTOvision

On 26 August 2015 the Department of Defense (DoD) published a new rule entitled the "Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013-D018). You can read the details of this new rule here: Download “DoD Rules On Protecting Data In Contractor Systems” 26-Aug-Federal-Registrar-New-DoD-Rules-For-Cyber.pdf – Downloaded 8 times – 290 kB.

article thumbnail

Antipodes

Erik Bernhardsson

I was playing around with D3 last night and built a silly visualization of antipodes and how our intuitive understanding of the world sometimes doesn’t make sense. Check out the visualization at bl.ocks.org ! Basically the idea is if you fly from Beijing to Buenos Aires then you can have a layover at any point of the Earth’s surface and it won’t make the trip longer.

100
100
article thumbnail

2 Reasons Employee Engagement is So Hard– And What to Do About It

Let's Grow Leaders

If you’ve ever been on the receiving end of employee engagement results, you most likely know the, “how in the world could they feel THAT WAY after ALL I’ve done” head scratching frustration. I know I have. You’ve recognized, mentored, career-pathed, taken some bullets, helped them win… and yet, it somehow wasn’t enough for everyone.

Survey 174
article thumbnail

Tuesday Time Machine: Worn Out By Weariness

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. From Our Early Files: Originally Published. 16 Feb 2014. The greatest weariness comes from work not done. Eric Hoffer. Are you tired? Are you frustrated? Are you weary? Weary of feeling as though your dreams are impossible to reach.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Registration for 10 Nov 2015 FedCyber Summit Now Open

CTOvision

FedCyber Conference co-chairs Matt Devost and Bob Gourley are pleased to announce that registration for the 10 Nov 2015 FedCyber Summit and Threat Expo is now open. Please reserve your seat today by registering here (as always, the FedCyber Summit is free for federal government employees). Every year this summit brings together thought leaders who know the cyber mission in a venue designed to enhance our collective understanding of the threat, build on existing strategies to mitigate challenges

article thumbnail

How to Influence When You’re Not in Charge

Nathan Magnuson

How do you lead when you’re not the boss? It’s hard enough to lead when you are in charge. What are the other options? If you’ve wondered this, I’ve got good news for you. It’s a lot easier than it sounds. And you can get started today. Here’s a game plan for you. Start Collaborating Now. It’s hard to influence when you don’t have any visibility for one reason: people give more credibility to folks they recognize.

How To 110
article thumbnail

How Motivation For Female Entrepreneurs Differs Throughout The World

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

111
111
article thumbnail

Happy Labor Day

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. Taking a break to celebrate a respite from our labors today. We will return to our regularly scheduled programming tomorrow! Thanks for tuning in to GeneralLeadership.com where we bring Advice from America’s Most Trusted Leaders to YOU!

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

The Hacker Playbook: updated for 2015

CTOvision

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Games 112
article thumbnail

Leadership and motivation

Lead on Purpose

So much productivity is lost in businesses because the people who are hired to do the work are not motivated or even worse are demotivated to give their best effort. Have you seen this in your organization?

article thumbnail

4 Things Entrepreneurs Should Do Quarterly

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

What’s Coming Next in Digital and Social in the Enterprise?

Dion Hinchcliffe's Web 2.0 Blog

I’ve been taking a close look at what’s over the enterprise horizon for much of the year as the pace of technology change continues to accelerate, as most experts have long predicated and which will only continue. New platforms, technologies, product, services, and models are appearing at a constant pace these days. Many topics that are hot today were barely on anyone’s radar a short while ago, from the blockchain and holacracy , to social performance management and trimodal IT

Social 104
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Empowering Analytics: Detecting Fraud In Hybrid Datasets (Webinar 24 Sep 2pm EST)

CTOvision

Fraud is pervasive and is seen in the form of social engineering, phishing attacks, insider threat attacks, and in attempts to extract money using false claims. Fraud especially presents major challenges in fields that include healthcare, visa applications, job applications, travel claims and even clearances. It has been proven to be critical to many terrorist operations and is instrumental to transnational crime.

Analytics 111
article thumbnail

Sass Style Guide: A Sass Tutorial on How to Write Better CSS Code

Toptal

When working on big web applications as a team with other developers, code needs to be scalable and readable. This can be a challenging process when it comes to CSS, although preprocessors like Sass are available. But only using preprocessors will only get you so far. In this article, Toptal engineer Matias Hernandez presents a style guide with advice on how to improve the way you write your code.

How To 91
article thumbnail

4 Ways Startups can Support Work-Life Balance

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Company 102
article thumbnail

#Sketchnote: Bold #HR by Josh Bersin

QAspire

For anyone working in HR, learning and leadership space, the Global Human Capital Trends Report 2015 by Deloitte University Press is a must read. It outlines the key challenges faced by businesses today and confirms that it is the soft stuff (culture, engagement, leadership and learning) that is actually hard for most businesses , large and small. The report ends with a note, Make 2015 a year of bold leadership in helping your organization thrive in this new world of work.

Trends 67
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Ten Best Ways to do On-The-Job Training

CTOvision

There are a variety of different styles of job training, but typically the most effective training happens when employees are actually at work. Employee development is important for a number of different reasons, and on-the-job training can provide unparalleled opportunities for employee growth, job development, and more. But why is on-the-job training so valuable, and what is the best way to do it?

Training 110
article thumbnail

A Remote Worker's Guide To Staying Healthy

Toptal

There are a lot of developers who take good care of themselves and enjoy a healthy, active lifestyle. If you are one of them, you can skip the rest of this post, because I wrote it to help developers like myself, who could benefit from a healthier lifestyle. Even if you are entirely focused on your career, and think you don’t have enough spare time to lead a healthy lifestyle, bear in mind that good physical health will also boost your productivity.

article thumbnail

4 Simple Steps to Boosting Sales

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Tools 98
article thumbnail

The Essential Guide to SWOT Analysis

CO2 Business Leadership

The Essential Guide to SWOT Analysis is a comprehensive and interactive guide that introduces and then details the fundamental aspects of SWOT analysis. The co-authors, Jackson Hille, Content Associate of FormSwift, and Justin Gomer, a Lecturer at UC Berkeley, decided to make the guide upon noticing the below-average quality of easily accessible information involving SWOT analysis online.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Fed Tech Roundup September 8

CTOvision

The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. Registration for 10 Nov 2015 FedCyber Summit Now Open. Apple and Other Tech Companies Tangle With US Over Access to Data - New York Times. Patent Law Shouldn't Block the Sale of Used Tech Products - New York Times.

Mobile 105
article thumbnail

Software Reengineering: From Spaghetti to Clean Design

Toptal

Inheriting someone else’s code can be a nightmare, especially when the code is poorly designed and lacks documentation. In this post, Toptal Engineer Juan Pablo Scida provides a case study of how he reengineered a chat server written in Node.js, transforming its original spaghetti code into a cleanly architected and designed piece of software.

article thumbnail

What Should Be Included in Start-Up Training?

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].