Sat.May 12, 2018 - Fri.May 18, 2018

article thumbnail

When Comparing Blockchains, Decentralization Comes in Degrees

Dataconomy

Word clouds are an easy way to see which topics within any subject are most prominent. Generate a word cloud from the Reddit cryptocurrency forum or an array of blockchain whitepapers, and one will quickly see that a single term – “decentralized” – is the biggest and boldest. It’s no. The post When Comparing Blockchains, Decentralization Comes in Degrees appeared first on Dataconomy.

Cloud 63
article thumbnail

5 Recommendations on Implementing DevOps CI/CD Pipelines

Social, Agile and Transformation

CI/CD is one of the key devops practices because it enables teams to align on development practices and ensure there is a consistent, reliable, and automated way to deliver applications to multiple compute environment. If you're new to CI/CD, consider reading my InfoWorld posts on What is CI/CD and on getting started with CI/CD. What you'll see is that there are many steps to mature this.

Devops 156
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Welcome the New Project Manager!

Cloud Musings

According to CIO.com , the six traits of highly effective project managers are: Be a strategic business partner who can offer higher-level strategic leadership skills, not just technical management skills, provide significant advantages for organizations of all sizes. Encourage and recognize valuable contributions because a project leader’s effectiveness is strongly impacted by the contributions of others on his or her team.

article thumbnail

Not all Machine Learning is Artificial Intelligence

CTOvision

One of the downsides to the recent revival of popularity of Artificial Intelligence (AI) is that we see a lot of vendors, professional services firms, and end users jumping on the AI bandwagon labeling their technologies, products, service offerings, and projects as AI projects without necessarily that being the case. On the other hand, there […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Back2Basics: Why B2B Marketers Should Differentiate On Customer Experience

Forrester IT

“To survive in a world of ‘killer competition,’ you can either distinguish yourself from your competitors or offer the lowest price.” That’s the opinion of Jack Trout, co-author of Positioning, late president of Trout & Partners, father of the positioning concept In this month’s conversation with Johannesburg-based author Mark Eardley, we discuss why differentiation seriously […].

B2B 339
article thumbnail

What is the cost of bad data?

Eric D. Brown

How much is bad data costing you? It could be very little – or it could be a great deal. In this article I give an example of what the cost of bad data really is. A few days ago, I received a nice, well designed sales/marketing piece in the mail yesterday. In it, a local window company warned me of the dangers of old windows and the costs associated with them (higher energy costs, etc etc).

Data 170

More Trending

article thumbnail

Chinese Intelligence Operations In America

CTOvision

In part 2 of our Cyberwar series we’ll take a look at how the Chinese government utilizes the US’s open business environment to stage intelligence operations on American soil. Reconnaissance: While there has been a lot of recent press on Cambridge Analytica, the reality is there’s a giant industry that sells information on individuals who play […].

article thumbnail

The Data-Driven Marketing Revolution Will Be Televised

Forrester IT

I recently heard L.L. Bean’s chief sales and brand officer walk through the company’s brand refresh and corresponding marketing campaign. He showed some TV spots (most of which elicited laughs, like this winner), and I was reminded of the company’s expanded TV spend. Is TV dead? Hardly. But it is about to change more radically […].

Data 300
article thumbnail

CIOs Struggle To Keep Their Airlines In The Air

The Accidental Successful CIO

Airlines run on their IT systems and CIOs have to keep these running. Image Credit: Job Garcia. When we think about the person who has the CIO job, we think of someone who spends their time thinking about the importance of information technology including such things as cloud computing, building new data centers, and the arrival of the internet of things.

Airlines 138
article thumbnail

Cisco CEO trumpets Catalyst 9K advances, software business success

Network World

Industry bellwether Cisco revealed some important financial numbers this week – its revenues were $12.5 billion, up 4 percent for the third quarter year-over-year, with product revenue up 5 percent. But one of the of the more interesting tidbits is that the company said it was selling some 40 Catalyst 9000 systems a day in and has installed 2,700 of the big boxes this quarter bring the total to 5,800 since its introduction in 2017.

Software 125
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Iran’s Hacker Hierarchy Exposed: The Islamic Republic of Iran Makes Maximum Use of Contractors and Universities to Conduct Cyber Operations

CTOvision

On 9 May Levi Gundert, Sanil Chohan, and Greg Lesnewich of Recorded Future provided a detailed assessment on the nature of the cyber threat from Iran titled: Iran’s Hacker Hierarchy Exposed. This report was widely cited in the press and immediately raised the bar for quality in strategic cyber threat intelligence (I saw several other […].

Report 183
article thumbnail

ServiceNow Offers A Refreshing Take On Customer-Centricity With Their Customer Service Application

Forrester IT

I attended ServiceNow’s Knowledge18 conference, held in Las Vegas on May 7-10. It’s a well attended conference by 18,000 people who use one or more of their cloud service management, HR, security and customer service products which are all built on an enterprise-grade platform. At the conference, there was a lot of emotion spent talking […].

article thumbnail

WSUS Offline Tool Keep Windows Machines Updated

Anoop

WSUS Offline tool allows you to update lab machines running Windows 10, Server 2016 or Office 2016. You have to download Microsoft update only once from the internet and then use WSUS Offline Tool to install it on all the lab machines. Without it needing to have an internet connection. As I mentioned below, I […]. The post WSUS Offline Tool Keep Windows Machines Updated appeared first on SCCM Intune Real World Enterprise Experience Blog by Anoop C Nair.

Windows 109
article thumbnail

The Enterprise of Thing's troubling lack of security

Network World

When it comes to security and manageability, Enterprise of Things (EoT) devices must have far more stringent requirements than consumer IoT devices, which often have virtually no built-in security. Indeed, enterprise use of consumer-grade IoT is highly risky. Making the matter even more urgent is the growing number of deployed EoT devices, which is expected to increase significantly over the next two to three years.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Don’t Get Distracted: The Equifax Breach Might Not The Big Issue Here

CTOvision

I am not happy about the massive Sep 2017 Equifax breach (or any other breach). All of us have a right to be angry with this leadership failure. But I worry, emotions like anger at this breach might be distracting us from bigger issues. Like do we want companies that aggregate data on U.S. citizens […].

Data 171
article thumbnail

All Brands Need A Full-Fledged Digital Commerce Strategy

Forrester IT

The internet has enabled brands to sell more of their products to an ever-expanding universe of shoppers, but digital distribution has also added complexity to the relationship between brands and retailers and other channel partners. All brands need to set parameters around the digital sales of their goods, regardless of the type of brand or […].

Strategy 282
article thumbnail

Setup Co-Management Cloud DP Azure Blob Storage

Anoop

A Cloud-based Distribution Point (CDP) is an SCCM DP that is hosted in Microsoft Azure. The application packages will be stored in Azure Blob storage. And it is a PaaS (Platform As A Service) solution from Microsoft SCCM. Security Patching of Azure PaaS solution servers is Microsoft’s responsibility. In this post, we will see how to […].

Storage 96
article thumbnail

Building A Collaborative Team

Cloud Musings

Recently, Harvard Business Review cited some insightful research into team behavior at 15 multinational companies. It found that although these teams tended to be large, virtual, diverse, and composed of highly educated specialists, those same four characteristics made it hard for teams to accomplish their goals. It also showed that complex team members were less likely—absent other influences—to share knowledge freely, learn from one another, shift workloads to break up bottlenecks, or help one

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Facebook gives sensitive user information to advertisers, White House emails not protected, Discounted cyber insurance, Intel’s unethical conduct

CTOvision

These are some of the cybersecurity stories CTOvision is tracking. For others see our portal into all things cybersecurity and cyberwar. Facebook lets advertisers target users based on sensitive interests CTOvision has been tracking the Facebook data issues for quite a while and will continued to keep you in the loop (see The Ethics Of […].

article thumbnail

Who Should Care About Quantum Computing?

Forrester IT

The media has been all over quantum computing for a few years now, creating muddy waters for our clients as they try to understand this conceptually difficult emerging technology. I’ve been tracking quantum computers for about five years, but I’ve kept it off the research radar because I thought it was outside the “Should clients care?

Media 218
article thumbnail

VC Due Diligence is a two way street

The Investing Edge

Borrowing an enterprise sales term, the “ funnel ” for startup opportunities at a venture firm starts very wide and ends up extremely narrow, and there are numerous stages along the way. From initial call or email to actual funding, there is a massive filtering process. The magnitude varies amongst firms, but to give you a sense, at Ascent, we see roughly 1,000 B2B business proposals throughout a given year, we meet with between 100 and 200, initiate diligence on 20 to 25, get really serious w

Meeting 70
article thumbnail

What is blockchain technology?

Network World

Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Assistant sounds eerily human, The White House forms AI committee, Carnegie Mellon launches AI degree

CTOvision

These are some of the hot topics we are tracking in the domain of Artificial Intelligence: Google Grapples With ‘Horrifying’ Reaction to Uncanny AI Tech We provided our thoughts on Google Duplex here (we think it is cool tech but needs bounding). This is consistent with how others seem to be viewing it. From Boomberg: […].

article thumbnail

A Week In India: Three Lessons Learned

Forrester IT

I was lucky enough to spend a week in India earlier in the month and had some interesting conversations with services firms about how the expectations from their customers and the nature of their engagements are changing. Aside from experiencing the wonderful cities of Bangalore, Hyderabad, and Pune and sampling delicious samosas and paneer dishes, I also managed to have some great conversations with Forrester […].

202
202
article thumbnail

VC Due Diligence is a two way street

The Investing Edge

Borrowing an enterprise sales term, the “ funnel ” for startup opportunities at a venture firm starts very wide and ends up extremely narrow, and there are numerous stages along the way. From initial call or email to actual funding, there is a massive filtering process. The magnitude varies amongst firms, but to give you a sense, at Ascent, we see roughly 1,000 B2B business proposals throughout a given year, we meet with between 100 and 200, initiate diligence on 20 to 25, get really serious w

Meeting 70
article thumbnail

What an Apple phishing attack looks like | Salted Hash Ep 32

Network World

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

Apple 62
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Clairvoyance™ An Early Warning System to Prevent Insider Threats

CTOvision

Editor's note: I have tracked the team and technologies of ICG Solutions for several years and reached out to ask that they provide CTOvision readers with an update. I believe their approaches are unique and worth investigating for multiple use cases, including use cases around protecting enterprises from damaging activity perpetrated by people in positions […].

System 152
article thumbnail

B2B Marketers Need To Establish Process Rigor (Without The Mortis)

Forrester IT

I had the pleasure of collaborating with fellow Forrester analysts, Jessie Lui and Ryan Skinner, on the subject of marketing process – one of the lynchpin competencies in Forrester’s Marketing Innovation Playbook. As Jessie Lui explained in her blog introducing the series, we wrote three reports, each targeted at a beginner, intermediate or advanced maturity […].

B2B 210
article thumbnail

VC Due Diligence is a two way street

The Investing Edge

Borrowing an enterprise sales term, the “ funnel ” for startup opportunities at a venture firm starts very wide and ends up extremely narrow, and there are numerous stages along the way. From initial call or email to actual funding, there is a massive filtering process. The magnitude varies amongst firms, but to give you a sense, at Ascent, we see roughly 1,000 B2B business proposals throughout a given year, we meet with between 100 and 200, initiate diligence on 20 to 25, get really serious w

Meeting 70
article thumbnail

Tech Talk: Prepping for GDPR

Network World

CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules means. They offer insights on how companies can prepare – and what happens if they don't.

Company 61
article thumbnail

Understanding Scope Creep

Project managers are now spending more time managing strategic projects where the scope is susceptible to changes as the projects progress. Scope change control is now becoming a critical component of project management requiring project teams to become more active in solving problems and making decisions. Scope change control will require collaboration with stakeholders and possibly government agencies.