Archives
- By thread 3675
-
By date
- June 2021 10
- July 2021 6
- August 2021 20
- September 2021 21
- October 2021 48
- November 2021 40
- December 2021 23
- January 2022 46
- February 2022 80
- March 2022 109
- April 2022 100
- May 2022 97
- June 2022 105
- July 2022 82
- August 2022 95
- September 2022 103
- October 2022 117
- November 2022 115
- December 2022 102
- January 2023 88
- February 2023 90
- March 2023 116
- April 2023 97
- May 2023 159
- June 2023 145
- July 2023 120
- August 2023 90
- September 2023 102
- October 2023 106
- November 2023 100
- December 2023 74
- January 2024 75
- February 2024 75
- March 2024 78
- April 2024 74
- May 2024 108
- June 2024 98
- July 2024 116
- August 2024 134
- September 2024 130
- October 2024 141
- November 2024 97
-
The week in charts
The Week in Charts
The global housing shortage, autonomous driving, and more Share these insights
Did you enjoy this newsletter? Forward it to colleagues and friends so they can subscribe too. Was this issue forwarded to you? Sign up for it and sample our 40+ other free email subscriptions here.
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to The Week in Charts newsletter.
Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey Week in Charts" <publishing@email.mckinsey.com> - 03:38 - 2 Sep 2023 -
EP75: How Does A Password Manager Work
EP75: How Does A Password Manager Work
This week’s system design refresher: Top 5 Most Used Architecture Patterns (Youtube video) OAuth 2.0 Flows Understanding Database Types Types of Software Engineers and Their Typically Required Skills How does a Password Manager Work? Implement passkey authentication in minutes (Sponsored) View in browser This week’s system design refresher:
Top 5 Most Used Architecture Patterns (Youtube video)
OAuth 2.0 Flows
Understanding Database Types
Types of Software Engineers and Their Typically Required Skills
How does a Password Manager Work?
Implement passkey authentication in minutes (Sponsored)
Join TikTok, Paypal, Google, and other leading tech companies by giving your users a faster and more secure sign-in experience with passkeys. Building an in-house auth solution takes months and requires ongoing maintenance from security engineers. But there’s a better way. Passage by 1Password is a cross-platform, ready-to-ship passkey solution. ByteByteGo readers get an exclusive six-month free trial – just use the code ‘BYTEBYTEGO6MO’ once you sign up in the console.
Top 5 Most Used Architecture Patterns
OAuth 2.0 Flows
Authorization Code Flow: The most common OAuth flow. After user authentication, the client receives an authorization code and exchanges it for an access token and refresh token.
Client Credentials Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code.
Implicit Code Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code.
Resource Owner Password Grant Flow: Allows users to provide their username and password directly to the client, which then exchanges them for an access token.
Over to you - So which one do you think is something that you should use next in your application?Scale automated QA without overspending (Sponsored)
Most QA teams are too resource-constrained to maintain an automated end-to-end test suite for their entire product. But costs to scale QA are hard to justify. The end result? Gaps in test coverage and bugs shipped to production. Here's a cost-effective solution to get 80% automated test coverage in just 4 months.
QA Wolf is a new technology-enabled service that leverages Playwright to build end-to-end test suites. Plus, they include 24-hour maintenance (ask about their zero flake guarantee) and unlimited parallel runs on their Kubernetes infrastructure.
Current customers include Cohere, Gumroad, and Napster (and they boast a 4.8/5 rating on G2).
Understanding Database Types
To make the best decision for our projects, it is essential to understand the various types of databases available in the market. We need to consider key characteristics of different database types, including popular options for each, and compare their use cases.
Types of Software Engineers and Their Typically Required Skills
In this overview, we'll explore three key types of Software engineers:
Front-End Engineer:
Specializes in creating user interfaces using HTML, CSS, and JavaScript. They focus on ensuring that apps are visually appealing and user-friendly.Back-End Engineer:
Works on the server-side of web applications, managing data, business logic, and server infrastructure to ensure functionality, performance, and security.Full-Stack Engineer:
A versatile expert who combines the roles of Front-End and Back-End engineers, handling UI design, server-side tasks, databases, APIs, and ensuring seamless application integration. They cover the entire development spectrum from start to finish.
Over to you: Which type of software engineer resonates most with your interests and career aspirations?
How does a Password Manager such as 1Password or Lastpass work?
How does it keep our passwords safe?
The diagram below shows how a typical password manager works.
A password manager generates and stores passwords for us. We can use it via application, browser extension, or command line.
Not only does a password manager store passwords for individuals but also it supports password management for teams in small businesses and big enterprises.
Let’s go through the steps.
Step 1: When we sign up for a password manager, we enter our email address and set up an account password. The password manager generates a secret key for us. The 3 fields are used to generate MUK (Master Unlock Key) and SRP-X using the 2SKD algorithm. MUK is used to decrypt vaults that store our passwords. Note that the secret key is stored locally, and will not be sent to the password manager’s server side.
Step 2: The MUK generated in Step 1 is used to generate the encrypted MP key of the primary keyset.
Steps 3-5: The MP key is then used to generate a private key, which can be used to generate AES keys in other keysets. The private key is also used to generate the vault key. Vault stores a collection of items for us on the server side. The items can be passwords notes etc.
Step 6: The vault key is used to encrypt the items in the vault.
Because of the complex process, the password manager has no way to know the encrypted passwords. We only need to remember one account password, and the password manager will remember the rest.
Over to you: Which password manager have you used?Latest articles
Here are the latest articles you may have missed:
To receive all the full articles and support ByteByteGo, consider subscribing:
Like Comment Restack © 2023 ByteByteGo
548 Market Street PMB 72296, San Francisco, CA 94104
Unsubscribe
by "ByteByteGo" <bytebytego@substack.com> - 11:35 - 2 Sep 2023 -
2023 is generative AI’s breakout year
Plus, how boards can help address geopolitical risk
by "McKinsey Highlights" <publishing@email.mckinsey.com> - 11:07 - 2 Sep 2023 -
Sustainable and inclusive growth: Economic growth that can can address both poverty and climate change
Get updated This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to our McKinsey Global Institute alert list.
Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey & Company" <publishing@email.mckinsey.com> - 04:39 - 1 Sep 2023 -
Tried generative AI at work? Here’s how your future job activities may change
On Point
Gen AI’s potential for automating tasks Brought to you by Liz Hilton Segel, chief client officer and managing partner, global industry practices, & Homayoun Hatami, managing partner, global client capabilities
•
AI’s effect on jobs. Clerical work is likely the sector to be most affected by generative AI, according to a new UN report. That can have greater repercussions for female employees, particularly in advanced economies, where a disproportionate number of women hold these types of jobs. For the majority of roles, however, generative AI will probably allow a part of workers’ responsibilities to be automated, rather than eliminating the need for those positions. [Reuters]
•
Big benefits. Generative AI technologies have some potential to benefit every business and function, say McKinsey Global Institute partner Michael Chui and senior partner and global leader of QuantumBlack, AI by McKinsey Alex Singla on a recent edition of The McKinsey Podcast. Generative AI’s possible business applications are wide-ranging. Leaders can use generative AI to write software, create personalized or brand marketing, and design products. All told, generative AI could add $2 trillion to $4 trillion each year across the global economy.
•
Workers with superpowers. Generative AI could give employees “superpowers” through automating parts of their jobs. By shedding some routine tasks, knowledge workers should be able to spend more time thinking, solving problems, and coaching colleagues. About a third of the activities that organizations pay people to do today could be automated between now and 2030 in the US. Learn how organizations can create value with generative AI, and for more on digital transformations, see Rewired: The McKinsey guide to outcompeting in the age of digital and AI.
— Edited by Belinda Yu, editor, Atlanta
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to the On Point newsletter.
Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey On Point" <publishing@email.mckinsey.com> - 12:05 - 1 Sep 2023 -
Register Now for webinar - Accelerate development of vision enabled self-checkout pipelines with OpenVINO™ Model Server
Register Now for webinar - Accelerate development of vision enabled self-checkout pipelines with OpenVINO™ Model Server
Accelerate development of vision enabled self-checkout pipelines with OpenVINO™ Model Server
Live Virtual training
Thursday, September 14, 2023
08:30 am - 09:30 am PDTRegister Now An Open-Source Initiative to accelerate the design, development and deployment of vision enabled self-checkout solutions. The Automated Self-Checkout Reference Implementation implements vision pipelines with the OpenVINO Model Server. The reference code can be used in a self-checkout solution to reduce time to market and taking advantage of all the underlying software framework optimizations that have been made to benefit the latest hardware features. Additionally, the reference implementation produces metrics to help determine the most appropriate Intel hardware SKUs required for driving a given number of streams or maximum number of streams.
The webinar will
- review the architecture,
- demo the benchmarking use case,
- review the benchmark results,
- look at the future roadmap.
Register Now Speaker
Brian McGinn
Software Architect and Technical Lead for the automated self checkout project - Intel
Brian is a software architect and technical lead for the automated self checkout project. He has been with Intel for 13 years who is currently focusing on Artificial Intelligence and how Intel hardware can help developers rapidly create new solutions.
If you forward this email, your contact information will appear in any auto-populated form connected to links in this email.
This was sent to info@learn.odoo.com because you are subscribed to Webinars. To view and manage your marketing-related email preferences with Intel, please click here.
© 2023 Intel Corporation
Intel Corporation, 2200 Mission College Blvd., M/S RNB4-145, Santa Clara, CA 95054 USA. www.intel.com
Privacy | Cookies | *Trademarks | Unsubscribe | Manage Preferences
by "Intel Corporation" <intel@plan.intel.com> - 01:03 - 31 Aug 2023 -
Data Replication: A Key Component for Building Large-Scale Distributed Systems
Data Replication: A Key Component for Building Large-Scale Distributed Systems
Data replication is critical for building reliable, large-scale distributed systems. In this issue, we will explore common replication strategies and key factors in choosing a suitable strategy. Throughout this issue, we will use databases as examples. Note that they are not the only data sources where replication can be useful. Replication could apply to cache servers like Redis and even application servers for critical in-memory data structures. View in browser This is a sneak peek of today’s paid newsletter for our premium subscribers. Get access to this issue and all future issues - by subscribing today.
Latest articles
If you’re not a subscriber, here’s what you missed this month.
To receive all the full articles and support ByteByteGo, consider subscribing:
Data replication is critical for building reliable, large-scale distributed systems. In this issue, we will explore common replication strategies and key factors in choosing a suitable strategy.
Throughout this issue, we will use databases as examples. Note that they are not the only data sources where replication can be useful. Replication could apply to cache servers like Redis and even application servers for critical in-memory data structures.
So, what is replication? It's a method of copying data from one place to another. We use it to make sure that our data is available when and where we need it. It helps us improve the durability and availability of our data, reduce latency, and increase bandwidth and throughput.
But choosing a replication strategy isn't always straightforward. There are different strategies, each with its own benefits and drawbacks. Some strategies might be better for certain use cases, while others might be better for different situations.
In this issue, we'll explore three main replication strategies: Leader-Follower, Multi-Leader, and Leaderless. We'll break down what each strategy is, how it works, and where it's most effectively used. We’ll discuss the trade-offs involved in each, so we can make informed decisions about the best strategy for our systems.
So, let's dive in and start exploring the world of data replication together.
A Primer on Replication
Let’s examine at a high level why replication is needed. As we mentioned earlier, we’ll use databases as examples throughout, but this applies to other types of data sources as well.
Improving Durability
Improving durability is perhaps the single most important reason for data replication. When a single database server fails, it could lead to catastrophic data loss and downtime. If the data is replicated to other database servers, the data is preserved even if one server goes down. Some replication strategies, like asynchronous replication, may still result in a small amount of data loss, but overall durability is greatly improved.
You might be wondering: Isn’t regular data backup sufficient for durability? Backups can certainly recover data after disasters like hardware failure. But backups alone have limitations for durability. Backups are periodic, so some data loss is likely between backup cycles. Restoring from backups is also slow and results in downtime. Replication to standby servers provides additional durability by eliminating (or greatly reducing) data loss windows and allowing faster failover. Backups and replication together provide both data recovery and minimized downtime.
Improving Availability
Another critical reason to replicate data is to improve overall system availability and resilience. When one database server goes offline or gets overwhelmed, keeping applications running smoothly can be challenging.
Simply redirecting traffic to a new server is non-trivial. The new node needs to already have a nearly identical copy of the data to take over quickly. And switching databases behind-the-scenes while maintaining continuous uptime for applications and users requires careful failover orchestration.
Replication enables seamless failover by keeping standby servers ready with up-to-date data copies. Applications can redirect traffic to replicas when issues occur with minimal downtime. Well-designed systems automatically handle redirection and failure recovery via monitoring, load balancing, and replication configurations.
Of course, replication has its own overhead costs and complexities. But without replication, a single server outage could mean prolonged downtime. Replication maintains availability despite outages.
Increasing Throughput
Replicating data across multiple database instances also increases total system throughput and scalability by spreading load across nodes.
With a single database server, there is a maximum threshold of concurrent reads and writes it can handle before performance degrades. By replicating to multiple servers, application requests can be distributed across replicas. More replicas means more capacity to handle load in parallel.
This sharding of requests distributes workload. It allows the overall system to sustain much higher throughput compared to a single server. Additional replicas can be added to scale out capacity even further as needed.
The replication itself has associated overheads that can become bottlenecks if not managed properly. Factors like inter-node network bandwidth, replication lag, and write coordination should be monitored.
But proper replication configurations allow horizontally scaling out read and write capacity. This enables massive aggregated throughput and workload scalability far beyond a single server's limits.
Reducing Latency
Data replication can also improve latency by locating data closer to users. For example, replicating a database to multiple geographic regions brings data copies closer to local users. This reduces the physical network distance that data has to travel compared to a single centralized database location.
Shorter network distance means lower transmission latency. So users' read and write requests see faster response times when routed to a nearby replicated instance versus one further away. Multi-region replication enables localized processing that avoids the high latencies of cross-country or intercontinental network routes.
Keep in mind that distributing copies across regions introduces complexities like replica synchronization, consistency, and conflict resolution with concurrent multi-site updates. Solutions like consistency models, conflict resolution logic, and replication protocols help manage this complexity.
When applicable, multi-region replication provides major latency improvements for geo-distributed users and workloads by localizing processing. The lower latency also improves user experience and productivity.
Keep reading with a 7-day free trial
Subscribe to
ByteByteGo Newsletterto keep reading this post and get 7 days of free access to the full post archives.A subscription gets you:
An extra deep dive on Thursdays Full archive Many expense it with team's learning budget Like Comment Restack © 2023 ByteByteGo
548 Market Street PMB 72296, San Francisco, CA 94104
Unsubscribe
by "ByteByteGo" <bytebytego@substack.com> - 11:36 - 31 Aug 2023 -
CNN’s incoming CEO first led a digital transformation at the New York Times
On Point
An interview with Mark Thompson Brought to you by Liz Hilton Segel, chief client officer and managing partner, global industry practices, & Homayoun Hatami, managing partner, global client capabilities
•
Cable news chief. Longtime news veteran Mark Thompson, the incoming CEO of CNN, will start his new role prior to the US presidential election in 2024, an event that typically attracts millions of TV viewers for cable news companies. Thompson will run the strategy, operations, and business units of CNN, according to its parent company. He will also step into the role of the news network’s editor in chief, supervising all of its editorial content. One of Thompson’s objectives will be to grow CNN’s digital offerings while minding its cable TV channels. [WSJ]
•
An outsider’s perspective. From 2012 to 2020, Mark Thompson, the New York Times Company’s former president and CEO, oversaw the institution’s dramatic transformation. Under his watch, the Times’s digital readership jumped from half a million to nearly 5.7 million subscribers. Yet in 2019, when Thompson announced his ambition to reach 10 million subscribers by 2025, many were skeptical, he said to McKinsey senior partner Yael Taqqu and McKinsey Global Publishing’s Raju Narisetti. Thompson’s outsider status had the advantage of a “cold eye,” he explained.
— Edited by Belinda Yu, editor, Atlanta
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to the On Point newsletter.
Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey On Point" <publishing@email.mckinsey.com> - 12:11 - 31 Aug 2023 -
Popular recent editions—and a brief respite
Five Fifty
Get your briefing Thank you for subscribing to the McKinsey Quarterly Five Fifty—your go-to for curated snapshots of some of our most popular content on McKinsey.com.
We’re off for the month of August, but we wanted to share a few highlights from earlier this year in case you missed them. See you next month!
Employee well-being: The holistic way
Thinking comprehensively about health can help workers live longer, better, and more productively.
Mindsets for success: Lessons from top CEOs
During times of change, successful bosses adapt and exhibit service-minded leadership. Leaders at all levels should take note.
Food plight
Disruptions to the world’s food system are deepening the global food crisis. Efforts by the grocery industry and consumers can help prevent a worsening scenario.Share these insights
Did you enjoy this newsletter? Forward it to colleagues and friends so they can subscribe too. Was this issue forwarded to you? Sign up for it and sample our 40+ other free email subscriptions here.
This email contains information about McKinsey’s research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to our McKinsey Quarterly Five Fifty alert list.
Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey Quarterly Five Fifty" <publishing@email.mckinsey.com> - 10:58 - 30 Aug 2023 -
Managing SLA Breaches: Essential Steps to Prevent Violations and Crisis Navigation Tips
New Relic
August 2023Managing SLA breaches: crucial steps to avoid violations Service-level agreements (SLAs) are pivotal contracts between customers and service providers, ensuring a specific level of service performance and availability. However, SLA breaches can quickly erode customer trust, fracture business relationships, and tarnish reputations. In our latest blog, discover best practices for avoiding and handling SLA breaches. We share our expert insights into how to mitigate the risks of SLA breaches.
Learn more We’re rolling out a new errors inbox enhancement, designed to give you the flexibility to group errors according to your needs. Easily reduce clutter, simplify your inbox, and accelerate your error resolution workflows with custom fingerprinting.
10x Banking transforms traditional banking by prioritizing customer-centricity through a cloud-native core banking platform. In the blog, 10x banking speaks on how they ensure reliability and success while leveraging tools like New Relic for observability, enhancing deployment precision and performance.
Useful ReadsRead our practical guide on peak readiness preparation based on several customer’s journeys, including lessons learned and step-by-step guidance. With competing priorities and limited resources, it is critical to understand how to effectively approach the peak readiness preparation to achieve best business results and a less stressful working environment.
Upcoming User GroupsJoin our EMEA user meetups this September with food, drinks, swag, and of course - data talk! September means tidying up after the summer and preparing for the upcoming busy periods.
We’ve got a jam-packed agenda where you’ll hear from our local engineers and other users on what’s new in observability. This time, our theme will be ‘back to school’, where we’ll give you essential tips and shortcuts to help you get ready for the peak sales period ahead. Happening in Tel Aviv, Dubai, Amsterdam, Paris, Manchester, London & Madrid.
New Relic User Meetup: Manchester
Tuesday 19th September 2023 | 2:00pm - 5:30pm (BST)Sixes Cricket, The Corn Exchange, New Cathedral St, Manchester M4 3TR
Register here.
New Relic User Meetup: London
Wednesday 20th September 2023 | 2:00pm - 5:30pm (BST)Bounce in Shoreditch, 241 Old Street, London, EC1V 9EY
Register here.
Register at your nearest city here.Webinars
Join our New Relic University experts, Liam Hurrell and Catherine Poggioli on the 7th September at 2 pm BST / 3 pm CEST, to discover how can you utilise New Relic Vulnerability Management to help you take control of your security and ensure you are always on top of risks and drive uptime and resilience.
7th September, 14:00 pm -15:00 pm BST/ 15:00 pm- 16:00 pm CEST.
New Relic in the News
Need help? Let's get in touch.
This email is sent from an account used for sending messages only. Please do not reply to this email to contact us—we will not get your response.
This email was sent to info@learn.odoo.com Update your email preferences.
For information about our privacy practices, see our Privacy Policy.
Need to contact New Relic? You can chat or call us at +44 20 3859 9190.
Strand Bridge House, 138-142 Strand, London WC2R 1HH
© 2023 New Relic, Inc. All rights reserved. New Relic logo are trademarks of New Relic, Inc
Global unsubscribe page.
by "New Relic" <emeamaketing@newrelic.com> - 09:08 - 30 Aug 2023 -
Redefining the role of the middle manager can help businesses thrive
On Point
How to invest in middle managers Brought to you by Liz Hilton Segel, chief client officer and managing partner, global industry practices, & Homayoun Hatami, managing partner, global client capabilities
•
Rewriting the manager’s story. The identity crisis inherent in middle managers’ roles (as leaders who are situated between executives and frontline workers but aren’t in either camp) has resulted in the trope of the ineffective bureaucrat. That story is changing, however, as the pace of business has blurred the lines between “B-suite leaders” and visionary executives. Smoothing out organizational dynamics such as reporting structures—so that middle managers don’t have to navigate divergent agendas—and limited influence can help these leaders focus on retaining talent and engaging employees. [CEO Magazine]
•
Help middle managers manage. Historically, middle managers’ primary role was as the go-between for leaders and frontline employees. Technology has blurred those lines, but middle managers remain inundated with administrative and individual-contributor tasks, leaving little time to manage people. On a recent episode of the McKinsey Talks Talent podcast, McKinsey partners Emily Field and Bryan Hancock, and alumnus Bill Schaninger—authors of Power to the Middle: Why Managers Hold the Keys to the Future of Work—found that at one bank, having a direct report put more than 100 tasks on managers’ to-do lists.
— Edited by Gwyn Herbein, editor, Atlanta
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to the On Point newsletter.
Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey On Point" <publishing@email.mckinsey.com> - 12:30 - 30 Aug 2023 -
Millions of US students still face learning gaps. What might it take for them to catch up?
On Point
Strategies to reduce absenteeism Brought to you by Liz Hilton Segel, chief client officer and managing partner, global industry practices, & Homayoun Hatami, managing partner, global client capabilities
•
A lack of progress. US elementary and middle school students aren’t making enough progress in reading and math to close learning gaps resulting from the COVID-19 pandemic, an analysis of approximately 3.5 million public school students’ test scores has found. In comparison to prepandemic learners, students in third through eighth grade improved their math and reading skills at a slower than average pace. The study shows “evidence of backsliding” among American students, a lead researcher says. [NYT]
•
Learning and earnings. Most US K–12 students have returned to classrooms, but many still face significant challenges. More than 17 million US students have experienced more than half a year of learning delay related to the COVID-19 pandemic, 16 million students who need mental health support are not receiving it, and 15 million students are chronically absent, McKinsey senior partner Jimmy Sarakatsannis and coauthors reveal. Without interventions, each student could lose an estimated $54,000 to $69,000 in lifetime earnings.
•
Lowering absenteeism. Chronic absenteeism puts roughly two million students on track to drop out before graduation—nearly double the rate before the pandemic, McKinsey analysis shows. In Louisiana, districts have tackled absenteeism through launching campaigns with positive messages about school attendance and adding staff dedicated to reducing absenteeism. Chronic absenteeism in the state fell to 19% in the 2021–22 school year from 28% the previous year. See three potential scenarios to help US schools recover.
— Edited by Belinda Yu, editor, Atlanta
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to the On Point newsletter.
Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey On Point" <publishing@email.mckinsey.com> - 12:18 - 29 Aug 2023 -
Beacon advancements that are reshaping efficiency, safety, and innovation across varied sectors
Beacon advancements that are reshaping efficiency, safety, and innovation across varied sectors
Discover the versatility of beacons as they are unlocking a multitude of possibilities across diverse industries.Discover the versatility of beacons as they are unlocking a multitude of possibilities across diverse industries.
Use Cases
Construction tools tracking
Continuous monitoring of tool movements identifies potential collision risks, promoting a safe working environment.
Waste container tracking
Real-time monitoring of waste container locations. Ensuring timely collections preventing overflow and detecting container temperature.
Temperature and humidity tracking
Automated temperature data logging, eliminated manual errors, and ensured accurate records.
Discuss your use-case to get your business growing
Uffizio Technologies Pvt. Ltd., 4th Floor, Metropolis, Opp. S.T Workshop, Valsad, Gujarat, 396001, India
by "Sunny Thakur" <sunny.thakur@uffizio.com> - 08:00 - 28 Aug 2023 -
From poverty to empowerment: Raising the bar for sustainable and inclusive growth
Advance the continuum of progress Brought to you by Liz Hilton Segel, chief client officer and managing partner, global industry practices, & Homayoun Hatami, managing partner, global client capabilities
Growth, inclusion, and sustainability are all parts of a complex yet connected system. What would it take for these forces to work together to economically empower communities and contribute to a greener planet? How can growth advance the two defining societal aspirations of our time: raising minimum living standards and limiting the effects of climate change? “The actions taken (or not) in this decade will determine what kind of world the next generation will inherit,” write Anu Madgavkar, Sven Smit, Mekala Krishnan, Jonathan Woetzel, Kweilin Ellingrud, Tracy Francis, and their coauthors in a new McKinsey Global Institute article. Understand the urgency of raising the bar and take a deep dive into the interactions between growth, economic inclusion, and the net-zero transition.
Quote of the day
Chart of the day
ALSO NEW
— Edited by Joyce Yoo, editor, New York
Share these insights
Did you enjoy this newsletter? Forward it to colleagues and friends so they can subscribe too. Was this issue forwarded to you? Sign up for it and sample our 40+ other free email subscriptions here.
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to our McKinsey Global Institute alert list.
Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey Daily Read" <publishing@email.mckinsey.com> - 05:07 - 28 Aug 2023 -
🚀 Exclusive Early Access: Remote Connect 2023 is here
🚀 Exclusive Early Access: Remote Connect 2023 is here
Early registration is now open for Remote Connect 2023. Secure your free pass to access our virtual platform, important event updates, and on-demand content.An exclusive invitation just for you
Psst! Early registration is now open for Remote Connect 2023 our annual virtual conference on 19 October and we wanted you to be the first to know.
Join business executives, HR professionals, thought leaders, and industry experts from around the world for this one-day virtual conference dedicated to uncovering new strategies for scaling globally distributed teams.
What to expect
Space is limited,
get your free virtual pass today!Need Help?
We're Here for You!Search over 1,500 articles, visit our Help Center.
Prefer a personal touch? Schedule a call with an expert.
You received this email because you are subscribed to Conferences & Events from Remote Technology, Inc.
Update your email preferences to choose the types of emails you receive.
Unsubscribe from all future emailsRemote Technology, Inc.
Copyright © 2023 Remote Technology, Inc. All rights reserved.
18 Bartol St. #1163 San Francisco California
by "Remote" <hello@remote-comms.com> - 11:01 - 28 Aug 2023 -
[Online workshop] How to Master Software Remediation using New Relic Vulnerability Management
New Relic
Register for this online workshop, "How to Master Software Remediation using New Relic Vulnerability Management" on 7th September at 2 PM BST/ 3 PM CEST to get a comprehensive introduction to New Relic Vulnerability Management. Applications today often consist of thousands of components, each with the potential to carry critical security vulnerabilities.Mitigating threats is no longer the sole responsibility of security teams, it is a shared responsibility of all engineers to have a security mindset across the development pipeline.
In this practical session, you’ll find out about how New Relic vulnerability management lets you see and fix security issues in one connected experience with zero configuration, open integrations, automatic risk prioritization, and alerting on newly discovered vulnerabilities across all teams (Dev, Ops, Sec).
In this online workshop, you’ll learn:
- Learn three best practices to adopt that can help improve secure code quality.
- How New Relic Vulnerability Management empowers your engineers to understand their application security
- How it works and how to get it technically (Agent upgrade)
Register now Need help? Let's get in touch. This email is sent from an account used for sending messages only. Please do not reply to this email to contact us—we will not get your response.View in browser
This email was sent to info@learn.odoo.com. Update your email preferences.For information about our privacy practices, see our Privacy Policy.
Need to contact New Relic? You can chat or call us at +44 20 3859 9190
Strand Bridge House, 138-142 Strand, London WC2R 1HH
© 2023 New Relic, Inc. All rights reserved. New Relic logo are trademarks of New Relic, Inc.
by "New Relic" <emeamarketing@newrelic.com> - 06:26 - 28 Aug 2023 -
Get excited for the latest products and APC news
Schneider Electric
East Asia Partner NewsletterGet certified, get access
Access our designer tool, the Local Edge Configurator (LEC) to design your latest one rack solution in just 2 minutes!
Easily generate and customize your own solution reports.
What is DCIM 3.0?
Schneider Electric is investing in EcoStruxure IT to best serve you, empowering you to operate in the most resilient, secure, and sustainable IT infrastructure anywhere.
Expertise with a Modular Solution
Discover in 2 mins how the Easy Modular Data Center All-in-One delivers on speed, predictability, and reliability.
+ Lifecycle Services From energy and sustainability consulting to optimizing the life cycle of your assets, we have services to meet your business needs. Schneider Electric
46 Rungrojthanakul Building. 1st, 10th, 11th Floor, Ratchadapisek Road. Huaykwang
Bangkok - 10310, Thailand
Phone +662 617 5555© 2023 Schneider Electric, All Rights Reserved. Schneider Electric trademarks are owned by Schneider Electric or its affiliated companies in the United States and other countries. All other trademarks are property of their respective owners.
by "Schneider Electric" <reply@se.com> - 03:00 - 28 Aug 2023 -
Go for bold: A leader’s guide to transformative change
Change it up Brought to you by Liz Hilton Segel, chief client officer and managing partner, global industry practices, & Homayoun Hatami, managing partner, global client capabilities
It’s not unusual if your company’s business transformation is slow or even stalled. Organizations continually try to reinvent their businesses, yet the average success rate of these efforts remains low. We find that companies that have launched transformation projects are rarely able to improve business performance and maintain those improvements over time; even organizations with successful transformations don’t always capture their full value. And playing it safe isn’t the solution—today’s transformations need to be big and bold to generate new opportunities and sustained growth. If your transformation initiative is stuck, the strategies below may help propel it forward.
Even if your organization’s transformation has been successful, has it been transformative? Probably not. Transformations that reach this level represent just 5 percent of all transformations but deliver 4.5 times the value, according to research led by McKinsey senior partners José Pimenta da Gama and Fábio Stul and colleagues. Exemplary transformations generally have five characteristics in common, but transformative ones add three crucial actions: reinventing the core business, developing or acquiring new businesses, and revamping the operating model to focus on speed and innovation. To check where your project falls on the transformative scale, you may want to examine ten important areas focused on holistic impact and business reinvention, asking questions such as these: How is the company delivering compared with its full potential? Is it being thoughtful about where to compete? Is it innovating fast enough?
That’s the percentage of respondents to a McKinsey survey whose organizations have sustained their transformation goals for more than three years; these enterprises report twice the rate of financial growth as their peers. Fifty-six percent of respondents say that their companies’ transformation programs were successful initially. At the later stages of implementation, however, respondents lost 42 percent of the transformation’s potential financial benefit. “It’s never been as important as it is now to execute and build capabilities in major transformation programs,” emphasizes McKinsey partner Steve Armbruster. “And guess what? We’re finding that it’s even harder to do this than we thought.”
That’s McKinsey senior partners Chris Bradley, Marc de Jong, and Wesley Walden on why you shouldn’t be afraid to aim high in a transformation. Go all in on the performance- and portfolio-related actions that you can take, they suggest. Making five big moves in these two categories can push a company up on the “power curve” of economic profit, on which only a few organizations reach the top quintile of earnings. But no matter what you do, “standing still is a terrible idea,” warn the McKinsey experts. “The odds associated with a static approach are grim, equating to a 2 percent chance of reaching the top of the power curve and a 16 percent chance of slipping to the bottom.”
Fairy tales are all about transformations—a frog turns into a prince, or a pumpkin becomes a golden carriage. Business transformations, while not quite as magical, are also about change—and getting people on board with change may be one of the most difficult processes for leaders to orchestrate. McKinsey senior partner Kirk Rieckhoff cautions against quick wins. “What you’re really looking for is quick progress,” he says. This involves showing people that change is possible. “The key to success for making change happen is to start the change, versus just planning to,” says Rieckhoff. “Step zero doesn’t get you anywhere. You’ve got to go to step one, two, three.”
Lead transformationally.
— Edited by Rama Ramaswami, senior editor, New York
Leading Off will take an end-of-summer break, but we’ll be back on September 11. Take care, and thanks for reading.
Share these insights
Did you enjoy this newsletter? Forward it to colleagues and friends so they can subscribe too. Was this issue forwarded to you? Sign up for it and sample our 40+ other free email subscriptions here.
This email contains information about McKinsey’s research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to the Leading Off newsletter.
Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey Leading Off" <publishing@email.mckinsey.com> - 02:05 - 28 Aug 2023 -
Registration closing for latest DevCon 2023
Registration closing for latest DevCon 2023
Learn about Smart Queue Management SystemsHow To Build a Smart Queue Management System Step by Step? From Zero to Hero.
September 5, 2023;
7PM-8PM ISTRegister now Md Abul,
Join us for a step-by-step tutorial on how to create an intelligent retail queue management system using the OpenVINO™ toolkit and YOLOv8. By the end of the presentation, you'll have the knowledge and resources to build your own solution.
What you’ll learn:
- Step-by-step easy-to-follow Jupyter Notebook tutorial
- Real-time detection and tracking of people for efficient queue management and staffing optimization
- Optimized for multi-model workloads across various Intel processors
- Where to find resources; open-source code, dataset, videos, and a blog available on GitHub for easy customization and extension to your specific needs
Register today Adrian Boguszewski
AI Software Evangelist, Intel
Adrian, an OpenVINO developer evangelist, is frequently a speaker at data science conferences,enjoys working with big data and creating solutions for big companies in Poland.Anisha Udayakumar
AI Evangelist, Intel
Anisha is an AI Evangelist at Intel with a passion for the OpenVINO™ toolkit. She is a member of aninnovation team that leverages cutting-edge technologies such as AI, Augmented Reality, Virtual Reality, Robotics, and XR to build rapid prototypes and vision-based retail solutions.On-Demand Workshops
OpenVINO 2023.0 – See What's New
Harness Generative AI Acceleration with OpenVINO™ toolkit
Beyond the Continuum: The Importance of Quantization in Deep Learning
If you forward this email, your contact information will appear in any auto-populated form connected to links in this email.
This was sent to info@learn.odoo.com because you are subscribed to Webinars. To view and manage your marketing-related email preferences with Intel, please click here.
© 2023 Intel Corporation
Intel Corporation, 2200 Mission College Blvd., M/S RNB4-145, Santa Clara, CA 95054 USA. www.intel.com
Privacy | Cookies | *Trademarks | Unsubscribe | Manage Preferences
by "Intel Developer Zone" <intel.developer.zone@plan.intel.com> - 12:34 - 28 Aug 2023 -
Generative AI can give people ‘superpowers.’ What are the implications for workers?
On Point
How AI can boost productivity Brought to you by Liz Hilton Segel, chief client officer and managing partner, global industry practices, & Homayoun Hatami, managing partner, global client capabilities
•
Generative AI’s new roles. The quality of response from generative AI depends on the prompt it is given—a prompt that is usually human-generated. However, researchers are exploring other ways to interact with the technology based on who initiates the interaction (human or machine) and who is using it (an individual, group, or another machine). Using different prompts, generative AI could act as a personal coach to help you manage your time, fact-check statements made during a group conversation, or act as a manager to coordinate a group project. [HBR]
•
Estimating generative AI’s value. Generative AI has captured the imagination of business leaders, as workers across industries discover how AI can accelerate IT coding, speed content development, and improve product design. Research by McKinsey Global Institute partner Michael Chui and coauthors shows the potential for generative AI to add the equivalent of $2.6 trillion to $4.4 trillion to the economy annually. “It’s very compelling on a personal level because almost everyone can use it,” Chui explains.
•
More power to you. Our research shows that using generative AI to automate routine daily tasks bestows workers with a new “superpower” to improve productivity and have more time for the more human elements of work. For example, AI-improved scripts and customer insights can help new call center workers advance faster because they are able to handle complex situations more quickly and spend more time interacting with customers. Visit our New at McKinsey Blog to learn how companies can reimagine their business models with AI.
— Edited by Gwyn Herbein, editor, Atlanta
This email contains information about McKinsey's research, insights, services, or events. By opening our emails or clicking on links, you agree to our use of cookies and web tracking technology. For more information on how we use and protect your information, please review our privacy policy.
You received this email because you subscribed to the On Point newsletter.
Copyright © 2023 | McKinsey & Company, 3 World Trade Center, 175 Greenwich Street, New York, NY 10007
by "McKinsey On Point" <publishing@email.mckinsey.com> - 12:16 - 28 Aug 2023