Sat.Jun 25, 2016 - Fri.Jul 01, 2016

article thumbnail

Leadership – It’s Not About You

N2Growth Blog

If you think leadership is about you, your ego has led you astray. Leadership has little to do with you and everything to do with those you lead. If you think leadership is about the bottom line, think again; it’s about the people. Without the people there is no bottom line. Closely examine the core characteristics of great leadership, and you’ll find it’s not power, title, authority or even technical competency that distinguishes truly great leaders.

article thumbnail

What To Do When The Customer is Wrong

Let's Grow Leaders

The only problem with the concept, “The customer is always right,” is that sometimes they’re wrong. If you’ve been in any kind of customer-facing position, I know you’re with me. Sure, there are many, many circumstances where the only choice is to bite your tongue and concede, for the good of the customer experience. But some wrong is just, well…wrong.

Windows 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How Mindset Can Affect Organizational Leadership

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “Genius is not enough; we need to get the job done.” Carol S. Dweck. The term “mindset” in the context of business typically invokes images of all-star athletes going for the gold or maybe thoughts of positive mental attitude – PMA – the self-development concept first introduced in 1937 by Napoleon Hill in his book Think and Grow Rich.

article thumbnail

Introduction to Kotlin: Android Programming For Humans

Toptal

Java has been a dominant programming language for ages, but modern times call for modern languages. Meet Kotlin, a modern, clear, and expressive programming language powered by the same virtual machine technology that powers Java. In this article, Toptal Freelance Software Engineer Tomasz Czura takes us for a spin through the world of Kotlin and shows us how it can be used to make an Android application with an elegant architecture without compromising the very qualities of the code that Kotlin

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

5 Steps for Women Entrepreneurs to Get Cash

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

75

More Trending

article thumbnail

4 All-Encompassing Effective Leadership Styles

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. As we yearn to advance our leadership abilities, we continue to search for all-encompassing styles to not only model our behavior but also exemplify the techniques we do not want to portray. After a year away from my family, I have been spending some time at the pool, at the helm of video games and just watching my children in action.

article thumbnail

Tips And Tools For Optimizing Android Apps

Toptal

The plethora of tutorials on building Android apps may have you thinking that making a mobile app is simple. In reality, however, performance issues can be very complicated, and because performance plays a key role in making sure that your app stays on your users' list of favorite apps for a long time, every little detail must be given one's full attention.

Tools 75
article thumbnail

8 Tips to Set Up Your Own Home Office

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

74
article thumbnail

Welcome to Business 2.0 as Powered by New IT

N2Growth Blog

Business 2.0 represents a new way of thinking and doing for early 21 st Century companies. Unlike e-commerce where consumer transactions are done via the Web, Business 2.0 is about using the Internet-based services to drive entire business processes. Indeed, the work of transforming an enterprise to Business 2.0 is quite an undertaking. But, this transformation has an ally in “ New IT “–a confluence of cloud-based computing, digitalization, automated operational frameworks and

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

A New Era of Data Integration with Tamr and 451 Research

CTOvision

Michael Johnson. Data preparation involving the integration, cleansing and enrichment of data so that it is ready for analysis is a tedious and time-consuming process, and it can occupy up to 80% of an analytical development effort. Because it is vital to analytics, given the ‘garbage in garbage out’ maxim, data preparation can’t be circumvented. But it can be made easier, more efficient and indeed faster.

article thumbnail

Announcing InversifyJS 2.0.0 Release Candidate ?

Wolk Software Engineering

Learn what’s new in InversifyJS 2.0.0 and what can you expect to see in the future of this powerful lightweight IoC container for JavaScript and Node.js apps powered by TypeScript. As many of the readers of this blog already know, over the past year and a half we have been working on InversifyJS. InversifyJS is a powerful lightweight IoC container for JavaScript and Node.js written in TypeScript.

article thumbnail

Seeing the Value of Women in the Tech Industry

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

Why Aren’t Our Networks Staying Up?

The Accidental Successful CIO

Things don’t seem to work as well as they used to Image Credit: Bob Mical. Does anyone besides me remember the phone system? You could be just about anywhere in the world at any time and you could pick up a phone, call someone, and your call would go right through. The Plain Old Telephone System (POTS) just worked. Now nothing is ever perfect and the POTS wasn’t perfect either, but it was 99.999% perfect which meant that it only didn’t work for about 5 minutes per year.

Network 49
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Right-Sizing Data Center Resources

CTOvision

Charles Hall. One of the perennial problems of data centers is monitoring server utilization to ensure right-sizing of resources. Having too few resources can lead to overprovisioning, which can cause downtime as virtual machines become starved for compute, memory, and storage. Having too many resources wastes dollars, along with cooling and power.

article thumbnail

Reimagine Your Productivity at Getting Results.com

J.D. Meier's Blog

Imagine if you could master your motivation, your productivity, and your time management? It’s time to get your game on. I’ve completely revamped Getting Results.com ( [link] ) to help you think, feel, and do your best in any situation. At Getting Results.com you can learn all about Agile Results. It’s more than just a time management system or a productivity system.

Agile 49
article thumbnail

Improving the Efficiency of Your Business the Smart Way

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

3 actions to building a culture of trust

Lead on Purpose

Gaining and keeping the trust of those you lead is one of the top factors to your company’s ongoing success.

Culture 61
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Cybersecurity: Is AI Ready for Primetime In Cyber Defense?

CTOvision

Nate Crocker. Is AI ready for primetime? Not according to Admiral Michael S. Rogers, Commander U.S. CYBER COMMAND. In a recent interview with Charlie Rose, he stated that machine learning showed great promise for cybersecurity, but that the necessary technology was probably five years out. If machine learning is currently so successful in other areas of society, why isn’t it ready for cybersecurity?

article thumbnail

One Way to Boost Proactive Cybersecurity

Coalfire

It’s clear from media articles that new CISOs need to make an immediate impact on their organization’s security program in the first 90 days with action items such as “make a quarterly plan for the next year”

Media 40
article thumbnail

Why Incorporate in Your Home State?

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

66
article thumbnail

Building Cool Websites with Vue.js

TXI

Wondering which of the uncountable dozens of JavaScript frameworks to use for your next project? At Table XI, we've become somewhat taken with Vue.js, a relative newcomer to the JavaScript framework. In this video, Table XI's Zach Briggs joins Noel Rappin to talk about why to use Vue.js, and to give some examples of how […]. The post Building Cool Websites with Vue.js appeared first on Table XI.

Video 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Verisign iDefense IntelGraph: Vulnerability Threat Exposure Use Case

CTOvision

Michael Johnson. Verisign iDefense IntelGraph is an innovative new tool to capture and link all facets of cyber threat landscape data together. This data driven security intelligence application allows practitioners to quickly understand the diverse threats they are facing, investigate additional risks to their organization, allocate resources more effectively and determine the proper courses of action to take.

Course 61
article thumbnail

Creating a Cyber Insurance Policy

Coalfire

According to research from PartnerRe and Advisen, the global cyber-insurance market is currently worth $2 billion a year, a number which is expected to double by 2020.With 60% of underwriters and brokers seeing a significant demand in cyber-insurance from customers, there is clearly a great business opportunity for the insurance sector to offer cyber-insurance policies.

article thumbnail

Dr. Joynicole Martinez Joins the Women on Business Writers Team

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

53
article thumbnail

Poolside From Sunny San Diego

Steve Farber

Dive Deep Into LEAP! Hanging out in my back yard this weekend, it suddenly occurred to me that Extreme Leadership Certification is less than 2 months away! And there are only a few spots left… Click here to view the embedded video.

Video 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Social Engineering and Phishing

CTOvision

Stu Sjouwerman. Social engineering is one of the most problematic attack techniques to combat. It preys on our nature as human beings and is therefore difficult to counter by using technology. User education is most effective at stopping a social engineer. Users who are aware of the potential for social engineering attacks and learn to recognize them can use simple methods to thwart these attacks successfully.

Social 61
article thumbnail

FedRAMP High Baseline Requirements Published

Coalfire

The Federal Risk and Authorization Management Program (FedRAMP) Project Management Office officially released its High baseline for High impact-level systems. This baseline is at the High/High/High categorization level for confidentiality, integrity, and availability in accordance with FIPS 199; and is mapped to the security controls from the NIST SP 800-53, Rev. 4 catalog of security controls.

article thumbnail

Kentik Detect for Network Security

Kentik

Protecting Your Network with Comprehensive, Timely Understanding. Network security depends on comprehensive, timely understanding of what’s happening on your network. That requirement dovetails nicely with the primary purpose of Kentik Detect™, which is to enable customers to monitor and analyze network traffic so that they can identify and resolve issues affecting network availability, performance, efficiency, and integrity.

Network 40