Sat.Sep 02, 2017 - Fri.Sep 08, 2017

article thumbnail

The number of letters in the word for each number

Erik Bernhardsson

Just for fun, I generated these graphs of the number of letters in the word for each number. I really spent about 10 minutes on this (ok…possibly also another 40 minutes tweaking the plots): More languages!! I love how Spanish has a few super compact words: “cien mil” for 100,000 for instance. Only eight letters, versus English “one hundred thousand” (20 letters).

Lambda 152
article thumbnail

5 Stages of Manager Soul Loss #WinningWell

Let's Grow Leaders

As we’ve travelled around the world sharing our Winning Well message– that yes, it is possible to get results that last without losing your soul– along with the tools to help, so many managers have shared, “well, I don’t think I’ve quite […].

Travel 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Happy Labor Day

General Leadership

Taking a break to celebrate a respite from our labors today. We will return to our regularly scheduled programming tomorrow! Thanks for tuning in to GeneralLeadership.com where we bring Advice from America’s Most Trusted Leaders to YOU!… Read the rest.

article thumbnail

Cybersecurity: What Every CEO and CFO Should Know

Toptal

$7.35 million. That’s the average cost of a data breach is. Sure, cybersecurity isn’t sexy. However, in today’s digital age, it is undeniably critical for large corporations and small startups alike. This is compounded by the fact that hacks are becoming commonplace. Read on to arm yourself with awareness to these invisible threats, and tangible steps you can take to protect yourself and your company.

Data 99
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

The number of letters in the word for each number

Erik Bernhardsson

Just for fun, I generated these graphs of the number of letters in the word for each number. I really spent about 10 minutes on this (ok…possibly also another 40 minutes tweaking the plots): More languages!! I love how Spanish has a few super compact words: “cien mil” for 100,000 for instance. Only eight letters, versus English “one hundred thousand” (20 letters).

Lambda 100

More Trending

article thumbnail

How to Run a Great Team Offsite Meeting

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Meeting 94
article thumbnail

The End of Traditional Employment—The Other Gig Economy

Toptal

As the number of skilled professionals turning to agile work increases, explore how the Talent Economy differs from the Gig Economy, how it offers up a very different mix of benefits and challenges, and why it could mean the end of traditional employment.

Agile 96
article thumbnail

Doing Digital Right: Ensuring Alignment of Business Strategy and Transformation Planning

N2Growth Blog

A manufacturing industry client had put a Digital Transformation Planning process in place before I began working them last year. The management team had done many of the right things in getting the planning program off of the ground – training, governance and executive oversight were all in place. But, they felt that the Digital Transformation Planning process wasn’t really getting them where it needed to be.

article thumbnail

Abandoned mobile apps, domain names raise information security risks

Kacy Zurkus - CSO Online

Whether it's an unfortunately short shelf life or a discontinued need, mobile apps are often abandoned by their creators who sometimes move on to a bigger, better deal. Should the domain be abandoned by its creator, a lot of domain-specific data is left out in the wild. The apps can still contact custom domain names for arbitrary tasks like configuration changes, application updates or publishing information.

Mobile 82
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

3 Entrepreneurial Habits for the Non-Entrepreneur

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

Things You Might Not Know About Typography in Sketch

Toptal

When working with typography, Sketch comes up short, especially when you compare it with the most popular design tools out there. In this article, we’ll give you quick tips to compensate for its shortcomings with typography.

Tools 89
article thumbnail

Micromastery: A Hidden Path to Learning and Happiness

QAspire

Learning anything new is not a daunting challenge, but a journey where each step counts. Fundamentally, we learn so that we can be happy and joyful. Micromastery is a great way to eliminate anxiety in learning. Two years back, I was fascinated by people creating sketchnotes and I wanted to learn how to create them. I was unaware of what goes into creating a great sketchnote but I decided to give it a try anyway.

Tools 78
article thumbnail

How to Keep Your Company’s Information Organized

CTOvision

The larger that your company grows, the more vital that it is for all the information your company processes to be properly organized at all times. Information organization quality is directly correlated with just how actionable the information is. Accurate information organization puts your company in the best position to develop fully customized white label […].

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Meet ProtectWise During The 6th Annual Denver Startup Week.

ProtectWise

Entrepreneurs from all over the country will converge on Denver for the annual Denver Startup Week. In its sixth year, the free weeklong event will take place September 25-29 in venues all over downtown, from Union Station to Galvanize Golden Triangle to everywhere in between. The event set attendance records last year with more than 13,300 attendees and is poised to do so again in 2017.

Meeting 67
article thumbnail

30 Tips on Remote Lifestyle and Design from the Toptal Network

Toptal

Working as a remote freelance designer poses special challenges while presenting unique opportunities. Here, some of Toptal’s top designers share their expertise on everything from the remote work lifestyle to expert design tips.

Network 85
article thumbnail

Branching out

Silk and Spinach

Hi, You know me as a long-time agile coach and trainer — something I’ve been doing now for a good few years. During that time I have often been asked whether I could spin up a software development team to create a new product or explore an idea for one of my clients or someone they know. And I have always declined, either because I was too busy or because it didn’t fit with the direction I wanted to take at the time.

USP 64
article thumbnail

FBI vs Apple: Lessons From History and The Law on Protecting Privacy Rights

CTOvision

Editor’s note: This is the fourth in a five-part series on this topic. This examination by Arnold Abraham provides insights and nuanced lessons from history, the law and the tech world that can inform all of us interested in both privacy and security. For a detailed legal analysis accompanying the article, please visit Thecyberlawteam.com/publications-1/ […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Big Data in Retail – Top 4 Trend Predictions for Retail in 2018

SQream

Retailers are in a tough situation. With a lot of consumers shifting preference towards online shopping, retails can’t be complacent. We think. The post Big Data in Retail – Top 4 Trend Predictions for Retail in 2018 appeared first on SQream - GPU Data Warehouse.

Retail 64
article thumbnail

Conquer String Search with the Aho-Corasick Algorithm

Toptal

The Aho-Corasick algorithm can be used to efficiently search for multiple patterns in a large blob of text, making it a really useful algorithm in data science and many other areas. In this article, Toptal Freelance Software Engineer Roman Vashchegin shows how the Aho-Corasick algorithm uses a trie data structure to efficiently match a dictionary of words against any text.

article thumbnail

Know Everything About MOJO – Mobile Journalism

WatchDown

WatchDown.com. What is Mobile Journalism? Mobile Journalism is a new way of storytelling where reporters use smart phones or other electronic devices to record the news and distribute it on their respective platforms. MOJO gives you a freedom to express your news the way you want to express it. Suppose a group of people protesting for a cause you can shoot it with your mobile phone and add your opinion to it and publish it.

Journal 59
article thumbnail

Product Manager as CEO

Lead on Purpose

Many product managers have begun their tenure with an up-and-coming company by hearing the phrase, “We want you to be the CEO of the product.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

News in Networking: Data Center Hurricane Prep, Gambling with DDoS, and Rural Broadband

Kentik

This week’s top story picks from the Kentik team. As the U.S. east coast prepares for Hurricane Irma, those with data centers in the storm’s path are also making efforts to avoid interruptions. Meanwhile, DDoS attackers took a gamble this week, making a hit on popular online poker site America’s Cardroom. The site’s CEO is said to be considering a bounty for information on who was behind the attack.

article thumbnail

Common Mistakes in Client Communication: How to Not Frustrate Your Client

Toptal

This article will help you identify and address various communication issues that can plague off-site professionals. Whether you’re a full-stack developer, a UI designer, or a content creator, these easy to memorize tips will help you hone your communication skills.

How To 75
article thumbnail

Abandoned mobile apps, domain names raise information security risks

Kacy Zurkus - CSO Online

Whether it's an unfortunately short shelf life or a discontinued need, mobile apps are often abandoned by their creators who sometimes move on to a bigger, better deal. Should the domain be abandoned by its creator, a lot of domain-specific data is left out in the wild. The apps can still contact custom domain names for arbitrary tasks like configuration changes, application updates or publishing information.

Mobile 40
article thumbnail

How to Address Major Gaps in Third-Party Risk Management Programs

Coalfire

While securing the organizational environment, it’s easy to focus on the enterprise assets without thinking as much about the vendor ecosystem. However, that extended ecosystem and how it interacts with the organization is a potential significant risk if not secured properly.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How Safe is The Cloud?

Getronics

For many years, security has been the number one concern of any CTO considering Cloud services. Although 47% of IT security personnel feel they are “forced” to believe in Cloud security , 65% believe that Cloud services are more secure than their own on-premises solutions. Years of experience suggest that Cloud security claims are true. Breaches have happened, but far less frequently than is the case with on-premise systems.

Cloud 40
article thumbnail

How You Can Save Your Business Money by Cutting Down on Paper

Strategy Driven

It may have escaped your notice, but UK businesses are gradually changing how they deal with the paper trail. Offices around the nation are looking at ways to reduce the need for paper mills to order pulp (which makes paper) that comes from the cutting of small trees and the remnants of harvesting larger ones. This way, forestry across the UK stays where it is, which looks more appealing and helps clean the air across the country too.

Storage 25
article thumbnail

Starting a Side Hustle to Make Extra Money

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

99