article thumbnail

How Novanta’s CIO mobilized its data-driven transformation

CIO Business Intelligence

On investing in capabilities: We’ve set up something called a BI Center of Excellence where we train and have workshops and seminars on a monthly basis that team members across Novanta can join to learn about how they could leverage data marts or data sources to build their own reporting. Here are some edited excerpts of that conversation.

Data 120
article thumbnail

CDH Users: If you have done impactful things with data please share how what and why

CTOvision

The goal of this program is to recognize organizations running CDH for the applications you’ve built using Hadoop, and for the impact your project is having on the organization, business, and/or society at large. CDH USERS: You have accomplished amazing things with Hadoop, and it’s time to shine a spotlight on your success.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Which Government, Non-Profit and NGO Have Big Data/CDH Lessons Learned To Share?

CTOvision

The goal of this program is to recognize organizations running CDH for the applications you’ve built using Hadoop, and for the impact your project is having on the organization, business, and/or society at large. CDH USERS: You have accomplished amazing things with Hadoop, and it’s time to shine a spotlight on your success.

Big Data 262
article thumbnail

Stepping up to the challenge of a global conglomerate CIO role

CIO Business Intelligence

It is divided into three verticals — business IT, manufacturing IT, and central IT. Within these three verticals, there are different divisions focusing on specific areas of technology such as networking, security, and applications. The acquisition process was completed only in March.

Budget 113
article thumbnail

The Importance of Identity Management in Security

CIO Business Intelligence

The solution, we’ve seen in discussions during CIO roundtables, seminars, and dinners, is to adopt a privileged access identity management approach. When you have an improperly managed access and identity process and technology, you might as well hang a sign outside the door: “Come On In”.

Security 121
article thumbnail

Upskilling ramps up as gen AI forces enterprises to transform

CIO Business Intelligence

At the basic level, every employee who uses AI applications will need to be somewhat familiar with prompt engineering, says Gartner analyst Arun Chandrasekaran. Application Management, Artificial Intelligence, Business IT Alignment, CIO, Digital Transformation, Employee Experience, Generative AI, IT Leadership, IT Skills