Sat.Jun 04, 2016 - Fri.Jun 10, 2016

article thumbnail

One million thanks!

Forrester IT

Thank you for your support! I'm delighted to see my blog has officially had over one million views, making it one of the most read blogs at Forrester! I truly appreciate all the support of you, my readers, in helping share this content with your peers. So thank you a million times. Here is a selection of the most popular reads based on your recommendations, page views and one or two I personally recommend: Social Media : The Secret Of Successful Social Communities: 4 Social Needs - 3/10.

Social 220
article thumbnail

An Update on the Megatrend of Big Data

CTOvision

Bob Gourley. There are seven key megatrends driving the future of enterprise IT. You can remember them all with the helpful mnemonic acronym CAMBRIC, which stands for C loud Computing, A rtificial Intelligence, M obility, B ig Data, R obotics, I nternet of Things, C yberSecurity. In this post we dive deeper into the trend of Big Data. For years now people and our sensors and our computers have been generating more information than we can analyze.

Big Data 156
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Estimate Mobile App Development Cost

IT Toolbox

You have the best mobile app idea to help your company improve customer engagement and support your marketing campaigns. However, you can't get started when you have problems calculating a budget for the development proposal. Mobile app development expenses vary considerably, with Clutch.

Mobile 153
article thumbnail

Internet traffic to triple by 2020, says Cisco

Computer Weekly

The latest edition of Cisco’s Visual Networking Index predicts a near tripling of internet traffic during the coming years as more than a billion people come online

Internet 155
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mobile Edge Computing Will Be Critical For Internet-Of-Things And Distributed Computing

Forrester IT

Computing at the edge of the mobile network will frame your IoT-enabled customer experiences in the age of the customer. As products and services based on the internet of things (IoT) continue to thrive, so does the reliance on the underlying network infrastructures to drive business success. Most IoT assets will be connected via mobile infrastructure, and cloud services are central to many IoT initiatives to deliver real-time and context-based services.

Mobile 220
article thumbnail

Pay with your Hand

CTOvision

Katie Kennedy. If you thought paying with your phone was convenient, try paying with your hand. Instead of taking your phone with you to purchase items you want to buy, now all you need is your hand. Charlie Warzel, Senior Writer for BuzzFeed News was the first to try out this technology.

Video 154

More Trending

article thumbnail

Security Think Tank: Information security professionals have key role in GDPR compliance

Computer Weekly

What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018?

article thumbnail

AI And Cognitive Computing — What's The Hype All About?

Forrester IT

That is exactly what Forrester wants to find out - is there something behind the AI and Cognitive Computing hype? What my research directors ask, "Is there a there there?" AI and Cognitive Computing have captured the imagination and interest of organization large and small but does anyone really know how to bring this new capability in and get value from it?

article thumbnail

The Ultimate Targeted Attack: Malvertisments

CTOvision

Michael Johnson. This talk was given by RiskIQ CEO and Co-Founder Elias Manousos at the Security Innovation Network in 2015. It provides important context on a very powerful attack method, malicious code delivered with the accuracy of a laser-guided bomb. He discusses how malvertising attacks can scale in a targeted way to maximize impact and limit collateral damage.

Network 153
article thumbnail

Do You Need a CRM or a CEM?

IT Toolbox

Acronyms abound when you research software solutions for your business. Even when you know what they mean, you don't necessary know the right choice. Customer Relationship Management (CRM) and Customer Experience Management (CEM) sound similar, but they serve two mostly different purposes. Before you finalize your purchase decision, learn more about the functionality offered by CRM and CEM solutions.

Research 149
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

IoT security: Lack of expertise will hurt, says Bruce Schneier

Computer Weekly

Government action at national and international levels is essential for addressing IoT security issues, but the relevant expertise is lacking, according to security expert Bruce Schneier

Security 147
article thumbnail

Digital Transformation Forum Europe 2016: Q&A with Blake Cahill, Head of Digital, Royal Philips

Forrester IT

Forrester's Digital Transformation Europe 2016 Forum in London starts today, and our first industry speaker will be Blake Cahill, Head of Digital, at Royal Philips. Over the past 20 years, Blake has led a series of marketing, creative, client management, product innovation, and thought leadership projects for both Fortune 500 organizations and digital start-ups.

Industry 204
article thumbnail

Video Overview of Surprising New Technologies

CTOvision

Katie Kennedy. The video below highlights some of the technology available today, (most of these are only available via Kickstarter now, but clearly they are coming. Enjoy!

Video 154
article thumbnail

Leveraging UC Data for Strategic Business Decisions

IT Toolbox

Your unified communications (UC) solution powers the most vital processes in your organization. You don't get very far in the business world without effective communication tools. UC systems have a home in 68 percent of companies, according to West Unified Communication Services. You gather many data types in this system.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cyber crime is serious business, shows Imperva report

Computer Weekly

If organisations want to fight cyber crime, they need to get serious and they need to get professional about it, says Imperva CTO Amichai Shulman

CTO 152
article thumbnail

US Government: Huawei Should Be Your Digital Business Partner, Not Your Enemy

Forrester IT

Huawei Technologies started out nearly 30 years ago as a small private company with 14 employees and 140,000 yuan in capital. By 2015, its total revenue exceeded $60 billion. Huawei is already a global company, but its globalization journey has been a difficult one since the very beginning. Despite its continuous business growth in other regions, Huawei has faced critical censorship in the US since Day One -- and last week the US government put Huawei under the microscope yet again.

article thumbnail

Announcing The Threat Brief Mobile App: Know the threat to beat the threat

CTOvision

Bob Gourley. Threat Brief Mobile App is now available for all Apple iOS and Android devices. This is a great way to track the cyber threat while on the go. To find it search for ThreatBrief in your favorite app store, or follow these links: The Threat Brief Mobile App For iOS . The Threat Brief Mobile App for Android. Please download today and let us know what you think.

Mobile 152
article thumbnail

Cold Storage in the Cloud: Comparing AWS, Google, Microsoft

Data Center Knowledge

As cloud storage options continue to evolve, organizations are finding more options for cutting the cost of keeping data Read More.

Storage 156
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Cloud firm adds Cloudian object storage to satisfy S3 demand

Computer Weekly

Calliog puts Cloudian object storage on Lenovo hardware to add a tier of storage for customers that want Amazon S3-compatible cloud services, but not from Amazon

Storage 145
article thumbnail

Digital Transformation Europe Forum 2016: Q&A With Fergus Boyd, VP, Digital And IT, Yotel

Forrester IT

This week, Forrester's European Digital Transformation Europe Forum 2016 kicks off in London at the Lancaster on June 8-9. Myself and Forum co-host Benjamin Ensor are very excited about the program that we have been able to put together across the two days. Our list of industry speakers is impressive, and includes Blake Cahill, Global Head of Digital and Social Marketing, at Philips, Toby Wright, Chief Technology Officer, at Telegraph Media Group, Nina Jones, Global Owner Experience Director, at

Hotels 195
article thumbnail

CMA Hosts Federal Cybersecurity Solutions Reference Architecture Meeting

CTOvision

Katie Kennedy. The GWACsolutions Center of Excellence * recently conducted a hands-on work session to map and demonstrate alignment of best-in-class solutions and services to the NIST Cybersecurity Framework. “Standardized Frameworks such as the NIST Cybersecurity Framework serve as an essential starting point in the planning process – but they are just that … a starting point” said John Frey who led the work session.

article thumbnail

How to Make Your UC System Work with Your Existing Business Infrastructure

IT Toolbox

The Unified Communications (UC) market continues to show strong growth, with Nasdaq predicting a 16.3 percent annual compound growth rate between 2014 and 2020. UC solutions bring multiple communication channels under one platform, encourage organization-wide collaboration and streamline conferencing configuration.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cyber weapons are perfect weapons, says security expert Mikko Hypponen

Computer Weekly

There is a lot of 'fog' surrounding cyber weapons and cyber war because there is no way of knowing the true capability of any country, says security expert Mikko Hypponen

Security 140
article thumbnail

Key Takeaways from Informatica World 2016: Informatica Pivots From A Data Company To A Business Insights Company

Forrester IT

Informatica World wrapped up in San Francisco last week where almost 3,000 customers and partners gathered in the Moscone West conference center for four days packed with executive keynotes, customer and partner presentations. Based on my time there it's clear that: Informatica is pivoting to cater to a business audience. They recognize the business and their requirements have gained greater influence over technology purchasing decisions and are responding accordingly.

Company 183
article thumbnail

Video on Cray Urika-GX: An Agile Analytics Platform

CTOvision

Michael Johnson. This video was used to introduce the Cray Urika-GX agile analytics platform. This high-performance data analytics appliance helps enterprises accelerate insight, multiply productivity, uncover data’s hidden opportunities — and get big value from big data.

Agile 151
article thumbnail

Major Salesforce acquisition signals move into cloud-based commerce

IT Toolbox

Salesforce has announced its acquisition of Demandware, a publicly listed provider of cloud commerce solutions, for $2.8 billion. The CRM giant is launching a tender offer to shareholders at $75 per share and expects to complete the transaction by the middle of next year.

Cloud 126
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Security Think Tank: All aboard as European data regulation nears final station

Computer Weekly

What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018?

Security 134
article thumbnail

Don't know where your customers and assets are? Then you don't know where your business is going.

Forrester IT

Business decision-makers take note: location-based context is critical for the future of application experiences and customer engagement. Understanding the location of customers and assets lets companies get closer to their customers and assets to drive better decisions (just to name a few: choosing the a site for a brick-and-mortar location, picking what offer to send to a customer, guiding passengers through airports, deciding where to focus your next marketing campaign, or pushing a greeting

Analysis 163
article thumbnail

The CTOvision Mobile App: Track tech topics anywhere anytime on iOS and Android

CTOvision

Bob Gourley. The CTOvision Mobile application provides intuitive, interactive access to our content and easy ways to find and share the information you and your network need to know on enterprise tech. The upgrade is available for for iPhone , iPad and Android users. The application focuses on content we create for technologists, so you will find our blog content and tech write-ups featured prominently in the app.

Mobile 151
article thumbnail

Top Cloud Providers Made $11B on IaaS in 2015, but It’s Only the Beginning

Data Center Knowledge

Cloud market’s current balance of power likely to shift as it grows more than 10-fold by 2020 Read More.

Cloud 158
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.