Sat.Jun 04, 2016 - Fri.Jun 10, 2016

article thumbnail

Why Change Requires More Than Training and Communication

Change Starts Here

It’s a common belief that to get people to adopt change, all you really need is training and communication. If we tell people what to do and why, and show them how to do it, that should be enough to get them to change, right? It’s a logical conclusion, but then people aren’t logical, especially when it comes to change. While training and communication are essential tools for influencing any change at work, they are not the complete solution for managing the “people side” of projects.

Training 162
article thumbnail

Ask Don’t Tell: 3 Questions That Will Make You a Better Leader

Let's Grow Leaders

You know that asking the right questions will make you a stronger leader. But it’s hard. Not all questions have the same impact. And it’s risky, you never know what the response will be– which means you need to stay fully present to be helpful. “When you ask a question you’re giving up some of your power. It means you’re willing to sit in that discomfort for the good of another person’s growth.” -Michael Bungay Stanier.

Coaching 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Dual Pillars of Character: Strength & Honor

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “ Nothing has such power to broaden the mind as the ability to investigate systematically and truly all that comes under thy observation in life.” Marcus Aurelius. If you are anything like me, there are certain movies that resonate deeply with you.

Film 121
article thumbnail

The One Word A Leader Should Never Ever Ever Utter (or Hear)

Terry Starbucker

“It can’t be done”. “You can’t do that”. How many times have you heard these words? Plenty of times, I bet. And, how many times have you said those words? Stop and think about that for a second, and then consider this: “Can’t” is a big, fat, stop sign designed to sabotage a dream. Perhaps a better question we should ask ourselves is this – why are we hearing and saying that word in the first place?

Sport 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Preparing Your Organization for the “Big Change”

N2Growth Blog

Organizational change is inevitable. Like all living things, it’s vital that organizations regularly adjust in order to accommodate the ebb and flow that goes on within the ecosystems in which they thrive. Every so often, though, a “Big Change” is needed to better position an organization for long-term success. In those times, proper preparation is required.

More Trending

article thumbnail

Web Audio API: Why Compose When You Can Code?

Toptal

Meet Web Audio API, a powerful programming interface for controlling audio on the web. Gone are the days when the web browser could rarely play a sound file correctly. With this API, you can now load sound from different sources, apply effects, create visualizations, and do much more. In this article, Toptal Freelance Software Engineer Joaquín Aldunate shows us how to unleash our inner musician using Web Audio API with the Tone.js framework by giving us a brief overview of what this API has to o

article thumbnail

Small Business Facebook Posting Tips

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

An Update on the Megatrend of Big Data

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into the trend of Big Data. For years now people and our sensors and our computers have been generating more information than we can analyze.

article thumbnail

Your Career is Your Responsibility

Nathan Magnuson

I’ve been thinking about career selection and management a lot recently. When I’m asked how I landed where I am, I’m quick to reply that I wouldn’t wish my career path on anyone but I sure do love where I am now. In all honesty, there has been a lot of hard work, difficult choices and tough breaks along the way. But that’s true for anyone who wants something more.

eBook 60
article thumbnail

“Build vs Buy Analytics?” The Question ALL SaaS Leaders Need to Answer in 2024

As a SaaS leader, you know that the more metrics, insights, and analytics you add to your products, the more engagement you’ll have – and the stickier your product will become with customers. At what point do you decide to keep building your analytics in-house or invest in an embedded analytics solution? Read our Build vs. Buy Analytics guide to learn: Top 4 benefits of embedded analytics A quick cost comparison of in-house analytics development vs embedded analytics 10 considerations to help yo

article thumbnail

Bidirectional Relationship Support in JSON

Toptal

Ever tried to create a JSON data structure that includes entities with bidirectional relationships? If you have, you know that this often results in errors or exceptions being thrown. In this article, Toptal Freelance Software Engineer Nirmel Murtic provides a robust working approach to avoiding these errors when creating JSON structures that included entities with bidirectional (i.e. circular) relationships.

article thumbnail

Important Steps in Choosing the Right Video Conferencing Solutions for Your Business

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Video 66
article thumbnail

Pay with your Hand

CTOvision

Katie Kennedy. If you thought paying with your phone was convenient, try paying with your hand. Instead of taking your phone with you to purchase items you want to buy, now all you need is your hand. Charlie Warzel, Senior Writer for BuzzFeed News was the first to try out this technology.

Video 62
article thumbnail

The Page-Jones refactoring algorithm

Silk and Spinach

In Fundamentals of Object-Oriented Design in UML Meilir Page-Jones offers the following guidelines for system maintainability: Minimise overall connascence. By breaking the system into encapsulated elements. Minimise connascence crossing encapsulation boundaries. By maximising the connascence within encapsulation boundaries. This feels like something of an “algorithm” for refactoring, if only we could quantify what “maximise” and “minimise” mean.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Get Your Angular 2 On: Upgrading from 1.5

Toptal

"So much of what’s new and exciting about Angular 2 is its new way of thinking rather than its new architecture," says Toptal Freelance Developer Ethan James. In this article, Ethan walks through the inner workings of a simple Angular 1.5 app and then shows us how to upgrade it to Angular 2 while giving us the necessary understanding to truly appreciate it.

article thumbnail

Mindful Mondays: How to Silence Your Itty Bitty Committee

Next Level Blog

A while back, I was coaching an executive who found herself getting emotionally hijacked. Like a lot of executives in large organizations, her job required her to work cross-functionally with lots of different people. That kind of work environment leads to lots of conversations, meetings, e-mail threads, presentations and the like. With all of that information flying around the matrix, there are lots of opportunities to get hijacked if you’re not watching out for it.

How To 48
article thumbnail

The Ultimate Targeted Attack: Malvertisments

CTOvision

Michael Johnson. This talk was given by RiskIQ CEO and Co-Founder Elias Manousos at the Security Innovation Network in 2015. It provides important context on a very powerful attack method, malicious code delivered with the accuracy of a laser-guided bomb. He discusses how malvertising attacks can scale in a targeted way to maximize impact and limit collateral damage.

article thumbnail

Why [brief]? Communicate with power

Lead on Purpose

We live in a fast-paced world. We never have enough time to complete the agenda. The more we accomplish, the more the work seems to pile up. It gets overwhelming. How do you deal with mounting stress?

44
article thumbnail

Lessons Learned in PostgreSQL®

In today's digital landscape, the threat of ransomware demands proactive defense. This paper, inspired by a real PostgreSQL® database incident, offers vital strategies for effective mitigation. Instaclustr expert Perry Clark outlines immediate actions to minimize risks, ensuring a swift response to ransomware threats and protecting critical data assets.

article thumbnail

More Evidence Online Community is Central to the Future of Work

Dion Hinchcliffe's Web 2.0 Blog

Within the last month, two new industry reports have been released that shed important new light on how we’re going to be organizing and operating our organizations in the coming years. Many of you know my point of view in this regard: Social technology has at this point largely transformed the consumer world , yet the increasingly outdated digital landscape of business frequently continues to rely on creaky and rather limited technologies such as e-mail, document repositories, intranets,

Social 42
article thumbnail

Produce DWGs Like It's 2016: Teigha For Architecture

Toptal

Today, the notion of repetitively modeling or drawing the windows, doors, and walls of standardized buildings seems archaic, so why do it? If you want to handle DWG files and ACA objects programmatically, one of the best platform options is Teigha Architecture. In this article, Toptal Freelance Designer Alexey Abramovsky walks us through the DWG production of a small house to introduce us to the benefits of Teigha.

article thumbnail

Video Overview of Surprising New Technologies

CTOvision

Katie Kennedy. The video below highlights some of the technology available today, (most of these are only available via Kickstarter now, but clearly they are coming. Enjoy!

Video 62
article thumbnail

Why Network Traffic Visibility is Crucial for Managed Service Providers

Kentik

Don’t come up empty-handed when clients ask questions. The biggest risk a managed service provider (MSP) faces is a customer question they can’t answer. “I don’t know” hurts the confidence and trust a client has in them. “I don’t know” weakens the relationship. And yet, “I don’t know” is an answer that many MSPs must currently give to one of the most common client questions of all: Why is my Internet slow?

Network 40
article thumbnail

A Tale of Two Case Studies: Using LLMs in Production

Speaker: Tony Karrer, Ryan Barker, Grant Wiles, Zach Asman, & Mark Pace

Join our exclusive webinar with top industry visionaries, where we'll explore the latest innovations in Artificial Intelligence and the incredible potential of LLMs. We'll walk through two compelling case studies that showcase how AI is reimagining industries and revolutionizing the way we interact with technology. Some takeaways include: How to test and evaluate results 📊 Why confidence scoring matters 🔐 How to assess cost and quality 🤖 Cross-platform cost vs. quality tr

article thumbnail

More Evidence Online Community is Central to the Future of Work

Dion Hinchcliffe's Web 2.0 Blog

Within the last month, two new industry reports have been released that shed important new light on how we’re going to be organizing and operating our organizations in the coming years. Many of you know my point of view in this regard: Social technology has at this point largely transformed the consumer world , yet the increasingly outdated digital landscape of business frequently continues to rely on creaky and rather limited technologies such as e-mail, document repositories, intranets,

Social 42
article thumbnail

I'm joining the fight against malware and ransomware with SentinelOne

Jeremiah Grossman

Today is a big day for me. I’m contributing to a company called SentinelOne , but I really don’t think of it as a job. I’ve accepted an opportunity to work side by side with other brilliant and highly motivated people where we’re all helping to solve important and challenging InfoSec problems. In this case, malware and ransomware. You see, more than anything, I want to make a positive impact on InfoSec.

Malware 40
article thumbnail

Announcing The Threat Brief Mobile App: Know the threat to beat the threat

CTOvision

Bob Gourley. Threat Brief Mobile App is now available for all Apple iOS and Android devices. This is a great way to track the cyber threat while on the go. To find it search for ThreatBrief in your favorite app store, or follow these links: The Threat Brief Mobile App For iOS . The Threat Brief Mobile App for Android. Please download today and let us know what you think.

Mobile 61
article thumbnail

We can be better

Dan Pupius

I’m male, white, and speak with a British accent. The odds are stacked in my favor. Yet even I have felt that running the gauntlet of…. Continue reading on Medium ».

40
article thumbnail

How to Achieve Product-Market Fit

Speaker: Dan Olsen - Product Management Trainer and Consultant, Author, and Speaker

Everyone working on a product is trying to achieve the same goal: product-market fit. But most products fail to do so. In this webinar, product management expert Dan Olsen will share his simple but effective framework for achieving product-market fit from his book The Lean Product Playbook. He will explain his Product-Market Fit Pyramid and The Lean Product Process, a 6-step methodology that guides you through how to: Determine your target customer Identify underserved customer needs Define your

article thumbnail

Links for 2016-06-09 [del.icio.us]

Dion Hinchcliffe's Web 2.0 Blog

Sponsored: 64% off Code Black Drone with HD Camera. Our #1 Best-Selling Drone--Meet the Dark Night of the Sky!

Meeting 40
article thumbnail

Why change management often fails to deliver

Rapid BI

Why do most change management initiatives fail? well the reasons are simple.Our 10 year research into organizational change is summarize here. How do you and your organization stack up? The post Why change management often fails to deliver appeared first on RapidBi.

article thumbnail

CMA Hosts Federal Cybersecurity Solutions Reference Architecture Meeting

CTOvision

Katie Kennedy. The GWACsolutions Center of Excellence * recently conducted a hands-on work session to map and demonstrate alignment of best-in-class solutions and services to the NIST Cybersecurity Framework. “Standardized Frameworks such as the NIST Cybersecurity Framework serve as an essential starting point in the planning process – but they are just that … a starting point” said John Frey who led the work session.