Daily Tech Digest - September 20, 2021

Leadership and emotional intelligence

EI provides unique psychological resources to exert cognitive regulation over negative effects of emotions, whether positive or negative, to maintain the leaders’ vision or value driven behavior. In simple words, EI is defined as cognitively controlled affective (emotional) processes to perform under stressful conditions. For example, EI is required when a person or a team loses a couple of matches e.g., Indian women hockey team lost their first three matches then won next three matches and entered into the semi-final. Thus it is EI that helps manage the stress generated after consecutive successes or defeats. Otherwise, sadness, grief, fear, anxiety could have taken over their mental capacities, hence it simply means that intelligence (IQ) works well when emotions are kept under control because rationality is not an absolute construct rather it is bounded by personal and situational constraints. It facilitates in regulating the emotions in self and others both. Meanwhile, emotions release a sustainable source of energy that helps achieve one’s long-term vision and mission of transformation for an organization or a country. 

What businesses need to know about data decay

There are several scenarios that can lead to data decay. The most common occurrence is when customer records – such as sales, marketing and CRM data – are not maintained. In systems that are constantly changing and evolving to meet business needs, linkages and completeness of data sets can quickly become broken and out of date if not properly maintained. Typically, there is no single source of data in any organization but instead data repositories span multiple platforms, formats, and views. Another factor leading to data decay is the human element. Often at some point in the journey, data is manually entered. The moment a mistype or incorrect information is entered into a system, data inconsistency, poor data hygiene and decay can occur. Enterprises are copying data at an average of 12 times per file, which means that a single mistake can have a compounded impact with exponential damages. Furthermore, all data has a lifecycle — meaning data is created, used and monitored and, at some point, it becomes no longer appropriate to store and must be securely disposed of.

MicroStream 5.0 is Now Open Source

MicroStream is not a complete replacement for a database management system (DBMS), since it lacks user management, connection management, session handling etc., but in the vision of the developers of MicroStream, those features could be better implemented in dedicated server applications. MicroStream considers DBMS an inefficient way of persisting data since every database has its data structure and, hence, data must be converted and mapped with an additional layer such as an object relational mapper (ORM). These frameworks add complexity, increase latency and introduce performance loss. The MicroStream Data-Store technology removes the need for these conversions and everything can be stored directly in memory, making it super fast for queries and simplifying the architecture using just plain Java. According to their website, performance is increased by 10x for a simple query with a peak of 1000x for a complex query with aggregation (sum) compared to JPA. Alternatively, they also offer connectors for databases like Postgres, MariaDB, SQLite and Plain-file storage (even on the cloud) to persist data.

5 Techniques to work with Imbalanced Data in Machine Learning

For classification tasks, one may encounter situations where the target class label is un-equally distributed across various classes. Such conditions are termed as an Imbalanced target class. Modeling an imbalanced dataset is a major challenge faced by data scientists, as due to the presence of an imbalance in the data the model becomes biased towards the majority class prediction. Hence, handling the imbalance in the dataset is essential prior to model training. There are various things to keep in mind while working with imbalanced data. ... Upsampling or Oversampling refers to the technique to create artificial or duplicate data points or of the minority class sample to balance the class label. There are various oversampling techniques that can be used to create artificial data points. ... Undersampling techniques is not recommended as it removes the majority class data points. Oversampling techniques are often considered better than undersampling techniques. The idea is to combine the undersampling and oversampling techniques to create a robust balanced dataset fit for model training.

Why you need a personal laptop

Even if you leave your company with plenty of notice, moving a bunch of things off your work device in the last few days of your tenure could raise some eyebrows with IT — who, remember, can see everything you’re doing on that device. “Let’s say you’re going to work at a competitor,” Toohil says. “They’re gonna go through that huge audit trail, see, wow, you moved a bunch of data off this laptop in the week before you left. And that opens up a huge liability for you personally. At a minimum, you’re going to spend some time explaining what you were doing. In the worst case, you took some corporate information.” ... And if things go wrong, the list of embarrassing possibilities is endless: do you really want to be this woman, who received a text message about pooping on her computer while sharing her screen with executives? Or this employee, who accidentally posted fetish porn in a company-wide group chat? ...  If you’re mixing work and pleasure on one device, just one mistaken email attachment or one incorrect copy / paste could lead to scenarios that aren’t just embarrassing but could harm your relationships with co-workers and even jeopardize your job.

What is developer relations? Understanding the 'glue' that keeps software and coders together

Developer relations can take different forms and can mean different things to different organizations. It can involve: talking about a vendor's app at a conference; creating tutorials and walkthrough videos for YouTube; creating app resources for GitHub or responding to questions from developers on Stack Overflow. At its core, however, DevRel is about building rapport with the developer community and leveraging this to figure out how to build successful software applications. In this sense, developer relations is about closing the feedback loop and creating a bridge between the people who use the software and the wider organization, says Lorna Mitchell, head of developer relations at open-source software company, Aiven. "You need a way to speak to your developers," Mitchell tells ZDNet. "You have to be there – to be in the communities where the developers are. If someone has a question about your product on Stack Overflow, you want to be responding to that." Mitchell describes developer relations as a "glue" role, which is why it's common to see it report into different parts of an organization.

Curate Your Thought Leadership: 3 Pro Tips

Of course goals, habit and systems need to be measured to determine if you are making headway. Social channels don’t let us peek behind the curtain of the algorithm, making it a challenge to see if we are getting the most traction. Duritsa’s metric of choice is to see how many viewers click through to his profile. Your goal might be to measure engagement with your posts. Social media expert Marie Incontrera of Incontrera Consulting works with clients on thought leadership strategies that include social media, podcasting and speaking engagements, including TEDx. She suggests a win is a 1% engagement rate for LinkedIn. For example, if your post gets 100 views, then one engagement – a reaction or a comment – is good. She also says that if you post every day you’ll goose the algorithm into “super poster” status where your posts are amplified further than if you post less frequently. As you track your results, look at what topics get the most attention from your audience, determine what is resonating with them, then dial up what they like and phase out the types of posts that might fall flat. 

What role must CDO’s play in today’s new working environment

As businesses look for ways to insulate themselves from future shock and deliver new and constantly evolving ways to deliver ROI, the workforce will need to embrace new data skills and technologies to provide insights faster and speed decision making to inform the business. This all mandates the need for a digital cartographer — a CDO — whose role will be to help prioritise the dissemination of data to improve data access and the development of an always-on approach to upskilling and a data culture across the business. Through spearheading data democratisation across the organisation, a CDO can empower a dispersed hybrid data literate workforce to deliver data-led insights by providing them with the right data tools to make that goal a reality. By providing access to data and analytics through easy-to-use, code-friendly self-service platforms, the CDO can create space for employees who want to upskill and become skilled knowledge workers themselves. Democratising access to these resources puts data science tools into the hands of the people with problems to solve – not exclusively those with years of experience or a specific university degree.

How to Craft Incident Response Procedures After a Cybersecurity Breach

As with all types of battles, cybersecurity is a game of preparation. Long before an incident occurs, trained security teams should know how to execute an incident response procedure in a timely and effective manner. To prepare your incident response plan, you must first review your existing protocols and examine critical business areas that could be targeted in an attack. Then, you must work to train your current teams to respond when a threat occurs. You must also conduct regular threat exercises to keep this training fresh in everyone's minds. ... Even with the best preparation, breaches still happen. For this reason, the next stage of an incident response procedure is to actively monitor possible threats. Cybersecurity professionals can use many intrusion prevention systems to find an active vulnerability or detect a breach. Some of the most common forms of these systems include signature, anomaly, and policy-based mechanisms. Once a threat is detected, these systems should also alert security and management teams without causing unnecessary panic.

How to retain the best talent in a competitive cybersecurity market

In cybersecurity, employees are often exposed to several aspects of technology and innovation. What I’ve learned from several conversations with employees is that ultimately, people want to work for organizations that are developing cutting-edge technology and making a real impact in the industry. They want to contribute to the solutions that are solving today’s most important problems – and in IT security, where cyber threats are looming and threatening organizations regularly, there’s an immense opportunity to play such a rewarding, impactful role. It’s up to the employers to share a vision with employees. Employees must realize how their contributions impact the company, customers, and the landscape. Often, employees may not realize that they’re contributing to solving a major, real-world issue, so it’s up to leadership – including HR leaders – to regularly communicate why the company exists, the difference it’s making, and how each employee plays a role in the responsibility. What attracts security professionals to a company is the power and impact of the technology and the experience they can receive.

Quote for the day:

"Leaders must know where they are going if they expect others to willingly join them on the journey." -- Kouzes & Posner

No comments:

Post a Comment