Let’s dive in to some ideas that will enhance and streamline the process both for you and your candidates
1) Publish your clearly defined remote working policy. Is it employee choice? A hybrid solution where you will work 2 days a week from the office building? Put this on your recruiting web site and job descriptions. You had 15 months to figure it out. Hint…do not require everyone to go back to the office full-time.
2) Put the salary range on your job description. Recruiters should be busy with qualified candidates. …
General Electric was valued at $600 billion in 2000 and had over 300,000 employees world-wide. Their stock price peaked at $32 but it plummeted to a record low of $5 last year. They were removed from the Dow Jones Industrial and recently shareholders voted to approve a controversial 1–8 stock split.
A new book titled “Lights Out: Pride, delusion and the fall of General Electric” describes much of GE’s downfall over the past two decades.
Up until recently, companies were leaning on their cyber insurance policy as their business continuity plan and cyber defense strategy. It was an excuse to not invest in good security practices and products because the policy would cover financial losses meaning they could cut IT investment.
This is coming to an end.
The insurance carrier AXA announced that it would stop covering ransom payments under its cyber insurance policies in France and other carriers are following suit. Even if they stay in the game, premiums are already on the rise.
Reportedly, bad actors searches the systems it infiltrates — prior…
There are three DynamoDB limits you must know
During a high velocity event one afternoon we learned the important lesson of #3
DynamoDB has a read limit of 3,000 per second
Our user traffic is very sporadic and comes in bursts. …
I faced a challenge with our EFS throughput which caused significant load increases on our EC2 instances (upwards of 30,000!!) as well as extreme delays reading and writing to the EFS volume.
The EFS volume (network storage) was setup in Bursting Throughput mode which means that Amazon scales the throughput based on the size of our file system. Our size at the time of the incident was 26.81GB which means we have a permitted throughput of 1 MiB/sec based on our size. However, we are generally pushing around 1.1 miB / sec which exceeded our throughput limit. Because of this…
Epic just unveiled Unreal Engine 5 and it looks amazing! Intel Labs is working with Grand Theft Auto on a new machine learning project called Enhancing Photorealism Enhancement and the footage looks unreal. It will be hard to distinguish video games from real life soon, which got me thinking….Where are we with AI? We’ve heard a lot of promises…….
What is AI doing and what is it not doing and what lies ahead?
Right now we have narrow AI. This is when systems perform very specific tasks. …
Did you know that Wednesdays are the most productive day of the week for developers?
Would you guess that the most productive coding times are between 3p and 5p ?
It’s been over a year since many companies have digitally transformed and embraced a remote working culture. Data is starting to emerge and the findings can help companies and talent adjust to increase productivity and efficiency.
Software.com is in a very unique position to share their global data with us on developers around the world. Late fall 2020, they were able to analyze data from developers that worked in the…
You are a tech company, whether you know it or not. Hopefully you embrace this sooner than later.
In 2019 Impossible Foods made an important decision to bring in executives from Motorola and Dropbox. Immediately, they were hit with a crisis when they ran out of their meatless meat. As most startups can relate, they were facing short-term challenges as demand skyrocketed. They were scalable, but they needed the right people to run it. Their decision to bring in tech executives with experience in expansions in times of breakthrough growth would prove successful.
Those in the tech space have the…
Principal Site Reliability Engineer. Cyber Security Professional. Technologist. Leader.