Sat.Jan 19, 2019 - Fri.Jan 25, 2019

article thumbnail

Do you need machine learning? Maybe. Maybe Not.

Eric D. Brown

I’ve recently written about the risks of machine learning (ML) , but with this post I wanted to take a step back and talk about ML and general. I want to talk about the ‘why’ of machine learning and whether you and/or your company should be investigating machine learning. Do you need machine learning? Maybe. Maybe not. The first question you have to ask yourself (and then answer) is this: Why do you want to be involved with machine learning?

article thumbnail

CEOs And Software

Forrester IT

How To Lead The Most Important – and Perplexing — Corporate Domain by John R. Rymer and Jeffrey S. Hammond Summary What if CEOs — not software development and delivery leaders or CIOs — held the keys to the fast, high-quality software delivery that is so crucial to digital business?

Software 398
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Can 5G Accelerate The Internet Of Things (IoT)?

CTOvision

5G, or fifth generation cellular communications technology, has become a hot topic across industries for its potential impact on emerging technologies, and specifically, the Internet of Things (IoT), which describes the development, manufacture, and use of connected devices. These devices range from small heart-rate-monitors to autonomous vehicles, smart home appliances, intelligent factories, and much more.

Internet 242
article thumbnail

Killing Spreadsheets and Empowering Data Driven Organizations

Social, Agile and Transformation

One of the more polarizing discussions I've had with IT leaders on Twitter chats #IdgTechTalk (Thursdays 12pm ET), #CIOChat (Thursdays at 2pm ET) or at conferences is around the use or misuse of spreadsheets. From the comments, you can guess people are either "for" or "against" using spreadsheets, but what we are really saying is, "Use them wisely" and find ways to replace them with more.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

PowerShell One-Liner to Configure the NIC Power Management Settings

Mick's IT Blog

While working on a series of one-liners for configuring the NIC on machines, I created this needed to makes changes to the power management settings of the NIC. This is something that will be implemented in the build, so I also wanted to make the script into a one-liner so the code itself can reside within the task sequence. This one-liner can check/uncheck the boxes within the Power Management tab of the network adapter.

Windows 197
article thumbnail

The Three Customer Service Megatrends In 2019

Forrester IT

As AI Eats Jobs, Agents Are More Valued Great customer service is not just about cutting costs or making operations more efficient. Instead, it’s a systematic reinvention of established technology, data, and operations — leveraging automation, data, and agents together to exploit each of their unique strengths. Trend 1: AI upends customer service operations.

Trends 385

More Trending

article thumbnail

Windows Autopilot Troubleshooting – Beginners Guide

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Windows Autopilot is Azure service to provision windows 10 build. Autopilot service is to simplify Windows OOBE and it happens primarily at Windows 10 OOBE stage. You will learn about basics of Windows Autopilot Troubleshooting from this post. The Basics In the OOBE stage of autopilot deployment, there can be many issues which result in failure. […].

Windows 167
article thumbnail

Foto Friday - Pika Rocky Mountain National Park

Eric D. Brown

Pika Rocky Mountain National Park While in Rocky Mountain National Park last year, I stumbled upon an area perfect for Pikas. I sat myself down next to some rocks and waited. After about 15 minutes I started hearing the ‘squeeks’ that you’d hear from these cute little animals. Quickly thereafter, I started seeing the scurrying around and spend about an hour grabbing photos of them.

130
130
article thumbnail

China’s Tech Market Will Grow by 4% in 2019 and 7% in 2020

Forrester IT

Growth in China’s technology market will slow in 2019 due to geopolitical tensions and economic pressures but will rebound in 2020. Our just-published China Tech Market Outlook, 2019 To 2020 report forecasts that business and government purchases of technology goods and services will grow by 4% in 2019 and 7% in 2020 in US dollar […].

article thumbnail

Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords

CTOvision

A little over two weeks have passed since we celebrated New Year without having to hear about a data breach in progress. The wait is finally over. In what’s being called the largest data breach literally ever, which in an era where data breaches are almost commonplace really means something, we have a breach that leaked almost […].

Data 225
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Intune Version Numbers -Service Release Numbers with Feature Details

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In this post, I will list down the Intune version numbers. I don’t think there is nothing called Intune version numbers. But the Intune monthly releases versions are known as Intune service releases. I will keep this Intune Service Release version list updated. Identity Intune Version Numbers?

article thumbnail

Do you need machine learning? Maybe. Maybe Not.

Eric D. Brown

I’ve recently written about the risks of machine learning (ML) , but with this post I wanted to take a step back and talk about ML and general. I want to talk about the ‘why’ of machine learning and whether you and/or your company should be investigating machine learning.  Do you need machine learning?  Maybe. Maybe not.

article thumbnail

The Billion-Dollar Healthcare Problem You Can’t Just Walk Off

Forrester IT

(Caleb Ewald contributed to this blog.) Super Bowl LIII is right around the corner, and we’ve begun reading the tea leaves and perusing injury reports to divine the future with precision. Will the Pats win another one? Will the Rams start a dynasty? While tea leaves are. well. tea […].

article thumbnail

Hybrid cloud trends offer lessons for potential adopters

CTOvision

Organizations and IT administrators hoping to follow hybrid cloud trends can save time and energy by planning ahead with these hybrid cloud design, deployment and migration guidelines. A hybrid cloud system mixes private and public cloud platforms with orchestration that enables workload flexibility between them. Hybrid cloud admins can move workloads between on-premises and third-party clouds […].

Trends 222
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How SD-WAN can improve your security strategy

Network World

Data breaches and security threats are a top concern among IT leaders, yet it’s harder than ever to hire skilled security professionals. That has organizations looking for ways to more easily improve their security strategy. One option is to implement a software-defined WAN ( SD-WAN ). I recently talked with Hamza Seqqat, director of solutions architecture at Apcela , to get his take on how SD-WAN affects security strategy.

WAN 135
article thumbnail

Foto Friday – Pika Rocky Mountain National Park

Eric D. Brown

Pika Rocky Mountain National Park. While in Rocky Mountain National Park last year, I stumbled upon an area perfect for Pikas. I sat myself down next to some rocks and waited. After about 15 minutes I started hearing the ‘squeeks’ that you’d hear from these cute little animals. Quickly thereafter, I started seeing the scurrying around and spend about an hour grabbing photos of them.

113
113
article thumbnail

Retailers: Use In-Store Sensor Tech To Understand And Enhance Customer Experiences

Forrester IT

Sensor-based technologies have been around for a while now — remember all the beacon hype? — and are now rapidly gaining traction. In-store sensor technology, and more importantly their contribution to understanding our in-store customers and businesses, are at a point where it is now truly digitally transforming physical stores and the experiences delivered to […].

Retail 365
article thumbnail

Trojan malware is back and it’s the biggest hacking threat to your business

CTOvision

Trojan malware attacks against business targets have rocketed in the last year, as cybercriminals alter their tactics away from short-term gain and in-your-face ransomware attacks towards more subtle, long-term campaigns with the aim of stealing information including banking information, personal data, and even intellectual property. Figures from security company Malwarebytes Labs in a new report suggest […].

Malware 219
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Cisco patches serious SD-WAN software security holes

Network World

Cisco has patched security vulnerabilities in four packages of SD-WAN Solution software that address buffer overflow, arbitrary file override and privilege access weaknesses that could have led to denial-of-service attacks or access problems. The first patch, called “Critical” by Cisco, fixes a vulnerability in the vContainer of the Cisco SD-WAN Solution that could let an authenticated, remote attacker cause a denial of service (DoS) and execute arbitrary code as the root user, the company wrote

WAN 132
article thumbnail

What You Need to Know About Augmented Analytics

Information Week

As enterprises travel on a digital transformation path, they need to stay current with analytics, but it's not a linear journey.

Travel 153
article thumbnail

Video: How AI is Transforming Advertising and What You Should Do About it.

Forrester IT

Did you know that artificial intelligence (AI) has infiltrated all parts of the advertising process? My guess is, probably not. But chances are, in an era of programmatic advertising where machines are making millions of decisions on billions of ad impressions every day, your advertising is being touched by AI. Awesome, right? But also risky: to your […].

article thumbnail

How Blockchain Technology Can Improve America’s Infrastructure

CTOvision

Read Adam Millsap explain how blockchain technology can help improve USA’s crumbling public infrastructure on Forbes : America’s infrastructure is often described as crumbling, broken-down, and out-of-date by politicians from both sides. While the reality isn’t so dire, there are obvious infrastructure issues throughout the country, such as New York’s subway, D.C.’s metro, and almost any […].

CTO 216
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Durham County goes Cisco for enterprise network ops and security proficiency

Network World

The IT department in Durham County, N.C.'s government was spending far too much time manually addressing network and security operations and turned to Cisco to help achieve the operational and security effectiveness it was looking for. The government in Durham County , N.C., was spending hours and hours manually provisioning its network and keeping security policies current, so it decided two-and-a-half years ago to upgrade for the sake of efficiency and security.

Network 128
article thumbnail

How Using Big Data Can Be Beneficial For Your Business

Social, Agile and Transformation

By Ashley Lipman In a recent study, marketing professionals claimed that understanding the interactions their customers had across all of their touchpoints was their biggest challenge. For years, business owners have relied on customer data to help them with things like setting a course for things like marketing and even product development. While most business owners understand how.

Big Data 100
article thumbnail

Telecom-Only = Disrupted

Forrester IT

My theme at PTC’19 this week was that telecommunications and colocation companies who maintain a focus on their traditional value propositions will be fully disrupted by 2025. Customers, in the era of cloud computing and embracing the shift to business agility, don’t want long-term commitments to fixed capacities of these resources. Their infrastructure consumption is […].

article thumbnail

Tech’s Next Imperative Must Be Physical Security

CTOvision

Physical security has always taken a back seat for IT professionals. With growing attacks read why Alan Cohen says that it is imperative for the IT pros to focus on physical security on Forbes : I believe our Founding Fathers knew that the American experiment would be sorely pressed, sorely challenged over time. This foresight exercises […].

Security 215
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why CIOs Should Care About Two Factor Authentication

The Accidental Successful CIO

Everybody needs two factor authentication, but just exactly what is it? Image Credit: Dave Crosby. As everyone in the CIO position knows, keeping the company’s systems and applications secure is a top priority and has a lot to do with the importance of information technology. However, just exactly how to go about doing this has always been a bit of a mystery.

article thumbnail

Top 5 Considerations When Hiring a Data Scientist

Information Week

AI is a hot term in every industry, but don't be a company that just blindly hires a group of data scientists who end up frustrated and unproductive.

Data 134
article thumbnail

Retailers: Extend Omnichannel Capabilities To The Customer, Not Just Operations

Forrester IT

Omnichannel investments, including in-store pickup and endless aisle, continue to be top strategic investment for digital business professionals at retail organizations. Forrester predicts that digital touchpoints will influence 55% of total European retail sales by 2022, so a retailer’s digital presence continues to play a significant role in influencing consumer purchase decisions, both online and […].

Retail 332
article thumbnail

CIO upfront: The Internet of Things – who pays when things go wrong?

CTOvision

Read Mark Campbell of Russell McVeagh discuss what companies can do to protect themselves on CIO : The internet of things (IoT), the ability of everyday objects to remotely connect to computers, promises connection, convenience and new market opportunities for manufacturers and developers. For the users of smart devices and apps, the convenience factor comes with […].

Internet 213
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.