OpenAI launches an API to commercialize its research

Venture Beast

OpenAI launched an API to commercialize -- and prevent the abuse of -- the AI and machine learning models it's actively developing. Read More. and Developers

Forrester IT

My focus is on Application Development and Delivery (AD&D) professionals, so I thought I'd update you on what all of this means to them. The self-training algorithms are where AI research had stalled until recently, but machine learning and other methods are revitalizing it. Well, that's the special sauce that will be very interesting for developers. The knowledge Viv uses to deliver on voice requests is directly driven by direct input from developers.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

IBM will no longer offer, develop, or research facial recognition technology

The Verge

The company will also no longer develop or research the technology, IBM tells The Verge. Yet Rekognition, the name of the program, has also been criticized for its accuracy. Illustration by Alex Castro / The Verge.

Virginia Announces Research Commercialization Awards


The Commonwealth of Virginia announced research commercialization awards today, including many friends and readers of CTOvision, so we wanted to share this announcement. Governor McAuliffe Announces Research Commercialization Awards. Investments target research and commercialization activities to spur innovation ~ . RICHMOND – Governor Terry McAuliffe announced today 38 Commonwealth Research Commercialization Fund (CRCF) awards totaling more than $2.8

3 Mistakes Organizations Make While Developing ABM Programs

While B2B research suggests organizations are thriving through successful ABM programs, getting just one campaign off the ground is more difficult than it seems. From building an account universe to understanding to orchestrating sales and marketing alignment around touchpoint and messaging, there are a number of variables to consider before launching a program.

8 Steps for a High-Impact Enterprise Architecture Program


Much of the growth and interest is being driven by the demands of digital business and the need for CIOs to start, restart or renew their EA programs. Saul Brand , Senior Research Director, Gartner, outlines eight steps that successful EA and technology innovation leaders follow to build a high-impact EA program. Step 1: Adopt a business-outcome-driven EA program. Start or restart the EA program by adopting a business-outcome-driven EA (BODEA) approach.

Thinking About “Data Program Governance”


One phrase in regular rotation in my elevator pitch is “data program governance." Program means an organized set of activities designed to accomplish a defined set of objectives. Governance means the program is planned and managed in an organized and sustainable way. Creating a data program governance strategy is not unlike creating other types of enterprise business strategies. Managing Data-Intensive Programs and Projects: Selected Articles. Dennis D.

Researchers want to pick up the pace on early testing and treatment for COVID-19


Scientists from Seattle’s Fred Hutchinson Cancer Research Center and the University of Washington say the search for COVID-19 treatments should widen its focus from hospitalized patients to people who are just starting to experience symptoms.

Fred Hutch’s president says a new strain of virus research center is needed to fight future outbreaks


Thomas Lynch, the president and director of the Fred Hutchinson Cancer Research Center, discusses the impact of the coronavirus outbreak during a GeekWire forum. “I think virology needs a ‘cancer centers’ program, OK?”

27 Jan Webinar With SEI’s Cyber Intelligence Research Consortium: Learn how to have intelligence successes instead of security failures


The discipline has developed to the point where lessons learned are being shared across the community. Jay McAllister leads research and development efforts that provide technical solutions and analytical acumen to cyber intelligence practitioners from government, industry, and academia.

What Kind of Management Structure Is Needed to Govern a Data Analytics Program?


When thinking about developing a new data analytics program, two questions you need to address are: What services do you need to provide? I’m assuming here that your organization already provides products or services of some sort and that, through a new or enhanced data analytics program, you want to take advantage of the data associated with these products or services. Developing simple (or complex) profiles of these requirements. Dennis D. McDonald. Introduction.

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb


Track sessions will focus on: Enabling Business Results with Big Data — How to enable agency programs that will yield enormous value through big data to deliver actionable information and measureable results. Engaging the Hadoop Developer. By Bob Gourley.

David Shoultz seeks tech and science solutions as Washington Research Foundation grants director


As the new director of the grants program at the Washington Research Foundation , David Shoultz joins at a unique time for an organization dedicated to accelerating innovation in science and technology in the state. Website: Washington Research Foundation.

How to improve candidate experience using developer assessments

Hacker Earth

David Heinemeier, the creator of Ruby on Rails tweeted: Several organizations still use whiteboard interviews as a standard process to hire developers. . In a whiteboard interview, developers are given a problem statement for which they have to provide the solution on a whiteboard. .

How to improve candidate experience using developer assessments

Hacker Earth

David Heinemeier, the creator of Ruby on Rails tweeted: Several organizations still use whiteboard interviews as a standard process to hire developers. . In a whiteboard interview, developers are given a problem statement for which they have to provide the solution on a whiteboard.

Pros and cons of low-code development platforms

mrc's Cup of Joe Blog

Summary: A growing trend, low-code development claims to address many of the common challenges facing businesses today. photo credit: ppokta via pixabay cc According to Forrester Research , the low-code development platform market is growing by 50% year-over-year.

Convergence: The Catalyst to Transform Scientific Research

Cloud Musings

by Melvin Greer Greer Institute for Leadership and Innovation A new transformative research approach is gaining global attention and adoption. This is an appropriate way to characterize and address converging research in life sciences and engineering, computation, and physical sciences.

Big Data Project Management: What’s In & What’s Out?


Here’s something to think about when you're planning a big data project: are you planning a project or a program ? A program is something ongoing and relatively permanent. Programs. Related reading: Agile Software Development and Project Collaboration Tools.

Gadgets Every Developer Needs to Get Through the Day


Information Technology Blog - - Gadgets Every Developer Needs to Get Through the Day - Information Technology Blog. Developers often have to beat deadlines, work in the same groups and environment for so long. This might help prevent the unnecessary closure of programs or pages.

DARPA semantic program seeks to glean truth from obfuscation

Network World

In this era where disinformation, alternative facts and other falsehoods are the rule of the day, the researchers at DARPA are looking to build a mechanism that can glean some truth from the obfuscation. DARPA says the program, called Active Interpretation of Disparate Alternatives (AIDA), looks to develop a “semantic engine” that generates alternative interpretations or meaning of real-world events, situations, and trends based on data obtained from an extensive range of channels.

Microsoft copied its new Windows Package Manager from rival AppGet, claims developer

The Verge

Microsoft surprised everyone with its new Windows Package Manager (winget) last week, but it looks like the company copied the core mechanics from a developer it interviewed and ghosted. Image by Alex Castro / The Verge.

DOE’s secret weapon: Supercomputers, Developers Scramble to Build NSA-Proof Email and more


“Many of the department’s supercomputing resources are devoted only to the highest impact, breakthrough research.” By Ryan Kamauff Here are the top cyber news and stories of the day.

Low-Code Development 101: Understanding the Basics

mrc's Cup of Joe Blog

Summary: Application development has long been a problem facing both the IT department and the business units. Today, we explore the concept of “low-code development”, and explain how it helps address this problem. Development lags far behind demand. Hire more developers.

Fiat Chrysler launches bug bounty program for connected vehicles

Network World

Fiat Chrysler Automobiles has launched a bug bounty program to attract white-hat hackers to spot out cybersecurity flaws in its products and connected services. The program is focused on FCA's connected vehicles, including systems within them and external services and applications that link to them. The move follows the remote hack and control of a Jeep Cherokee, one of the company’s products, by security researchers.

DARPA looking to develop drone destroying, personnel protection system

Network World

Looking to protect military personnel from a swarming drone attack is the goal behind a new system that the researchers from the Defense Advanced Research Projects Agency are set to develop. The three-phase program, called Mobile Force Protection will in the next few years potentially develop a prototype system that could sense an attack, identify the attacker and then use a number of techniques, from communications jamming to capturing mid-flight any attacking drones.

DARPA developing secure data sharing wireless technology

Network World

The researchers at the Defense Advanced Research Projects Agency will later this month discuss a new software system that would let multiple levels of classified data traverse current commercial and military wireless networks while preserving the security of sensitive information.

A CIO’s Own Learning and Development Plan

CIO Dashboard

New models for learning and networking like TED highlight why leaders need to think about their personal and organizational development options as more of a portfolio. for their organizations and staff that they often neglect their own learning and development. Strategy Development.

The 7 Step to Develop and Deploy Data Loss Prevention Strategy


Information Technology Blog - - The 7 Step to Develop and Deploy Data Loss Prevention Strategy - Information Technology Blog. DLP is known for a multi-year undertaking, a DLP program can be a manageable, progressive process if organizations focus on a progressive approach.

The reason India does not have enough awesome developers

Hacker Earth

A never-ending debate is that about the quality of Indian software developers. It is said that most developers around the world begin coding at a ridiculously young age. Seriously, you are a senior developer and you don’t know how to use Git? Research says, around 1.5

Hottest tech skills to hire for in 2020

Hacker Earth

Here are some of the hottest tech skills (a mix of programming languages, tools, and frameworks; in random order) to hire for in 2020, which will help you thrive in the workplace of tomorrow. JavaScript has been the fastest-growing and the most sought-after programming language for years.

An insight into the process of developing a product for a customer

Spearline Testing

When I started, there were only four of us on the development team and we've grown into a team of over 15, it's great to see a big team grow and evolve. But we also research new technologies as well. We follow the software development life cycle called the pipeline.

Strategic Agile Thinking: Balancing Value, Innovation and Research

Social, Agile and Transformation

I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 Shifting to a Market, Program, and Platform Organization.

Agile 163

Amid COVID-19 pandemic, experts lay out 10-point plan for a genomic revolution in public health


“COVID really accelerated the pace at which this work was happening,” said Trevor Bedford , a computational biologist at Seattle’s Fred Hutchinson Cancer Research Center who’s a co-author of the plan. Strengthen application programming interfaces.

Microsoft invests $2.5M in CREATE, a new center for accessible tech at the University of Washington


The University of Washington is launching a new Center for Research and Education on Accessible Technology and Experiences (CREATE) and Microsoft is helping to fund the effort with a $2.5 “We need more research investment thought leadership when it comes to accessibility.

Back-to-Basics Weekend Reading - The Working Set Model for Program Behavior

All Things Distributed

This weekend we go back in time all the way to the beginning of operating systems research. In the first SOSP conference in 1967 there were several papers that laid the foundation for the development of structured operating systems. The Working Set Model for Program Behavior , Peter J.

Take a Pragmatic Approach To Personalization

Forrester IT

To help organizations get started on their personalization program, my colleague Ted Schadler and I researched how best-in-class organizations today have operationalized personalization. The most successful firms we spoke with created a four-pronged personalization program that Forrester calls POST: P eople - Before doing anything else, successful firms ask and answer this question: Which customers am I trying to reach and serve? Application Development

Survey 225

Researchers add software bugs to reduce the number of… software bugs

Network World

Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities. By analyzing the reasons bugs escape detection, developers can create more effective bug-finders, according to researchers at New York University in collaboration with others from MIT’s Lincoln Laboratory and Northeastern University.

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014


Director, Federal Business Development. Director of Research. Deputy Director for Intelligence for Strategic Programs. Intelligence Advanced Research Projects Activity (IARPA). Deputy Program Manager. Office of the Program Manager, Information Sharing Environment. Assistant Director for Intelligence Programs and National Security Systems. Chief of Naval Research/Director, Innovation, Technology Requirements, and Test & Evaluation.

Report 275

10 UX Design Techniques Beneficial for the Newbie Designers


Mobile app developers and app UX designers go hand in hand. This is why software development companies banks on its entire team of dedicated UX designers to create a winning app experience for the targeted market and audience. Ample Research. What could user-research involve?

Starving IT researcher? Sniff out bugs for cash

Course Index: IT

The first ever bug bounty program was launched in 1983. Such is the pressure on software firms to produce vulnerability-free code that they will offer cash rewards to white hat security researchers who can find and report flaws. How successful can a good researcher be at this game?

DISA Provides A milCloud Overview: Looks like progress, but watch for two big risks


DISA released the information below as an update on milCloud, an integrated suite of capabilities designed to drive agility into the development, deployment and maintenance of DoD applications. I have no insider information on this activity, but reading between the lines leads me to conclude there are two key risks to this program.

Agile 232

Fed Tech Roundup August 3


Chinese-Originated Hack Potentially Compromised UConn Research and Personal Data - Nextgov. Northrop Grumman-Developed Stealthy Data Link Validated as Combat Ready with US Marine Corps. News Joint Strike Fighter program Lockheed Martin Lockheed Martin F-35 Lightning II Northrop Grumman United States Marine CorpsThe following are some of the hot topics in the federal technology ecosystem (from and ): Fed Tech Ticker.

8 ways to hire a developer [Actionable tips]

Hacker Earth

Research shows that context-dependent skills and passion for the job will continue to drive hiring more than ever. How are recruiters using LinkedIn for hiring developers? Build a referral chain , and run referral contests or referral programs that reward the participants.