<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Yaw Joseph Etse</title>
    <description>The latest articles on DEV Community by Yaw Joseph Etse (@yawetse).</description>
    <link>https://dev.to/yawetse</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F28274%2Fcb23803f-d9e9-4d3e-89b4-828b5d2753d6.jpg</url>
      <title>DEV Community: Yaw Joseph Etse</title>
      <link>https://dev.to/yawetse</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/yawetse"/>
    <language>en</language>
    <item>
      <title>Embracing Followership and Technical Fluency in Modern Leadership</title>
      <dc:creator>Yaw Joseph Etse</dc:creator>
      <pubDate>Thu, 21 Mar 2024 11:54:03 +0000</pubDate>
      <link>https://dev.to/yawetse/embracing-followership-and-technical-fluency-in-modern-leadership-1hb2</link>
      <guid>https://dev.to/yawetse/embracing-followership-and-technical-fluency-in-modern-leadership-1hb2</guid>
      <description>&lt;p&gt;It’s always fun when extremely talented engineers bring up the topic of continuing down an individual contributor path versus entering formally into people leadership.&lt;/p&gt;

&lt;p&gt;I recently had the chance to talk about the usual trade-offs in conversations about people leadership vs individual contributions. Topics like, do you think you can effectively lead through others, or you’re a brilliant engineer are you sure you want to manage people instead of doubling down on your expertise?&lt;/p&gt;

&lt;p&gt;Naturally, The conversation generally shifts to an equally fascinating topic: quantifying effectiveness. For individual contributors, effectiveness can be measured in various ways, such as algorithmic efficiency or the robustness of systems and platforms they develop.&lt;/p&gt;

&lt;p&gt;In contrast, measuring performance and effectiveness in leadership introduces a different kind of subjectivity. It tends to lead into an opportunity where I quote from a concept from my favorite leadership book (at this point I should use an Amazon federal link, hah), that followership is a useful measure of leadership effectiveness because it’s both simple and quantifiable.&lt;/p&gt;

&lt;p&gt;Consider this: how many people you lead would choose to follow you if you switched teams, organizations, or even companies? This question underpins the argument in &lt;a href="https://a.co/d/biQDyFg"&gt;Nine Lies About Work&lt;/a&gt;, where the author challenges the conventional wisdom of universally definable and measurable leadership. Instead, the book suggests that “followership” is the real measure of leadership effectiveness, proposing that the essence of leadership is not a singular trait or capability.&lt;/p&gt;

&lt;p&gt;Coincidentally, our friends at Quotient &lt;a href="https://www.getquotient.com/insights/what-makes-a-great-manager-of-software-engineers"&gt;recently analyzed&lt;/a&gt; a &lt;a href="https://ieeexplore.ieee.org/abstract/document/8094304"&gt;Microsoft study&lt;/a&gt; that offers complementary insights, identifying key attributes of effective engineering managers from both managers’ and engineers’ perspectives.&lt;/p&gt;

&lt;p&gt;These attributes include fostering a positive work environment, enabling autonomy, and nurturing talent. Notably, the study suggests de-emphasizing technical expertise in favor of qualities that promote team cohesion, psychological safety, and personal growth, reflecting a shift in how leadership effectiveness is perceived in the technical domain.&lt;/p&gt;

&lt;p&gt;However, I have reservations about the interpretations presented in the Microsoft research paper, especially the assertion that effective managers place less emphasis on technical leadership. This discrepancy might stem from the definition of ‘technical’ prowess, particularly within software and machine learning engineering.&lt;br&gt;
From my experience, there’s a correlation between effective leadership and technical acumen. However, I’d reinterpret ‘technical’ abilities to include the capacity to engage in multiple “languages of abstraction.”&lt;/p&gt;

&lt;p&gt;Exceptional leadership, especially in technical disciplines, involves the versatility to engage scientifically with data and empirical evidence, mathematically to argue points with precision, and logically to construct cogent arguments by effortlessly forming valid arguments (any casual reference to using modus ponens or hypothetical syllogism is a win). This abstract multi-lingual fluency enables leaders to connect with their teams on multiple intellectual levels, fostering a deeper appreciation for the leader’s technical capabilities.&lt;/p&gt;

&lt;p&gt;I think effective leadership within most engineering domains, hinges as much on technical fluency as it does on vision, empathy, and adaptability. It’s this synthesis of skills and the ability to create an environment where folk would happily follow — that distinguishes truly effective leaders.&lt;/p&gt;

</description>
      <category>management</category>
    </item>
    <item>
      <title>Use Cases Define the Choice of Privacy-Enhancing Technologies</title>
      <dc:creator>Yaw Joseph Etse</dc:creator>
      <pubDate>Fri, 19 Jan 2024 04:24:37 +0000</pubDate>
      <link>https://dev.to/yawetse/use-cases-define-the-choice-of-privacy-enhancing-technologies-1o8m</link>
      <guid>https://dev.to/yawetse/use-cases-define-the-choice-of-privacy-enhancing-technologies-1o8m</guid>
      <description>&lt;p&gt;I love the recent papers taking a deeper dive into synthetic data that highlight how a one-size-fits-all approach to data access and privacy strategies is a mirage. This is best highlighted from the paper "On the Inadequacy of Similarity-based Privacy Metrics: Reconstruction Attacks against 'Truly Anonymous Synthetic Data'" by Georgi Ganev and Emiliano De Cristofaro. I would consider the paper required reading for anyone who is seriously working with synthetic data and was brought to my attention through Damien Desfontaines' amazing &lt;a href="https://www.linkedin.com/posts/desfontaines_so-about-this-truly-anonymous-synthetic-activity-7139918399706423298-GegX/"&gt;post&lt;/a&gt;, which effectively summarizes the key insights.&lt;/p&gt;

&lt;p&gt;"Synthetic data, when not underpinned by robust privacy guarantees like Differential Privacy (DP), can lead to significant privacy breaches, especially concerning outliers" (Ganev &amp;amp; De Cristofaro, 2023). The quote is a great call out and highlights the challenges for real-world and product environment usage of synthetic data for various applications.&lt;/p&gt;

&lt;p&gt;The paper highlights that most synthetic data products claim compliance with regulations like GDPR, HIPAA, or CCPA, yet rarely use DP. Instead, many companies use empirical heuristics to ensure privacy, which can break the end-to-end DP pipeline and negate its privacy protections.&lt;/p&gt;

&lt;p&gt;The authors identify major disadvantages of commonly used privacy metrics and filters. They introduce a novel reconstruction attack, ReconSyn, which exposes the vulnerabilities of these metrics. ReconSyn recovers at least 78% of underrepresented train data records (outliers) with perfect precision across various models and datasets.&lt;/p&gt;

&lt;p&gt;The paper identifies eight major issues with using similarity-based privacy metrics (SBPMs), including the lack of theoretical guarantees, treating privacy as a binary property, and the absence of worst-case analysis. These limitations present severe vulnerabilities to privacy attacks.&lt;/p&gt;

&lt;p&gt;Synthetic data's appeal lies in its presumed privacy and utility, especially for software and model testing by creating a safe playground without exposing sensitive real-world data. However, synthetic data can be less useful in deep analytics and model training. The paper highlights that synthetic data generated from highly sensitive information often falls short of providing adequate privacy unless it incorporates stringent privacy-preserving methods like DP.&lt;/p&gt;

&lt;p&gt;This distinction leads us to a broader narrative in the realm of privacy-enhancing technologies (PETs). It’s often not practical to choose a single PET, such as trusted execution environments or homomorphic encryption, because in practice they all have their ideal use cases. The intent behind their use should be the primary driver of technology decisions. Sometimes, synthetic data suffices; other times, more robust controls are necessary.&lt;/p&gt;

&lt;p&gt;The intent and use case should always be at the forefront of any data protection strategy. For instance, safeguarding highly sensitive data in scenarios where accuracy is paramount might call for homomorphic encryption or DP. Conversely, in scenarios with lower privacy risks or less sensitive data contexts, synthetic data could be a viable and efficient option.&lt;/p&gt;

&lt;p&gt;Ganev and De Cristofaro advocate for a nuanced approach to data privacy, stating, "A critical examination of current privacy metrics and the adoption of empirically driven methods is essential for ensuring real privacy in synthetic data generation" (Ganev &amp;amp; De Cristofaro, 2023).&lt;/p&gt;

&lt;p&gt;This perspective should inform the selection of appropriate PETs based on specific use cases, balancing the dual demands of utility and privacy. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ganev, G., &amp;amp; De Cristofaro, E. (2023). On the Inadequacy of Similarity-based Privacy Metrics: Reconstruction Attacks against 'Truly Anonymous Synthetic Data'. - &lt;a href="https://arxiv.org/abs/2312.05114v1"&gt;https://arxiv.org/abs/2312.05114v1&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>data</category>
      <category>discuss</category>
      <category>ai</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Balancing Innovation and Privacy: Navigating LLM Augmentation with RAG and RA-DIT</title>
      <dc:creator>Yaw Joseph Etse</dc:creator>
      <pubDate>Fri, 12 Jan 2024 11:27:29 +0000</pubDate>
      <link>https://dev.to/yawetse/balancing-innovation-and-privacy-navigating-llm-augmentation-with-rag-and-ra-dit-3hk1</link>
      <guid>https://dev.to/yawetse/balancing-innovation-and-privacy-navigating-llm-augmentation-with-rag-and-ra-dit-3hk1</guid>
      <description>&lt;p&gt;The advancements in Retrieval-Augmented Generation (RAG) and Retrieval-Augmented Dual Instruction Tuning (RA-DIT) are compelling, especially their implications for intellectual property, data privacy and data governance. These generative model augmentation techniques prompt important data security and privacy-related questions in most enterprise settings.&lt;/p&gt;

&lt;p&gt;While RAG merges retrieval-based and generative models to improve text retrieval and generation, suitable for tasks like text summarization and content creation (&lt;a href="https://spotintelligence.com/2023/10/19/retrieval-augmented-generation-rag/"&gt;https://spotintelligence.com/2023/10/19/retrieval-augmented-generation-rag/&lt;/a&gt;) RA-DIT, on the other hand, adds retrieval capabilities to LLMs through two fine-tuning stages, refining both the model's use of retrieved data and the retriever's relevance (&lt;a href="https://ar5iv.labs.arxiv.org/html/2310.01352"&gt;https://ar5iv.labs.arxiv.org/html/2310.01352&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;The two methods differ fundamentally. RAG integrates retrieval with generation, potentially raising privacy concerns in cases where sensitive data is involved. RA-DIT focuses on upgrading existing models for better retrieval, possibly offering more control over sensitive data.&lt;/p&gt;

&lt;p&gt;Integrating privacy-enhancing technologies (PETs) like differential privacy and homomorphic encryption could transform LLM use in privacy-sensitive areas.&lt;/p&gt;

&lt;p&gt;However, selecting the right PET depends on a sound data production and consumption strategy. For example Differential privacy could potentially obscure individual data points in both RAG and RA-DIT processes, while homomorphic encryption would allow for computations on encrypted data, keeping sensitive information secure. &lt;/p&gt;

&lt;p&gt;Other considerations should include how data will be shared externally, how the data will be used internally, the importance of data accuracy, and whether the challenges are related to modeling and analysis or software engineering. Data access patterns and user expectations, whether they require static data dumps or API interfacing, could aLos influence the PET application strategy.&lt;/p&gt;

&lt;p&gt;While these technologies promise enhanced LLM accuracy and context-rich outputs, balancing technical and ethical considerations is crucial. Differential privacy might reduce accuracy, and homomorphic encryption could increase computational demands.&lt;/p&gt;

&lt;p&gt;Understanding how RAG and RA-DIT, coupled with PETs, can create a secure, well governed LLM framework and implementation strategy. This approach could improve LLMs in sensitive sectors and accelerate AI adoption, with data privacy and intellectual property as a foundational design element. The potential of these technologies in enhancing auditability, explainability, and governance in LLMs, particularly when privacy is central, is immense.&lt;/p&gt;

</description>
      <category>llm</category>
      <category>rag</category>
      <category>machinelearning</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Leaking sensitive data via membership inference attacks on machine learning models</title>
      <dc:creator>Yaw Joseph Etse</dc:creator>
      <pubDate>Fri, 12 Jan 2024 11:25:30 +0000</pubDate>
      <link>https://dev.to/yawetse/leaking-sensitive-data-via-membership-inference-attacks-on-machine-learning-models-1fc</link>
      <guid>https://dev.to/yawetse/leaking-sensitive-data-via-membership-inference-attacks-on-machine-learning-models-1fc</guid>
      <description>&lt;p&gt;The paper, &lt;a href="https://arxiv.org/abs/1610.05820"&gt;"Membership Inference Attacks against Machine Learning Models,"&lt;/a&gt; shows how easy it is to expose how models can inadvertently leak sensitive information about the data they were trained on.&lt;/p&gt;

&lt;p&gt;Leaking via membership inference attacks (essentially allow an adversary to determine if a particular data record was used in the training set of a machine learning model) is another reason why the work in the differential privacy space is so interesting and valuable. It’s extremely common to deal with confidential and sensitive data in most enterprise settings, and the assurance that this data cannot be reverse-engineered or exposed is critical.&lt;/p&gt;

&lt;p&gt;The authors of the paper does a nice job walking through multiple experiments and evaluations, demonstrating that machine learning models, especially those that are overfitted, are susceptible to these types of attacks. The authors show that the models behave differently when queried with data they have seen before, compared to unseen data. This difference in behavior can be exploited to infer membership information.&lt;/p&gt;

&lt;p&gt;A key contribution of the paper is the introduction of a novel technique called "shadow training." This technique involves training models (referred to as shadow models) to mimic the behavior of the target model, using data that is similar to the target model’s training data. The shadow models are then used to generate a dataset for training an attack model, which learns to distinguish between the target model’s outputs on its training and test data. This attack model can then be used to infer membership information about new data records.&lt;/p&gt;

&lt;p&gt;The implications of this are far-reaching. Whenever the usefulness of privacy enhancing technologies comes up, it’s appropriate to raise the risks associated with membership inference attacks and take steps to mitigate these risks. This includes being mindful of the trade-offs between model accuracy and vulnerability to such attacks, and implementing strategies to prevent overfitting.&lt;/p&gt;

&lt;p&gt;Some questions that arise from this research, and that I believe warrant further exploration, include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;How can we effectively measure the susceptibility of our models to membership inference attacks?&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;What are the best practices for implementing shadow training in a real-world scenario, and how can we ensure its effectiveness?&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Are there specific types of data or model architectures that are more prone to these attacks, and how can we safeguard against this?&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;I would be interested in engaging with more researchers who are currently delving deeper into these questions and to explore potential collaborative efforts to address these vulnerabilities.&lt;/p&gt;

</description>
      <category>llm</category>
      <category>machinelearning</category>
      <category>dataengineering</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Rethinking Performance Management - Embracing Subjectivity Over Objectivity</title>
      <dc:creator>Yaw Joseph Etse</dc:creator>
      <pubDate>Fri, 12 Jan 2024 04:46:08 +0000</pubDate>
      <link>https://dev.to/yawetse/rethinking-performance-management-embracing-subjectivity-over-objectivity-2dj9</link>
      <guid>https://dev.to/yawetse/rethinking-performance-management-embracing-subjectivity-over-objectivity-2dj9</guid>
      <description>&lt;p&gt;I was recently asked about my thoughts on performance management and to share the resources I find helpful. So, as we wrap up another performance management (PM) season, I'd like to reiterate what I've mentioned privately: it’s crucial to reflect on the inherent shortcomings of most PM processes, especially as they pertain to engineering culture. The key point is the importance of acknowledging and embracing the subjectivity at the heart of performance management.&lt;/p&gt;

&lt;p&gt;One of the most compelling arguments comes from "Nine Lies About Work" by Marcus Buckingham and Ashley Goodall. They assert, "People can reliably rate their own experience" but are notably unreliable at rating others. They explain, "Your rating of a team member on something called 'performance' is unreliable because your definition of performance is unique to you" (Buckingham &amp;amp; Goodall, 2019). This challenges traditional, often rigid, performance evaluation models and suggests a more introspective approach.&lt;/p&gt;

&lt;p&gt;Similarly, "No Rules Rules" by Reed Hastings and Erin Meyer presents the intriguing concept of "The Keeper Test." It's a straightforward yet powerful tool: "If a person on your team were to quit tomorrow, would you try to change their mind? Or would you accept their resignation, perhaps with a little relief? If the latter, you should give them a severance package now, and look for a star, someone you would fight to keep" (Hastings &amp;amp; Meyer, 2020). This approach simplifies performance assessment to a singular, yet profound question, focusing on the real value an individual brings to the team.&lt;/p&gt;

&lt;p&gt;"Working Backwards" by Colin Bryar and Bill Carr, though not directly addressing PM, offers valuable insights into creating environments where performance is naturally high. Amazon’s emphasis on clarity, autonomy, and direct, candid communication is a testament to creating a culture where high performance is a byproduct of the work environment itself.&lt;/p&gt;

&lt;p&gt;In most large corporate settings managing low performance consumes disproportionate time, energy, and resources. The goal should be to cultivate high-performing teams where excellence is the norm, not the exception.&lt;/p&gt;

&lt;p&gt;As &lt;a href="https://www.linkedin.com/company/getquotient/"&gt;Quotient&lt;/a&gt;'s Research-Driven Engineering Leadership aptly notes, measuring engineering productivity requires a nuanced understanding of what performance means in a technical and creative domain (RDEL, 2023).&lt;/p&gt;

&lt;p&gt;In conclusion, embracing the subjectivity of performance management can lead to more genuine, effective, and meaningful assessments. By focusing on individual experiences, aligning personal goals with team missions, and empowering team members with context and autonomy, organizations can create a dynamic, responsive, and ultimately more effective approach to managing performance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Buckingham, M., &amp;amp; Goodall, A. (2019). Nine Lies About Work: A Freethinking Leader's Guide to the Real World.&lt;/li&gt;
&lt;li&gt;Hastings, R., &amp;amp; Meyer, E. (2020). No Rules Rules: Netflix and the Culture of Reinvention.&lt;/li&gt;
&lt;li&gt;Bryar, C., &amp;amp; Carr, B. (2021). Working Backwards: Insights, Stories, and Secrets from Inside Amazon.&lt;/li&gt;
&lt;li&gt;RDEL. (2023). Research-Driven Engineering Leadership: The Most Popular Posts of the Year. &lt;a href="https://rdel.substack.com/p/rdel-22-the-most-popular-posts-of"&gt;Blog Post&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>culture</category>
      <category>management</category>
      <category>feedback</category>
      <category>career</category>
    </item>
    <item>
      <title>Improving Engineering Culture by Building Products, Not Projects</title>
      <dc:creator>Yaw Joseph Etse</dc:creator>
      <pubDate>Fri, 12 Jan 2024 04:42:03 +0000</pubDate>
      <link>https://dev.to/yawetse/improving-engineering-culture-by-building-products-not-projects-39fe</link>
      <guid>https://dev.to/yawetse/improving-engineering-culture-by-building-products-not-projects-39fe</guid>
      <description>&lt;p&gt;I love this &lt;a href="https://twitter.com/pawelhuryn/status/1603459523439693830?s=46&amp;amp;t=zK8SwvDlDnRie8ozc9wHNQ"&gt;tweet thread&lt;/a&gt; from Paweł Huryn about how projects are not products. Especially when building software, a strong engineering culture is often the cornerstone of building great software. However, what is less understood is the crucial role of product management in fostering this culture. Distinguishing product management from project management is key, as the former is foundational in nurturing an environment where engineers thrive.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Pitfalls of Mistaking Projects for Products&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many initiatives, labeled as 'products,' are in reality projects in disguise. This mislabeling is a red flag and can derail the potential of an engineering team. A project-centric approach starts with a comprehensive Product Requirements Document (PRD), focuses on meeting these requirements, and often lacks the involvement of a UX Designer. The roadmap is driven by timelines and features, rather than outcomes and innovation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This approach misses out on essential aspects of product development:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Limited Exploration:&lt;/strong&gt; When the goal is merely to implement listed features, there's little room for innovation.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Absence of Testing:&lt;/strong&gt; The lack of emphasis on testing ideas before implementation can lead to misaligned products.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lack of Strategy:&lt;/strong&gt; Without a clear product strategy, efforts become dispersed, trying to please all customers, which dilutes the product's essence.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Insufficient Analytics:&lt;/strong&gt; The absence of product analytics means being blind to user interactions and needs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Transactional Relationships:&lt;/strong&gt; Viewing the work as a customer-vendor transaction, whether internally or externally, restricts the creative and collaborative potential of the team.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Cultivating a Product-Centric Engineering Culture&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A product-centric approach pivots around a cross-functional team empowered to solve problems, not just implement solutions. The collaboration between Product Managers (PMs), Designers, and Engineers in product discovery is continuous and fluid.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key characteristics of a product-centric approach include:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Empowerment and Collaboration: Teams are empowered to find the best solutions, with PMs, Designers, and Engineers working in unison.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Outcome-Based Roadmap:&lt;/strong&gt; The focus shifts to outcomes rather than just outputs, with a roadmap that adapts and evolves.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk Management:&lt;/strong&gt; Managing and mitigating value, usability, feasibility, and viability risks becomes a priority.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Incremental Shipping and Learning:&lt;/strong&gt; Products are shipped incrementally, allowing for real-time learning and adjustments.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Strategic Tradeoffs:&lt;/strong&gt; Understanding and making strategic tradeoffs highlights the importance of a unique value proposition and market understanding.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Pre-Launch Strategies for a Product-Centric Approach&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before launching a product, defining the market, value proposition, business model, and initial strategy is crucial. Testing the concept with an MVP prototype, defining a go-to-market strategy, and relying on customer interviews and behavioral data are all part of this phase.&lt;/p&gt;

&lt;p&gt;To build a thriving engineering culture, it's essential to shift from a project management to a product management mindset. This shift not only enhances the product's market fit and innovation but also fosters an environment where engineers feel more engaged and empowered. The essence lies in understanding that building a product is not just about ticking off a list of features but about continuously exploring, learning, and adapting to create something truly valuable.&lt;/p&gt;

</description>
      <category>product</category>
      <category>culture</category>
      <category>productivity</category>
      <category>career</category>
    </item>
  </channel>
</rss>
