June, 2018

article thumbnail

Five Best Practices To Scale Data Science Across The Enterprise

Forrester IT

Nearly all firms want to do more with data science. However, executives and data scientists alike are frustrated by the difficulty of turning new initiatives into business impact at scale. Outside of well-established use cases – such as risk scoring or optimizing search results – data scientists regularly complain that their solutions can take months […].

Data 388
article thumbnail

Machine learning risks are real. Do you know what they are? 

Eric D. Brown

Machine Learning Risks are real and can be very dangerous if not managed / mitigated. Everyone wants to ‘do’ machine learning and lots of people are talking about it, blogging about it and selling services and products to help with it. I get it…machine learning can bring a lot of value to an organization – but only if that organization knows the associated risks.

Data 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When Cyberattacked, Should CIOs Share Information About The Experience?

The Accidental Successful CIO

When they are attacked, CIOs have to decide how much they want to share Image Credit: Blogtrepreneur. The person with the CIO job, you, is the person who is responsible for securing the company against attacks from outside. We all know that try as we might, we’re not going to be able to prevent the bad guys from trying to break into our networks.

Report 138
article thumbnail

Not all Machine Learning (ML) Is Artificial Intelligence (AI): Part II

CTOvision

No two companies define Artificial Intelligence (AI) the same way, but they all insist they are doing it. Or at least some version of it. However, if AI is to mean something and be a useful term to help delineate different technologies and approaches from others, then it has to be meaningful. A term that [.].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

12 Warning Signs of Bad Application Architecture

Social, Agile and Transformation

At a #CIOChat this weekend we were asked about warning signs for bad architecture. Here was my quick response capturing just a tweet-sized summary of architecture that "smells bad" - Too slow making biz needs. Too difficult/complex to explain to new technologists. Lack of defined integration process (closed system). Can’t be deployed to the cloud. Performance or stability issues. #.

article thumbnail

Beginners Guide SCCM Console Nodes Buttons

Anoop

This is my first post on SCCM Educational post series. I will provide more information about “SCCM Educational post series” in upcoming posts. In case you are a newbie to SCCM then this is the important guidelines for you. The details of SCCM Console nodes or buttons will give you an overall idea UI capabilities. […]. The post Beginners Guide SCCM Console Nodes Buttons appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Education 167

More Trending

article thumbnail

SDNs and NFV are complementary and core components of modernized networks

Network World

The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect. In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn’t have to be the case. Enterprises could maintain their current network architecture and shift to NFV or they could roll out an SDN and never leverage the benefits of NFV, so it’s important to understand what each is and the benefits of both. [ For mo

Network 115
article thumbnail

How Should CIOs Handle Data From Employee?s Wearables?

The Accidental Successful CIO

More data is always better, but what if it’s personal data? Image Credit: Timo Newton-Syms Follow. As the person with the CIO job, you are the one who is responsible for managing all of the data that the company collects. We are all pretty used to what this means. We set up databases, we create backup programs, and we create processes for acquiring, cleaning, storing, and eventually discarding data because we understand the importance of information technology.

Data 147
article thumbnail

The commercial impact of IoT insecurity

CTOvision

Introduction A hacker recently shut down Bycyklen, Copenhagen’s public city bikes system, forcing employees to hunt down and manually reboot the Android tablet attached to every bike. The company said that restoring all bikes to working order would "take some time". Naturally, the costs of restoration will be significant. This is just one example of [.].

Examples 219
article thumbnail

What Drives Agile Teams to Become Agile Organizations

Social, Agile and Transformation

Last week I moderated a panel at nGage's Enterprise Transformation Exchange on Developing an Agile IT Organization: Concepts, Culture and Concerns. The message from panelists was clear. Organizations looking to transform need to go beyond scrum practices and improving IT project execution.

Agile 115
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

How to Promote Pre-Production Client to Production

Anoop

This is my second (2nd) post on SCCM education series of posts. Recently I received a couple of queries about the Promote Pre-Production Client on my SCCM 1802 upgrade post. This post is the reply to those queries and doubts about the promotion of pre-production SCCM client. First of all, I would recommend you to […]. The post How to Promote Pre-Production Client to Production appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

How To 152
article thumbnail

Customer Experience Trends In China, 2018

Forrester IT

What are the CX trends that will impact customer loyalty and help you build competitive advantage? Look at what China reveals about the future of customer experiences. Until only a few years ago, most CX pros would have scoffed at talks of China as an innovator. But this has changed at breathtaking speed. Today, China […].

Trends 281
article thumbnail

How to Correct Posture with Good Desk Ergonomics

Galido

Information Technology Blog - - How to Correct Posture with Good Desk Ergonomics - Information Technology Blog. Greatly improve your desk ergonomics and prevent the strain on your neck, back, and wrists by watching this quick video: Find your natural posture. Scoot your chair away from your desk and sit down comfortably. For many people, it would look a lot like sitting in a car.

How To 113
article thumbnail

CIOs Need To Learn How To Become Futurists

The Accidental Successful CIO

Futurist keep their eyes fixed on what may be coming our way Image Credit: ADiamondFellFromTheSky. I’ve got a quick question for you: how good is your ability to predict the future? If your skill in this area is anything like mine, you find yourself being constantly surprised by things that you simply didn’t see coming. As the person with the CIO job, you really can’t allow this to happen to you.

How To 124
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HBO?s Westworld: The Man In Black is a special kind of Twitter user

CTOvision

HBO’s Westworld is a modern take on the Michael Crichton SciFi tale of a robotic amusement park. The HBO version has a new twist. The creators/writers were all exposed to years of Twitter, which has influenced every episode and the entire arch of two seasons of the show. Now that season two is wrapping up, [.].

article thumbnail

Meeting notes for your agile and scrum meetings? Here's why they are important and some options to implement

Social, Agile and Transformation

My question for the agile scrum masters, coaches, and team leads today is whether or not you are documenting meeting notes after planning sessions, standups, and other common scrum meetings? You might be tempted to do away with meeting notes as a relic of the past. In fact, if you have a small collocated team that has a long tenure working together, then I agree that it might be overkill to.

SCRUM 100
article thumbnail

How to Setup Co-Management Video Tutorials

Anoop

I have several posts related to co-management scenarios and implementation. In this post, I have collated all Co-Management Video Tutorials in one place for easy access. All these videos are recorded with SCCM CB 1802 production version. I don’t think I would be able to share all the scenarios. Let me know if you want […]. The post How to Setup Co-Management Video Tutorials appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Video 146
article thumbnail

Use Text Analytics Technologies To Handle Mountains Of Unstructured Data

Forrester IT

Enterprises are sitting on mountains of unstructured data – 61% have more than 100 Tb and 12% have more than 5 Pb! Luckily there are mature technologies out there that can help. First, enterprise information architects should consider general purpose text analytics platforms. These are capable of handling most if not all text analytics use […].

Data 284
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

SEO for Small Businesses

Galido

It can be difficult for small businesses to fully utilize technological marketing means due to a lack of knowledge or a lack of funds. Either way, this puts small businesses at a distinct disadvantage from larger companies with deeper pockets. The good news here is that there is one digital marketing strategy that any company of any size can use without spending an arm and a leg.

article thumbnail

What The World Of High Speed Trading Can Teach CIOs

The Accidental Successful CIO

High speed trading is all about having a very fast IT infrastructure Image Credit: Epic Fireworks. At most firms, the person with the CIO job plays a supporting role to the rest of the company. The company makes its blue widgets and the CIO is responsible for creating and maintaining all of the systems that allow blue widgets to be manufactured and sold.

System 113
article thumbnail

Why Cybersecurity is Looking to AI to Mitigate Business Risks

CTOvision

Malicious cyber attacks against government and private businesses have increased in frequency and severity over past years. Microsoft estimates the potential cost of cyber-crime to the global community at $500 billion and that breaches of data will cost the average company around $3.8 million. The unfortunate truth is that the cybersecurity industry is largely unprepared [.].

article thumbnail

What happens if IoT security doesn’t get solved?

Network World

Sometimes, confirmation of the obvious can be really important. At least, that’s how I felt when I saw a new Bain & Company report, Cybersecurity Is the Key to Unlocking Demand in IoT. According to the consulting firm’s survey , 45 percent of Internet of Things (IoT) buyers say “ concerns about security remain a significant barrier and are hindering the adoption of IoT devices.

Security 112
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

SCCM Configure Settings for Client PKI certificates

Anoop

Setting up Client PKI certificates is one of the essential steps for HTTPs communication from CMG to MP/SUP. In this post, we will see how to complete Client PKI setup task for Co-management scenarios. Once you have Root CA, Client PKI certificates configuration is pretty straightforward. Content of this post Decision Making - Client PKI […]. The post SCCM Configure Settings for Client PKI certificates appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

How To 131
article thumbnail

Alexa, How Do I Fix Healthcare?

Forrester IT

Disruption is Bringing Much Needed Innovation to Healthcare Disruption is not new to healthcare, but the entrance of established brands from other industries signals a level of disruption that hasn’t been seen before. Healthcare Organizations take note, innovate now or become irrelevant tomorrow. We are in an environment where consumers have more choice.

article thumbnail

Social Media Marketing: How the Pros Do It

Galido

To increase the recognition of your business, you may need to use a variety of avenues including using paid advertising. In recent times, social media has been a significant key to the promotion of businesses, and you can use this to get your business out to the right audience. Social media marketing is a fundamental element for the success of your marketing, and it carries a lot of potential that could take your business from one stage to another.

Media 104
article thumbnail

Online Learning VS Traditional Learning| Why Online Learning is Better

Kitaboo

Traditional and non-conventional education have their own merits and demerits. Though classroom learning is still preferred as a mode of teaching in many institutes, the popularity of online learning is slowly overshadowing traditional learning. As per Statista, 43% of U.S college students find digital learning technologies helpful. With growing demand, the interactive digital publishing industry is on the rise as well.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

The Government Is Slow To Move On Privacy Regulations, But When It Gets Going It Is Hard To Stop

CTOvision

The following are some of the cybersecurity related stories we are tracking. More and more we see governments considering doing more to protect privacy, or at least to attempt to protect it. Seems the demands of people all over the world may cause more action. Scoop: The White House looks to coordinate online privacy plan [.].

article thumbnail

Automation critical to scalable network security

Network World

Securing the business network has been and continues to be one of the top initiatives for engineers. Suffering a breach can have catastrophic consequences to a business, including lawsuits, fines, and brand damage from which some companies never recover. To combat this, security professionals have deployed a number of security tools, including next-generation firewalls (NGFW) such as Cisco’s Firepower, which is one of the most widely deployed in the industry.

Network 105
article thumbnail

Beginners Guide for SCCM Driver Management

Anoop

SCCM Driver Management strategy is critical for each organization. This post will help you to download an eBook which gives an end to end SCCM driver management guide for beginners in IT Pros world. I don’t have much expertise in OS Deployment (OSD) as I mentioned in my AutoPilot post. Content What are Drivers and […]. The post Beginners Guide for SCCM Driver Management appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

eBook 120
article thumbnail

Implement UEM To Improve Employee Experience And Protect Customer Trust

Forrester IT

Introducing Our 2018 Now Tech On Unified Endpoint Management (UEM) We are excited to announce the publication of our Now Tech report on Unified Endpoint Management! Forrester clients frequently ask us how to balance employee productivity with management and security. Unified endpoint management, the successor of enterprise mobility management (EMM) and mobile device management (MDM), can help you do it.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.