Sat.May 07, 2016 - Fri.May 13, 2016

article thumbnail

Digital Transformation 2016 Infographic

Forrester IT

They say a picture is worth a 1000 words. so our graphics designers and my wonderful research associate, Rachael Klehm, created this infographic to highlight a few of the data points from the Digital Transformation Playbook and the Forrester / Odgers Berndtson Digital Business research study. Previous post: Digital's golden rule; always save your customer's time.

Study 281
article thumbnail

Cognitio’s Bob Flores and Roger Hockenberry On Cyber Risk

CTOvision

Bob Gourley. Cognitio's Bob Flores and Roger Hockenberry are widely known for their ability to articulate what is important about the cyber threat and the digital risks to the modern organization. The clip below shows both Bob and Roger in action, succinctly articulating what business leaders need to know about the nature of digital risk in the modern age.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Reuse Waste Heat from Data Centers Intelligently

Data Center Knowledge

There are two big problems with reusing server exhaust heat, but there are also good solutions to both of them Read More.

article thumbnail

How Can CIOs Pick Tomorrow’s Stars?

The Accidental Successful CIO

CIOs want to know how to correctly identify their star performers Image Credit: Susanne Nilsson. On top of all of the jobs that the person with the CIO job has to do, one of the most important is identifying the leaders of tomorrow. What this means is that from all of the employees that the firm has, some of them are better than others. What a CIO needs to be able to do is to figure out who the company should make the investment in and who they should pass over.

Airlines 122
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Velocity Mandates DevOps And Continuous Deployment

Forrester IT

Today's customers, products, business operations, and competitors are fundamentally digital. Succeeding in this new era mandates everyone constantly reinvent their businesses as fundamentally digital. You have two choices, · become a digital predator; or. · become digital prey. To compete in this new digital market norm, software applications and products must contain new sources of customer value while at the same time adopting new operational agility.

Devops 270
article thumbnail

Moving Toward a Framework for Resilient Cybersecurity: Designing for Security and Flexibility

CTOvision

Dan Cybulski. This post was written by Cognitio and sponsored by Verisign. So far in our quest to establish a framework for resilient cybersecurity we have talked about the importance of understanding and evaluating the threat landscape. Specifically, we highlighted the advantage of context focused threat intelligence and the value it can add to quickly and proactively detect and respond to threats.

Security 153

More Trending

article thumbnail

Getting the C-Suite on Board with Agile Transformation

Social, Agile and Transformation

HBR is proving they understand Digital Innovation with two recent posts, one on Embracing Agile co-written by Jeff Sutherland one of the Agile Manifesto's signers and the other, You Don't Have to Be a Software Company to Think Like One. Anyone who has led an agile transformation in their organization knows that getting people, teams, departments, and organizations on board takes time and.

Agile 109
article thumbnail

Don't Wait; Rethink Your ITIL Journey Now!

Forrester IT

Over the past 25 years, many organizations have modelled their support - and in some cases their delivery organization - after the ITIL frameworks and processes. For many, ITIL has been helpful in establishing the rigor and governance that they needed to bring their infrastructure under control in an era where quality and consistency of service was critical and technology was sometimes fragile.

Devops 268
article thumbnail

Institute of World Politics Holds Unique Cyber Intelligence Initiative Event 24 May 2016

CTOvision

Bob Gourley. The Institute of World Politics is an independent graduate school formed to fill a major national security need: the need for greater professional education in statecraft, national security and international affairs. They do so by use of highly qualified, motivated, experienced practitioners from the community and world class best academics.

article thumbnail

Amazon’s Cloud Arm Makes Its First Big Submarine Cable Investment

Data Center Knowledge

Transpacific Hawaiki cable expected to improve AWS latency for users in Australia and New Zealand Read More.

Cloud 158
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Game of Clouds 2016

Cloud Musings

In the mythical, medieval land of AWS, a civil war brews between the several noble Cloud Services over rulership. Meanwhile, across the sea, the former controlling dynasty, Traditional IT, attempts to make its way back home and reclaim the throne with the help of the " Do It Yourself " old guard. While the conflict of political power ensues in the civilized world, an ancient, forgotten army of an undead race located far north of any inhabited territory begin traveling south for a chilling invasi

Cloud 99
article thumbnail

Enrich Customer Insights With Unstructured Data

Forrester IT

Over the past several years, Forrester's research has written extensively about the age of the customer. Forrester believes that only the enterprises that are obsessed with winning, serving, and retaining customers will thrive in this highly competitive, customer-centric economy. But in order to get a full view of customer behavior, sentiment, emotion, and intentions, Information Management professionals must help enterprises leverage all the data at their disposal, not just structured, but

Data 264
article thumbnail

Tech News Roundup May 13

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Round-the-world Solar Impulse plane dodges bad weather and lands in Oklahoma. Revealed: The winners of the 2016 GeekWire Awards. Second bank hit by 'sophisticated' malware attack, says Swift - The Guardian. Federal Microbiome Project Aims to Solve Tiny Riddles of Science - New York Times.

article thumbnail

Data Center Transformation Will Unfold in Four Steps

Data Center Knowledge

Brocade’s Tom Nadeau, who literally wrote the book on SDN, says data centers are transforming, and OpenStack is just the first step Read More.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

5 questions to ask when choosing a CRM for your small business

Tech Republic Cloud

Often times, a small business will have similar challenges as a large enterprise in terms of finding the right tools. Here are a few things to consider as you vet a CRM for your small business.

article thumbnail

Could Your Next Security Analyst Be A Computer?

Forrester IT

Cybersecurity requires a specialized skillset and a lot of manual work. We depend on the knowledge of our security analysts to recognize and stop threats. To do their work, they need information. Some of that information can be found internally in device logs, network metadata or scan results. Analysts may also look outside the organization at threat intelligence feeds, security blogs, social media sites, threat reports and other resources for information.

Security 262
article thumbnail

Swords Still Crossed Over Privacy Shield

CTOvision

Toby Duthie. In October last year, the Court of Justice of the European Union (CJEU) invalidated the EU-US Safe Harbor agreement. Concern had been mounting for some time that the agreement failed to provide adequate protections for EU citizens’ private data located in, or transferred to, the United States. The decision means that the most commonly used data transferring method between the EU and the US – allowing for over 4000 companies to store and process data in the US – is no longer an optio

Data 150
article thumbnail

Google Declares War on Boring Data Center Walls

Data Center Knowledge

Partners with artists in US and Europe to paint murals on the walls of its server farms Read More.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Serverless Reference Architecture with AWS Lambda

All Things Distributed

Building your applications with only managed components has become very popular, and AWS Lambda plays a crucial role in that. I see a tremendous interest in examples how to build such applications, and articles such as " The Serverless Start-Up - Down With Servers! " about teletext.io are read eagerly around the globe. If you are looking for more examples there are the Lambda Serverless Reference Architectures that can serve as the blueprint for building your own serverless applications.

article thumbnail

Navigating The New Insights Service Provider Landscape

Forrester IT

"We are in the business of building [FILL IN THE BLANK], why would we build an insights platform out ourselves.". That sentiment will drive more and more companies to explore the insights services option. Many already feel like they are chasing a moving target. Data and analytics practices are evolving quickly with new tools and techniques moving the bar higher and higher.

Big Data 258
article thumbnail

Tech News Roundup May 11

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Facebook Rebuts Criticisms About a Bias Against Conservatives - Wall Street Journal. Institute of World Politics Holds Unique Cyber Intelligence Initiative Event 24 May 2016. Staples and Office Depot are calling off their merger - The Verge.

Journal 150
article thumbnail

CyrusOne Plans Huge Expansion at CME Data Center Campus in Chicago

Data Center Knowledge

Plans call for 500,000-square foot data center in response to influx of inquiries from financial services firms Read More.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Businesses beware: the 'industrial internet of things' is a prime target for cyberattacks

Tech Republic Security

Think your Amazon Echo or Samsung Smart TV are IoT security threats? Businesses using the 'industrial internet of things' are even bigger targets for cyberattacks.

Internet 104
article thumbnail

The 2016 Guide To Digital Predators, Transformers, and Dinosaurs

Forrester IT

By 2020, every company that exists today will have become a digital predator or digital prey. This isn't news to you if you follow my research or blog posts. In fact I've been saying that since 2014. But why is it that some companies seem to understand digital business more than others? Is their a difference in the leadership in digital predators compared to digital dinosaurs?

Survey 244
article thumbnail

Tech News Roundup May 9

CTOvision

Katie Kennedy. The following are some of the hot topics we are tracking in the technology ecosystem: Technology Ticker. Agricultural innovation committee recommends government upgrades rural telecommunications infrastructure - ZDNet. Yelp, Google Hold Pointers to Fix Governments - Wall Street Journal. Automatic Assignment of Future Inventions: A Serious Error of Federal Law that Requires Supreme Court Review - Patently-O.

Journal 150
article thumbnail

How to Create a Reliable DR Strategy: Best Practices

Data Center Knowledge

Your data center just went down. Your manager is on the phone. Do you know exactly what to do? Read More.

Strategy 138
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Essential Online Tools for Work from Home Employee

Galido

The ability to work-at-home is fantastic, but before you start there are a few essential tools that must be at your disposal to make your job easier. Without these tools you will face more time looking for solutions than working, and chances are this isn’t going to make the job very fun. There are a number of online tools available and you should have many of them to make your job easier.

Tools 99
article thumbnail

Viv.ai and Developers

Forrester IT

At the TechCrunch Disrupt event in NY today, Dag Kittlaus delivered the first public demonstration of Viv , his team's follow-up to the popular Siri service. There's been a lot of press in advance of the demo and frequent chatter around eBusiness and bots and what Viv means to them. My focus is on Application Development and Delivery (AD&D) professionals, so I thought I'd update you on what all of this means to them.

article thumbnail

TabCloud makes saving and restoring Chrome sessions simple

Tech Republic Cloud

TabCloud is one of those Chrome extensions you'll find yourself unable to work without. Jack Wallen shows you to install and use this amazingly handy Chrome tab tool.

Tools 101
article thumbnail

Configurable, Extensible Universe of IoT Expands

Data Center Knowledge

Microsoft said it would help you brew up Big Data along with your latté, while Amazon and HPE had some IoT news of their own Read More.

Big Data 123
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.