November, 2016

article thumbnail

Micro Explanations For Nine Essential AI Technologies

Forrester IT

Artificial Intelligence (AI) is not one big, specific technology. Rather, it is comprised of one or more building block technologies. So, to understand AI, you have to understand each of these nine building block technologies. Now, you could argue that there are more technologies than the ones listed here, but any additional technology can fit under one of these building blocks.

article thumbnail

How Big Data Drives The Sharing Economy

CTOvision

Brigg Patten. Your data is being tracked. Don't worry, you aren't alone. The advent of "Big Data" has resulted in an internet landscape where every major company tracks their users' information. When a website warns you that it wants to use cookies to track your information, that's a clear sign of big data at work. We often hear about the sharing economy, big data, and other technical terms that seem a bit mysterious.

Big Data 331
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Software-defined storage: The pros and cons, and what is available

Computer Weekly

Software-defined storage is a rapidly rising trend in the datacentre, but what are the advantages and disadvantages of building your own storage, and is it suitable for all organisations?

Storage 255
article thumbnail

Microsoft to Build Out, Probably Upgrade, Boydton Data Center

Data Center Knowledge

The timing of the company’s move points to the likelihood that it may be upgrading its facility near Richmond and Raleigh for its “Generation 5” DC platform. Read More.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

My 300th Post!!! -- Sharing Four Tech Predictions for 2017

Social, Agile and Transformation

This is my 300th post! I started Social, Agile, and Transformation over ten years ago as a Startup CTO posting technical insights that I developed while overseeing application development, innovating with new technologies, and driving customer experiences. Over the last several years, I have been writing more about digital transformation with a lot of detail on agile, DevOps, and data science.

Devops 176
article thumbnail

Data Analytics & Python (Cross Post)

Eric D. Brown

Crosspost – This post first appeared on Python Data as Data Analytics & Python. So you want (or need) to analyze some data. You’ve got some data in an excel spreadsheet or database somewhere and you’ve been asked to take that data and do something useful with it. Maybe its time for data analytics & Python? Maybe you’ve been asked to build some models for predictive analytics.

Data 174

More Trending

article thumbnail

Election Impact 2016: 10 Nov on Capital Hill

CTOvision

Michael Johnson. CG Roll Call is hosting Election Impact 2016 on 10 Nov at the Hyatt Regency Washington on Capitol Hill. This event is an opportunity to hear directly from leaders in DC on the impact of the Congressional and Presidential elections, including diving deep into topics like cybersecurity, healthcare, defense, energy, technology and budgets.

article thumbnail

Tech industry is ‘eating itself’ through automation and lack of skills, says Harvey Nash survey

Computer Weekly

As IT jobs become increasingly automated, continuous skills development is the only way to prevent the tech industry from “eating itself”, according to a Harvey Nash survey

Survey 252
article thumbnail

Chinese Bitcoin Firm Says It’s Building a 135 MW Powerhouse

Data Center Knowledge

The leader of a kind of virtual mutual fund for online currency is not only manufacturing its own servers, but now says it’s building a massive data center to house and power them all. Read More.

article thumbnail

Driving an Agile and DevOps Culture that Delivers Business Transformation

Social, Agile and Transformation

Thanks to the team at All Day DevOps for giving me the opportunity to speak about this critical topic on the intersection of agile, devops, culture and business transformation. If you missed the talk, I'm summarizing below and including the stream to watch it along with several other great presentations. If you would like access to the slides, I have a newsletter signup at the bottom of this.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to hack an election: An interview with security expert Calvin Liu

Tech Republic Security

Voter fraud has been a hot topic this election cycle, but there are still two fundamental questions to be asked: Can widescale election fraud happen and if so will hackers be the ones to pull it off?

How To 161
article thumbnail

The US Leads In Public Cloud Services, But Other Regions Are Catching Up

Forrester IT

Public cloud services are one of the biggest disruptions in the tech market in the past 15 years. In September 2016, my colleagues Andrew Bartels , Dave Bartoletti , and John R. Rymer published their latest public cloud services outlook, The Public Cloud Services Market Will Grow Rapidly To $236 Billion In 2020 ,projecting 22% annual growth in public cloud services over the 2015-to-2020 period.

Cloud 316
article thumbnail

Cyber Intelligence and Defense for the Public Sector, Part 1

CTOvision

Marty Meehan. Part 1: The Challenge. In today’s connected society, the threat posed by cyber actors and the reality of countless high-profile breaches have catapulted cyber security to a top priority for most organizations. According to recent studies , today, cyber crime and cyber espionage are estimated to cost the global economy over $400 billion each year.

Security 270
article thumbnail

Human-machine teaming key to cyber defence, says Intel Security

Computer Weekly

Intel Security is working with a select group of customers on developing systems to enable human-machine teaming to get the best of both worlds in applying cyber threat intelligence

Intel 249
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

By 2020, 92 Percent of All Data Center Traffic Will be Cloud

Data Center Knowledge

Cisco projects total global data center traffic to reach 15.3 ZB annually by 2020, with 92 percent of all workloads being processed in the cloud by 2020. Read More.

article thumbnail

CIOs Need To Understand That Reviews Come With Risks

The Accidental Successful CIO

The standard review process for employees comes with a great deal of risk Image Credit: GotCredit. As your company’s CIO, one of your jobs is to evaluate the performance of your direct reports as it relates to the importance of information technology. How you go about doing this and how often you do it have been the subject of much debate over the past few years.

Meeting 138
article thumbnail

Video: FBI cybersecurity chief talks about aftermath of Wikileaks, Snowden, and 2016 election

Tech Republic Security

The FBI has a long legacy of being at the forefront of technology, but managing those systems while keeping up with the latest advances in tech is an unforgiving task.

Video 162
article thumbnail

Take The Wheel: Build Your Cloud Computing Strategic Plan NOW

Forrester IT

Are you excited by all the new innovations coming in the cloud computing market for 2017 ? Our Predictions report neatly summarizes them for you. Now what are you going to do about it? If you're like the majority of infrastructure and operations pros I speak with about cloud, building a strategic plan to get your cloud plans in order is a top priority for 2017. 2017 is the perfect time for I&O pros to take control of their company's cloud computing strategy , because cloud adoption is up, de

Cloud 304
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Best Ways to Get Rid of Unwanted Data

CTOvision

Rick Delgado. Big Data holds a lot of profitable potential for a business. While you’re looking at how much consumer interest can be gleaned from the lakes upon lakes of data, enabling you to better predict their interest and better tailor your services to reach the right audience more effectively – what you’re missing is how much room it takes. Big Data lives up to its name; it’s massive.

Data 251
article thumbnail

GDPR will require 75,000 DPOs worldwide, study shows

Computer Weekly

The General Data Protection Regulation is likely to help boost the data protection profession, with 75,000 data protection officers needed worldwide for organisations to comply with new EU rules

Study 248
article thumbnail

China Adopts Cybersecurity Law Despite Foreign Opposition

Data Center Knowledge

China has green-lit a sweeping and controversial law that may grant Beijing unprecedented access to foreign companies’ technology and hamstring their operations in the world’s second-largest economy. Read More.

Company 214
article thumbnail

5 things you need to know about virtual private networks

Network World

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Worried about Windows 10 snooping? Here's how you can stop it

Tech Republic Security

Attempts to stem the quantity of data that Windows 10 gathers on users continue to this day. Here are the options available if you're uncomfortable with how much data the OS hoovers up.

Windows 154
article thumbnail

China’s Cybersecurity Law Challenges Foreign Companies To Accelerate Their Digital Transformation

Forrester IT

On November 7, China's top legislature adopted a cybersecurity law to safeguard the sovereignty on cyberspace, national security, and the rights of citizens. The law has seven chapters that define specific regulations in various areas, such as network operational security (including key IT infrastructure), network information security, monitoring, alerting, and emergency situation handling as well as related legal responsibilities.

Company 281
article thumbnail

Digital Risk Management Leader RiskIQ Raises New Funding To Expand Platform Ecosystem, Sales and Digital Risk Applications

CTOvision

Bob Gourley. Editor's note: When I read of a great firm like RiskIQ investing to expand their platform I immediately think of the positive impact to current and future customers. But strategically this also means that large teams of investors believe strongly in the powerful capabilities and strong future of this company. With that in mind we share a RiskIQ press release below -bg.

article thumbnail

Russian banks hit by IoT-enabled DDoS attacks

Computer Weekly

DDoS attacks on Russian banks have been linked to IoT botnets, further confirming this worrying trend and highlighting the need for IoT suppliers to improve security capabilties

Banking 244
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Nvidia Has Become the Data Center Accelerator Company

Data Center Knowledge

The company whose biggest investments were once in gaming chips now finds itself the leader of a principal technology for one of the hottest markets in data center computing. Read More.

article thumbnail

There’s a war on for cybersecurity talent

Network World

Filling cybersecurity jobs is getting so hard managers need to think outside the box if they hope to fill critical positions, experts say. That means redefining jobs, training human resources departments to screen resumes differently, seeking latent talent already inside the organization, and hiring bright, motivated people who can grow into critical roles, according to an expert panel speaking at the recent Advanced Cyber Security Center conference in Boston.

article thumbnail

Five password management apps that will work on all your devices

Tech Republic Security

Password security is essential. We have more passwords than ever before and most of us don't take them seriously. You can keep yourself safe with a password manager: Here are five worth checking out.

Security 152
article thumbnail

India Jolts Its Cash Economy

Forrester IT

Prime Minister Modi's announcement of the demonetization of the large denomination bills is a significant initiative. While he indicated terror financing and corruption as the main causes for the initiative, there are many ramifications this move will have on legitimate business activities as well. India is known for its love of cash. Uber is primarily a cashless service elsewhere in the world, but more than 50% of Uber trips in India are paid for in cash.

Banking 272
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.