News Aggregator


Angular Logging and Log-Back

Aggregated on: 2020-06-18 18:50:03

In this article, we will see how to do Client-Side Logging and Server Side Log-back in an Angular application. We all enable the logging in our application to understand the behavior of the application and to debug unexpected issues or simply tracking events. In the production environment, we can't debug issues without proper log files as they become the only source of information to debug some intermittent or unexpected errors. Advantages of Using Loggers Information at Class Level What timestamp Which user Filename Separate log files for different components. Log levels (like DEBUG, ERROR, WARN, INFO) which can be very handy when you want to track the path followed by your program or log queries, etc. In this article, we are going to use ngxLogger to achieve logging and log-back in the angular application. First, we need to install the ngxLogger by running the below command at the root of our angular application.

View more...

How Do You Run a Unit Test in Apex?

Aggregated on: 2020-06-18 18:50:02

To facilitate the development of robust, error-free code, Apex supports the creation and execution of unit tests. Unit tests are class methods that verify whether a particular piece of code is working properly. Unit test methods take no arguments, commit no data to the database, and send no emails. Such methods are flagged with the @isTest annotation in the method definition. Unit test methods must be defined in test classes, that is, classes annotated with @isTest. For example:

View more...

Day 5 of 30 Coding Challenge: Sum Prime Numbers Functionally

Aggregated on: 2020-06-18 18:50:02

Hey! Day 5 of 30 of this Ruby Coding Challenge series, and this is the post version of the Youtube video.

View more...

What Is 'AWS CodeArtifact'?

Aggregated on: 2020-06-18 18:50:02

AWS CodeArtifact Amazon Web Services (AWS) has released its wholly managed software artifact repository service AWS CodeArtifact across multiple AWS regions. Image source: TheRegister

View more...

Spring Boot Microservice Application With Spring Cloud and Netflix Discovery

Aggregated on: 2020-06-18 18:50:02

Today I am going to provide you an example of a small microservices based application, where I am going to implement a Eureka discovery server to register all the microservices application in it, so that each of these services can be accessible from all the microservices applications registered with Discovery Server.  For this example, we are going to create total four microservices applications/services. 

View more...

How to Call a REST API Using jQuery AJAX in Spring Boot

Aggregated on: 2020-06-18 17:40:02

In the video below, we take a closer look at how to call REST API by using jQuery and AJAX in Spring Boot. Let's get started!

View more...

Developing a Custom Gradle Plugin

Aggregated on: 2020-06-18 17:40:02

Gradle allows you to implement your own plugins in any languages like Java, Groovy, or Kotlin, so you can reuse your build logic, and share it with others, which can be used across many different projects and builds.  In our example, we are going to use Kotlin as the implementation language for a standalone plugin project and Kotlin in the build script plugin examples. In the following example, we will create a plugin with two tasks: task with command-line option and task with extension.

View more...

Extract Information From PDF Invoice

Aggregated on: 2020-06-18 17:40:02

It's pretty easy to write code to generate PDF files but pretty hard to parse and get back information from it because PDF is complicated. Unfortunately, it's sometimes the input of our system which needs to parse and model before doing further logic on it. If the template is various, it's nearly impossible to write one abstract parser to understand and extract all information we need such as Order number, quantity, amount, vendor id. But if the number of templates is fixed, yes there's a way to achieve that with PDF box and regex.

View more...

Authentication vs Authorization: What is the Difference? [Infographic]

Aggregated on: 2020-06-18 16:30:02

When businesses move towards digital maturity in times of robust cloud-based systems and strict online protection, authentication and authorization are used in combination with each other (also, sometimes interchangeably). Though both terms sound similar, they refer to entirely different security processes. Within the Customer Identity and Access Management (CIAM) scope, authentication verifies the identity of a user, Authorization validates when the user has access to execute a particular function.

View more...

Protect Your Small Business From a Cyber Attack

Aggregated on: 2020-06-18 16:30:02

Living at a time when businesses are shifting from the traditional brick-and-mortar format to online businesses, it is no surprise that cyber attacks are also on the increase. As a developer, you are looking to expand and reach new markets using various computer-based tools. This may be a step in the right direction, but there is also the constant challenge posed by cyber-attacks. Most small business owners tend to think that their businesses are too small to be noticed or bothered by hackers. The truth of the matter is that hackers are now focusing on small businesses more than ever, courtesy of their susceptibility and unpreparedness. Based on this, any small business must create a strong culture of security in order to cultivate customer confidence and enhance business. The following are some vital tips you can implement in your small business as a developer. Focus on Employee Education Your employees can make or break your business, depending on how best they are informed about cybersecurity.  Create a culture of inculcating basic security policies and practices among your employees. This may include establishing guidelines on how best employees can help handle and protect customer information and other sensitive data within the company.

View more...

Top 9 Web Security Tools to Secure Your App/System

Aggregated on: 2020-06-18 16:30:02

Security testing is used to identify the unapproved users within some information system and make the data secure. A conscientious and well carried out security testing can help the data to be secure and remain inaccessible to the malicious viruses and threats that might want to break through it. Below are the 9 web security tools that you can use to identify unauthorized invasions into your system. 1. Sucuri Some of the features that this tool provides are remediation of security, deployment of protection platforms, identifying security issues, continued inspection configuration, a configuration of performance optimization, and many more.

View more...

How to Hire an IT Dream Team: An Interview Guide for IT Specialists

Aggregated on: 2020-06-18 15:20:03

Skilled Team Player Obviously, each employee can have many qualities. But their most important qualities should be: professional skills and ability to work with others. Evaluating Skills It's very known misconception to give to all interviewees the same specific task and then make a conclusion about all their other skills. One individual could be strong in algorithms and OOP, and another candidate could be more well versed in industrial development or databases. The purpose of the interview is to create a clear picture of potential employee's experience.

View more...

Spring Boot Docker Image Debugging

Aggregated on: 2020-06-18 15:20:02

Spring Boot Docker Image Debugging Support Release 2.3 of Spring Boot added new exciting features including cloud-native build packs for Docker image builds.Ben Hale gives an excellent video tutorial showing some of the new features in this video.

View more...

How to Keep Your Files Safe in S3 with Versioning

Aggregated on: 2020-06-18 15:20:02

Warning! Your important files are at risk of being accidentally or maliciously overwritten or deleted and will be lost forever! The solution? Enable versioning! A new S3 bucket has versioning disabled by default. By enabling versioning, S3 will manage an unlimited amount of historical versions for your objects. Uploading an object will not overwrite but will instead create a new version. Deleting an object will not remove but will instead create a delete marker, which is a placeholder that enables S3 to keep track of deleted objects without actually removing the object. This means that your files are safe because only the bucket owner can delete previous versions.

View more...

Hazelcast: Setup Using Java

Aggregated on: 2020-06-18 14:10:02

Thank you all for reading my last article, Hazelcast: Introduction and Clustering, which gives you an introduction about the caching and clustering technologies. In this, we will be moving with a Spring Boot project to set up a simple Hazelcast server and client. Let's start by adding the dependency to our "pom.xml" file or "build.gradle" depending on the type of build tool.

View more...

A Kubernetes Service Mesh Tool Comparison for 2020

Aggregated on: 2020-06-18 13:00:03

Service mesh is not a new concept, but its implementation for connecting microservices running on top of Kubernetes as a containerization platform makes the idea of having a service mesh more popular. Without a service mesh, each microservice needs to be configured to accept (and send) connections to other microservices it needs to communicate with. Service mesh changes that completely. Instead of dealing with manual configurations and having to invest a lot of time and energy maintaining connections between microservices, developers can now create a mesh that enables microservices to communicate with each other in a reliable, secure, and controllable way. Kubernetes and service mesh are made for each other, mainly because the use of a service mesh allows for a more complex containerization architecture without the added workload.

View more...

Introducing Main Feature of OpenYurt: Local Autonomy

Aggregated on: 2020-06-18 13:00:03

Gartner defines edge computing as a topology where information processing and content collection and delivery are placed closer to the sources of the information, with the idea that keeping traffic local and distributed will reduce latency. This includes all the technology on the Internet of Things (IoT). A typical Kubernetes cluster sits in well-protected data centers. But when moving the nodes to the edge, the harsh reality of unstable public internet kicks in. By current upstream design, the Kubelet on each node will cache information in memory. This is fine if the connection is guaranteed. However, when the connections are not available, this design can lead to trouble. To be more specific, there are three typical scenarios that need to be taken into account.

View more...

10 Advantages Your Organization May Gain From CI/CD

Aggregated on: 2020-06-18 13:00:03

Continuous Integration (CI) allows you to continuously integrate code into a single shared and easy to access repository. Continuous Delivery (CD) allows you to take the code stored in the repository and continuously deliver it to production. CI/CD practices deploy the application into the market quickly and efficiently in advance and possibly most importantly, releasing new features and bug fixes to maintain great customer experience. Take a look at this gentle introduction for newcomers to grasp the general idea about CI/CD.  

View more...

Most Competetive Machine Learning and Deep Learning Programs

Aggregated on: 2020-06-18 04:00:04

Machine learning is a technical self-explanatory subset of data science and an application of artificial intelligence (AI). It specializes in conditioning the machine by designing the ability to auto-learn and improve in order to execute tasks that it is not programmed to do so. It may sound totally otherworldly but essentially it is not. A machine can actually automatically learn to perform without human intervention. Because for the most part, machine learning is about developing computer programs that enable data accession in terms of direct experience, examples, or instructions to deduce certain patterns which can be used as future reference.

View more...

Artificial Emotional Intelligence: Teaching AI to Detect and Express Human Emotions

Aggregated on: 2020-06-18 04:00:04

Artificial emotional intelligence is a set of practices, techniques, and tools used to teach artificial intelligence how to detect, assess, and identify human emotions. Emotional AI techniques typically involve the usage of facial and body recognition, voice and language recognition, and data management. To achieve these purposes, you can use deep learning for facial emotion recognition, and implement unsupervised emotion recognition in text. What Is Emotional AI? Emotional AI uses machine learning to detect and interpret emotions in text, audio, or video data. It employs a variety of technologies to collect and analyze data related to facial expressions, gestures, tone of voice, language use, and situational context. Emotional AI also incorporates psychological research as the basis on which interpretations are trained and reported.

View more...

Spring Boot Restful Client With RestTemplate Example | Consuming a RESTful Web Service

Aggregated on: 2020-06-18 04:00:03

In the video below, we take a closer look at Spring Boot Restful Client with RestTemplate Example | Consuming a RESTful Web Service. Let's get started!

View more...

Devising a UI Test Plan That Works Like a Charm

Aggregated on: 2020-06-18 04:00:03

User Interface(UI) is the first thing that the user comes in contact with on your website. A good user interface attracts the user and helps to create a distinct identity of a website. This is why it becomes vital to test your UI, before pushing your website into production. UI Testing is a very important phase of development that opens up risks and possible breaks in the web application that could have been really hard to figure out.  Testing increases the quality of the web application and it would not be wrong to say that the reputation of the web application depends on how well it has been tested. 

View more...

How Can 2 Hours Now Save You 1,000 Hours in the Next Year?

Aggregated on: 2020-06-18 04:00:03

As a quality engineer, what do you think about when you consider the return on investing an hour of your time? Or two hours? What if it could save you up to half the work hours you spent over the past year? If you spend a lot of time writing or maintaining your end-to-end tests, our data shows that you'll find lots of savings. What would you do with that time?

View more...

API Security Weekly: Issue #88

Aggregated on: 2020-06-18 01:40:02

This week, we take a break from vulnerabilities and direct our gaze to the wider landscape of API security. On the practical side, we have a toolkit for JSON Web Token (JWT) security. The more high-level items include a video on API discovery, an eBook on API security, and a discussion on the role of the OpenAPI standard in API security.

View more...

Threat Modelling Tools Analysis 101 – OWASP THREAT DRAGON

Aggregated on: 2020-06-17 21:00:03

Abstract  An interconnected world with an increasing number of systems, products, and services relying on the availability, confidentiality, and integrity of sensitive information is vulnerable to attacks and incidents. Unfortunately, the threat landscape expands and new threats, threat agents, and attack vectors emerge at all times. Defending against these threats requires that organizations are aware of such threats and threat agents. Threat modeling can be used as part of security risk analysis to systematically iterate over possible threat scenarios. The motivation for this research came from the constantly growing need to acquire better tools to tackle the broad and expanding threat landscape present. One such tool to help to categorize and systematically evaluate the security of a system, product, or service, is threat modeling.

View more...

How We Achieved MongoDB Replication on Docker

Aggregated on: 2020-06-17 21:00:03

Prologue Picture your database server. Now imagine it somehow breaks. Despair comes up and disturbs the reaction. Maybe you lost data. Maybe you had too much downtime. Maybe you lost work hours. Maybe you lost precious time and money. High Availability is easily a nice-to-have but in times like these, you value it more.

View more...

Mule Rest Connector, a Simplified Option to Integrate JIRA

Aggregated on: 2020-06-17 19:50:03

JIRA and Mulesoft are one of the leading products in their own space. As per the Gartner report, they are placed in the Magic quadrant. This makes sense to introduce process or demonstrate some steps, which help to automate processes or integration with other systems. Anypoint product suite from Mulesoft is a popular ESB and having a rich list of connector/adapter to integrate the different system, hosted in an on-premise server or a cloud setup. 

View more...

Heap Memory In Java Applications Performance Testing

Aggregated on: 2020-06-17 19:50:03

Does every performance engineer need to know about how memory in Java works? To completely fine-tune the java performance bottlenecks for high performance my answer is YES. Java memory management is a significant challenge for every performance engineer and Java developer, and a skill that needs to be acquired to have Java applications properly tuned.  It is the process of allocating new objects and removing unused objects (Garbage Collections) properly. Java has automatic memory management, a garbage collector that works in the background to clean up the unused/unreferenced objects and free up some memory. By not having enough knowledge and experience in Java, how the JVM and garbage collector will work, and how Java memory is built, many performance engineers fail to find and address the java bottlenecks when we execute Java application performance testing. 

View more...

Python Packages for Data Science

Aggregated on: 2020-06-17 18:40:03

Python is one of the most widely used programming languages. Although standard Python does not offer too much, its insane number of open-source and third-party libraries holding its popularity amongst the developers. You just name the domain and Python will provide you with its best packages and libraries. Data Science and Machine Learning are two demanding technologies of this era, and Python is doing better than excellent in these two fields. Apart from Python, R is another programming language that often used in Data Science projects. R is faster and contains more computational and statistical libraries; however, in this article, we have only covered the top Python Data Science Libraries which you should know if you want to master Data Science.

View more...

Implementation of Hybrid Encryption Using Java 1.8 and OpenSSL

Aggregated on: 2020-06-17 03:40:03

Symmetric encryption is a type of encryption in which a single key is used to both encrypt and decrypt the data. Whereas in asymmetric encryption approach public/private key pair is used to do the same. This rules out the risk of mishandling of the key as the public key is only shared with the clients and the private key is kept secret. Client can encrypt the data with the key and send the data securely over any standard data sharing protocols. At the receiver end, the private key is used to decrypt the data. But the time to encrypt the data with asymmetric encryption grows significantly proportionately with the size of data. Here symmetric encryption does the job quite efficiently.

View more...

React Native WebView — Loading HTML in React Native

Aggregated on: 2020-06-17 03:40:03

In React Native, WebViews enable access to any web portal in the mobile app itself. In other words, a web view allows us to open the web URLs inside the app interface. While React Native provides us with a built-it web view component, but we are going to use react-native-webview plugin in this tutorial, since it is more powerful. React Native WebView is a modern, well-supported, and cross-platform WebView for React Native. The built-in Webview from React Native is to be deprecated pretty soon based on this document. Hence, this plugin serves as the replacement for the built-in web view. This plugin is a third-party plugin supported by the react-native community.

View more...

AIOps: The Solution for Software Change Management to Save Millions a Year?

Aggregated on: 2020-06-17 03:40:03

Problem, Legacy Change Management We all might have been in that situation that making the actual software change takes just a few hours, but getting approval to go live takes almost two weeks!? It is the story of a painful go-live experience for an engineering team who is ready to release their changes but needs to go through lengthy organisation red-tapes to get 10 approvals by filling the same forms with so much information that may or may not be even used. As change management is not fully aware of what's in the change and because they get so many of these requests, the tendency might be to just decline some of these requests with no clear reason for the team, until they are convinced that the change is safe after a lot of back and forth, and sometimes by just seeing how committed you are to go live!

View more...

Adding Class Scripts to Your Chatbot in Teneo Studio

Aggregated on: 2020-06-17 03:40:02

Scripts in Teneo are written in Groovy or Java code. Apache Groovy is similar to Java but with an easier to learn syntax. More details on Groovy can be found here: http://groovy-lang.org. An overview of the differences between Groovy and Java can be found here: Differences with Java. Sometimes you may want to add a class to your solution, which you can then call in your integrations or scripts.

View more...

Spring Boot CRUD Operations Example With Exception Handling | Spring Boot RESTFul Web Services

Aggregated on: 2020-06-17 03:40:02

In the video below, we take a closer look at a Spring Boot CRUD Operations example with exception handling | Spring boot RESTFul web services. Let's get started!

View more...

Unboxing the Most Amazing Edge AI Device Part 1 of 3 - NVIDIA Jetson Xavier NX

Aggregated on: 2020-06-17 00:10:03

Fast, Intuitive, Powerful and Easy.  This is the first of a series on articles on using the Jetson Xavier NX Developer kit for EdgeAI applications. This will include running various TensorFlow, Pytorch, MXNet and other frameworks. I will also show how to use this amazing device with Apache projects including the FLaNK Stack of Apache Flink, Apache Kafka, Apache NiFi, Apache MXNet and Apache NiFi - MiNiFi. These are not words that one would usually use to define AI, Deep Learning, IoT or Edge Devices. They are now. There is a new tool for making what was incredibly slow and difficult to something that you can easily get your hands on and develop with. Supporting running multiple models simultaneously in containers with fast frame rates is not something I thought you could affordably run in robots and IoT devices. Now it is and this will drive some amazingly smart robots, drones, self-driving machines and applications that are not yet in prototypes.

View more...

All About Maps - Episode 2: Moving Map Camera to Bounded Regions

Aggregated on: 2020-06-17 00:10:03

Previously on AllAboutMaps: Episode 1, we looked at: The principles of clean architecture

View more...

Writing About a Developer Conference: Tips and Lessons Learned

Aggregated on: 2020-06-16 23:00:03

Conferences are one of the primary ways that developers learn and interact with other developers and industry professionals to learn about trends and topics in software development. Millions of software professionals attend conferences every year to network with and hear presentations with thought-leaders in their fields. But if you're reading this, you knew all this already. 

View more...

SSL-Based/Secured FeignClient Example in Java Microservices With Eureka

Aggregated on: 2020-06-16 21:50:03

Prerequisite: You should have one Discovery Server up and running An SSL based microservice registered with the above Discovery Server up and running which we are going to consume from below FeignClient You need to generate your client application's keystore and trust store. You need to add your server certificate into your client application's trustStore and add your client application's certificate in the Server application's trustStore. Before reading this article make sure that you know about Spring Feign Client. In this article, I will explain how to develop a Feign Client application/service to establish two way SSL based communication. In simple words, how a Feign Client can make an HTTPS REST service call. Also for this project, I assumed that we have a Eureka discovery server and one SSL based Spring boot microservice called global-repository. In other words from our FeignClient below, we are going to consume an SSL based microservice (global-repository)with a valid certificate.

View more...

Invoking WCF Service Secured With Basic Authentication Using SoapUI

Aggregated on: 2020-06-16 21:50:03

In this post, we will demonstrate how to use the SoapUI API tool to invoke a secured WCF SOAP service. First, we will create a service where it will be the system under test. Next, we will approach the steps required to invoke the created service while secured by a basic authentication mechanism. 1 WCF Basic Authentication Service The access to the resource in the service to be implemented will be secured using Basic Authentication transport security mechanisms. One of many provided by the Windows Communication Foundation. This kind of mechanism is used in conjunction with HTTPS to provide confidentiality. 

View more...

Mathematical Notation for Python Developers (Part 1)

Aggregated on: 2020-06-16 21:50:02

Introduction As a self-taught developer, I struggled most of the time reading whitepapers, or going through data science courses that contain incredible amounts of mathematical jargon (mostly weird and magic symbols). This tutorial is going to be focused on translating mathematical notation to Python.

View more...

Local Development With OpenShift and Tilt

Aggregated on: 2020-06-16 20:40:03

In this article, I am going to show you how to use Tilt to facilitate local OpenShift development. Tilt's capabilities will be demonstrated in a practical example that uses buildah and CodeReady Containers. If you develop containerized applications on OpenShift, this blog post is for you. How Does Tilt Facilitate Local Development? The diagram below depicts a development workflow orchestrated by Tilt. After you execute the tilt up command on your development machine, Tilt will keep running while performing the following actions:

View more...

3 Ways to Save Time During Software Development Life Cycle

Aggregated on: 2020-06-16 20:40:03

In the software industry, new technology is coming out every single day. It seems that almost as soon as the software is developed, the next big thing is already making its debut. To shorten your software development life cycle without losing quality here are some tips. 1. Communication With the right communication, software development projects can be kept on track (or maybe even sped up). Instead of tackling problems within the life cycle individually, having the entire team be able to brainstorm together is often the best way to find a lasting solution. Well-timed team meetings within the timeline can streamline major phases and better connect everyone helping them see the big picture, rather than just the piece they are working on.

View more...

Creating Encrypted EFS Using CloudFormation and EC2 Linux

Aggregated on: 2020-06-16 19:30:03

There are multiple ways of storing information on an instance, like EBS or EFS. EBS is Elastic Block Storage and can be considered as if you have a high capacity Storage Device attached to your computer. Whereas EFS is Elastic File Storage and can be considered as if you have attached an external storage device attached to your computer. It may depend on your application or use case you choose to use what among both, but for our case, that we are discussing today, we are going to use encrypted EFS with EC2 Linux instance.  Create EFS Using CloudFormation Let's create EFS using CloudFormation. You can use the following template to create the resource.  Just pass the appropriate values when asked while creating the resource.

View more...

Leveraging Kubernetes Open Policy Agent

Aggregated on: 2020-06-16 18:20:02

One of the big challenges of going cloud-native and using containers is enforcing security and usage policies. This is an easy task to complete when the cloud infrastructure is relatively simple and has only a limited number of users. Once the cloud environment becomes complex or there are more end-users utilizing cloud resources, having clear governance is a must. In Kubernetes, policy management and governance are easy thanks to the Open Policy Agent Gatekeeper project or Gatekeeper in short. It enables compliance checks and more thorough management of policies without sacrificing agility or ease of use. Gatekeeper acts as the agent that validates CRD-based policies run by Open Policy Agent.

View more...

How to Easily Set Up Mutual TLS

Aggregated on: 2020-06-16 17:10:02

Mastering Two-Way TLS This tutorial will walk you through the process of protecting your application with TLS authentication, only allowing access for certain users based on their certificates. This means that you can choose which users are allowed to call your application. This sample project demonstrates a basic setup of a server and a client. The communication between the server and client happens through HTTP, so there is no encryption at all yet. The goal is to ensure that all communication will be encrypted.

View more...

Parallel TCP/IP Socket Server With Multithreading and Multiprocessing in C

Aggregated on: 2020-06-16 17:10:02

The primary intention of writing this article is to give you an overview of how we can entertain multiple client requests to a server in parallel. For example, you are going to create a TCP/IP server which can receive multiple client requests at the same time and entertain each client request in parallel so that no client will have to wait for server time. Normally, you will get lots of examples of TCP/IP servers and client examples online which are not capable of processing multiple client requests in parallel.   In the first example, the TCP/IP server has been designed with multi-threading for parallel processing and in the second example, I have implemented the server with multi-processing to accomplish the same goal. 

View more...

What Are the Real-Time Examples of Smoke and Sanity Testing?

Aggregated on: 2020-06-16 17:10:02

Today, almost every business is effectively dependent on software and before these are released for their users, software testing becomes crucial. Software testing is a wide concept with different testing types and each testing type having a different purpose in the software development lifecycle (SDLC).  Among the many different types of testing, smoke testing and sanity testing are two most confusing terms as these two revolve around the software build. However, these two tests help teams to overcome the functional complexities in the program.

View more...

How to Use a Camera in React Native

Aggregated on: 2020-06-16 17:10:02

Capturing Memories! Camera in our smartphones allows us to quickly capture amazing moments in our lives. Moments which we most likely can never return to, but we can safely capture them up in the form of photos and videos. we are therefore left with a desire to share this amazing moment with our loved ones through our favorite mobile apps. Building your next mobile app, you might want to add the capability to capture photos and videos. You also might not be exactly sure how to implement this. Well, look no further as we have recently implemented this feature in our social apps. You might want to check out how we have seamlessly implemented the camera feature with React Native.

View more...

How to Make Better Decisions With Second-Order Thinking

Aggregated on: 2020-06-16 16:00:02

While making decisions, how often do we optimize for long term gain at the cost of short term pain? A good process for making decisions requires second-order thinking which unravels the implications of our decisions by thinking about its consequences in the future. It requires solving problems in a manner that avoids unintentional and unforeseen outcomes. Second-order thinking is a necessity to think beyond what we know, things we haven't thought about by applying divergent information and forming new associations and connections. It's tempting to give in to good outcomes with a small upside that are easily accessible and visible to us without weighing in on the potentially large downside of these decisions in the future. Our experiences and beliefs also limit our ability to go beyond the natural and seek hard truths by asking difficult questions, exploring unknown territories, and doubting what may seem like an obvious choice.

View more...

Why Your Business Team Needs a Self-Service Data Preparation Tool to Manage Customer Data

Aggregated on: 2020-06-16 14:50:03

Before you continue to read the rest of this article, take a moment, log in to your CRM, or open, and scan the data columns.  Does it look like this? 

View more...