Sat.Mar 26, 2016 - Fri.Apr 01, 2016

article thumbnail

The Most Powerful Note on Authenticity I’ve Ever Received

Let's Grow Leaders

I was blown away by an email I received from a woman who recently read Winning Well. I was touched on so many levels… by her brave journey toward authenticity in the workplace, by her clear sense of confident humility, by her gratitude for accepting leaders and an inclusive workplace, and quite frankly by the fact that there are Winning Well CEOs out there looking for other Winning Well leaders who have the ability to value competence and confidence over all the other crap that gets i

article thumbnail

Why Your Company Needs a Chief Joy Officer

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. NOTE: This article was written by Holly Michel, wife of General John E. Michel, the co-founder and CEO of GeneralLeadership.com. “ I slept and dreamt that life was joy. I awoke and saw that life was service.

Company 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Join Women in Cybersecurity This Week in Dallas

CTOvision

Katie Kennedy. Women in Cybersecurity (WiCyS) is hosting its third annual Women in Cybersecurity event on March 31 through April 2 at the Hyatt Regency DFW International Airport. WiCyS continues to innovatively expand its mission to bring together women in cybersecurity from academia, research and industry. This event is designed as a forum for speakers and guests to exchange knowledge, experience, networking, and mentoring, with the ultimate goal of raising interest in the important, fascinatin

article thumbnail

Mastering 2D Cameras in Unity: A Tutorial for Game Developers

Toptal

Camera systems are very important in conveying the right atmosphere in video games. When developing games, even 2D ones, advanced cameras should be your tool of choice. In this article, Toptal engineer Mihai Cozma shows us how to build a modular camera system for 2D platform games using some simple components in Unity that can be easily extended to 2.5D or even 3D games.

Games 81
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Fill in the Blank

Change Starts Here

In order for people to adopt change, what do they need to fill in the blank know believe understand feel create prioritize trust replace avoid value own choose do learn let go embrace accept share expect develop communicate risk discover resist start stop continue fear want gain lose change succeed ? know. believe. understand. feel. create. prioritize. trust. replace. avoid. value. own. choose. do. learn. let go. embrace. accept. share. expect. develop. communicate. risk. discover. resist. st

More Trending

article thumbnail

Why Collaboration as a Business Model Works

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

The 9 Most Common Mistakes That Ionic Developers Make

Toptal

Ionic is extremely popular at the moment, and it has revolutionized the hybrid application industry in a way that nobody could have imagined. However, over time, the best practices and tooling for Ionic have not progressed in the same way. As a result, the number of pitfalls that developers need to look out for when working with Ionic is still high.

article thumbnail

The workforce is changing, is your leadership ready?

Lead on Purpose

We see changes around us all the time. Some things change so often we become blissfully unaware. One of those areas of rapid change is the people making up the workforce.

article thumbnail

Monday Quote

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “For every minute you are angry, you lose sixty seconds of happiness. “ Ralph Waldo Emerson. . How did you enjoy today’s post? If you liked what you read, sign up for our frequent newsletter by clicking HERE — and you’ll also receive our handy Leader’s Reference List. . … Read the rest.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Putting programmatic ad management in perspective

CTOvision

Henry Rowe. Editor's note: Automating digital media trading can bring major operational efficiencies, but we’re only at the start of the curve for programmatic ad management which to date accounts for just a small fraction of overall marketing budgets. So there’s no need to panic if you haven’t got to grips with it yet, says Henry Rowe, EMEA Managing Director of Theorem- bg.

article thumbnail

How to Create a Simple Python WebSocket Server Using Tornado

Toptal

The threaded model and global interpreter lock has always been in the way of Python handling thousands of concurrent long-lived connections. Modern web frameworks, such as Tornado, use non-blocking network I/O to make Python feasible for implementing WebSocket servers. In this article, Toptal engineer Jongwook Kim walks us through the process of implementing a simple WebSocket-based web application in Python using the Tornado web framework.

How To 81
article thumbnail

3 Places to Look for Insight into Your Career Direction

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

Tuesday Time Machine: Honoring Those Who Have Given Their All

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. From Our Early Files: Originally Published. 27 April 2014. “ I have long believed that sacrifice is the pinnacle of patriotism. ”. Bob Riley. [The following is an unedited transcript of the speech I shared this morning commemorating the third anniversary of the loss of nine of our teammates fighting for freedom in Afghanistan…a reminder they are go

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

The @CTOvision Twitter Feed Is Great For Content On The Go

CTOvision

Bob Gourley. Statistically most of our daily readers consume our content via newsletter. If that is you, thank you! If not, you can subscribe to any of our tailored newsfeeds at this link. We would also like to encourage you to sign up to our Twitter Feed. We populate our feed with links to our latest articles and also live tweet events and special activities.

Trends 62
article thumbnail

Rethinking Authentication And Biometric Security, The Toptal Way

Toptal

How does one secure a vast, distributed network of tech talent? There are three ways of doing this: the right way, the wrong way, and the Toptal way. Today, we will be discussing the latter, and unveiling our plans for a comprehensive overhaul of our onboarding and authentication procedures. In this post, Toptal Technical Editor Nermin Hajdarbegovic will help you get acquainted with our brand new processes.

article thumbnail

Craftsman Spirit

QAspire

Do you consider yourself as an artist and your work as art? Art isn’t just about doing fancy stuff or indulging into painting, dancing etc. Your work becomes art when it changes others for better. When your ideas and insights change the conversations. When you overcome resistance to start, execute and most importantly, finish what you start. When you have the humility to accept what needs to improve and change.

article thumbnail

4 Creative Ways to Use Mobile Payments In Your Retail Business

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

Retail 66
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

From Role-Based Access Control to Access Governance

CTOvision

Robert Doswell. Role-based access control (RBAC) and access governance are two terms that are used interchangeably. Is one then simply synonymous with the other? Or not? What are the differences, and how do you get from RBAC to access governance? Let’s consider the subject in detail. Role-based access control is a term that has been in use for some time and is considered an effective method of setting up authorization management in an organization.

article thumbnail

Love, Laughter and the Meaning of Life

Next Level Blog

Last week, I was reminded of the value of old friends. While I was back in DC to teach in the Georgetown Leadership Coaching Program, I got to spend three days teaching with my dear friend of 13 (!) years, Rae Ringel. On one of the days we there together, I got to have lunch with another dear friend and mentor of 14 (!) years, Frank Ball. (That’s the three of us in the picture that accompanies this post.

article thumbnail

Balanced Risk Management Must Include Security Incident Response

Sailpoint

In previous blogs, I wrote about the growing market for cyber security insurance , and how more and more organizations are insuring themselves against what seems inevitable – cyber attacks and data breaches. Driving this trend is the increased frequency and severity of cyber attacks – and the knowledge that they are perpetrated by technically sophisticated criminals, intent on financial gain.

article thumbnail

Workplace Inclusion With Anand Giridharadas

CO2 Business Leadership

Anand Giridharadas is a friend who is a brilliant thinker and writer for The New York Times. I have only just begun to get to know him, and the courage and wisdom he shares is daring. Anand is speaking this week at St. Thomas University’s annual event: The Forum of Workplace Inclusion (March 29th to 31st, 2016). It’s last minute, I realize, but go see him if you can!

Journal 52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Can You Imagine Processing Classified Government Data In The Cloud? DOD Releases Cloud Security Requirements Guide Update

CTOvision

Bob Gourley. DoD technologists continue their pioneering work in leveraging cloud computing in support of national security missions. Cloud Computing for DoD is hard for many reasons, including the fact that like many other organizations the tendency is to keep things in motion that are already in motion. The fact that the old things never stop makes starting anything new just harder.

Cloud 61
article thumbnail

5 Things That CIOs Need To Be Doing In Order To Protect Their Networks

The Accidental Successful CIO

CIOs had better be doing all five of these network protection actions Image Credit: svenwerk. By now I think that we all realize that we are living in dangerous and challenging times. The bad guys know about the importance of information technology and so they spend their time trying to break into our networks and we keep trying to find ways to keep them out.

Network 56
article thumbnail

The Times, They Have A-Changed, Part I

The Agile Manager

"This technology revolution was not invented by robo-advisers. They have simply noticed, and taken advantage of, a broader and deeper shift towards passive investment through ETFs and index funds." -- John Gapper, Robots are Better Investors than People We like to think of "technology revolutions", but as Mr. Gapper points out, revolutions aren't led by technology.

Social 53
article thumbnail

An Interview with Becoming Wise Writer, Krista Tippett

CO2 Business Leadership

An Interview on Becoming Wise with Krista Tippett Becoming wise is a bar that most of us should reach for. And it is a difficult one to achieve. I have had the good fortune of knowing Krista Tippett for the past five years and the pleasure, like many of you, of listening to her radio show On Being. Her latest book, Becoming Wise: An Inquiry into the Mystery and Art of Living , provides insight from the deep well that she draws from.

Social 52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Tech News Roundup April 1

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. UCF partners with MIT in major federal high-tech research - Orlando Sentinel. Annual Race for Tech Visas Is Under Way - Wall Street Journal. Memo: RealNetworks reorganizes, names new CTO. ‘Affordable’ Tesla Model 3 electric car gets a five-star reveal from Elon Musk.

article thumbnail

Links for 2016-03-26 [del.icio.us]

Dion Hinchcliffe's Web 2.0 Blog

Sponsored: 64% off Code Black Drone with HD Camera. Our #1 Best-Selling Drone--Meet the Dark Night of the Sky!

Meeting 40
article thumbnail

Why can’t people follow instructions? #changemanagement #HRblog

Rapid BI

Why can’t people follow instructions? Or maybe more accurately why wont people follow instructions? This was brought home to me recently during some small changes in a community group I run online. It got me thinking about how we implement change, and why change management programs often fail to meet expectations. In the worlds of […]. The post Why can’t people follow instructions?