October 12, 2024

October 12, 2024

Technically skilled managers can be great leaders, if they do this

Outlier leaders often struggle with delegation because they hold themselves—and their work—to impossibly high standards. To ensure that everything is perfect, you may take on too much, which leads to burnout and stifles your team’s potential. This approach drains your energy and can cause your team to feel undervalued or micromanaged. Building trust in your team is crucial for leveraging their strengths and empowering them to contribute to the organization’s success. Trust isn’t just about assuming your team will do their job; it’s about giving them the freedom to innovate, make mistakes, and grow. When your team feels trusted, they are more likely to take ownership of their work and deliver results that align with your vision. Start by delegating smaller tasks and gradually increase the responsibility you give to team members. ... Fostering a culture where team members feel comfortable sharing their thoughts, ideas, and concerns is key to maintaining strong team cohesion. It also helps outlier leaders stay connected with their teams, giving them a better understanding of what’s working and what’s not. Make communication a priority by holding regular team meetings focused not just on project updates but on sharing feedback, discussing challenges, and exploring new ideas.


6 biggest healthcare security threats

Traffic from bad bots — such as those that attempt to scrape data from websites, send spam, or download unwanted software — present another major challenge for healthcare organizations. The problem has become especially pressing when governments around the world began setting up new websites and other digital infrastructure to support COVID vaccine registrations and appointments. Bad actors bombarded these new, hastily established and largely untested sites with a huge volume of bad-bot traffic. Imperva says it has observed a 372% increase in bad-bot traffic on healthcare websites in the first year of the pandemic. “Increased levels of traffic result in downtime and disruption for legitimate human users who are trying to access critical services on their healthcare providers’ site,” Ray says. “It might also result in increased infrastructure costs for the organization as it tries to sustain uptime from the persistent, burdensome level of elevated traffic.” ... Wearable and implantable smart medical devices are a proven cybersecurity risk. These technologies certainly offer better analysis, assisting diagnosis of medical conditions while aiding independent living, but mistakes made in securing such medtech have exposed vulnerable users to potential attack.


Cybercriminals Are Targetting AI Conversational Platforms

Besides the issue of retained PII stored in communications between the AI agent and end users, bad actors were also able to target access tokens, which could be used by enterprises for the implementation of the service with APIs of external services and applications. According to Resecurity, due to the significant penetration of external AI systems into enterprise infrastructure and the processing of massive volumes of data, their implementation without proper risk assessment should be considered an emerging IT supply chain cybersecurity risk. The experts from Resecurity outlined the need for AI trust, risk, and security management (TRiSM), as well as Privacy Impact Assessments (PIAs) to identify and mitigate potential or known impacts that an AI system may have on privacy, as well as increased attention to supply chain cybersecurity. Conversational AI platforms have already become a critical element of the modern IT supply chain for major enterprises and government agencies. Their protection will require a balance between traditional cybersecurity measures relevant to SaaS (Software-as-a-Service) and those specialized and tailored to the specifics of AI, highlighted the threat research team at Resecurity.


Leveraging digital technologies for intralogistics optimisation

With rapid advances in digital technologies such as robotics, artificial intelligence (AI) and the Internet of Things (IoT), companies can now optimise their intralogistics processes more easily and achieve better results. The following sections focus on a range of key aspects that can be significantly improved by leveraging digital technologies in support of intralogistics. ... Wearables are often used in warehouses to optimise worker movements, enable picking and packing efficiency, and ensure worker safety. Wearables equipped with augmented reality technology can be used for navigation and guiding employees for picking and packing operations. These techniques yield benefits not only by speeding up processes and reducing errors but also by reducing employee training time. ... The overall benefits of intralogistics optimisation are significant in terms of process efficiency, but securing the benefits depends on a range of sub-domains as described above. These technologies enhance visibility of operations by enabling real-time monitoring at every stage of production, right from the raw material supply stage up to the final delivery of the manufactured goods stage, which in turn can enhance efficiency and reduce downtime and production cost. 


Do we even need Product Managers?

The brand manager of the past was in many ways the product manager of the present. And not long after we began our discussion, Shreyas brought up the rather famous example of Procter and Gamble’s ‘Brand Man’ memo. ... And then, as tech gave businesses the ability to slice and dice consumer categories and cohorts and track multiple data points, the more ‘artistic’ PMs—those who made decisions based on intuition and taste—had to find patterns that would align with what the data suggested. But consumer data isn’t absolute truth. Humans are irrational. They might do one thing, and say something completely different in a survey. Or a feedback form. And as Chandra outlines, most companies are drowning in data now, with no clue what to do with all the metrics they track. ... When do you hire your first Product Manager? This is a question that an increasing number of CEOs and founders are asking in the post-ZIRP era—where efficiency is key and AI is pushing into more and more functions. So what happens when you sit down and ask yourself, “Do I need to hire product managers?” ... The one certainty that emerged from our discussion was that the role of a Product Manager has to evolve and break out of the boundaries it is now enclosed in, although some skills and characteristics will remain constant.


Scaling Uber’s Batch Data Platform: A Journey to the Cloud with Data Mesh Principles

One significant challenge that Uber has faced during the migration process is the need to accommodate changes in data ownership and the limits set by GCS. Data ownership changes can occur due to team reorganizations or users reassigning assets. To address this, Uber implemented an automated process to monitor and reassign ownership when necessary, ensuring data remains securely stored and managed. Additionally, Uber optimized its data distribution to avoid hitting GCS storage limits, ensuring that heavily used tables are separated into their buckets to improve performance and make monitoring easier. ... Looking to the future, Uber aims to further expand on its use of data mesh principles by building a platform that allows for self-governed data domains. This will simplify infrastructure management and enhance data governance, ultimately creating a more agile, secure, and cost-efficient data ecosystem. The cloud migration of Uber’s batch data platform is a significant undertaking, but through careful planning and the development of innovative tools like DataMesh, Uber is positioning itself for greater scalability, security, and operational efficiency in the cloud.

Read more here ...

To view or add a comment, sign in

More articles by Kannan Subbiah

  • January 16, 2025

    January 16, 2025

    How DPUs Make Collaboration Between AppDev and NetOps Essential While GPUs have gotten much of the limelight due to AI,…

  • January 15, 2025

    January 15, 2025

    Passkeys: they're not perfect but they're getting better Users are largely unsure about the implications for their…

  • January 14, 2025

    January 14, 2025

    Why Your Business May Want to Shift to an Industry Cloud Platform Industry cloud services typically embed the data…

    1 Comment
  • January 13, 2025

    January 13, 2025

    Cloud and AI: The M&A deal makers Artificial intelligence is optimising the entire M&A lifecycle by providing…

  • January 12, 2025

    January 12, 2025

    Data Architecture Trends in 2025 While unstructured data makes up the lion’s share of data in most companies (typically…

  • January 11, 2025

    January 11, 2025

    Managing Third-Party Risks in the Software Supply Chain The myriad of third party risks such as, compromised or faulty…

  • January 10, 2025

    January 10, 2025

    Meta puts the ‘Dead Internet Theory’ into practice In the old days, when Meta was called Facebook, the company wrapped…

  • January 09, 2025

    January 09, 2025

    It’s remarkably easy to inject new medical misinformation into LLMs By injecting specific information into this…

  • January 08, 2025

    January 08, 2025

    GenAI Won’t Work Until You Nail These 4 Fundamentals Too often, organizations leap into GenAI fueled by excitement…

  • January 07, 2025

    January 07, 2025

    With o3 having reached AGI, OpenAI turns its sights toward superintelligence One of the challenges of achieving AGI is…

Insights from the community

Others also viewed

Explore topics