November, 2017

article thumbnail

How Artificial Intelligence is Making Big Data Better Than Ever

CTOvision

The concept of Big Data is a relatively new one. It denotes the availability of vast volumes and sources of data, which were not available before. By itself, Big Data is powerful, and when combined with Artificial Intelligence and machine learning, the opportunities presented by this combination are just endless. As big data moves to the […].

article thumbnail

The impacts on storage and compliance from Blockchain, robots and IoT

Computer Weekly

Vigitrust's Mathieu Gorge reports from Web Summit 2017 on the impact on storage and compliance of biometric security, Blockchain, and robots in internet of things deployments

Storage 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

8 Ways to Build a Better Business Bot

IT Toolbox

The increasing demand for these technological solutions is not a result of blind consumerism, nor is it a case of mindless obsession with AI.

226
226
article thumbnail

Deep learning – when should it be used?

Eric D. Brown

“When should I use deep learning?” I get asked that question constantly. The answer to this question is both complicated and simplistic at the same time. The answer I usually give us something along the lines of ‘if you a lot of data and an interesting / challenging problem, then you should try out deep learning’ How a much is ‘a lot of data’?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Three Factors to Better Understand Digital Transformation

Social, Agile and Transformation

Digital transformation is not just about applying cloud, mobile, and social technologies or experimenting with emerging technologies like AI, blockchain, or IoT. In my book, Driving Digital: The Leader's Guide to Business Transformation Through Technology I begin the discussion on digital transformation by sharing expert opinions on what is digital business.

article thumbnail

CM Update Reset Tool Fixes SCCM CB Update Download Issue

Anoop

Have you faced SCCM CB update getting stuck in the “Downloading” state? I have seen SCCM CB updates are getting stuck in downloading stage. But, in most of the scenarios, a service restart resolves this issue. In this post, we will see “CM Update Reset Tool Fixes SCCM CB Update Download Issue.” Video Tutorial to […]. The post CM Update Reset Tool Fixes SCCM CB Update Download Issue appeared first on Anoops.

Tools 163

More Trending

article thumbnail

GDPR could ramp up cyber extortion demands, warns researcher

Computer Weekly

The ransom demanded for stolen or encrypted data is likely to rise after the General Data Protection Regulation compliance deadline in May 2018, according to a cyber security researcher

Research 259
article thumbnail

5 Ways VoIP Can Increase Productivity

IT Toolbox

Businesses of all sizes and types are consistently striving to increase profits. Companies can reach this goal in a variety of ways—reduce overhead spending and waste, increase workforce efficiency—but one reliable way is to increase productivity in the workplace. One often-overlooked way to increase productivity is to use the benefits of voice over IP (VoIP) telephony.

VOIP 183
article thumbnail

When it comes to big data, think these three words: analyze; contextualize; internalize

Eric D. Brown

If you don’t know, I’m a bit of a data nerd. I’ve been writing about big data, data science, machine learning and other ‘new’ stuff for years. I believe in data science and I believe in big data. I’m a fan of machine learning (but think you probably don’t need it ) for the majority of problems that the majority of organizations run across.

Big Data 147
article thumbnail

Forrester predicts what’s next for IoT

Network World

What’s in store for the Internet of Things (IoT) in 2018? That’s the question on many people’s minds in the fast-growing IoT industry. One set of answers can be found in a new report from Forrester, called Predictions 2018: IoT Moves From Experimentation To Business Scale. According to Forrester and published reports last week, that journey means many things, but apart from the usual superheated speculation about IoT’s incredible growth and increasing impact, here’s what I think is most intere

Internet 148
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Intune Android Work SCEP Certificate Deployment Issue

Anoop

SCEP certificate deployment for Intune managed Android for Work devices is a bit tricky. This process is similar to that of iOS. But, because of “Android for Work” containerisation, it’s bit a tricky to confirm whether the SCEP certificate is successfully delivered to the device or not. In this post, we will see more details […].

158
158
article thumbnail

Microsoft Ignite Guide for First Time Attendees

Mick's IT Blog

I have been coming to the Microsoft Ignite convention since it's inception in 2015. The first conference held in Chicago had a lot of fallacies. It was the first time Microsoft had combined the conferences into one. Since then, Microsoft has steadily improved. Atlanta was significantly better and this year's conference in Orlando was awesome! I am sharing my experiences on the conference and what I suggest might be good for first-timers.

Microsoft 107
article thumbnail

Use GDPR to future-proof business models

Computer Weekly

Businesses should look beyond compliance with new data regulations to ensure that their business processes and models are in line with future requirements, advises a privacy innovation expert

Data 229
article thumbnail

Truth or Hype? Is Blockchain Really the End of ERP as We Know It?

IT Toolbox

While enterprise resources planning (ERP) software isn't dead, there may be a revolution underway. With excitement about the potential of blockchain technology growing, there's hope that we'll soon be looking at a new era of ERP, one possibly known as Ecosystem Resources Planning, or EcoRP.

Resources 168
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management. This episode of the “The Endpoint Imperative” podcast series from Intel, Kevin L. Jackson and Intel’s Yasser Rasheed explore the new normal for security, with a focus on the end users.

article thumbnail

Docs should help design medical IoT

Network World

Doctors — particularly the ones that work in emergency rooms — need to have strong stomachs and level heads, since they see illness and injury at their most serious. Violence, accidents and serious diseases are all a matter of routine in the ER. Dr. Christian Dameff is a faculty member at UC San Diego’s medical school, has seen all of that and more, since he’s also a white-hat hacker and expert in medical IoT security.

article thumbnail

Video Tutorial How to Setup SCCM Azure AD User Discovery

Anoop

SCCM 1706 and later versions allowed us to discover Azure Active Directory users. Azure AD user discovery helps to deploy applications to Azure AD users. Azure AD user discovery helps to deploy apps to AAD users in a co-management scenario. Azure AD User Discovery can be configured from Administration workspace – Cloud Management. In this post, […].

Video 143
article thumbnail

5 big challenges facing CIOs and IT leaders in 2018

mrc's Cup of Joe Blog

Summary: As business technology goes through a fundamental shift, the role of the CIO is changing. In the coming years, CIOs will face new challenges and take on new roles. The most successful CIOs are those that recognize and adapt to these changes. In this article, we explore 5 such challenges that CIOs must face in the near future. photo credit: OpenClipartVectors via pixabay cc Driven largely by digitization, new technologies, and rapidly increasing data volumes, modern CIOs face a growing s

Agile 97
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

IR35 reforms: Consultation on private sector roll-out confirmed in Autumn Budget 2017

Computer Weekly

The government has confirmed it is preparing to consult on whether or not to roll out the controversial IR35 tax avoidance reforms to the private sector

Budget 246
article thumbnail

4 Common ERP User Complaints and How to Remedy Them

IT Toolbox

Enterprise resource planning (ERP) systems are used by thousands of companies all over the world. They aid companies in various business process, helping them improve productivity, efficiency, and profits. No matter how good an ERP system is, though, or how flawless the implementation seems, nothing is perfect. There will be complaints, especially from those who spend the most time using the software.

How To 164
article thumbnail

Understanding the value of your customer: CLV 101

Dataconomy

At some point, almost every company faces questions like How good are the customers that we acquire? How do they differ from each other? How much can we spend to encourage their first or next transaction? As a measure that determines the amount of profit a customer brings over the. The post Understanding the value of your customer: CLV 101 appeared first on Dataconomy.

Company 78
article thumbnail

What to consider when deploying a next-generation firewall

Network World

Firewalls have become ubiquitous across enterprises over the past decade, but the combination of new and varied access methods combined with increasingly sophisticated attacks has forced network operators and security professionals to constantly evaluate their defenses. Typically, firewalls are on a five-year refresh cycle, according to Gartner researcher Adam Hils, and that gives organizations the opportunity to evaluate fairly regularly what type of firewall and what features best suit their

Firewall 119
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Overview Windows 10 Co-Management with Intune and SCCM

Anoop

Co-Management is another buzz word in device management world. What is this co-management? Windows 10 co-management is a dual management capability available with Windows 10 1709 version (Fall Creators Update) and later. Co-management is the bridge between traditional management and modern management. In this post, we will see more details “Overview Windows 10 Co-Management with […].

Windows 135
article thumbnail

CIOs as “Chief Improvement Officer”: How to Apply Maslow’s Hierarchy to IT management

Future of CIO

Abraham Harold Maslow was an American psychologist, who stated that people are motivated to achieve certain needs and that some needs take precedence over others. Maslow’s hierarchy of needs is a motivational theory in psychology comprising different tier of human needs, at the bottom is the basic surviving needs to the middle tier for belonging to the top tier of self-actualization.

How To 67
article thumbnail

MPs press Theresa May to explain why alleged hacker Lauri Love is being extradited to US

Computer Weekly

MPs question the attorney general and prime minister about why alleged hacker Lauri Love is to be extradited to the US, when at least 13 other hackers have been tried for US hacking offences in the UK

227
227
article thumbnail

5 VoIP Trends That Are Pushing Enterprises to Evolve

IT Toolbox

These days, an increasing number of enterprises are choosing Voice over Internet Protocol technology because of the value it adds to their organizations. But this solution-based software isn't new. In fact, although it has been in the telecommunications field for two decades, it is only now starting to get the recognition and growth it truly deserves as key decision-makers realize its potential.

VOIP 162
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Why Smart Contracts Will Bring Blockchain to the Masses

Dataconomy

Blockchain technology has rapidly asserted itself as one of the most potentially disruptive technological forces of the 21st century. Just like the internet has had far-reaching implications and touched upon nearly every aspect of modern life, blockchain architecture can create a wave of radical changes similar to those brought on by. The post Why Smart Contracts Will Bring Blockchain to the Masses appeared first on Dataconomy.

article thumbnail

IDG Contributor Network: The case for securing the SD-WAN

Network World

With everything from massive data breaches at global organizations to explosive ransomware attacks that infect hundreds of thousands of users within days, it’s well established that enterprises these days are dealing with more threats than ever before – all of which are increasing in abundance, frequency and complexity. Among other things, this rapidly evolving threat environment can be attributed to new and expanding threat vectors that have opened the door for external threats to reach critica

WAN 91
article thumbnail

ConfigMgr SCCM Troubleshooting Newbies Guide with SuperFlow

Anoop

I have a post which talks about troubleshooting steps for newbies with flowcharts. SCCM flowcharts are the best place to understand the workflow/dataflow/process of each SCCM components. More details in the following post SCCM ConfigMgr Troubleshooting Steps for Newbies with Flowcharts. In this post, we will see “ConfigMgr SCCM Troubleshooting Newbies Guide with SuperFlow.” Video […].

Video 113
article thumbnail

5 Business Intelligence Trends to Watch in 2018

mrc's Cup of Joe Blog

Summary: Driven by new technologies and data growth, the BI landscape is shifting dramatically from traditional BI solutions of the past. These changes create amazing opportunities for those who jump on board. In this article, you’ll learn more about why BI is changing and where it’s heading. photo credit: Negativespace via pixabay cc By now, you’ve heard all of the research surrounding the rapid growth of data.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.