2016

article thumbnail

The half-life of code & the ship of Theseus

Erik Bernhardsson

As a project evolves, does the new code just add on top of the old code? Or does it replace the old code slowly over time? In order to understand this, I built a little thing to analyze Git projects, with help from the formidable GitPython project. The idea is to go back in history historical and run a git blame (making this somewhat fast was a bit nontrivial, as it turns out, but I’ll spare you the details, which involve some opportunistic caching of files, pick historical points spread out in

Linux 224
article thumbnail

What’s Really Killing Morale and Employee Engagement

Let's Grow Leaders

Janice shared: I’d had enough: the gossip; the veterans scaring the new hires; more and more people doing just enough to get by… And I was frustrated because we’d done so much to foster employee engagement. I changed out some toxic leaders. We revamped our coaching program to focus on the positive. I’m here every Saturday right along with them.

Coaching 199
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Happy 69th Birthday to the United States Air Force!

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “I AM AN AMERICAN AIRMAN. I AM A WARRIOR. I HAVE ANSWERED MY NATION’S CALL.” The Airman’s Creed. Happy 69th Birthday to the U.S. Air Force! In 1947 President Truman signed the National Security Act which established this new defense organization, and along with it the creation of the US Air Force as an independent service, equal t

article thumbnail

Why Change Requires More Than Training and Communication

Change Starts Here

It’s a common belief that to get people to adopt change, all you really need is training and communication. If we tell people what to do and why, and show them how to do it, that should be enough to get them to change, right? It’s a logical conclusion, but then people aren’t logical, especially when it comes to change. While training and communication are essential tools for influencing any change at work, they are not the complete solution for managing the “people side” of projects.

Training 162
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Dream Adjusters: Why Company Leaders Also Have To Be Chief Calibration Officers

Terry Starbucker

When is a dream too big? When is it not big enough? When should the dream change? And who should be the one sorting it all out for an organization and/or team pushing for greatness? YOU, the leader. . There is no other person that can do it most effectively, or with the most impact. In fact, I’d argue that this is probably the most important job for high-level leaders- they also need to be Chief Calibration Officers.

Company 156

More Trending

article thumbnail

Cognitio’s Bob Flores, Ex-CIA CTO, Featured in IDG TechWorld Providing Context On the Cyber Threat

CTOvision

Bob Gourley. Cognitio's Bob Flores, former CTO of the CIA, was just featured in IDG TechWorld providing context on the state of the cyber threat. From the article: The former CTO of America's Central Intelligence Agency , Bob Flores, has said the gravest cyber security threat facing the world is the lack of protection for critical infrastructure and the internet of things – and that it's worth challenging narratives about attacks from nation states that get repeated without criticism.

Internet 153
article thumbnail

5 Steps to Develop a Viable Digital Marketing Strategy for Small Business

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

How Much Coding Should Designers Know?

Toptal

Much of the design community is locked in debate over whether designers should code. Some favor seeking out the unicorns who can do both, while others claim they don’t exist or only get in the way.

111
111
article thumbnail

What kind of leader are you? Take the quiz to find out!

Steve Farber

Taking a leadership style quiz won’t make you a great leader, but it will give you some of the insights you need to start developing your leadership into something greater than it already is. We all lead with style. For some of us, our leadership style is sort of like bellbottom jeans or parachute pants – a bit dated. We need a new wardrobe. Many of us, on the other hand, pay close attention to the trends that drive successful leadership in our competitive economy.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

What are you really competing against?

Lead on Purpose

In our world of work and business, competition is a real thing. Too often, however, we miss the real competitor. We overlook the root of what our products are really competing against.

article thumbnail

How to create your own TypeScript type definition files (.d.ts) and contribute to DefinitelyTyped on GitHub

Wolk Software Engineering

Learn how to create your own type definition files and how to contribute to the TypeScript community at DefinitelyTyped. Helping your community is AWESOME. It is Saturday evening and it’s raining a lot in Ireland. So I decided to spend some time on Twitter looking for interesting TypeScript news. Over the last year I’ve been using the @DubTypeScript account to share TypeScript news.

article thumbnail

9 Ways to Strengthen Your Personal Brand

Let's Grow Leaders

If you Google you, do you like who shows up? Do you feel like you’ve got a powerful message to share, but without the right positioning, find yourself talking to the metaphorical mute button? Are you having trouble outgrowing an outdated reputation at work? Or maybe you’re just looking to get a better seat at the table. 9 Ways to Strengthen Your Winning Well Brand.

Games 198
article thumbnail

End Meeting Nightmares: Manage Results, Not Activity

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. “A meeting is an event at which the minutes are kept and the hours are lost.” Unknown. Want to review housekeeping details weekly? Open a maid services franchise. Admit what you already know: Your meetings are ineffective.

Meeting 167
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

What to Do When Leaders Resist the Change They Hired You to Implement

Change Starts Here

The field of organizational change is littered with people who were hired to implement change and then eventually fired because the leaders who hired them wouldn’t actually let them do the job. These are a few of the stories I’ve heard over the years: A change manager wasn’t given access to the people who really needed to lead the change, thus condemning her project to fizzle out.

Coaching 158
article thumbnail

A Leadership Key To Success: Don’t Do Second Things First

Terry Starbucker

Remember those yellow legal note pads? They used to be my constant companions earlier in my career, before PCs, smart phones, laptops, and tablets. (Yes, there was actually a time like that, as strange as it may seem now. And oh yes, that officially qualifies me as a dinosaur.). I would always be making “to do” lists on those pads. Some were short, and some were long.

article thumbnail

The 15 minute guide to a successful interview

N2Growth Blog

Do you want to learn the techniques which will help you to smash your job interviews out of the park and get you the offer? Do you want to learn how to answer any interview question, even difficult behavioural interview questions? My name is Gordon Berridge , and I am the UK Partner and President at N2Growth , a global, multifaceted professional services firm.

Games 149
article thumbnail

A Timeline of Big Data Analytics

CTOvision

Rick Delgado. The world seems to run on big data nowadays. In fact, it’s sometimes difficult to remember a time when businesses weren’t intensely focused on big data analytics. It’s equally difficult to forget that big data is still relatively new to the mainstream. The amount of data being generated in the world today is immense, and it’s only getting bigger.

Big Data 147
article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Ready to Become a Solopreneur? Here Are 3 Steps to Get You Started

Women on Business

We've Moved! Update your Reader Now. This feed has moved to: [link] If you haven't already done so, update your reader now with this changed subscription address to get your latest updates from us. [link].

article thumbnail

The Definitive Guide to DateTime Manipulation

Toptal

In the realm of software development, time and date manipulation is considered by many to be a difficult task. Complicated time zone rules, leap seconds, differences in locale-specific formatting, etc., force us to immediately resort to popular time and date manipulation libraries. We often use these libraries without thinking about how exactly they work, which can lead to all sorts of obscure bugs in our software.

article thumbnail

How to Change a Struggling Culture

Steve Farber

Mitch Luciano had worked for Trailer Bridge for three years, and things weren’t going well for the Florida-based logistics company. They had churned through three CEOs in as many years, and the business was generating about a one percent annual return on investment. They needed to turn things around, and they needed to do it fast. In 2014 the company’s board moved Luciano into the president role (he didn’t want the CEO title, and who could blame him?

Culture 99
article thumbnail

What are you really competing against?

Lead on Purpose

In our world of work and business, competition is a real thing. Too often, however, we miss the real competitor. We overlook the root of what our products are really competing against.

article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

RIP CityDesk

Joel on Software

Here’s a quick history of the technology behind Joel on Software. Version one was on Manila, created by Dave Winer. Dave was the one who convinced me to blog, by blogging himself, and by creating what was, I think, the first public blogging platform at editthispage.com. My site was joel.editthispage.com and back in 1999 people thought it was pretty spiffy that you could get your own subdomain like that.

Windows 92
article thumbnail

3 Character Traits That Make You a Better Leader

Let's Grow Leaders

A guest post from Greg Marcus. Being a better person is easy in theory – do less of the negative stuff, and more of the positive stuff. The same holds true for leadership. The problem comes in when we either don’t know what we should do, or we do know but can’t help ourselves and do the negative anyway. When I was in the corporate world, I was very good at my job, and very, very arrogant.

article thumbnail

Veterans Day – Solemnly Remember

General Leadership

GeneralLeadership.com and the General Leadership Foundation bring Leadership Advice from America's Most Trusted Leaders to You! Read more at [link]. Armistice Day parade – 1929 – Boston (Source: Boston Public Library). “…solemnly remember the sacrifices of all those who fought so valiantly on the seas, in the air, and on foreign shores, to preserve our heritage of freedom.”.

article thumbnail

Keep Rumors from Hijacking Your Change Initiative

Change Starts Here

The rumors about change can start the instant it’s communicated. A cost management initiative is announced, and suddenly people start speculating to each other what the impact will be – we will lose perks, stop travel, or lose our jobs. A new strategy? The company is going under, and they’re just not telling us. A new system? Another department implemented it last month, and they hate it.

Social 142
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

7 Leadership Pitfalls That Sabotage Company Growth

The Empowered Buisness

What’s sabotaging your growth? Driving profitable growth is at the top of every leader’s priority list. Yet, according to Bain and Company, only 10% succeed in achieving sustainable profitable growth. While growth is the life-blood of every business, at some point, your company will experience the double edge sword of growth. Either your company will grow faster than your internal capacity to handle it.

article thumbnail

Why Corporations Have a Talent Problem

N2Growth Blog

The reason most corporations are broken when it comes to talent acquisition is they are simply looking for the wrong things through the wrong lens. Their hiring models are built for the old economy. They are looking for conformity rather than a non-conformity. They look to protect the status quo rather than disrupt it. They are hiring for the present and not for the future.

article thumbnail

Cognitio and ThreatBrief in People Magazine: Security tips for the general public

CTOvision

Bob Gourley. One of the key lines of business at Cognitio is our cybersecurity practice. We help enterprises build action plans to mitigate risks and improve their security posture. Increasingly we are also asked to provide tips and techniques for employees to consider in their personal lives. Every person with a computer or phone has information at risk and should take personal responsibility for improving their security posture.