Fresh Links Sundae – November 23, 2014 Edition Links Sundae encapsulates information I have come across during the past week. Often they are from the people whose work I admire or resonate with me. I hope you will find these ideas thought-provoking at the minimum. Even better, I hope these ideas will, over time, help my fellow IT pros make better decisions, be awesome, and kick ass!

A baseline is necessary to gauge and to validate the results produced by machine learning algorithms. Jason Brownlee describes why we create a baseline prediction result and how to create a baseline in general and for specific problem types. How To Get Baseline Results And Why They Matter (Machine Learning Mastery)

From KDNuggets, Burtch Works details the top 9 data science skills that potential data scientists must have to be competitive in this growing marketplace from the perspective of a recruiter. 9 Must-Have Skills You Need to Become a Data Scientist (KDNuggets)

Accurate asset tracking and management can be an enormous task for any IT organization. In a four-part series, Marcel Shaw describes a three-tiered approach to assets management. IT Asset Management, a three-tiered approach  IT Asset Management, a Three-Tiered Approach (Part 2 of 4)  IT Asset Management, a Three Tiered Approach (Part 3 of 4)  IT Asset Management, a Three-Tiered Approach (Part 4 of 4) (LANDESK Blog)

Bob Lewis points out many enterprise technical architecture management (ETAM) efforts suffer from the pitfall where it cannot keep up with the changes within the organization. He further suggests that perhaps an agile approach to ETAM will be necessary. Technical architecture’s irreducible core (IS Survivor Publishing)

A well-known problem troubleshooting and root-cause analysis technique has been the Five Why’s. John Allspaw argues that, for maximum learning effectiveness, we also need to ask more questions about the How’s. The infinite hows (O’Reilly Radar)

Every organization needs to assess its information security readiness from time to time and implement improvements or remediation when necessary. Chris Sell walks through the four steps that are critical for every information security gap analysis. How To Conduct An Information Security Gap Analysis (SunGard)

Although analytics projects are often at the top agenda for organizations these days, many of those organizations are still struggling to identify the business problems where analytics could generate measurable ROI. Pearl Zhu suggests the ways organizations can use to improve their analytics ROI. How can Organizations Improve their Analytics ROI (Future of CIO)

For most of us, it is easier to see our behavioral challenges in others than to see them in ourselves. From his own experience, Marshall Goldsmith discusses two important life lessons he had learned about addressing those challenges from within. 2 Life-Changing Lessons No One Ever Taught You (Marshall Goldsmith Personal Blog)