Remove Agile Remove Authentication Remove CTO Remove How To
article thumbnail

Bell Canada uses AI and machine learning to improve fraud detection delays on targeted schemes by 200%

TM Forum

The system can immediately learn from it, and create models to cope,” says Dr. Gadi Solotorevsky, CTO at Amdocs cVidya, the leader of several TM Forum Business Assurance catalysts, predominantly around machine learning, and the co-head of TM Forum’s Business Assurance group. CTO Amdocs cVidya. ” image. . image_align.

article thumbnail

A look at the Hadoop Big Data Reservoir with Platfora’s Peter Schlampp

CTOvision

Peter and Platfora believe that the HDR eliminates data silos, reduces costs, and makes business analytics agile. While there is some built-in security in the Hadoop File System, it focuses mainly on file and directory based permissions, as well as secure authentication. Meeting the Security Requirement.

Big Data 227
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

Glenn Kapetansky, Senior Principal & Chief Security Officer, Trexin: "For those who predict that quantum computing will break InfoSec, I want to point out that very smart people have been working equally long on next-gen cyber techniques that work in a post-quantum computing world.

article thumbnail

How the ‘diversity hire’ accusation and other barriers remain for Black women in tech

CIO Business Intelligence

Leonie, an agile delivery manager working in the retail industry, who only gave her first name, saw this first-hand earlier in her career. Monica Pemberton, CTO at Washington-based higher education professional development association Nacubo, agrees, saying that being resilient is essential to both progression and career longevity.

CTO Hire 143
article thumbnail

Five areas where EA matters more than ever

CIO Business Intelligence

Radicle Science, which provides online services to measure the effectiveness of health and wellness products, uses EA to track the APIs and data formats used by its data suppliers so changes don’t disrupt the business, says CTO Sheldon Borkin. Remote work has driven our clients to reconfigure their enterprise architecture plan and strategy.

CTO Hire 106
article thumbnail

The CIO’s Five Leadership Traits

Future of CIO

Being Authentic is Influential. CIOs as Authentic Business Leaders The spirit of business comes from the top, authenticity is important for CIOs and all leaders. A CIO just needs to be him/herself really. We're all different and unique human beings, so there's nothing to suggest we all have to be with the same personality.

article thumbnail

Everything You Know About eAuthentication is wrong!

CTOvision

On Labor Day, September 5 th 2016, NIST published their Digital Authentication Guideline: Public Preview. The process is similar to sprints in Agile. The base document SP 800-63-3 is the third iteration of this special publication, and has been renamed to: Digital Authentication Guideline. Nathaniel Crocker.