Leadership and emotional intelligence
EI provides unique psychological resources to exert cognitive regulation over
negative effects of emotions, whether positive or negative, to maintain the
leaders’ vision or value driven behavior. In simple words, EI is defined as
cognitively controlled affective (emotional) processes to perform under
stressful conditions. For example, EI is required when a person or a team loses
a couple of matches e.g., Indian women hockey team lost their first three
matches then won next three matches and entered into the semi-final. Thus it is
EI that helps manage the stress generated after consecutive successes or
defeats. Otherwise, sadness, grief, fear, anxiety could have taken over their
mental capacities, hence it simply means that intelligence (IQ) works well when
emotions are kept under control because rationality is not an absolute construct
rather it is bounded by personal and situational constraints. It facilitates in
regulating the emotions in self and others both. Meanwhile, emotions release a
sustainable source of energy that helps achieve one’s long-term vision and
mission of transformation for an organization or a country.
What businesses need to know about data decay
There are several scenarios that can lead to data decay. The most common occurrence is when customer records – such as sales, marketing and CRM data – are not maintained. In systems that are constantly changing and evolving to meet business needs, linkages and completeness of data sets can quickly become broken and out of date if not properly maintained. Typically, there is no single source of data in any organization but instead data repositories span multiple platforms, formats, and views. Another factor leading to data decay is the human element. Often at some point in the journey, data is manually entered. The moment a mistype or incorrect information is entered into a system, data inconsistency, poor data hygiene and decay can occur. Enterprises are copying data at an average of 12 times per file, which means that a single mistake can have a compounded impact with exponential damages. Furthermore, all data has a lifecycle — meaning data is created, used and monitored and, at some point, it becomes no longer appropriate to store and must be securely disposed of.
MicroStream 5.0 is Now Open Source
MicroStream is not a complete replacement for a database management system
(DBMS), since it lacks user management, connection management, session handling
etc., but in the vision of the developers of MicroStream, those features could
be better implemented in dedicated server applications. MicroStream considers
DBMS an inefficient way of persisting data since every database has its data
structure and, hence, data must be converted and mapped with an additional layer
such as an object relational mapper (ORM). These frameworks add complexity,
increase latency and introduce performance loss. The MicroStream Data-Store
technology removes the need for these conversions and everything can be stored
directly in memory, making it super fast for queries and simplifying the
architecture using just plain Java. According to their website, performance is
increased by 10x for a simple query with a peak of 1000x for a complex query
with aggregation (sum) compared to JPA. Alternatively, they also offer
connectors for databases like Postgres, MariaDB, SQLite and Plain-file storage
(even on the cloud) to persist data.
5 Techniques to work with Imbalanced Data in Machine Learning
For classification tasks, one may encounter situations where the target class
label is un-equally distributed across various classes. Such conditions are
termed as an Imbalanced target class. Modeling an imbalanced dataset is a
major challenge faced by data scientists, as due to the presence of an
imbalance in the data the model becomes biased towards the majority class
prediction. Hence, handling the imbalance in the dataset is essential prior to
model training. There are various things to keep in mind while working with
imbalanced data. ... Upsampling or Oversampling refers to the technique to
create artificial or duplicate data points or of the minority class sample to
balance the class label. There are various oversampling techniques that can be
used to create artificial data points. ... Undersampling techniques is not
recommended as it removes the majority class data points. Oversampling
techniques are often considered better than undersampling techniques. The idea
is to combine the undersampling and oversampling techniques to create a robust
balanced dataset fit for model training.
Why you need a personal laptop
Even if you leave your company with plenty of notice, moving a bunch of things
off your work device in the last few days of your tenure could raise some
eyebrows with IT — who, remember, can see everything you’re doing on that
device. “Let’s say you’re going to work at a competitor,” Toohil says. “They’re
gonna go through that huge audit trail, see, wow, you moved a bunch of data off
this laptop in the week before you left. And that opens up a huge liability for
you personally. At a minimum, you’re going to spend some time explaining what
you were doing. In the worst case, you took some corporate information.” ... And
if things go wrong, the list of embarrassing possibilities is endless: do you
really want to be this woman, who received a text message about pooping on her
computer while sharing her screen with executives? Or this employee, who
accidentally posted fetish porn in a company-wide group chat? ... If
you’re mixing work and pleasure on one device, just one mistaken email
attachment or one incorrect copy / paste could lead to scenarios that aren’t
just embarrassing but could harm your relationships with co-workers and even
jeopardize your job.
What is developer relations? Understanding the 'glue' that keeps software and coders together
Developer relations can take different forms and can mean different things to
different organizations. It can involve: talking about a vendor's app at a
conference; creating tutorials and walkthrough videos for YouTube; creating app
resources for GitHub or responding to questions from developers on Stack
Overflow. At its core, however, DevRel is about building rapport with the
developer community and leveraging this to figure out how to build successful
software applications. In this sense, developer relations is about closing the
feedback loop and creating a bridge between the people who use the software and
the wider organization, says Lorna Mitchell, head of developer relations at
open-source software company, Aiven. "You need a way to speak to your
developers," Mitchell tells ZDNet. "You have to be there – to be in the
communities where the developers are. If someone has a question about your
product on Stack Overflow, you want to be responding to that." Mitchell
describes developer relations as a "glue" role, which is why it's common to see
it report into different parts of an organization.
Curate Your Thought Leadership: 3 Pro Tips
Of course goals, habit and systems need to be measured to determine if you are
making headway. Social channels don’t let us peek behind the curtain of the
algorithm, making it a challenge to see if we are getting the most traction.
Duritsa’s metric of choice is to see how many viewers click through to his
profile. Your goal might be to measure engagement with your posts. Social media
expert Marie Incontrera of Incontrera Consulting works with clients on thought
leadership strategies that include social media, podcasting and speaking
engagements, including TEDx. She suggests a win is a 1% engagement rate for
LinkedIn. For example, if your post gets 100 views, then one engagement – a
reaction or a comment – is good. She also says that if you post every day you’ll
goose the algorithm into “super poster” status where your posts are amplified
further than if you post less frequently. As you track your results, look at
what topics get the most attention from your audience, determine what is
resonating with them, then dial up what they like and phase out the types of
posts that might fall flat.
What role must CDO’s play in today’s new working environment
As businesses look for ways to insulate themselves from future shock and deliver
new and constantly evolving ways to deliver ROI, the workforce will need to
embrace new data skills and technologies to provide insights faster and speed
decision making to inform the business. This all mandates the need for a digital
cartographer — a CDO — whose role will be to help prioritise the dissemination
of data to improve data access and the development of an always-on approach to
upskilling and a data culture across the business. Through spearheading data
democratisation across the organisation, a CDO can empower a dispersed hybrid
data literate workforce to deliver data-led insights by providing them with the
right data tools to make that goal a reality. By providing access to data and
analytics through easy-to-use, code-friendly self-service platforms, the CDO can
create space for employees who want to upskill and become skilled knowledge
workers themselves. Democratising access to these resources puts data science
tools into the hands of the people with problems to solve – not exclusively
those with years of experience or a specific university degree.
How to Craft Incident Response Procedures After a Cybersecurity Breach
As with all types of battles, cybersecurity is a game of preparation. Long
before an incident occurs, trained security teams should know how to execute an
incident response procedure in a timely and effective manner. To prepare your
incident response plan, you must first review your existing protocols and
examine critical business areas that could be targeted in an attack. Then, you
must work to train your current teams to respond when a threat occurs. You must
also conduct regular threat exercises to keep this training fresh in everyone's
minds. ... Even with the best preparation, breaches still happen. For this
reason, the next stage of an incident response procedure is to actively monitor
possible threats. Cybersecurity professionals can use many intrusion prevention
systems to find an active vulnerability or detect a breach. Some of the most
common forms of these systems include signature, anomaly, and policy-based
mechanisms. Once a threat is detected, these systems should also alert security
and management teams without causing unnecessary panic.
How to retain the best talent in a competitive cybersecurity market
In cybersecurity, employees are often exposed to several aspects of technology and innovation. What I’ve learned from several conversations with employees is that ultimately, people want to work for organizations that are developing cutting-edge technology and making a real impact in the industry. They want to contribute to the solutions that are solving today’s most important problems – and in IT security, where cyber threats are looming and threatening organizations regularly, there’s an immense opportunity to play such a rewarding, impactful role. It’s up to the employers to share a vision with employees. Employees must realize how their contributions impact the company, customers, and the landscape. Often, employees may not realize that they’re contributing to solving a major, real-world issue, so it’s up to leadership – including HR leaders – to regularly communicate why the company exists, the difference it’s making, and how each employee plays a role in the responsibility. What attracts security professionals to a company is the power and impact of the technology and the experience they can receive.
Quote for the day:
"Leaders must know where they are going
if they expect others to willingly join them on the journey." --
Kouzes & Posner
No comments:
Post a Comment