The Right-Hand Man Of Steve Jobs Has Broken His Silence
Higa explained that there were "two things" that got him the job: One was an ability to be frank, honest, and able to go toe-to-toe with him on any question. The other was wide peripheral vision. He’s always wanted that in the people around him. The ability to connect dots is really important. A Renaissance perspective on the world. Because it was always about the intersection of technology and liberal arts.
MapReduce / Map Reduction Strategies Using C#
The C# programming language provides many features and classes that can be used to successfully perform map reduction processing as described in the sections above. In fact, certain forms of parallel map reduction in C# can be performed by individuals having a minimal knowledge of thread pools or hardware specific thread management practices.
John Baldoni on Developing a More Effective Leader
John Baldoni talks about his new book titled "Leader's Pocket Guide 101" in this AMA Edgewise podcast. He explains the importance of critical thinking, self-selection and presence when connecting with your colleagues and shares the mantras he uses to influence others: competence, credibility, and confidence.
An inside look at Internet Explorer 10's mysterious Flash whitelist
For Internet Explorer 10 on Windows 8 and Windows RT, Microsoft has tried to walk a delicate balancing act with Flash. The underlying theory is that Flash itself isn't evil. Instead, its bad reputation can be traced to the impact of poorly written Flash programs, which drain batteries and hog CPU resources, or malicious Flash content that exploits weaknesses in the Flash runtime to spread malware.
White Paper: Increasing Marketing RoI with Predictive Response Models
What is surprising, is that while predictive response modelling usually does improve response rates, in many cases it actually increases customer acquisition cost per account ... To overcome these challenges, Integrated Marketing employs an alternative approach, called the Value Adjusted Optimization Model that is changing how many in the industry manage their direct marketing campaigns. - Download requires free subscription.
US judge rules for Texas school district in RFID tracking case
Unlike passive chips that transmit data only when scanned by a reader, these chips have batteries and broadcast a constant signal so they can track students' locations on school property. Andrea Hernandez was one student who took issue with the badge, saying she had religious and privacy concerns and refused to wear it. Since then, her case went to court but now a judge has ruled against her.
Driving Analytic Value From New Data
The use of new information can enable huge leaps in the effectiveness, predictive power, and accuracy of your analytics. Most of the time, effort is spent trying to incrementally improve results by using existing data and information in a more effective manner. This isn’t as much because analytic professionals don’t realize that new data can be powerful as it is because new data only becomes available occasionally.
Implementing RSA asymmetric public-private key encryption in C#: encrypting under the public key
Performing RSA Encryption is not particularly difficult, but neither is it straightforward. Andrew writes in his blog with C# code sample - To make this code more general, we are going to allow users to specify the bit length of the public key, allowing us to easily encrypt under 1024, 2048 and 4096 bit keys.
The Unreasonable Effectiveness of C
Damien's love with C: I've had intense and torrid love affairs with Java, C++, and Erlang. I've built things I'm proud of with all of them, and yet each has broken my heart. They've made promises they couldn't keep, created cultures that focus on the wrong things, and made devastating tradeoffs that eventually make you suffer painfully. And I keep crawling back to C.
HCL Technologies is Coming of Age in Asia
Revenue-wise, HCL is the fifth largest India centric IT service providers after TCS, Infosys, Cognizant and Wipro. While it only derived about 15% of its global FY12 revenues from markets outside of Europe and the U.S., lightly lower than the four larger Indian firms, HCL has built a strong base in Asia and now boasts more than 300 customers serviced by more than 8,000 employees.
How to Create Governance Policies in InfoSphere Business Glossary 9.1
Business Glossary 9.1 can act as the central nervous system for a Data Governance program. Previous versions of the product allowed the cataloguing and management of technical and business metadata – Categories, Terms, Database tables, BI Fields, ETL Jobs. The new version adds in Policies and Terms so you can document and define a greater range of Governance requirements – with the pay off that Rules can be linked straight to the information assets that must conform to those rules via Glossary linking.
Quote for the day:
"The act of taking the first step is what separates the winners from the losers." -- Brian Tracy
Higa explained that there were "two things" that got him the job: One was an ability to be frank, honest, and able to go toe-to-toe with him on any question. The other was wide peripheral vision. He’s always wanted that in the people around him. The ability to connect dots is really important. A Renaissance perspective on the world. Because it was always about the intersection of technology and liberal arts.
MapReduce / Map Reduction Strategies Using C#
The C# programming language provides many features and classes that can be used to successfully perform map reduction processing as described in the sections above. In fact, certain forms of parallel map reduction in C# can be performed by individuals having a minimal knowledge of thread pools or hardware specific thread management practices.
John Baldoni on Developing a More Effective Leader
John Baldoni talks about his new book titled "Leader's Pocket Guide 101" in this AMA Edgewise podcast. He explains the importance of critical thinking, self-selection and presence when connecting with your colleagues and shares the mantras he uses to influence others: competence, credibility, and confidence.
An inside look at Internet Explorer 10's mysterious Flash whitelist
For Internet Explorer 10 on Windows 8 and Windows RT, Microsoft has tried to walk a delicate balancing act with Flash. The underlying theory is that Flash itself isn't evil. Instead, its bad reputation can be traced to the impact of poorly written Flash programs, which drain batteries and hog CPU resources, or malicious Flash content that exploits weaknesses in the Flash runtime to spread malware.
White Paper: Increasing Marketing RoI with Predictive Response Models
What is surprising, is that while predictive response modelling usually does improve response rates, in many cases it actually increases customer acquisition cost per account ... To overcome these challenges, Integrated Marketing employs an alternative approach, called the Value Adjusted Optimization Model that is changing how many in the industry manage their direct marketing campaigns. - Download requires free subscription.
US judge rules for Texas school district in RFID tracking case
Unlike passive chips that transmit data only when scanned by a reader, these chips have batteries and broadcast a constant signal so they can track students' locations on school property. Andrea Hernandez was one student who took issue with the badge, saying she had religious and privacy concerns and refused to wear it. Since then, her case went to court but now a judge has ruled against her.
Driving Analytic Value From New Data
The use of new information can enable huge leaps in the effectiveness, predictive power, and accuracy of your analytics. Most of the time, effort is spent trying to incrementally improve results by using existing data and information in a more effective manner. This isn’t as much because analytic professionals don’t realize that new data can be powerful as it is because new data only becomes available occasionally.
Implementing RSA asymmetric public-private key encryption in C#: encrypting under the public key
Performing RSA Encryption is not particularly difficult, but neither is it straightforward. Andrew writes in his blog with C# code sample - To make this code more general, we are going to allow users to specify the bit length of the public key, allowing us to easily encrypt under 1024, 2048 and 4096 bit keys.
The Unreasonable Effectiveness of C
Damien's love with C: I've had intense and torrid love affairs with Java, C++, and Erlang. I've built things I'm proud of with all of them, and yet each has broken my heart. They've made promises they couldn't keep, created cultures that focus on the wrong things, and made devastating tradeoffs that eventually make you suffer painfully. And I keep crawling back to C.
HCL Technologies is Coming of Age in Asia
Revenue-wise, HCL is the fifth largest India centric IT service providers after TCS, Infosys, Cognizant and Wipro. While it only derived about 15% of its global FY12 revenues from markets outside of Europe and the U.S., lightly lower than the four larger Indian firms, HCL has built a strong base in Asia and now boasts more than 300 customers serviced by more than 8,000 employees.
How to Create Governance Policies in InfoSphere Business Glossary 9.1
Business Glossary 9.1 can act as the central nervous system for a Data Governance program. Previous versions of the product allowed the cataloguing and management of technical and business metadata – Categories, Terms, Database tables, BI Fields, ETL Jobs. The new version adds in Policies and Terms so you can document and define a greater range of Governance requirements – with the pay off that Rules can be linked straight to the information assets that must conform to those rules via Glossary linking.
Quote for the day:
"The act of taking the first step is what separates the winners from the losers." -- Brian Tracy
No comments:
Post a Comment