Mon.May 22, 2017

article thumbnail

Where Is Artificial Intelligence In Forrester's Tech Market Numbers? It's Hiding

Forrester IT

I have gotten some inquiries about where spending on artificial intelligence and cognitive technologies occur in our tech market numbers (see, for example, " US Tech Market Outlook For 2017 And 2018: Mostly Sunny, With Clouds And Chance Of Rain "). The short answer is that we include them in our data on business intelligence and analytics, though so far spending on these technologies is still small -- probably than a billion dollars for 2017.

article thumbnail

Latest CTOvision Assessments on Cloud Computing, Artificial Intelligence, Mobility, Big Data, Robotics, Internet of Things and Cybersecurity

CTOvision

Bob Gourley. One of the enjoyable things about estimating the future is there is always a new consideration. It is a dynamic task that is never done. This is especially true in analyzing the future of enterprise technology, where things are always moving fast. We try to find balance in tracking the future of technology by focusing on the metatrends, those very powerful forces that sweep over us all (whether we want them to or not).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Prepare for Increasing Frequency of “Nation-State” Cyberattacks with Strategy, not Technology

Forrester IT

Let me pose a question: "Is it a bad thing to give the average person a hand grenade with the pin pulled?" I think most of us would respond to that question with an emphatic "YES!" No one in their right mind would think it's a good idea in any possible reality to allow anyone without extensive military or professional training to access an explosive--especially not one that is live and has no safety device in use.

Strategy 277
article thumbnail

Enterprise Security and Functionality Benefits of the new Software Defined Perimeter (SDP) Approach

CTOvision

Bob Gourley. The dynamic nature of today’s IT Operations has eroded the network perimeter in ways we have all been watching and even cheering on! This is a new world of mobility, cloud computing and rapid partnering for success. But the erosion of the network perimeter is making traditional security a roadblock to efficiency. No one wants to allow holes to be poked in the security system but no one wants to shut down connectivity to partners either.

Software 171
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Agile unlocked: Pivotal uses paired programming and PaaS to bolster cloud app development

Computer Weekly

Digital transformation consultancy Pivotal explains how paired programming, an empathetic work culture and open source PaaS help enterprises achieve their agile software development goals

Agile 194
article thumbnail

How Cybersecurity Benefits from Hackers

CTOvision

Carol M. Evenson. With the number of cyber crimes climbing every day, and the costs of each cyberattack higher than the last, the word “hacker” has come to carry a very negative connotation. Business owners who are afraid of litigation cringe when they hear the word. Private individuals who are worried their identities will be stolen—or who have already had their identities stolen before—get sick to their stomach at the thought.

More Trending

article thumbnail

Dell Technologies: Apple, or Just Bananas? 

Data Center Knowledge

Why on earth did Michael Dell and team take on an eye-watering, terrifying mountain of debt to transform and enlarge his company, when others have the reverse strategy? Read More.

Dell 158
article thumbnail

Security Think Tank: Malware is sneaky

Computer Weekly

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

Malware 162
article thumbnail

How Rear-Door Heat Exchangers Help Cool High-Density Data Centers

Data Center Knowledge

When the national weather services for Denmark and Switzerland upgraded their computing capacities, they each turned to supercomputers that are cooled by internal heat exchangers. It doesn’t take a supercomputer to justify liquid cooling, however. Heat exchangers have been used inside server.

article thumbnail

Windows 7 accounts for most WannaCry infections

Computer Weekly

Statistics show that computers running Windows 7 accounted for the biggest proportion of machines infected with the WannaCry ransomware, while NHS suppliers are blamed for hampering patching by NHS trusts

Windows 135
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Microsoft Is Planning To Take Over Again In The Future

IT Toolbox

It was only around a few decades ago Microsoft didn't have a care in the world. Every developer flocked to them automatically and produced wonderful applications for Windows. Computers running the operating system eventually took over the world and it was hard to see how their dominance would ever end.

Microsoft 134
article thumbnail

Why public cloud R&D is making lock-in worse, not better

Tech Republic Cloud

Each of the major cloud vendors wants to distinguish itself with innovative features, the adoption of which threaten to leave CIOs and developers dependent on them.

Cloud 160
article thumbnail

Why Bitdefender Antivirus is a wise choice for Mac users

Tech Republic Security

Recent well-publicized ransomware attacks plagued some Windows users, though Macs aren't immune from malware. Find out how Bitdefender Antivirus can provide Mac users with peace of mind.

Malware 146
article thumbnail

Is technology destroying grammar and spelling?

IT Toolbox

I've read the articles saying that Google is making us dumber. I don't know if I buy into that or not. The nature of knowledge and intelligence is quite different in today's hyper-connected software-driven age. I don't know how to compare the effects of technology on intelligence any more than I know how to compare Dr. Stephen Hawking and Aristotle.

Google 114
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How the CISO moved from the basement to the boardroom

Tech Republic Security

A growing threat landscape has changed the role of the chief information security officer in the past decade. Here's why this position and its evolution are vital in the modern enterprise.

article thumbnail

Middle East largely unscathed after WannaCry cyber attack

Computer Weekly

The impact of WannaCry on the Middle East was reduced due to the attack falling on a weekend, but it is a stark warning

141
141
article thumbnail

Report: Mobile ransomware attacks 'soared' in 2017, up 250% in Q1

Tech Republic Security

Kaspersky Lab detected more than 479 million malicious attacks from online sources in Q1 2017 alone, according to a new report. Here's how to stay safe.

Report 143
article thumbnail

Only 9% of parents want kids to be tech entrepreneurs

Computer Weekly

Study shows UK parents would prefer their children to have a traditional job such as doctor, teacher or lawyer

Study 140
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Custom parts manufacturer turns to all-in-one ERP

IT Toolbox

Canadian custom plastic parts maker PH Molds Ltd. had relied for years on a specialized manufacturing resource planning (MRP) system to manage its shop floor. That worked out fine – at first. But as the company grew, visibility gaps and systematic inefficiencies began to plague business processes beyond the shop floor.

Resources 100
article thumbnail

98% of WannaCry victims were running Windows 7, not XP

Tech Republic Security

New data from Kaspersky Lab shows that almost all of the WannaCry/WannaCrypt ransomware worm victims were running some version of Windows 7.

Windows 133
article thumbnail

JD Edwards Business Services: The Inevitability of Code

IT Toolbox

JD Edwards EnterpriseOne allows developers to use Business Services and Published Business Services to expose transactions as either internal business services in Java or Published Business Services that expose Java methods as Web Services. This leads to the inevitability of code.

article thumbnail

HSBC voice authentication tricked by twins

Computer Weekly

Twin brothers managed to trick HSBC’s voice recognition security system into giving account access to the wrong person

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

6 Tech Conferences You Won't Want to Miss in 2017

IT Toolbox

Did your 2017 business resolutions include learning something new, becoming more profitable, or making valuable business contacts? Well, if so, you should be attending conferences this year. You?ll form valuable relationships with like-minded entrepreneurs, broaden your horizons and perhaps even tap into the knowledge you need to reach your goals.

article thumbnail

DCK Investor Edge: CyrusOne — Catch Me If You Can

Data Center Knowledge

Low cost and short delivery time give the REIT an edge over competition when closing cloud giants Read More.

Cloud 121
article thumbnail

VMware vSphere: The smart person's guide

Tech Republic Data Center

VMware vSphere is the dominant data center virtualization platform. This smart person's guide provides an introduction to what you need to know about vSphere.

Vmware 113
article thumbnail

Netgear added data collection 'feature' to NightHawk R7000 routers; disable it

Network World

Netgear makes some popular routers, but do you really want the company behind your model of router to collect data such as your IP address and MAC address? If the answer is no, then you need to disable the ‘analytics’ data collection. Netgear’s NightHawk R7000 router, dubbed as “best-selling” and “top-rated” router on Amazon , is now collecting users’ data.

Data 95
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Video: How to survive the global cyberwar

Tech Republic Security

Dr. Kenneth Geers, senior research scientist at Comodo and NATO Cyber Center Ambassador, explains #WannaCry and the steps business should take to protect critical assets during the next cyberattack.

Video 75
article thumbnail

New products of the week 5.22.17

Network World

Running its course Image by Untangle Network World's long-running product of the week slideshow has come to an end with this edition. Vendors are still welcome to discuss their products with reporters. Thank you to all who have submitted products.

Course 79
article thumbnail

The Role of Information Technology in Education

IT Toolbox

The only question is how college students can use web technology.

Education 100
article thumbnail

How Micron is focusing on edge processing for smart IoT deployments

Tech Republic Security

Micron is moving into new markets such as connected vehicles, industrial IoT and smart manufacturing with its connected security and storage solutions, according to Marc Musgrove, head of global PR for Micron.

Storage 66
article thumbnail

Understanding Scope Creep

Project managers are now spending more time managing strategic projects where the scope is susceptible to changes as the projects progress. Scope change control is now becoming a critical component of project management requiring project teams to become more active in solving problems and making decisions. Scope change control will require collaboration with stakeholders and possibly government agencies.