Archives
- By thread 3808
-
By date
- June 2021 10
- July 2021 6
- August 2021 20
- September 2021 21
- October 2021 48
- November 2021 40
- December 2021 23
- January 2022 46
- February 2022 80
- March 2022 109
- April 2022 100
- May 2022 97
- June 2022 105
- July 2022 82
- August 2022 95
- September 2022 103
- October 2022 117
- November 2022 115
- December 2022 102
- January 2023 88
- February 2023 90
- March 2023 116
- April 2023 97
- May 2023 159
- June 2023 145
- July 2023 120
- August 2023 90
- September 2023 102
- October 2023 106
- November 2023 100
- December 2023 74
- January 2024 75
- February 2024 75
- March 2024 78
- April 2024 74
- May 2024 108
- June 2024 98
- July 2024 116
- August 2024 134
- September 2024 130
- October 2024 141
- November 2024 171
- December 2024 64
-
Webcast: What’s ahead for AI-powered ERP?
Join us to explore top ERP trends for the year ahead.SAP WEBCAST
Top ERP Trends and Opportunities for 2025 and BeyondHello,
Technology is evolving faster than ever. Wouldn’t it be great to know what’s ahead for the coming year?
Join us for the first event in our 2025 Cloud ERP Essentials series to hear some top predictions from IDC’s upcoming FutureScape report on intelligent ERP.During the Webcast, we’ll discuss the market trends and opportunities for the year ahead. You’ll learn about the impact of generative AI and gain valuable insights to prepare your business for the future.
Our speakers:- Mickey North Rizza, Group Vice President Enterprise Software, IDC
- Lauren Husum, VP of Product Marketing, SAP S/4HANA Cloud Public Edition
Top ERP Trends and Opportunities for 2025 and Beyond
January 15, 2025 | 11:00 a.m. ET/ 11:00 a.m. CET/ 1:00 p.m. SGT
Best regards,
The GROW with SAP team
(121)Contact us
See our complete list of local country numbersSAP (Legal Disclosure | SAP)
This e-mail may contain trade secrets or privileged, undisclosed, or otherwise confidential information. If you have received this e-mail in error, you are hereby notified that any review, copying, or distribution of it is strictly prohibited. Please inform us immediately and destroy the original transmittal. Thank you for your cooperation.
You are receiving this e-mail for one or more of the following reasons: you are an SAP customer, you were an SAP customer, SAP was asked to contact you by one of your colleagues, you expressed interest in one or more of our products or services, or you participated in or expressed interest to participate in a webinar, seminar, or event. SAP Privacy Statement
This email was sent to info@learn.odoo.com on behalf of the SAP Group with which you have a business relationship. If you would like to have more information about your Data Controller(s) please click here to contact webmaster@sap.com.
This offer is extended to you under the condition that your acceptance does not violate any applicable laws or policies within your organization. If you are unsure of whether your acceptance may violate any such laws or policies, we strongly encourage you to seek advice from your ethics or compliance official. For organizations that are unable to accept all or a portion of this complimentary offer and would like to pay for their own expenses, upon request, SAP will provide a reasonable market value and an invoice or other suitable payment process.
This e-mail was sent to info@learn.odoo.com by SAP and provides information on SAP’s products and services that may be of interest to you. If you received this e-mail in error, or if you no longer wish to receive communications from the SAP Group of companies, you can unsubscribe here.
To ensure you continue to receive SAP related information properly, please add sap@mailsap.com to your address book or safe senders list.
by "SAP" <sap@mailsap.com> - 08:14 - 11 Dec 2024 -
How can companies become more data driven?
Only McKinsey Perspectives
New data-related roles
by "Only McKinsey Perspectives" <publishing@email.mckinsey.com> - 01:24 - 11 Dec 2024 -
How Tinder Recommends To 75 Million Users with Geosharding
How Tinder Recommends To 75 Million Users with Geosharding
Disclaimer: The details in this post have been derived from the Tinder Technical Blog.͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ Forwarded this email? Subscribe here for moreBuilding AI Apps on Postgres? Start with pgai (Sponsored)
pgai is a PostgreSQL extension that brings more AI workflows to PostgreSQL, like embedding creation and model completion. pgai empowers developers with AI superpowers, making it easier to build search and retrieval-augmented generation (RAG) applications. Automates embedding creation with pgai Vectorizer, keeping your embeddings up to date as your data changes—no manual syncing required. Available free on GitHub or fully managed in Timescale Cloud.
Disclaimer: The details in this post have been derived from the Tinder Technical Blog. All credit for the technical details goes to the Tinder engineering team. The links to the original articles are present in the references section at the end of the post. We’ve attempted to analyze the details and provide our input about them. If you find any inaccuracies or omissions, please leave a comment, and we will do our best to fix them.
Tinder is a dating app that handles billions of swipes daily, matching over 75 million users worldwide.
Their recommendation engine must deliver matches with speed and precision. However, managing a global user base and ensuring seamless performance isn’t easy, especially when searches involve massive amounts of data spread across different regions.
To overcome the challenge, Tinder adopted Geosharding: a method of dividing user data into geographically bound "shards."
This approach enabled the recommendation engine to focus searches only on relevant data, dramatically improving performance and scalability. The system now handles 20 times more computations than before while maintaining low latency and delivering matches faster than ever.
In this post, we’ll explore how Geosharding works, the architecture behind it, and the techniques Tinder uses to ensure data consistency.
The Initial Single-Index Approach
When Tinder started using Elasticsearch to manage its recommendation system, it stored all user data in a single "index".
Think of this index as one massive database holding information about every Tinder user worldwide. While this worked fine when the platform was smaller, it caused significant problems as Tinder grew.
Some major problems were as follows:
The Index Became Too Big: As millions of users joined Tinder, the index grew into an enormous collection of data. Every time someone used the app to find potential matches, the system had to sift through this gigantic index, even though most of the data wasn’t relevant to that search. For example, a user in Los Angeles didn’t have to see people from London, but the system still had to deal with all the unnecessary data, making the process slow and inefficient.
High Latency (Search Slowness): Latency refers to the delay or time it takes to complete a task. In this case, the task was to find appropriate matches. Since the index was so large, it took a lot of time and computing power to search through everything. This delay degraded the user experience.
Rising Costs: To handle the ever-growing workload, Tinder had to add more powerful servers and replicas (backup systems) to maintain speed and reliability. These additions drove up infrastructure costs, making the system expensive to maintain.
The MOST Hands-On Training on AI Tools you’ll ever attend, for free (Sponsored)
The biggest MYTH about AI is that it is for people in tech. Or people who can code.
In reality, AI can be game-changing for you whether you are a curious 11 year old kid wanting to research or a 50 year old professional who is willing to stay relevant in 2024.
Join the 3 hour AI Tools Training (usually $399) but free for the first 100 readers.
By the way, here’s sneak peek into what’s inside the workshop:
Making money using AI 💰
The latest AI developments, like GPT o1 🤖
Creating an AI clone of yourself, that functions exactly like YOU 🫵
10 BRAND new AI tools to automate your work & cut work time by 50% ⏱️
And a lot more that you’re not ready for, just 3 hours! 🤯
1.5 Million people are already RAVING about this hands-on Training on AI Tools. Don’t take our word for it? Attend for yourself and see.
(first 100 people get it for free + $500 bonus) 🎁
The Geosharding Solution
Geosharding was the method Tinder adopted to address the inefficiencies of using a single large index for its recommendation system.
The idea was to divide the global user base into smaller, localized groups, or "shards," based on location. Each shard contains data for users in a specific region, allowing the system to focus its searches only on the most relevant data for a particular query.
How Geosharding Works?
Imagine Tinder’s user base as a map of the world.
Instead of putting all user data into one massive database (like a single, global shelf), the map is divided into smaller sections or shards. Each shard corresponds to a geographic region.
For example:
One shard might include all users within a 50-mile radius of Los Angeles.
Another shard might include users in London.
By organizing users this way, the system can search only the shard that matches a user’s location, avoiding the need to sift through irrelevant data. And all of this was made possible through Geosharding.
Geosharding improves query performance in the following ways:
Focus on Relevant Data: When a user searches for matches, Tinder only interacts with the shards containing users within their specified distance range (e.g., 100 miles). This drastically reduces the amount of data the system needs to process for each query, making searches much faster and more efficient.
Smaller Shard Sizes: Breaking the index into smaller shards results in lighter, more manageable datasets. Smaller datasets mean the system can process queries faster and with less strain on infrastructure.
Better Resource Utilization: By narrowing the search area to a localized shard, computing power is used more effectively. Resources aren’t wasted on processing irrelevant data.
Optimizing Shard Size
Despite the obvious benefits of sharding, finding the "right" size for a shard was crucial for maintaining system efficiency.
Several factors were considered in determining this balance:
Query Efficiency: Shards must be large enough to contain sufficient user data for meaningful matches. Too small a shard size could require the system to query multiple shards, increasing latency.
Shard Migration Overhead: Users don’t stay in one place—they travel, commute, or use features like "Passport" to swipe in different locations. When a user moves to a new geographical area, their data must be migrated to the corresponding shard. If shards are too small, migrations happen more frequently, creating temporary inconsistencies and operational complexity.
User Density Variations: Some areas, like New York City, have high concentrations of users in a small space, while others, like rural areas, have lower densities. Shards need to account for these differences. In densely populated areas, shards may represent smaller geographic regions, whereas in sparsely populated areas, shards might cover larger regions.
Algorithm and Tools Used For Geosharding
To implement Geosharding effectively, Tinder needed tools and algorithms that could efficiently divide the world into geographic shards while ensuring these shards were balanced in terms of user activity.
Two key components made this possible: Google’s S2 Library and a container-based load balancing method. Let’s look at them both in more detail.
The S2 Library: Mapping the Globe Into Cells
The S2 Library is a powerful tool developed by Google for spatial mapping. It divides the Earth’s surface into a hierarchical system of cells, which are smaller regions used for geographic calculations.
Source: S2 Geometry Here’s how it works and why it’s ideal for Geosharding:
Quadtree Structure: The S2 Library organizes cells in a "quadtree" structure, where each cell can be divided into four smaller cells. This allows for a flexible representation of geographic areas, from very large regions to precise, tiny locations.
Spatial Locality with Hilbert Curves: It uses a mathematical concept called a Hilbert curve, which ensures that geographically close points on the Earth’s surface remain close in the cell hierarchy. For example, users in Los Angeles and San Diego, being physically near each other, are also close in the S2 hierarchy. This helps group them logically within the same shard.
The main advantages of S2 for Tinder’s use case were as follows:
Consistent Cell Sizes: S2 ensured that cells at the same level in the hierarchy cover roughly equal areas, avoiding distortions near the poles that other systems (like Geohashes) often face.
Multi-level Granularity: Tinder could choose different cell sizes depending on user density. For instance:
Level 7 cells (~45 miles wide) were ideal for sparsely populated areas.
Level 8 cells (~22.5 miles wide) worked better for dense regions like New York City.
Efficient Geo-queries: Built-in S2 functions allow for quick mapping of a location (latitude/longitude) to a cell or a group of cells that cover a specific area.
Load Balancing: Evenly Distributing Users Across Geoshards
Once the world was divided into S2 cells, the next challenge was to balance the "load" across these cells.
Load refers to the activity or number of users within each shard. Without proper balancing, some shards could become "hot" (overloaded with users), while others remained underutilized.
To solve this, Tinder used a container-based load-balancing approach which involved the following aspects:
Quantifying the Load: Each S2 cell was assigned a load score based on factors like active user count and the number of queries originating from that cell. Higher activity meant a higher load score.
Balancing the Load: Imagine each S2 cell represents a neighborhood, and the “load” score” reflects the number of active Tinder users in that area. For example, a cell with a load score of 10 represents a neighborhood of 10 active users. Tinder used a "container" (a conceptual district) to group nearby neighborhoods into a district. When the container filled up to a certain threshold, it was treated as one Geoshard. This approach ensured that shards were formed based on activity, keeping their total load roughly equal.
Preserving Geographic Locality: Because S2 cells and Hilbert curves maintain spatial locality, the process naturally grouped adjacent cells into the same shard, ensuring each shard represented a contiguous geographic area.
The Abstraction Layer
After finalizing the Geosharding algorithm, Tinder designed a scalable and efficient architecture that relies on an abstraction layer to handle user data seamlessly across Geoshards.
This layer simplifies interactions between the application, the recommendation system, and the geosharded Elasticsearch cluster.
See the diagram below:
Here’s how the setup works:
Abstraction Layer: The abstraction layer is an internal microservice that acts as a bridge between Tinder’s application logic and the geosharded Elasticsearch system. It hides the complexity of Geosharding from the application layer, allowing the recommendation engine to interact with the cluster without worrying about the underlying shard configurations or user data migration.
Location Updates and Shard Movement: When a user’s location changes (for example, when traveling to a new city), the abstraction layer determines if this change requires the user’s data to be moved to a different Geoshard. It accesses Tinder’s location services to evaluate the user’s new position and initiates a shard move if necessary. The abstraction layer ensures the data is removed from the old shard and correctly added to the new one.
Query Handling: When a user searches for matches, the recommendation engine sends a request to the abstraction layer. The abstraction layer calculates which Geoshards need to be queried based on the user’s current location and their distance filter (e.g., a 50-mile radius). It distributes the query to the appropriate shards in the Elasticsearch cluster, collects the results, and aggregates them before sending them back to the client.
Geosharded Indices: The actual data is stored in Geosharded indices within the Elasticsearch cluster. These indices represent logical shards, divided based on geographic regions, and are accessed through the abstraction layer. The abstraction layer maintains a mapping of users to their respective Geoshards, ensuring that all operations (like searches or data migrations) are directed to the correct shard.
Dynamic Adaptation: The abstraction layer simplifies operations like shard rebalancing and re-sharding. For example, if user density in a specific area grows or shrinks significantly, the abstraction layer helps reconfigure shards to accommodate the changes without disrupting the system.
Multi-Index vs Multi-Cluster
When building the Geosharded recommendation system, Tinder had to decide how to organize its data infrastructure to manage the geographically separated shards efficiently.
This led to a choice between two approaches: multi-index and multi-cluster.
Each approach had pros and cons, but Tinder ultimately chose the multi-index approach. Let’s break it down in simple terms.
What is the Multi-Index Approach?
In the multi-index setup:
All the shards (Geoshards) are stored as separate indices within a single Elasticsearch cluster.
Each index corresponds to a logical Geoshard, containing user data for a specific geographic area.
The alternative was a multi-cluster setup that involved creating separate Elasticsearch clusters for each geoshard. While this approach has some advantages, it wasn’t the right fit for Tinder due to a lack of native support for cross-cluster queries and higher maintenance overhead.
To overcome the limitations of the multi-index setup, particularly the risk of uneven load distribution, Tinder implemented appropriate load balancing techniques. Some of the details about these techniques are as follows:
Dynamic Scaling Through Replica Adjustments:
A replica is a copy of an index shard. Adding more replicas distributes the workload across multiple servers, reducing the burden on any single shard.
Tinder adjusted the number of replicas dynamically based on the activity levels in each Geoshard:
High-traffic Geoshards (e.g., urban areas with many users) were given more replicas to handle the extra load.
Low-traffic Geoshards (e.g., rural areas) required fewer replicas, saving resources.
Handling Load Imbalances:
If a particular Geoshard became a "hotspot" due to a surge in user activity, its replicas could be increased temporarily to balance the load.
This ensured consistent performance across all regions, even during unexpected spikes in usage.
Fault Tolerance and Scalability:
By spreading replicas across multiple nodes in the cluster, Tinder ensured that the system could handle server failures without interrupting service.
This setup also allowed Tinder to scale horizontally by adding more servers to the cluster as needed.
Handling Time Zones: Balancing Traffic Across Geoshards
One of the key challenges Tinder faced with Geosharding was the variation in traffic patterns across Geoshards due to time zones.
See the diagram below that shows the traffic pattern of two Geoshards during a 24-hour time span:
Source: Tinder Tech Blog Users within the same geoshard are typically in the same or adjacent time zones, meaning their active hours tend to overlap. For example:
A shard covering New York experiences peak traffic during the evening in the Eastern Time Zone.
A shard covering Tokyo might see peak traffic several hours later, during the evening in Japan.
If shards were assigned directly to physical servers without considering time zone effects, some servers would be overloaded during peak hours for one shard, while others would remain idle.
To solve this problem, Tinder implemented a randomized distribution of shards and replicas across physical nodes in the Elasticsearch cluster.
Here’s how it works and why it helps:
Random Allocation of Shards: Each physical server (or "node") hosts multiple Geoshards. These shards are randomly distributed across the available nodes. For example, a single server might hold:
A primary shard for New York.
A replica shard for Tokyo.
Another replica shard for London.
Load Balancing Through Time-Zone Offsets: Since Geoshards covering different time zones have their peaks at different times of the day, random distribution ensures that the load on each node is more evenly spread throughout a 24-hour period. A server hosting New York’s shard (with peak traffic in the evening) will also host Tokyo’s shard (with peak traffic at a different time), balancing the load spikes.
Resilience to Changes: The random distribution of shards also helps in case of unexpected traffic surges. If one Geoshard suddenly experiences higher activity, the other shards on the same node are less likely to be at their peaks, preventing server overload.
The Overall Cluster Design
Tinder’s Geosharded recommendation system was built using a carefully designed cluster architecture to handle billions of daily swipes while maintaining speed, reliability, and scalability.
The cluster architecture divides the responsibilities among different types of nodes, each playing a specific role in ensuring the system’s performance and fault tolerance.
See the diagram below:
The key components of the cluster are as follows:
Master Nodes
These are the managers of the cluster, responsible for overall health and coordination.
They keep track of which shards are stored on which data nodes. They also monitor the status of the nodes and redistribute shards if a node fails.
Master nodes don’t handle user queries directly. Their role is to manage the system and ensure everything runs smoothly.
Coordinating Nodes
The coordinating nodes act as the traffic controllers of the system.
When a user performs a search or swipe, their request goes to a coordinating node. This node determines:
Which Geoshards need to be queried based on the user’s location and filters?
Which data nodes hold the relevant shards to process the request?
Once the results are collected from the data nodes, the coordinating node aggregates them and sends the final response back to the user.
Data Nodes
These are the workers of the cluster, responsible for storing the actual data and processing queries. Data nodes execute the search queries sent by coordinating nodes and return the results.
Each data node holds multiple Geoshards and their replicas as follows:
Primary Shards: The main copies of data.
Replica Shards: Backup copies that improve fault tolerance and help balance the workload.
Consistency Challenges
Maintaining data consistency was another significant challenge in Tinder’s Geosharded system.
This complexity arises because users frequently move between locations, and their data must be dynamically shifted between Geoshards. Without proper handling, these transitions could lead to inconsistencies, such as failed writes, outdated information, or mismatches between data locations.
The key challenges are as follows:
Concurrent Updates: In Tinder’s real-time environment, multiple updates to the same user data can happen within milliseconds of each other. For example, a user could use Tinder’s Passport feature to switch their location to another city and then quickly return to their original location. If updates are not processed in the correct order, the system could end up storing outdated or incorrect information.
Failed Writes: During the migration of user data between Geoshards, network issues or system overloads could cause write operations to fail, leaving the data incomplete or missing.
Stale Data: A delay in updating Geoshard mappings could result in queries pointing to the wrong shard, leading to the retrieval of outdated information.
Mapping Mismatches: The mapping datastore, which keeps track of which shard a user belongs to, could fall out of sync with the actual location of the user’s data, causing future updates or queries to fail.
Tinder implemented a combination of strategies to address these issues and ensure consistent, reliable data handling across Geoshards. Let’s look at a few of those techniques in detail.
1 - Guaranteed Write Ordering with Apache Kafka
When multiple updates occur for the same user data, ensuring they are processed in the correct order is critical to avoid inconsistencies.
Apache Kafka was used as the backbone for managing data updates because it guarantees that messages within a partition are delivered in the same order they were sent.
Tinder assigns each user a unique key (for example, their user ID) and uses consistent hashing to map updates for that user to a specific Kafka partition. This means all updates for a particular user are sent to the same partition, ensuring they are processed in the order they are produced.
See the diagram below:
The consumers (parts of the system that read and process messages) read updates sequentially from the partitions, ensuring that no updates are skipped or processed out of order.
This guarantees that the latest update always reflects the most recent user activity.
2 - Strongly Consistent Reads with the Elasticsearch Get API
Elasticsearch is a "near real-time" search engine, meaning recently written data may not be immediately available for queries. This delay can lead to inconsistencies when trying to retrieve or update data.
Tinder, however, leveraged Elasticsearch’s Get API, which forces the index to refresh before retrieving data. This ensures that any pending updates are applied before the data is accessed.
Reindexing and Refeeding:
In cases where data inconsistencies occurred due to upstream failures or mismatches between shards, a mechanism was needed to realign the datastore with the source of truth.
Data from the source shard was copied to the target shard when a user moved between Geoshards.
If inconsistencies were detected (e.g., missing data in a shard), the system periodically re-synced the search datastore with the source datastore using a background process.
This ensured that even if temporary errors occurred, the system would self-correct over time.
Conclusion
Tinder’s implementation of Geosharding demonstrates the complexities of scalability, performance, and data consistency in a global application.
By dividing its user base into geographically bound shards, Tinder optimized its recommendation engine to handle billions of daily swipes while maintaining lightning-fast response times. Leveraging tools like the S2 Library and Apache Kafka, along with algorithms for load balancing and consistency, the platform transformed its infrastructure to support a seamless user experience across the globe.
This architecture improved performance by handling 20 times more computations than the previous system. It also addressed challenges like traffic imbalances across time zones and potential data inconsistencies during shard migrations. With randomized shard distribution, dynamic replica adjustments, and intelligent reindexing, Tinder ensured reliability, fault tolerance, and scalability.
References:
SPONSOR US
Get your product in front of more than 1,000,000 tech professionals.
Our newsletter puts your products and services directly in front of an audience that matters - hundreds of thousands of engineering leaders and senior engineers - who have influence over significant tech decisions and big purchases.
Space Fills Up Fast - Reserve Today
Ad spots typically sell out about 4 weeks in advance. To ensure your ad reaches this influential audience, reserve your space now by emailing sponsorship@bytebytego.com.
Like Comment Restack © 2024 ByteByteGo
548 Market Street PMB 72296, San Francisco, CA 94104
Unsubscribe
by "ByteByteGo" <bytebytego@substack.com> - 11:35 - 10 Dec 2024 -
From China to Arizona: The oddities of global clocks
From China to Arizona: The oddities of global clocks
The most common global data challenges in 2024, Monthly changes and The world’s most confusing clocks.Most common global data challenges in 2024
Monthly changes
🕛 The world’s most confusing clocks 🕛
CUSTOMER STORIES
The 4 Most Common Global Location
Data Challenges in 2024
Let's close the year by compiling our customer's most common location data challenges and how they solved them.
How to validate postal data 300X faster
SUPPLY CHAIN AND LOGISTICS
Manually finding and validating global postal data takes time and effort. Larger cities can have hundreds of zip codes, and some countries change them regularly. Errors can lead to shipping delays and delivery problems down the line.
Improving targeting with geocoded postal data
GEOMARKETING
Inaccurate geofencing will affect the performance of your marketing activities and ad spending, impacting your revenue stream.
Address Matching Using Reliable Postal Data
MARKETPLACES
Maintaining a global in-house address database is challenging both time-wise and cost-wise. This often leads to dirty addresses and gaps in the data, hindering the customer experience of your website.
Mapping risk areas to postal boundaries and points
INSURANCE
Inaccurate and outdated zip code boundaries can lead to failed identification of addresses at risk, leaving insurers open to unnecessary losses.
MONTHLY CHANGES
Canada postal codes are notoriously difficult to localize. Thanks to a new public data source, the coordinates of thousands of points have been improved.
Full Postal & Street updates
Canada, Israel, Netherlands, Norway, Portugal, Puerto Rico, Romania, United Kingdom
Postal database patches
(small changes)
Brazil (Coordinates)
Postal boundaries updates
United States, South Africa
Postal boundaries patches (small changes)
Armenia, Belgium, Brunei, Brazil, Guatemala, India, Ireland, Netherlands, San Marino, Thailand, United Kingdom, Vatican
Administrative boundaries patches (small changes)
Argentina
For a detailed changelog, take a look at the CSV file.
The world's most confusing clocks
Time zones reveal the fascinating intersection of geography and culture!
Despite its size, China uses one time zone. This means that in Tibet, the sun doesn't rise until 10 a.m. in winter, while Afghanistan is 3.5 hours behind.
Arizona has its own time mess, with some areas observing daylight savings and others not—so your watch may flip as you cross state lines.
The Diomede Islands, only 2.5 miles apart in the Pacific, are a full day apart due to the International Date Line.
Kiribati jumped across the Date Line in 1995, skipping December 31 altogether to sync with Australia's business hours.Time zones aren't just about clocks—they're a reflection of human culture, borders, and, occasionally, chaos. ⏳
Source: Map Men
Follow us on LinkedIn for more geographical facts like this!
Kind regards,
Jérôme & the GeoPostcodes team
PS: Interested in previous Monthly Product Updates? Read here.
GeoPostcodes, Bld Bischoffsheim 15, 1000 Bruxelles, Belgium
by "Jérôme from GeoPostcodes" <jerome@geopostcodes.com> - 06:46 - 10 Dec 2024 -
RE : Seeking for Argentina agent
Dear agent,
Greeting from Cara and GLA family. Trust you are doing great.
I sincerely invite you to join GLA platform and cover the increasing request from/to Argentina from our GLA members.
Above 75% of GLA Members are first-class agents with wide range of primary resources. GLA fulfills all your needs for your business development and resources integration, in terms of finding reliable agents and getting huge volume of inquiries from/to your area.
Besides, We are planning to hold the 12th GLA Global Logistics Conference:
Ø Event Name: The 12th GLA Global Logistics Conference
Ø Host By: GLA Global Logistics Alliance
Ø Event Date: May 15 - 18, 2025 (4 days)
Ø Host City: Dubai, UAE
Ø Expected Attendee: 1500+
Ø From: 130+ countries
Ø 1-on-1 Meeting: 51 times per pax
The early bird price for the 12th GLA Conference is now open till 31st Dec 2024! Please don’t miss this opportunity to attend the conference as a GLA member.
If you want to know more, please don’t hesitate to contact me.
Best regards,
Cara Chen
GLA Overseas department
Mobile:
(86) 190-7616-6926 (WhatsApp|Wechat)
Email:
Company:
GLA Co.,Ltd
Website:
Address:
No. 2109, 21st Floor, HongChang, Plaza, No. 2001, Road Shenzhen, China
The 12th GLA Conference – Dubai, UAE on 15th - 18th May 2025 – click here for registration
Ø The 11th GLA Conference in Bangkok Thailand, online album
Ø The 10th GLA Conference in Dubai UAE, online album
Ø The 9th GLA Conference in Hainan China, online album
【Notice Agreement No 7】
7. GLA president reserves the right to cancel or reject membership or application.
company shall cease to be a member of GLA if:
a) the Member does not adhere to GLA terms and conditions
b) the Member gives notice of resignation in writing to the GLA.
c) No good reputation in the market.
d) Have bad debt records in the GLA platform or in the market
by "Cara" <member226@glafamily.com> - 06:15 - 10 Dec 2024 -
Hi there, can I send you some examples?
Hi there, can I send you some examples?
Hi there,
At CRM Management Ltd, we're passionate about designing innovative CRM systems that perfectly fit the unique needs of our clients. Our track record speaks volumes, having successfully collaborated with businesses of all sizes across various industries.
Can I send you some examples of some recent systems we've produced?
Here are some of the reasons our clients choose us, and stick with us:
- Understand your business: Our solutions are built based on real-life usage and feedback, ensuring they align with your unique workflows.
- Building partnerships: Beyond delivering projects, we cultivate long-term partnerships with our clients, supported by our robust project management practices.
- Flexibility: Our agile approach allows us to adapt quickly to meet your evolving needs, delivering solutions promptly and effectively.
- Clear pricing: Our transparent pricing structure ensures there are no hidden fees, with support packages tailored to your budget and requirements.
Whether you're new to CRM systems or contemplating an upgrade, it would be great to have a chat to understand your requirements.
Let me know if you would like to see some examples.
Kind regards,
Andrew Miller
CRM Management Ltd
01759 361 845
crmmanagement.co.uk
I have sent this email to info@learn.odoo.com. If you don't want to get any more emails from us, you can unsubscribe here.
CRM Management Ltd - English House, Railway St, Pocklington, York YO42 2QZ - Company no. 10684534
by "Andrew Miller" <Andrew@crmcompany.co.uk> - 06:10 - 10 Dec 2024 -
The technological leaps that have changed business forever
Only McKinsey Perspectives
An interactive timeline Brought to you by Alex Panas, global leader of industries, & Axel Karlsson, global leader of functional practices and growth platforms
Welcome to the latest edition of Only McKinsey Perspectives. We hope you find our insights useful. Let us know what you think at Alex_Panas@McKinsey.com and Axel_Karlsson@McKinsey.com.
—Alex and Axel
•
Turning points in business tech. Much has changed since the McKinsey Quarterly was founded in 1964. In honor of our flagship publication’s 60th birthday, we revisited more than six decades of history to identify 25 turning points in technology that have transformed the face of business—from the semiconductor revolution of the 1960s to the birth of the World Wide Web in the 1990s and the current decade’s advances in space exploration and AI.
•
Leaps and bounds. While we’re only a few years into the 2020s, it’s already been a banner decade for technological advances. In 2021, commercial space exploration took a giant leap forward: an all-civilian crew went into outer space’s orbit for the first time ever. The next year, 2022, witnessed a bold new development in technology with OpenAI’s release of ChatGPT, its generative-AI-based chatbot that’s capable of holding humanlike conversations. Visit the interactive for a visual history of the key moments in business technology, and sign up for a free digital Quarterly membership to access our commemorative issues.
—Edited by Belinda Yu, editor, Atlanta
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to the Only McKinsey Perspectives newsletter, formerly known as Only McKinsey.
Copyright © 2024 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "Only McKinsey Perspectives" <publishing@email.mckinsey.com> - 01:12 - 10 Dec 2024 -
Hi there, how can I help?
Hi there, how can I help?
Hi there,
At Infoserve, we've been working with businesses on a similar trajectory to Your Telecoms Consultant for over 2 decades, helping them to promote their business and attract new customers.
We cover all aspects of digital marketing and advertising - from Websites and SEO to Social Media, Google ads and Directory Listings.
If you're looking for help with any of these, whether you're new to it or want to improve what you already have, we can help.
Just drop me an email back, let me know what you need, and I'll send you some ideas, examples of work with other Telecommunication Companies and an idea of costs.
Thank you,
Matt Budd
Digital Marketing Consultant
0800 089 0879
infoserve.com
Infoserve Ltd, Southside Aviation, Leeds Airport, LS19 7UG. Registered in England No. 04209122
We have sent this email to Your Telecoms Consultant having found the details online. If you would no longer like to get emails from us you can stop them here.
by "Matt Budd" <matt@infoserve.digital> - 09:27 - 9 Dec 2024 -
[Video] How Domino’s tech stack helps them deliver on time
New Relic
How leaders build better digital experiences.
Ever wondered how Domino’s uses its tech stack to dominate pizza delivery? In the first episode of The Observability Blueprint, New Relic CEO Ashan Willy sits down with Matthias Hansen, Group CTO of Domino’s Pizza Enterprises to learn how the company leverages observability and AI/machine learning to deliver satisfying digital customer experiences, and hot pizza.
Watch the video to learn:- The power of Domino’s every order counts ethos and how technology helps.
- The growing role of AI and machine learning in enhancing operations.
- The role that observability plays at Domino’s including strategies and tips.
Watch Now View in browser
This email was sent to info@learn.odoo.com. Update your email preferences.For information about our privacy practices, see our Privacy Policy.
Need to contact New Relic? You can chat or call us at +44 20 3859 9190
Strand Bridge House, 138-142 Strand, London WC2R 1HH
© 2024 New Relic, Inc. All rights reserved. New Relic logo are trademarks of New Relic, Inc.
by "New Relic" <emeamarketing@newrelic.com> - 05:06 - 9 Dec 2024 - The power of Domino’s every order counts ethos and how technology helps.
-
A leader’s guide to upgrading your personal operating model
Leading Off
Model behavior Brought to you by Alex Panas, global leader of industries, & Axel Karlsson, global leader of functional practices and growth platforms
Welcome to the latest edition of Leading Off. We hope you find our insights useful. Let us know what you think at Alex_Panas@McKinsey.com and Axel_Karlsson@McKinsey.com.
—Alex and Axel
Just as our phones and computers regularly alert us to update their operating systems, leaders can do the same for themselves, say McKinsey’s Arne Gast and Suchita Prasad. According to the authors, leaders should build their personal operating models around four drivers: their priorities, the roles they choose to play, how they spend their time, and how they sustain their energy. Leaders need to be vigilant about reviewing and upgrading their operating models at key inflection points in both their professional and personal lives: for example, starting a new role, leading an organizational transformation, or dealing with urgent family needs. This ongoing self-evaluation is particularly important in today’s fast-changing business environment. “Leaders who continually upgrade their personal operating model report being more productive, working more consciously, and driving change more effectively,” the authors say.
That’s the share of chiefs of staff who are appointed from within their organizations, according to a McKinsey study of the role. A high-performing support team is critical to a senior executive’s personal operating model because a capable chief of staff—along with skilled executive assistants—can help leaders focus on priority work and cover their weak spots. McKinsey’s Andrew Goodman and his coauthors note that the percentage of in-house appointments “reflects the value that principals place on a chief of staff having deep institutional knowledge and strong internal networks so they can hit the ground running.”
That’s McKinsey’s Celia Huber, Ishaan Seth, Kurt Strovink, and Meagan Hill on lessons for aspiring CEOs. One core component of a leader’s personal operating model is assembling a trusted “kitchen cabinet” of colleagues, friends, mentors, and others who can advise on thorny issues and provide honest feedback. Seeking counsel from a diverse group offers leaders valuable perspective, and “it’s also good training for the sensitive collection of insight that will be central to your success as a CEO leading a team of people with a range of conflicting needs,” the authors say.
The ability to sustain good health and energy levels is part of an effective operating model. But leaders’ well-being is often taxed by personal and professional “microstresses” that can compound quickly, Babson College professor Rob Cross says in an Author Talks interview. Such stressors include bad news on social media, a friend’s health scare, or minor errors made by a colleague. “The problem is that we are hit with 20, 25, 30, sometimes more of these microstresses in small moments,” Cross says. “We’re conditioned to kind of fight through. But our bodies absorb it.” Top performers counter the effects of microstresses by maintaining meaningful relationships outside of work that bring them moments of joy. On the job, they can take small steps such as restating expectations at the end of every meeting to ward off errors. “The small micromoments are the answer as well as the problem in different ways,” Cross says.
Lead by updating your own operating model.
— Edited by Eric Quiñones, senior editor, New York
Share these insights
Did you enjoy this newsletter? Forward it to colleagues and friends so they can subscribe too. Was this issue forwarded to you? Sign up for it and sample our 40+ other free email subscriptions here.
This email contains information about McKinsey’s research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to the Leading Off newsletter.
Copyright © 2024 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey Leading Off" <publishing@email.mckinsey.com> - 04:47 - 9 Dec 2024 -
GGB/0029/24
Dear Sales team,Good day.
Kindly forward us the best price for below items.
Product Code
Description
Quantity
2
330261
TORCH WATER-PROOF ELECTRIC, WITH MORSE SIGNALLING For Morse signalling, sealed in a waterproof container.
2.00
3
330250
LIFERAFT JACK KNIFE Furnished with lanyard for attaching the knife to the boat.
2.00
4
330246
LIFEBOAT FIRST AID KIT Stores medicines and medical instruments in a watertight container.
2.00
5
330314
RED HAND FLARE MK8 PAINSWESSEX, 9529000 SOLAS/MED APPROVED
12.00
Best Regards
Pradeep Nandanan
Business Development Manager
Mob. +971 50 5561773
ASCA Maritime FZE
E-Lob Office No.E-43G-19Hamriyah Free Zone,
PO Box 42333 | Sharjah | UAE |
Tel: +971 6 561 5615
Fax: +971 6 557 1913
Email:procurement@ascamaritime.com
_______________________________________________________________________________
CONFIDENTIALITY NOTICE
The contents of this email message and any attachments are intended solely for the addressee(s) and may contain confidential and/or privileged information and may be legally protected from disclosure. If you are not the intended recipient of this message or their agent, or if this message has been addressed to you in error, please immediately alert the sender by reply email and then delete this message and any attachments. If you are not the intended recipient, you are hereby notified that any use, dissemination, copying, or storage of this message or its attachments is strictly prohibited.
PRIVACY NOTICE
If you are not the intended recipient or should you wish not to receive emails from us, please email the sender by reply email. We do not store an email address should it be not lawful processing, or should you have not provided your specific consent.
_______________________________________________________________________________
by "rocurement" <procurement@ascamaritime.com> - 04:37 - 9 Dec 2024 -
Announcing 2025 SAP Flagship Event Dates
PromoEmail_STD_Events25
Take a look at our exciting event experiences – both familiar and NEW!SAP events come alive in 2025 with experiences both familiar and NEW!
Getting ready for next year?
We are too!
Bring out your best at SAP events in 2025Business leader? Practitioner? Technology professional? We have designed our 2025 events with YOU in mind! We now have three flagship events to choose from. Explore what events work best for you and sign up now to receive the latest event updates.
SAP Sapphire
May 2025 | Orlando, Virtual, Madrid | Learn moreYour catalyst for business transformation! Designed for IT and business decision makers to showcase SAP’s vision, innovations, and solutions.
•
May 19–21: SAP Sapphire Orlando + ASUG Annual Conference + SAP Select
•
May 20–21: SAP Sapphire Virtual
•
May 26–28: SAP Sapphire Madrid + SAP Select
SAP Connect
October 6–9, 2025 | Las Vegas & Virtual | Learn moreNEW! Designed for practitioners and decision makers to showcase SAP’s interconnected, AI, and “suite-first” strategy for your organization. SAP Connect will feature a collective event gathering with targeted, value-driven lines of business experiences:
SuccessConnect
Enhance employee experiences and support strategic talent initiativesSpend Connect
Streamline procurement processes and experience effective spendingCX Connect
Create seamless, personalized experiences for loyalty and long-term growthCFO Connect
Optimize financial processes through automation, analytics, and real-time insightsSupply Chain Connect
Transform supply chains with improved visibility, agility, and collaborationSAP TechEd
November 4–6, 2025 | Berlin & Virtual | Learn moreReturns in-person! Designed to provide deep technical learning, best practices, and hands-on training to technology professionals. Sign up to get the latest event updates, including SAP TechEd on Tour stops available around the world.
But wait, there’s more!
Looking for additional 2025 events?Event Finder: Browse all upcoming and on-demand webinars, virtual events, and conferences by category, type, or region.
Thank you for your interest, and we look forward to delivering valuable, rewarding, and unforgettable experiences to you next year!
SAP (Legal Disclosure | SAP)
This e-mail may contain trade secrets or privileged, undisclosed, or otherwise confidential information. If you have received this e-mail in error, you are hereby notified that any review, copying, or distribution of it is strictly prohibited. Please inform us immediately and destroy the original transmittal. Thank you for your cooperation.You are receiving this e-mail for one or more of the following reasons: you are an SAP customer, you were an SAP customer, SAP was asked to contact you by one of your colleagues, you expressed interest in one or more of our products or services, or you participated in or expressed interest to participate in a webinar, seminar, or event. SAP Privacy Statement
This e-mail was sent to you on behalf of the SAP Group with which you have a business relationship. If you would like to have more information about your Data Controller(s) please click here to contact webmaster@sap.com.
This promotional e-mail was sent to you by SAP Global Marketing and provides information on SAP's products and services that may be of interest to you. If you would prefer not to receive such e-mails from SAP in the future, please click on the Unsubscribe link.
To ensure you continue to receive SAP related information properly please add sap@mailsap.com to your address book or safe senders list.
by "SAP" <sap@mailsap.com> - 02:35 - 9 Dec 2024 -
How organizations can develop great leaders
Only McKinsey Perspectives
Today’s most important leadership traits Brought to you by Alex Panas, global leader of industries, & Axel Karlsson, global leader of functional practices and growth platforms
Welcome to the latest edition of Only McKinsey Perspectives. We hope you find our insights useful. Let us know what you think at Alex_Panas@McKinsey.com and Axel_Karlsson@McKinsey.com.
—Alex and Axel
•
Challenging times. It’s not easy to lead a global organization in today’s fragmented world, McKinsey’s global managing partner, Bob Sternfels, and coauthors acknowledge. Leaders are contending with a growing number of disruptions: the authors estimate that the number of critical issues CEOs and top teams typically focus on has doubled in the past ten years. Even so, organizations that treat leadership development as a core capability can raise their overall resilience and improve their odds of withstanding future shocks.
—Edited by Belinda Yu, editor, Atlanta
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to the Only McKinsey Perspectives newsletter, formerly known as Only McKinsey.
Copyright © 2024 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "Only McKinsey Perspectives" <publishing@email.mckinsey.com> - 01:16 - 9 Dec 2024 -
The week in charts
The Week in Charts
Supply chain resilience, investing in insurance, and more Share these insights
Did you enjoy this newsletter? Forward it to colleagues and friends so they can subscribe too. Was this issue forwarded to you? Sign up for it and sample our 40+ other free email subscriptions here.
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to The Week in Charts newsletter.
Copyright © 2024 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey Week in Charts" <publishing@email.mckinsey.com> - 03:50 - 7 Dec 2024 -
GRAB 3 FREE 1 !!! UNDERSTAND SHIPPING PRACTICES, DOCUMENTS AND PAYMENT SYSTEM (15-16 Jan 2025)
GRAB 3 FREE 1 !!!
Please call 012-588 2728
email to pearl-otc@outlook.com
FACE-TO-FACE PUBLIC PROGRAM
UNDERSTAND SHIPPING PRACTICES,
DOCUMENTS AND PAYMENT SYSTEM
Venue : Dorsett Grand Subang Hotel, Selangor (SBL Khas / HRD Corp Claimable Course)
Date : 15 Jan 2025 (Wed) | 9am – 5pm By SH Yeo
16 Jan 2025 (Thu) | 9am – 5pm .
LEARNING OBJECTIVES:
By the end of the interactive session, the learning curve achieve will enable the following:-
a) UNDERSTAND the parties involved in shipping operation and its relation to one and another
b) UNDERSTAND the rule of delivery and risk transfer in shipping operation
c) UNDERSTAND the responsibility and liability of all the parties in a shipping operation
d) UNDERSTAND the key documents required for shipping operation
e) UNDERSTAND the difference type of bill of lading and the type of bill of lading issue out for the different payment or contract made between buyer and seller
f) UNDERSTAND the incentives available to importer and exporter in Malaysia for efficient international trade
g) UNDERSTAND packaging best practices and clause in contract to protect a buyer interest
h) UNDERSTAND the different category of cargoes in shipping
i) UNDERSTAND the process of shipping for import and export
j) UNDERSTAND the different method use to calculate import duties and sales tax
k) UNDERSTAND the type of payment system in shipping operation
TRAINING METHODOLOGIES:
This training will involve the following area to enhance learning:
a) Power point presentation
b) Quiz session for every module completed
c) Discussion on subject of learning
d) Facilitating by trainer to enhance understanding of subject matter
e) Notes will be provided
f) Pre test and Post test will be given to participants to gauge learning before and after training
PARTICIPANTS GROUP:
This training program is highly recommended for employees in purchasing, sales and marketing and logistics and other operational areas.
OUTLINE OF WORKSHOP
Module 1 – Parties in Shipping Operation, Responsibility and Liability
- Parties in Shipping Operation
- Buyer and seller responsibility
- Freight forwarder and carrier responsibility
- Exclusion issue
- Freight broker versus Freight Forwarder
- NVOCC versus Ocean Carrier
- Chartered shipping operation
- Quiz session
Module 2 – Type of Cargoes in Shipping
- FCL versus LCL cargo and documentation difference
- Type of box containers for ocean and air freight
- Flat rack container
- Bulk Cargo versus Neo Bulk and Break Bulk cargo
- RORO operation versus LOLO operation
- Quiz session
Module 3 – Bill of Lading, Insurance and other Documents in Shipping
- NVOCC and Freight forwarder BL versus Carrier BL
- Different type of Bill of Lading
- Negotiable versus Non Negotiable Bill of Lading
- Bill of Lading issued for Letter of Credit
- Blank endorsed Bill of Lading
- Packing list and Invoice best practices and purpose
- Delivery note versus packing list
- Type of Custom document used in shipping
- Cargo insurance, the different type available
- Quiz session
Module 4 – Customs Role and Responsibility and Trade Incentives
- Customs role and responsibility
- Method of calculating import duties and sales tax
- Harmonized Tariff code
- MIDA trade incentives
- Free Trade Agreement purpose and rule of origin
- Temporary Export and Import scheme
- Quiz session
Module 5 – Rule of Delivery for Shipping Operation
- Understand Risk Transfer and Delivery point using Incoterms
- Title document
- Responsibility and liability of seller and buyer in the process of delivery
- Freight agent responsibility in ensuring proper delivery in shipping
- When Force Majeure apply in shipping operation
- Quiz session
Module 6 – Payment in International Trade and Role of Shipping Parties
- Different types of Payment method in international trade
- Selection of Incoterms in shipping to secure payment
- Shipping company and Freight forwarder role in the payment process
- Quiz session
** Certificate of attendance will be awarded for those who completed the course
ABOUT THE FACILITATOR
SH Yeo
Academic & Professional Qualifications
Certified HRDF Trainer (TTT certificate number 4669)
Certified Professional Trainer and Facilitator (University Malaya, Malaysia)
- Diploma in Human Resource Management (UK)
- Diploma in Production Management (USA)
- MBA in Supply Chain Management (USA)
- 33 year of management experience in supply chain and operation
- Trainer & consultant since 2008
Mr. Yeo is a very experienced supply chain and operational manager. During his working career, spanning over 33 years, he has held various positions as following:-
1987 - with International Paint (later known as Akzo Nobel International Paint) as a Storekeeper
1989 to 1992 @ Warehouse Executive
1992 to 1993 @ Warehouse Manager
1993 to 1998 @ Production Manager
1998 to 1999 @ join Melandas as a Logistics and Purchasing Manager.
1999 to 2004 @ join Dian Creative as a Material Manager
2004 to 2006 @ join Joubert SA Malaysia as Purchasing Manager
2006 to 2008 @ Procurement Manager
2008 to 2019 @ Supply Chain Manager and Company Director
His major achievements include the following:-
a) Increase productivity in the production department by providing intrinsic and extrinsic motivation to the employees from 1993 to 1998.
b) Making major decision to advise a MNC company to drop LMW warehousing scheme and adopting MITI PC1 and 2 exemption system to help company to be more competitive in the local and oversea market in 1998.
c) Co coordinating Kastam licensing and reporting to solve company reporting and licensing issue with Kastam
d) Establishing control and procedure and bringing awareness to employee on important of supply chain control in 2004 until 2019 and achieving 100% shipment performances to customers
e) Involve in negotiating with a major customer from Europe to secure new contract and beside visiting overseas suppliers for performances improvement and selection of new suppliers
f) Carry out new product development by working with engineering and design team and suppliers, including spending on site at supplier premise to solve new product design issue
g) Introduced new procedures in warehouse and operation for better control of operation and reporting system
h) Managing and conducting cost reduction management program from 2008 to 2013 and reduce cost for the company by up to RM6.5 mil.
i) Involve in managing suppliers contract and involving in proposing and drafting new contract and contract renewal for suppliers from 2008 until 2019 (early retirement) by working with suppliers and internal stakeholders with guidance from legal expert.
j) Managing Non Disclosure Agreement with suppliers to protect company intellectual property
(SBL Khas / HRD Corp Claimable Course)
TRAINING FEE
2 days Face-to-Face Public Program
RM 2,250.00/pax
(excluded 8% SST)
Group Registration: Register 3 participants from the same organization, the 4th participant is FREE.
(Buy 3 Get 1 Free) if Register before 6 Jan 2025. Please act fast to grab your favourite training program!We hope you find it informative and interesting and we look forward to seeing you soon.
Please act fast to grab your favorite training program! Please call 012-588 2728
or email to pearl-otc@outlook.com
Do forward this email to all your friends and colleagues who might be interested to attend these programs
If you would like to unsubscribe from our email list at any time, please simply reply to the e-mail and type Unsubscribe in the subject area.
We will remove your name from the list and you will not receive any additional e-mail
Thanks
Regards
Pearl
by "sump@otcmsb.com.my" <sump@otcmsb.com.my> - 11:56 - 7 Dec 2024 -
EP141: How to Ace System Design Interviews Like a Boss?
EP141: How to Ace System Design Interviews Like a Boss?
They are the most critical components to crafting successful software systems.͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ Forwarded this email? Subscribe here for moreRedpanda Streamfest: Learn the latest in streaming data and AI (Sponsored)
Redpanda Streamfest is your best chance to learn the latest techniques and technologies for building data pipelines that support real-time applications, analytics and AI. Our half-day online streaming data conference includes more than a dozen technical talks, live demos and a hands-on workshop. Hear from streaming data experts at the New York Stock Exchange, Snowflake, Dun & Bradstreet, Clickhouse, Poolside, Qdrant, ShareChat, Cohere and more. Plus, you can take home the best swag in the business! Busy on Dec 12 and can’t make it? Register, and we’ll send you the on-demand recordings.
This week’s system design refresher:
How to Ace System Design Interviews Like a Boss?
My NEW book, Coding Interview Patterns, is now available on Amazon
Who are the Fantastic Four of System Design?
Unicast vs Broadcast vs Multicast vs Anycast
How Does VISA Make Money?
SPONSOR US
How to Ace System Design Interviews Like a Boss?
Follow this 7-step process to do well in a System Design Round
Requirements Clarification
In the first step, clarify functional and non-functional requirements. Ask questions to understand the core features of the system as well as non-functional aspects such as data volume, availability, scale, etc.Capacity Estimation
Next, estimate the capacity of the system. Focus on attributes like the number of users, traffic, storage/memory needs, and compute and networking requirements.Create High-Level Design
Break down the system into components such as client apps, servers, load balancers, databases, etc.
Start with drawing a simple block diagram that shows these components and their potential interaction with each other. Focus on the data flow.Database Design
Model the data and choose the right database type for the system. Once done, focus on the database schema.Interface Design
Next, focus on the interfaces to the system. This could be API endpoints or event models exchanged between the various components of the system. Also, choose a communication approach such as REST, GraphQL, gRPC, or an event-drivenScalability and Performance
Address the scalability, performance, and latency aspects of the system by suggesting techniques that will be used. For example, vertical and horizontal scaling, caching, indexing, denormalizing, sharding, replication, CDNs, etc.Reliability and Resiliency
Lastly, address the reliability and resiliency of the design. Identify single points of failure and mitigate their impact.
Over to you: What else would you add to the process?
Proactive performance monitoring using New Relic AI (Sponsored)
Managing complex technology stacks and ensuring continuous uptime are critical challenges for modern engineering teams. Reacting to issues after they occur often results in costly downtime and frustrated customers. The solution? Proactive performance monitoring. With New Relic AI, you can move from reactive to proactive monitoring by leveraging AI to foresee problems before they happen, identify trends, and resolve issues faster.
My NEW book, Coding Interview Patterns, is now available on Amazon
My new book, Coding Interview Patterns, is now available on Amazon!
I’ve been working on this book for 1.5 years with my co-author, Shaun Gunawardane.
Our goal is to help you understand the underlying patterns of each coding problem, so you don’t have to grind through 100s/1000s of them.
We’ve also included 1,000+ diagrams to help you quickly grasp the reasoning and logic behind a solution within 5–10 minutes.
I hope this book achieves its goal.
Who are the Fantastic Four of System Design?
Scalability, Availability, Reliability, and Performance.
They are the most critical components to crafting successful software systems.
Let’s look at each of them with implementation techniques:Scalability
Scalability ensures that your application can handle more load without compromising performance.Availability
Availability makes sure that your application is always ready to serve the users and downtime is minimal.Reliability
Reliability is about building software that consistently delivers correct results.Performance
Performance is the ability of a system to carry out its tasks at an expected rate under peak load using available resources.
Over to you: What are the other pillars of system design and strategies you’ve come across?
Unicast vs Broadcast vs Multicast vs Anycast
These are 4 network communication methods you must know.
Unicast
Unique sender and a single receiver.
For example, communication between two people in a party.
Used in protocols such as HTTP, FTP, and SMTP.Broadcast
Single sender and multiple receivers.
For example, a person at a party stands up on a podium and shouts a message to everyone. However, it doesn’t mean that every receiver gets the message.
Used in Address Resolution Protocol, DHCP, and NTPMulticast
Sender to a specific group of devices in a network. This is a specialized case of broadcast routing.
For example, a member of the group talks and listens to other members of the group within a party.
Used in IPTV and video conference applications.Anycast
Sender to a single device or a specific group of devices.
For example, saying thank you to one host out of a group of hosts organizing a party. All other hosts also expected to receive the thank you note.
Used in DNS querying and CDNs.
Over to you: Which approach have you used?
How Does VISA Make Money?
Why is the credit card called “the most profitable product in banks”? How does VISA/Mastercard make money?
The diagram below shows the economics of the credit card payment flow.1. The cardholder pays a merchant $100 to buy a product.
2. The merchant benefits from the use of the credit card with higher sales volume, and needs to compensate the issuer and the card network for providing the payment service. The acquiring bank sets a fee with the merchant, called the “merchant discount fee.”
3 - 4. The acquiring bank keeps $0.25 as the acquiring markup, and $1.75 is paid to the issuing bank as the interchange fee. The merchant discount fee should cover the interchange fee.
The interchange fee is set by the card network because it is less efficient for each issuing bank to negotiate fees with each merchant.
5. The card network sets up the network assessments and fees with each bank, which pays the card network for its services every month. For example, VISA charges a 0.11% assessment, plus a $0.0195 usage fee, for every swipe.
6. The cardholder pays the issuing bank for its services.
Why should the issuing bank be compensated?The issuer pays the merchant even if the cardholder fails to pay the issuer.
The issuer pays the merchant before the cardholder pays the issuer.
The issuer has other operating costs, including managing customer accounts, providing statements, fraud detection, risk management, clearing & settlement, etc.
Over to you: Does the card network charge the same interchange fee for big merchants as for small merchants?
SPONSOR US
Get your product in front of more than 1,000,000 tech professionals.
Our newsletter puts your products and services directly in front of an audience that matters - hundreds of thousands of engineering leaders and senior engineers - who have influence over significant tech decisions and big purchases.
Space Fills Up Fast - Reserve Today
Ad spots typically sell out about 4 weeks in advance. To ensure your ad reaches this influential audience, reserve your space now by emailing sponsorship@bytebytego.com.
Like Comment Restack © 2024 ByteByteGo
548 Market Street PMB 72296, San Francisco, CA 94104
Unsubscribe
by "ByteByteGo" <bytebytego@substack.com> - 11:36 - 7 Dec 2024 -
Top 10 reports this quarter
McKinsey&Company
At #1: The next big arenas of competition Our top ten reports this quarter look at the state of fashion, small businesses, retail banking in the AI era, and more. At No. 1, McKinsey's Chris Bradley, Michael Chui, Kweilin Ellingrud, Michael Birshan, and coauthors explore 18 business arenas of competition that could reshape the global economy and generate $29 trillion to $48 trillion in revenues by 2040.
Share these insights
This email contains information about McKinsey’s research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you are a registered member of the Top Ten Most Popular newsletter.
Copyright © 2024 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey Top Ten" <publishing@email.mckinsey.com> - 10:27 - 7 Dec 2024 -
Fw: Rebuild WordPress Website
Hi,
Just following up on my previous email to see if you're still interested in exploring a website update or any of our web services. Let me know if you’d like to set up a quick call to discuss your needs.
Looking forward to hearing from you!Best Regards,Violetta smith
From: Violetta smith
Sent: Sunday, August 25, 2024 11:22 AM
Subject: Re: Can We Schedule a Time to Talk?Hi there,Are you considering a website update? We offer comprehensive services including design, redesign, development, and maintenance.Our expertise includes:- Website Design
- WordPress Development
- Redesign/Re-Development
- Web Maintenance
- E-Commerce Solutions
- Custom Websites
- PHP and MySQL Development
- PSD to HTML
Please share your requirements and website URL. Let’s schedule a call to discuss further.Looking forward to your response.Best regards,Violetta Smith
by "Violetta smith" <Violettasmith27@hotmail.com> - 08:15 - 7 Dec 2024-
Re: Rebuild WordPress Website
Hi,I wanted to touch base again regarding the services we offer, such as responsive web design and development. I believe we can add significant value to your projects.If you're interested, I'd be happy to send over a quote or discuss the details further.Let me know if this is something you’d like to explore.Thank You!
From: Violetta smith <Violettasmith27@hotmail.com>
Sent: Saturday, December 7, 2024 6:45 PM
Subject: Fw: Rebuild WordPress WebsiteHi,
Just following up on my previous email to see if you're still interested in exploring a website update or any of our web services. Let me know if you’d like to set up a quick call to discuss your needs.
Looking forward to hearing from you!Best Regards,Violetta smith
From: Violetta smith
Sent: Sunday, August 25, 2024 11:22 AM
Subject: Re: Can We Schedule a Time to Talk?Hi there,Are you considering a website update? We offer comprehensive services including design, redesign, development, and maintenance.Our expertise includes:- Website Design
- WordPress Development
- Redesign/Re-Development
- Web Maintenance
- E-Commerce Solutions
- Custom Websites
- PHP and MySQL Development
- PSD to HTML
Please share your requirements and website URL. Let’s schedule a call to discuss further.Looking forward to your response.Best regards,Violetta Smith
by "Violetta smith" <Violettasmith27@hotmail.com> - 10:25 - 10 Dec 2024
-
How do you foster meaningful connections with stakeholders?
Only McKinsey Perspectives
4 characteristics of effective communication Brought to you by Alex Panas, global leader of industries, & Axel Karlsson, global leader of functional practices and growth platforms
Welcome to the latest edition of Only McKinsey Perspectives. We hope you find our insights useful. Let us know what you think at Alex_Panas@McKinsey.com and Axel_Karlsson@McKinsey.com.
—Alex and Axel
•
Crucial relationships. For CEOs today, managing a broad range of relationships is a vital skill. Before becoming CEO of Microsoft, for example, Satya Nadella didn’t fully appreciate “how multi-constituent the world really is,” consisting of shareholders, team members and employees, and customers and governments. The capability to balance stakeholders’ needs is one of the defining characteristics of a great CEO, McKinsey research finds. Yet not all leaders have mastered that talent, McKinsey senior partner Kurt Strovink and coauthors share.
•
Engage effectively. To cultivate diverse relationships, leaders should start with a deep understanding of their organizations’ unique purpose and their stakeholders’ motivations and goals. With this information, CEOs can craft core narratives and adapt them to make messages meaningful for different audiences. Consider four characteristics of successful stakeholder engagement, and read CEO Excellence and The Journey of Leadership to learn the practices of top CEOs and discover leaders’ personal and professional experiences.
—Edited by Belinda Yu, editor, Atlanta
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to the Only McKinsey Perspectives newsletter, formerly known as Only McKinsey.
Copyright © 2024 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "Only McKinsey Perspectives" <publishing@email.mckinsey.com> - 11:09 - 5 Dec 2024 -
Mastering Modern Authentication: Cookies, Sessions, JWT, and PASETO
Mastering Modern Authentication: Cookies, Sessions, JWT, and PASETO
Authentication serves as the first line of defense in ensuring the security of applications and the sensitive data they handle.͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ Forwarded this email? Subscribe here for moreAuthentication serves as the first line of defense in ensuring the security of applications and the sensitive data they handle.
Whether it’s a personal banking app, a corporate platform, or an e-commerce website, effective authentication mechanisms are needed to verify the identity of users and safeguard their access to resources.
Authentication ensures that only authorized users gain access to specific data or actions within an application. Without proper authentication, applications are vulnerable to unauthorized access, data breaches, and malicious attacks, potentially resulting in significant financial loss, reputational damage, and privacy violations.
In addition to security, authentication plays a critical role in the user experience. By effectively identifying users, applications can provide personalized services, remember user preferences, and enable functionalities like Single Sign-On (SSO) across platforms.
With evolving threats, implementing secure and efficient authentication is more challenging than ever. Developers must navigate between competing priorities such as:
Security: Ensuring protection against different attack types like session hijacking, token theft, and replay attacks.
Scalability: Supporting millions of users without compromising performance.
User Experience: Maintaining ease of use while applying strong security measures.
To tackle these challenges, developers rely on various authentication mechanisms. In this post, we’ll explore multiple authentication mechanisms used in modern applications and also study their advantages and disadvantages.
Fundamentals of Authentication...
Continue reading this post for free in the Substack app
Like Comment Restack © 2024 ByteByteGo
548 Market Street PMB 72296, San Francisco, CA 94104
Unsubscribe
by "ByteByteGo" <bytebytego@substack.com> - 11:37 - 5 Dec 2024