
Beyond an organization’s bottom line, positive workplace relationships matter to
individuals’ well-being. Whether respondents’ relationships with their most
liked, least liked, or most influential collaborators were being rated, the
quality of their collaborative relationships positively predicted job
satisfaction, good mental health, and positive attitudes about workplace
collaboration. Having even one low-quality collaborative relationship may drive
undesirable outcomes, including poor mental health that contributes to burnout,
and job dissatisfaction that contributes to turnover. Given that collaborative
relationship quality is important both to individuals and to bottom lines, why
don’t organizations provide more opportunities for people to develop
collaborative skills? It could be that companies do, in fact, make development
opportunities available but that individuals fail to see those opportunities as
either available or related to collaboration. Or it could be that such offerings
are precluded by underlying assumptions that people pick up relationship skills
via osmosis rather than direct training, that they are just naturally “good” or
“not good” at relationships, or that these skills cannot be learned.

The Tinkerboard’s processor is more powerful than the one you’ll find in the Pi
4 B, so you may be able to get even more ambitious with your builds. However,
when they’re available, you can get Pi 4s with up to 8 GB of RAM, which is more
than the 2 GB that the Tinkerboard offers. Then there is the price. You can pick
up a Tinkerboard S R2.0 on Amazon for $149.99 — which is more than some of the
inflated Pi 4s are currently selling for. In short, this is a good option if you
need more processing power or you can’t find a Pi 4, even at a premium. ... The
Linux-powered ODROID XU4Q benefits from “Samsung Exynos5422 Cortex-A15 2Ghz and
Cortex-A7 Octa core CPUs” along with 2GB of DDR3 RAM. On paper, this potentially
makes the UX4Q the most powerful micro-computer on this list. It also comes with
a very large heatsink attached, presumably to soak up some of the heat from its
relatively powerful processor. With regards to ports, ODROID has managed to cram
two USB 3.0, one USB 2.0, a Gigabit Ethernet, and an HDMI port onto the tiny
board.

The human brain is hardwired to infer intentions behind words. Every time you
engage in conversation, your mind automatically constructs a mental model of
your conversation partner. You then use the words they say to fill in the model
with that person’s goals, feelings and beliefs. The process of jumping from
words to the mental model is seamless, getting triggered every time you receive
a fully fledged sentence. This cognitive process saves you a lot of time and
effort in everyday life, greatly facilitating your social interactions. However,
in the case of AI systems, it misfires – building a mental model out of thin
air. A little more probing can reveal the severity of this misfire. Consider the
following prompt: “Peanut butter and feathers taste great together because___”.
GPT-3 continued: “Peanut butter and feathers taste great together because they
both have a nutty flavor. Peanut butter is also smooth and creamy, which helps
to offset the feather’s texture.” The text in this case is as fluent as our
example with pineapples, but this time the model is saying something decidedly
less sensible.
What's the lesson? It's not news that people make mistakes, and the more baroque
things become, the harder they are to guard against. It's just that what gets
advertised on BGP isn't just routes but things crapping out, and when you're
Cloudflare that's what the C in CDN becomes. It's not the first time it's
happened, nor the last, and one trusts the company will hire a choreographer to
prevent further op-on-op stompfests. Yet if it happens, and keeps happening, why
aren't systems more resilient to this sort of problem? You can argue that highly
dynamic and structurally fluid routing mechanisms can't be algorithmically or
procedurally safeguarded, and we're always going to live in the zone where the
benefits of pushing just a bit too hard for performance is worth the occasional
chaotic hour. That's defeatist talk, soldier. There's another way to protect
against the unexpected misfire, other than predicting or excluding. You'll be
using it already in different guises, some of which have been around since the
dawn of computer time: state snapshotting.

AttacksResearchers are racing against hackers to develop stronger protections
that keep data safe from malicious agents who would steal information by
eavesdropping on smart devices. Much of the effort into preventing these
“side-channel attacks” has focused on the vulnerability of digital processors.
Hackers, for example, can measure the electric current drawn by a smartwatch’s
CPU and use it to reconstruct secret data being processed, such as a password.
MIT researchers recently published a paper in the IEEE Journal of Solid-State
Circuits, which demonstrated that analog-to-digital converters in smart devices,
which encode real-world signals from sensors into digital values that can be
processed computationally, are vulnerable to power side-channel attacks. A
hacker could measure the power supply current of the analog-to-digital converter
and use machine learning algorithms to accurately reconstruct output data. Now,
in two new research papers, engineers show that analog-to-digital converters are
also susceptible to a stealthier form of side-channel attack, and describe
techniques that effectively block both attacks.

It can be helpful to break apart the governance of AI algorithms into layers. At
the lowest-level, close to the process are the rules of which humans have
control over the training, retraining and deployment. The issues of
accessibility and accountability are largely practical and implemented to
prevent unknowns from changing the algorithm or its training set, perhaps
maliciously. At the next level, there are questions about the enterprise that is
running the AI algorithm. The corporate hierarchy that controls all actions of
the corporation is naturally part of the AI governance because the curators of
the AI fall into the normal reporting structure. Some companies are setting up
special committees to consider ethical, legal and political aspects of governing
the AI. Each entity also exists as part of a larger society. Many of the
societal rule making bodies are turning their attention to AI algorithms. Some
are simply industry-wide coalitions or committees. Some are local or national
governments and others are nongovernmental organizations. All of these groups
are often talking about passing laws or creating rules for how AI can be
leashed.

For continuous operations to be successful, you must have infrastructure
automation in place. In fact, continuous operations cannot exist without
infrastructure automation. The true value that arises from the combination of
infrastructure automation and continuous operations is that it gives back IT
operations teams their time so they can focus on more complex reasoning or
problem-solving tasks while the system simply continuously scans and fixes
errors. ... The very essence of DevOps is constant change. Continuous operations
may ultimately return your infrastructure to its desired state, but
philosophically, it’s about being able to quickly and securely identify
anomalies, apply fixes and modify your infrastructure as quickly as possible.
It’s not as simple as flipping a switch or pushing a line of code. As the demand
for security and compliance swells, continuous operations will have to build in
these elements to be de facto checkboxes in the loop. At Puppet, we’ve baked
continuous compliance and security into our infrastructure automation products
to ensure continuous operations are indeed continuous.
The biggest problem in OT security is the cultural divide between IT and OT. IT
security is a mature field, with standards, frameworks, and an abundance of
mature and emerging technologies. The OT security field is much less mature,
lacking people with OT security experience, established best practices and
frameworks, and with a much smaller selection of security technologies.
Historically, IT and OT have worked independently on security, with OT engineers
overseeing security in the OT environment where it was not as critical due to
lack of or limited connectivity to the internet and to the enterprise. Today,
however, most OT environments are connected to the enterprise IT environment and
to the internet. The benefits of Industry 4.0 and digital transformation in OT
has accelerated connectivity in OT, including to cloud environments. The
prevalence of converged IT/OT environments makes it imperative that IT and OT
teams work together to secure them. The problem is that cultural divide. The
good news is that it can be conquered, by bringing the two teams together to
create an OT security strategy that is owned jointly by both teams.

A data culture creates standards for employee data literacy and provides open
and transparent access to what assets exist, as well as standards for
curation, quality, and certification so employees have a shared understanding
of the data within an organization. “This will not resolve the silos, but it
will create a transparent view of the entire enterprise data fabric,” Wills
explains. He adds some of the approaches Alation has seen work well include
things like providing an enterprise-wide data literacy training and
certification program, so that everyone shares the same perspective,
vocabulary, and basic analytic skills. Each functional business unit and area
should include data training as part of their employee onboarding as it
provides a review of an organization’s authoritative data and data-related
assets, the process used to maintain them, and sets expectations for how
employees should participate. “Also, recognition: Nothing motivates more and
sends a stronger message than employees seeing each other be recognized and
rewarded for their contributions,” Wills says.

One of the most obvious ways how digital real estate diverges from its
physical counterpart is in the limited utility that it provides. This, of
course, is because digital products do not require storage, nor do the digital
people who populate the metaverse need to be kept comfortable or warm in
indoor venues. However, the sense of discovery in the search for goods and
services remains genuine within the metaverse, and it is in this way that
virtual utility provides the most value. As businesses are free to design
their purchased real estate however they want to, they can dedicate their
efforts to creating the most eye-catching and exciting facades that will
entice users to discover more about their property – and ultimately the goods
and services they have on offer. Therefore, it is not so much about the
utility of a piece of real estate that determines its valuation – but more
about its network power. For example, how easy is it to discover this real
estate? How well connected is it? What is the purchase power of the people
coming to the piece of real estate? In this sense, valuing real estate in the
metaverse, I’d argue, is a lot more like valuing a website, i.e., how many
clicks does it get?
Quote for the day:
"Leadership - mobilization toward a
common goal." -- Gary Wills
No comments:
Post a Comment