Trending Articles

Maria Lensing: The Network Platform for Healthcare’s Future

Cloud Musings

As a girl, Maria and her family traveled to Memphis, Tennessee to get cancer treatment for her sick brother. The miracle she observed, as the healthcare providers saved her brother’s life, ignited a passion for healthcare.

Top 5 ABM Planning And Execution Pitfalls To Avoid

Forrester IT

Extra, extra! Read all about it! TOPO declares that“86% of account-based organizations report improved close rates and 80% say it is driving increased customer lifetime value!”

Report 172

IBM AI fails to beat human debating champion


After suffering defeat to AI at Go and Dota 2, the battle between man and machine was starting to look a little one-sided. But a human has finally notched up a win against our future robot overlords.

IBM 160

Gartner Predicts the Future of AI Technologies


If you’ve noticed an uptick in product recommendations based on your Amazon purchases, or GPS services that are increasingly accurate in displaying congested traffic areas, it’s because artificial intelligence (AI) is everywhere. AI adoption in organizations has tripled in the past year , and AI is a top priority for CIOs. Yet early AI initiatives have a high probability of failure due to misalignment with business requirements and lack of agility.

What cloud computing can learn from good BBQ

David Linthicum

You can’t beat good BBQ. As long as I’ve been eating, I’ve loved the taste of BBQ cooked correctly, and I’ve loved the science of getting BBQ right, no matter brisket, ribs, pulled pork, or chicken. Vegans may want to sit this blog out.) What’s clear to me is that the process and ingredients that it takes to make your cloud computing project work are directly related to how you get a perfectly smoked piece of meat. Here’s a bit of advice about both. InfoWorld explains: What is multicloud?

Cloud 129

5G Wireless Technology Connecting Healthcare

Cloud Musings

Healthcare is in the middle of massive change. Called digital transformation by many, this term describes the industry’s pursuit of the many promises offered by connected patients, connected caregivers, and connected hospitals.

More Trending

Top 10 Ways Internet of Things and Blockchain Strengthen Supply Chains


Read Louis Columbus list the top 10 ways in which combining Internet of Things and Blockchain technology could strengthen enterprise supply chain on Business2Community : Combining blockchain’s distributed ledger framework with the Internet of Things’ (IoT) proven real-time monitoring and tracking capability is redefining supply chains. Blockchain shows potential for increasing the speed, scale, and […]. CTO News

Wells Fargo’s CIO Drops The Ball

The Accidental Successful CIO

Wells Fargo outage results in customers not being able to access to accounts Image Credit: Mike Mozart. If you were the CIO of a major bank responsible for the importance of information technology, what do you think that your #1 job responsibility would be?

Calculate Potential Market Share Size for a New Product or Service


“How did the product manager get leadership interested in that new product idea?”. “He He showed them a billion-dollar total addressable market!”.

Survey 135

Tulane University SoPA Selects "Architechting Cloud Computing Solutions"

Cloud Musings

Last week, Packt Publishing announced that " Architecting Cloud Computing Solutions " by Kevin L.

Course 130

Augmented Reality, Virtual Reality, And Mixed Reality Do Bring Value To Industry

Forrester IT

Back in August of last year, I asked for good examples of augmented reality (AR), virtual reality, and mixed reality (MR), all together known as extended reality.

What the New U.S. Intelligence Strategy Says About Cyber Threats


The United States intelligence strategy for 2019 has been released, covering seven specific themes. Here’s how the United States Intelligence Community will deal with cyber threats: “Despite growing awareness of cyber threats and improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years to come. Our adversaries are becoming […]. Cyber Security News

3 reasons you shouldn’t use chatbots

David Linthicum

Cloud-based chatbots are almost old technology now; they’ve been around for four years. And reception has been decidedly mixed. Last week, researchers at several collaborating institutions unveiled the formal write-up of something called the “Second Conversational Intelligence Challenge,” which was a competition among chatbots that took place during December 2018’s NeurIPS artificial intelligence conference.

5 AI Myths Debunked


“AI will automate everything and put people out of work.” “AI AI is a science-fiction technology.” Robots will take over the world.” The hype around artificial intelligence (AI) has produced many myths, in mainstream media, in board meetings and across organizations. Some worry about an “almighty” AI that will take over the world, and some think that AI is nothing more than a buzzword. The truth is somewhere in the middle.

Join Top Social CIO at the First #CIOChatLive!

Social, Agile and Transformation

If you're a CIO, CISO, or CTO and want to connect with the brightest, most socially vocal group of CIOs then please join us for the first ever #CIOChatLive in Boston on March 14-15th! If you are not familiar with #CIOChat, it's a twice per week gathering on Twitter that you can follow with this hashtag. On Thursday at 2pm ET, moderator Myles Suer sends out 4-5 questions around a topic while.

Social 159

Pragmatism Rules Finovate Europe 2019

Forrester IT

Finovate Europe is back in full swing, so we wanted to share our impressions of day one. Here are Benjamin’s thoughts: And some further reflections by Aurélie and myself. financial services

Cybersecurity and the Need for SSL Monitoring


Read why Kameerath Kareem says that SSL monitoring is a must for app security for every organization on DZone : The cybersecurity industry is constantly striving to stay well prepared and well ahead of new threats. Data protection was in the spotlight all through 2018. It’s a common practice for applications to collect user data like […]. Cyber Security News

Desktop Support Network Troubleshooting Tips for Beginners


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. This post is a continuation of my old post “How to Learn Desktop Support Engineer Skills“ Desktop support engineers are an integral part of the IT support world.

How to Become a Product-Centric Organization


Redesigning the organization as a digital business should be on every CIO’s mind. However, digital business designs often do not scale because the organization fails to modify its business model and operating model to support its strategy. “We We surveyed business leaders around the world, and while 66% of leaders think that they are digitally transforming their business, only 11% of CEOs are actually doing so,” says Lars Van Dam , Vice President Analyst, Gartner.

How To 101

Loss of Bluetooth Connectivity Resolved via PowerShell

Mick's IT Blog

Recently, we ran into the issue of users replacing their keyboard and mouse with Bluetooth devices. What happened was they would lose connectivity and the error below would appear in the event viewer logs.

Customer Experience: France Is Lagging Behind

Forrester IT

After New York City, San Francisco, Sydney, Singapore, and London, Forrester hosted its first event dedicated to customer experience in Paris, France. It was a great pleasure for me to host about 150 leaders in a unique venue, the Parc des Princes (PSG’s football stadium!!),

Trends 166

Here’s what you need to know about Trump’s ‘American AI Initiative’


President Trump issued an executive order today announcing what the White House calls an “American AI Initiative.” The order encourages research in the field of artificial intelligence in the United States. The announcement is based on principles that touch on issues like AI and jobs, and the relationship between American artificial research and the international community. […]. Artificial Intelligence News

IBM Takes Watson AI to AWS, Google, Azure

Information Week

IBM is leveraging Kubernetes to enable its Watson AI to run on public clouds AWS, Google, and Microsoft Azure. The move signals a shift in strategy for IBM

That VPN may not be as secure as you think

Network World

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure. Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently.

5 signs that your business technology is falling behind

mrc's Cup of Joe Blog

Summary: Technology is evolving faster than ever, and plays an increasingly important role in the business world. Is your company keeping up? In this article, we explore a few signs that your technology is falling behind.


In The Era Of Shutdowns, Federal Agencies Can Reinvent Citizen (And Employee) Experience

Forrester IT

Never let a serious crisis go to waste! Senior government executives would be wise to listen to Winston Churchill’s wisdom! We’re living in the era of shutdowns, when funding disruption is the norm.

Uber releases Ludwig, an open source AI ‘toolbox’ built on top of TensorFlow


Want to dive earnestly into artificial intelligence (AI) development, but find the programming piece of it intimidating? Not to worry — Uber has your back. The ride-hailing giant today debuted Ludwig, an open source “toolbox” built on top of Google’s TensorFlow framework that allows users to train and test AI models without having to write […]. Artificial Intelligence News

Running Digital IT as Business Performance and Productivity Booster

Future of CIO

Information & technology is not for its own sake, but to deliver services and solutions that drive business growth and improve organizational performance and maturity. Improving productivity is one of the noble business goals behind running a digital IT organization.

Red Hat announces container flaw CVE-2019-5736

Network World

Red Hat announced a vulnerability this morning – one that can be exploited if a user runs malicious or modified containers. The flaw in runC (a lightweight portable container runtime) and Docker that this vulnerability exposes allows an attacker to escape a container and access the underlying file system. That might sound bad, but there's more. The good news is that this vulnerability cannot be exploited if SELinux is enabled and that this is the default on Red Hat systems.

Perficient Recognized for Twilio Flex Success On Earnings Call

Perficient - Digital Transformation

Twilio held their Q4 2018 earnings call earlier this week. No surprise, the company finished their fiscal 2018 on a strong note. Significant revenue gains were propelled by continued growth from both Twilio’s core voice and messaging products, as well as the company’s continued focus on delivering an omni-channel customer engagement platform.