Sat.Jun 02, 2018 - Fri.Jun 08, 2018

article thumbnail

CIOs as “Chief Investment Officer”: Three Aspects of Clarifying Digital Business Model

Future of CIO

The emerging digital trends bring significant opportunities for organizations to pursuing business growth through methodical examinations of alternative business models. With emerging digital technology trend and abundant information, the new digital business model can be discovered if organizations can ride learning curve and explore the art of possibility.

Trends 40
article thumbnail

12 Warning Signs of Bad Application Architecture

Social, Agile and Transformation

At a #CIOChat this weekend we were asked about warning signs for bad architecture. Here was my quick response capturing just a tweet-sized summary of architecture that "smells bad" - Too slow making biz needs. Too difficult/complex to explain to new technologists. Lack of defined integration process (closed system). Can’t be deployed to the cloud. Performance or stability issues. #.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five Best Practices To Scale Data Science Across The Enterprise

Forrester IT

Nearly all firms want to do more with data science. However, executives and data scientists alike are frustrated by the difficulty of turning new initiatives into business impact at scale. Outside of well-established use cases – such as risk scoring or optimizing search results – data scientists regularly complain that their solutions can take months […].

Data 388
article thumbnail

Not all Machine Learning (ML) Is Artificial Intelligence (AI): Part II

CTOvision

No two companies define Artificial Intelligence (AI) the same way, but they all insist they are doing it. Or at least some version of it. However, if AI is to mean something and be a useful term to help delineate different technologies and approaches from others, then it has to be meaningful. A term that [.].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Setup Co-Management Video Tutorials

Anoop

I have several posts related to co-management scenarios and implementation. In this post, I have collated all Co-Management Video Tutorials in one place for easy access. All these videos are recorded with SCCM CB 1802 production version. I don’t think I would be able to share all the scenarios. Let me know if you want […]. The post How to Setup Co-Management Video Tutorials appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Video 146
article thumbnail

What The World Of High Speed Trading Can Teach CIOs

The Accidental Successful CIO

High speed trading is all about having a very fast IT infrastructure Image Credit: Epic Fireworks. At most firms, the person with the CIO job plays a supporting role to the rest of the company. The company makes its blue widgets and the CIO is responsible for creating and maintaining all of the systems that allow blue widgets to be manufactured and sold.

System 113

More Trending

article thumbnail

Northern Virginia Blockchain Mixer 14 June 2018 in Reston VA

CTOvision

With this post I want to let you know about a small networking event being hosted by Matt Devost and Bob Gourley in Reston VA on 14 June from 530pm till 7:30pm. The purpose of the event is to help enhance the dialog among and between the many local players in the blockchain ecosystem. We [.].

Network 194
article thumbnail

SDNs and NFV are complementary and core components of modernized networks

Network World

The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect. In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn’t have to be the case. Enterprises could maintain their current network architecture and shift to NFV or they could roll out an SDN and never leverage the benefits of NFV, so it’s important to understand what each is and the benefits of both. [ For mo

Network 115
article thumbnail

Azure AD Application proxy Browser Addon “My Apps Secure Sign-in”

Anoop

Azure AD Application Proxy is the recommended solution to access on premise web application from external network (outside corporate). The end user can login to My Apps portal to access all the application assigned to the user. With My Apps Browser addon installed, user can use the same Web URL to access from both internal and […]. The post Azure AD Application proxy Browser Addon “My Apps Secure Sign-in” appeared first on SCCM Intune Real World Enterprise Experience Blog by Vimal Da

article thumbnail

Apple Continues To Empower The Patient To Be An Informed Consumer

Forrester IT

Apple Takes Record Sharing To The Next Level Consumers demand access to their medical information, and Apple has answered the call. In January, Apple released an update to the Health app, enabling customers of 12 hospitals and clinics to see their medical records right on their iPhone. Months late, Apple now allows patients from over […].

Apple 243
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

Blockchain Templates: Amazon Making Technology Mainstream

CTOvision

It might just be me, but the news of Amazon’s blockchain templates has got me very excited. I can assure you that it’s not the thought of a blockchain template though that is the exciting bit. What has got me jumping for joy and so should the rest of the blockchain world, is that one of the [.].

CTO 172
article thumbnail

What happens if IoT security doesn’t get solved?

Network World

Sometimes, confirmation of the obvious can be really important. At least, that’s how I felt when I saw a new Bain & Company report, Cybersecurity Is the Key to Unlocking Demand in IoT. According to the consulting firm’s survey , 45 percent of Internet of Things (IoT) buyers say “ concerns about security remain a significant barrier and are hindering the adoption of IoT devices.

Security 112
article thumbnail

Learn about Journey to Cloud Micro Services

Anoop

The journey to cloud is not a straightforward path for most of the organizations. It involves a different mix of computing styles depending on the requirements. The cloud journey for an organization which has loads of complex infrastructure is entirely different from startup organization. Best Start Private or Public or Hybrid Cloud? I think the […].

Cloud 92
article thumbnail

Cyber Conferences, It Shouldn’t Be This Way.

Forrester IT

I recently saw another posting/photo from a friend in the industry that showed what amounts to “booth babes” at yet another conference, this time it wasn’t in Vegas, it was in Europe. This issue is one of importance in an industry rife with failure on lots of levels, a lack of available talent, and that […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Some of the biggest compromises of your information are by design, you just don’t know it

CTOvision

The following are some of the key cybersecurity and cyberwar topics we are following: Facebook Gave Data Access to Chinese Firm Flagged by U.S. Intelligence The social media giant is in trouble again for sharing sensitive user data with Chinese smartphone makers. The US authorities have found that Facebook has had data-sharing partnerships with Huawei, [.].

Media 171
article thumbnail

Cato Networks adds threat hunting to its Network as a Service

Network World

Enterprises that have grown comfortable with Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (IaaS) are increasingly accepting of Network as a Service (NaaS). NaaS is a rapidly growing market. According to Market Research Future , NaaS is expected to become a US $126 billion market by 2022, sustaining an annual growth rate of 28.4 percent.

Network 62
article thumbnail

Technology Short Take 101

Scott Lowe

Welcome to Technology Short Take #101! I have (hopefully) crafted an interesting and varied collection of links for you today, spanning all the major areas of modern data center technology. Now you have some reading material for this weekend! Networking. Kirk Byers discusses the direct TextFSM integration he added to the 2.0 release of Netmiko. David Gee provides a walkthrough on creating a self-signed root certificate for use with mutual SSL for gRPC on JunOS.

article thumbnail

The Five Use Cases For AI In The Contact Center

Forrester IT

Increasing channel diversity and automation will make interactions more complex, requiring highly-skilled agents and intelligent processes to assist them. Here’s my take on five valuable use cases for AI in the contact center.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Scary Words For Anyone: Microsoft and Amazon Are Entering Your Market

CTOvision

These are some of the enterprise IT stories we are following: Microsoft’s GitHub takeover sends shockwaves through the open-source developer ecosystem The worlds largest git repository is getting a second lease of life. GitHub has been struggling with revenues even as it is facing new rivals. The knight in shining armor for GitHub is none [.].

article thumbnail

Learn what the 'zero trust' security model really means | Salted Hash Ep 29

Network World

Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.

article thumbnail

Exploring Kubernetes with Kubeadm, Part 1: Introduction

Scott Lowe

I recently started using kubeadm more extensively than I had in the past to serve as the primary tool by which I stand up Kubernetes clusters. As part of this process, I also discovered the kubeadm alpha phase subcommand, which exposes different sections (phases) of the process that kubeadm init follows when bootstrapping a cluster. In this blog post, I’d like to kick off a series of posts that explore how one could use the kubeadm alpha phase command to better understand the different com

Linux 60
article thumbnail

Telecom Operators Deliver Insights Services — With Network And Subscriber Data

Forrester IT

A few years ago, I met with an incumbent telecom provider in Europe, and they came across as being from “the old country.” I asked about their data strategy, and they were horrified at the thought of doing anything other than securing and protecting their data assets. Even just one year ago at Mobile World […].

Data 255
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

INFOGRAPHIC: Data Scientist vs. Data Engineer by Cognilytica

CTOvision

As AI increasingly gains popularity among enterprises, companies are actively seeking data scientists who possess data science skills. Many enterprises confuse the roles of data scientists and data engineers. Even though some traits, skills, programming languages and tools are shared by both roles, the overall roles and core skill sets are different and are not [.].

article thumbnail

The Weekly Insight of the “Future of CIO” 6/8/2018

Future of CIO

Blogging is not about writing, but about thinking, brainstorming, innovating and sharing. The “Future of CIO” Blog has reached 2.5 million page views with 4600+ blog posting in 59+ different categories of leadership, management, strategy, digitalization, change/talent, etc. The content richness is not for its own sake, but to convey the vision and share the wisdom.

article thumbnail

CIO Leadership Live with James Rinaldi, CIO, Director for Information Technology, NASA’s Jet Propulsion Laboratory | Ep 11

ComputerWorld IT Management

In this episode, host Maryfran Johnson talks with James Rinaldi, CIO at NASA's Jet Propulsion Lab, about opening up data silos and driving data transformation; having a seat at the table to lead change; and using technology to explore the universe.

Data 45
article thumbnail

Risk Tech, Reg Tech — All The 2018 Tech

Forrester IT

The Forrester Tech Tide™: Risk And Compliance Management, Q2 2018 We recently published our Tech Tide™ report outlining 14 key risk and compliance technologies to track in 2018. One of the challenging parts of this research is setting the right scope. We found risk and compliance technology everywhere, covering every industry, region, and niche use case. […].

Research 253
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Apple’s new Core ML 2 Framework promises faster and smaller AI, Google opts out of Project Maven, Nvidia launches two AI Platforms

CTOvision

The following are some of the Artificial Intelligence topics we are following: Apple’s Core ML 2 is 30% faster, cuts AI model sizes by up to 75% The iPhone maker is training its guns on artificial intelligence with its new Core ML 2 Framework which promises to help devs cut AI model sizes by 75 [.].

article thumbnail

Digital Fusion: How to Unleash the Full Business Potential

Future of CIO

Uncertainty, ambiguity, unpredictability, velocity etc., are the digital new normal. With increasing pace of changes, the emergence of potential opportunities for exploiting digitization is likely to follow a nonlinear pattern as the pervasiveness of an organization's digitization journey increases. Business leaders need to be both bold and cautious, take multifaceted management disciplines to drilling down the critical success factors that underpin each of the higher level performance dimension

How To 51
article thumbnail

Trying out Gutenberg (from mobile)

I'm not lost, I'm wondering

Sitting here at the WordPress West meetup celebrating the 15th anniversary of WordPress, the conversation inevitably came around to Gutenberg. So of course I installed it so I can try it out, give it a spin. . Celebrating 15 years of WordPress. Working off my iPhone SE, it was easy enough to install and activate the plugin for use on this site. Very quick install, editor immediately available. .

Mobile 45
article thumbnail

C/4HANA: SAP’s Industrialization Of Customer Engagement

Forrester IT

SAP announced a new name, market position, and strategy for its customer engagement portfolio. Instead of a potpourri of products, SAP will now offer the quirkily named C/4HANA, which is comprised of SAP Marketing Cloud, SAP Commerce Cloud, SAP Service Cloud, SAP Sales Cloud (including CallidusCloud), and SAP Customer Data Cloud (Gigya). C/4HANA attempts to remind […].

SAP 207
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.