Sat.Mar 02, 2019 - Fri.Mar 08, 2019

article thumbnail

Tech Titans Google And Microsoft Are Transforming Cybersecurity

Forrester IT

Last April, we outlined how the “Tech Titans” (Amazon, Google, and Microsoft) were poised to change the cybersecurity landscape by introducing a new model for enterprises to consume cyber security solutions. Security has long been delivered as siloed solutions located on-premise. These solutions were hard to buy, hard to use, and existed in siloes. Security […].

Google 382
article thumbnail

Artificial Intelligence Regulation May Be Impossible

CTOvision

Read why Michael Spencer says that artificial intelligence regulation is nearly impossible on Forbes : Artificial intelligence is a tool humanity is wielding with increasing recklessness. We say it’s for our common good with machine learning hype equal to business profits. But what happens when we don’t have the code of ethics, laws, government accountability, corporate transparency […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Active Directory PowerShell Module Configuration Baseline

Mick's IT Blog

With the recent 1809, RSAT is now integrated into Windows, which is a major plus for the admin side. In my environment, I have the active directory PowerShell module enabled on all machines for two reasons. The first is I use it to move the machine in AD during the build process. The second is that I have an SCCM baseline that makes sure the Bitlocker key matches the one stored in AD.

Windows 158
article thumbnail

List of Microsoft 365 Certification Exams and Cost Details

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In this post, you will learn about the Microsoft 365 Certification exam in details. I have created a table to keep track of Microsoft certifications, exams, and training classes. I have a previous post which talks about latest SCCM certification (70-703). Intune device management certification is included in the Microsoft 365 certification path (you can […].

Microsoft 168
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Mobile World Congress Offers Food For Thought

Forrester IT

Food Tech figured prominently on the menu at Mobile World Congress 2019. Mobile operators, network equipment providers, device manufacturers and solution providers address challenges from farm, field, fishery or factory to fork, - and beyond. Venture investment has increased significantly. And, if Mobile World Congress is any indication, companies large and small are eager to get a place at the table.

Mobile 361
article thumbnail

Operationalizing AI

CTOvision

When AI practitioners talk about taking their machine learning models and deploying them into real-world environments, they don’t call it deployment. Instead the term that’s used in the industry is “operationalizing”. This might be confusing for traditional IT operations managers and applications developers. Why don’t we deploy or put into production AI models?

More Trending

article thumbnail

Local Administrator Baseline Compliance

Mick's IT Blog

One of the issues we have had is some users ending up being in the administrators group. There are circumstances to which we have to sometimes put a user in that group to install an application which is both user and computer-based. It can be easy to forget to take the user back out of that group. We don't allow the end users here to have local administrator privileges for security reasons.

Groups 153
article thumbnail

What CIOs Can Learn from Fleetwood Mac about Marketing

Forrester IT

Here at Forrester, we love all things music. Each office floor has a different musical theme and all the rooms are named after popular musicians of the time. It’s not uncommon to have a team meeting in Guns N’ Roses or an afternoon phone call in Jackson Browne. So, it seems natural to think of […].

Meeting 359
article thumbnail

The Value Of Ethics And Trust In Business. With Artificial Intelligence

CTOvision

Read why Stephen Ibaraki says that ethics and trust are very important issues while dealing with artificial intelligence on Forbes : The 128 most ethical companies for 2019 were announced this week from the Ethisphere Institute. The timing is fortuitous with the upcoming AI for Good, which I founded, global artificial intelligence dialogue including accountability, responsibility, […].

article thumbnail

SCCM Community Hub – Scripts Reports and Documentation

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. SCCM community Hub is the central location within your SCCM console where you can share useful SCCM objects with other admins. SCCM community hub is still in preview version. Note – There could be changes in production version of SCCM Community Hub What is SCCM Community Hub The Community Hub is a centralized location for […].

Report 160
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IT Talent Shortages: What Businesses are Doing to Cope

Information Week

For organizations that are having trouble recruiting IT professionals with in-demand skills, some options have become available in the cloud and gig economy.

Cloud 166
article thumbnail

What To Expect At RSA Conference 2019: Cloud As Security Improvement And The Possible End Of The Infosec Gilded Age

Forrester IT

I recently did a webinar with a few of my colleagues from the RSA Conference Advisory Board on precisely this topic, which you can find here. We tried to expose as much as we could of the fantastic variety that you’ll find at RSA Conference 2019. Here’s a further elaboration of one of my favorite […].

article thumbnail

There Are Ways To Improve The Security of Your Artificial Intelligence Solutions

CTOvision

Security of the data and algorithms and results of artificial intelligence takes new methods. At OODAloop.com Matt Devost provides a framework for improving the security and reducing the risk of problems from your AI deployment in a post titled: Securing AI – Four Areas to Focus on Right Now His approach: Build a strategy informed […].

article thumbnail

Bitlocker Active Directory Recovery Password Backup Compliance

Mick's IT Blog

Recently, we had an issue of some machines not backing up the Bitlocker recovery password to active directory, even with the GPO in place. They ended up being offline while the bitlocker process took place. Plus, some of the systems in AD had multiple entries, which can be cumbersome. To mitigate this issue, I have implemented an SCCM Configuration Baseline that makes sure the Bitlocker recovery password is backed up to AD and that it is the only recovery password present.

Backup 142
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

VMware firewall takes aim at defending apps in data center, cloud

Network World

VMware has taken the wraps off a firewall it says protects enterprise applications and data inside data centers or clouds. Unlike perimeter firewalls that filter traffic from an unlimited number of unknown hosts, VMware says its new Service-defined Firewall gains deep visibility into the hosts and services that generate network traffic by tapping into into its NSX network management software, vSphere hypervisors and AppDefense threat-detection system.

Firewall 146
article thumbnail

Think Privacy’s Just A Cost Center? Think Again.

Forrester IT

Over and over, clients tell us they just don’t get enough funding for the kind of privacy programs they want to create. In fact, many privacy budgets shrank in 2019, after firms were forced to spend more than they expected on GDPR compliance in 2018. But what if we told you that customer-centric privacy programs […].

Budget 348
article thumbnail

NSA Makes Reverse Engineering Tool Freely Available

CTOvision

The United States National Security Agency (NSA) this week released its in-house reverse engineering tool Ghidra to the public, for free. Initially announced in January, the release was accompanied by a demonstration of the tool at the RSA Conference 2019, which is taking place this week in San Francisco. Ghidra, the NSA explains, is a software reverse […].

article thumbnail

Incrementally Better

Eric D. Brown

Recently, I spent a week at the Grand Canyon National Park in Arizona. While visiting, I stayed in Tusayan Arizona, just a few miles outside the park’s entrance. When I visit places like this, I don’t have high expectations when it comes to dining. I’m not a food-a-phile (or whatever you call them) but I do like good food and I like to have a selection of choices, especially since I’ve recently been trying to eat cleaner in recent months.

Financial 113
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How blockchain will manage networks

Network World

Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it's centralized. It’s out-of-date, and it needs revamping, researchers say. One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and packet management over to a smart contract, decentralized chain-based system.

Network 145
article thumbnail

We Should Chat About WeChat And Why Facebook Wants In

Forrester IT

For years, I’ve maintained that Mark Zuckerberg, CEO of Facebook Inc., has had his eye on a singular goal: becoming the global version of China’s WeChat. WeChat is China’s most popular messaging app with 1 billion monthly users. China’s population is 1.4 billion people, which means approximately 2 in 3 Chinese are on WeChat. But WeChat […].

article thumbnail

W3C approves WebAuthn as the web standard for password-free logins

CTOvision

The World Wide Web Consortium (W3C) today declared that the Web Authentication API (WebAuthn) is now an official web standard. First announced by the W3C and the FIDO Alliance in February 2016, WebAuthn is now an open standard for password-free logins on the web. It is supported by W3C contributors, including Airbnb, Alibaba, Apple, Google, […].

article thumbnail

How Low-Code and No-Code Fit into a DevOps Strategy

Information Week

There are ways organizations can simplify app creation if they do not have the resources to build them from scratch.

Devops 154
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Cisco uncorks 26 security patches for switches, firewalls

Network World

Cisco has bundled 25 security advisories that describe 26 vulnerabilities in Cisco NX-OS switch and Firepower FXOS firewall software. While the 26 alerts describe vulnerabilities that have a Security Impact Rating of “High,” most –23 – affect Cisco NX-OS software, and the remaining three involve both software packages. [ Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ].

Firewall 126
article thumbnail

Uncovering 2020 Digital Experience Priorities: It’s That (survey) Time of Year!

Forrester IT

This week we launched our annual panel survey on Digital Experience (DX) priorities, challenges and strategies. If you’re a leader, decision-maker, or influencer of your enterprise DX strategy, we’d love to have your input: [link] take the survey?

Survey 340
article thumbnail

Regarding Facebook’s cryptocurrency

CTOvision

If Bloomberg and the New York Times are to be believed, later this year Facebook will introduce a cryptocurrency which will allow WhatsApp users to send money instantly. Yes, that’s right: Facebook. Cryptocurrency. Earthquake! Revolution! The world is tilting on its axis! The end times are cometh! Except – um – what exactly are people going […].

CTO 213
article thumbnail

CIOs Are Racing To Deal With The Next Big Security Threat

The Accidental Successful CIO

Quantum computing may allow unstoppable future attacks on corporate networks Image Credit: Brookhaven National Laboratory. One of the most important jobs that the person with the CIO job has is to keep the company’s networks and data secure because of the importance of information technology. This means that they are responsible for implementing systems and procedures that will keep the bad guys out.

Security 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

10 Steps to Develop Applications with Embedded Analytics

Social, Agile and Transformation

Designing and developing data-driven applications has to go through a modified agile planning, discovery, and user experience design compared to traditional applications. Why? Because the data is an input to the design and development process! In other words, designers of the user experience cannot do their work in a bubble. They have to review the underlying data, work with customers to.

article thumbnail

Data And Analytics Leaders, We Need You!

Forrester IT

How do you create an insights-driven organization? One way is leadership. And we’d like to hear about yours. Today, half of the respondents in Forrester’s Business Technographics® survey data report that their organizations have a chief data officer (CDO). A similar number report having a chief analytics officer (CAO). Many firms without these insights leaders […].

Data 337
article thumbnail

IoT Future-Proofing for the Long Haul

CTOvision

Read Don Dingee’s article about how to future-proof Internet of Things connected devices on Dev Ops : Think about this: The IoT application your DevOps team is developing right now, if successful at scale, will likely be the longest-living application in your shop. It may even outlive the tenure of many of your team members […].

Devops 197
article thumbnail

Automakers Take the Onramp to Machine Learning Strategies

Information Week

Automaker experiments with vehicle tech offer established businesses lessons for managing machine learning and DevOps influences on products and operations.

Devops 122
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.