Thu.Jan 02, 2020

article thumbnail

Resolving or Revolving?

Forrester IT

It’s that time of year. When folks make up their minds that things are going to change. The gym is full of new members who are eager to get into their journey towards some other semblance of better health, or a beach body, or some change that they desire. Others are in that annual state […].

Security 195
article thumbnail

AI and robotics execs look back at tech trends of 2019

CTOvision

As 2019 winds down, every news media and technology site is pausing to reflect on the biggest trends of the past year. Some aspects of robotics and artificial intelligence are advancing rapidly; others, not so much. What should AI and robotics developers recall as they prepare for a new year? Sudhir Jha, senior vice president […].

Trends 152
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What Makes A Payments App Successful?

Forrester IT

Excellence in digital experience is fast becoming a non-negotiable expectation that customers have from a brand. The thing about expectations is that once they rise, they become par for the course. Payments apps are no exception! We recently analysed seven apps from Indian payments providers. We found that that with next-to-zero cost of switching in […].

Course 195
article thumbnail

As Hackers Target Mobile Payment Apps, Here’s How to Keep Them at Bay

CTOvision

Read Carlos Asuncion explain how you can prevent hackers from targeting your mobile payment apps on Dark Reading : Consumers love paying for goods and services with their smartphones. But as more retailers release their own mobile apps with in-store payment options, the threat of fraud must be carefully considered. Retailers offering in-store purchasing through […].

Mobile 151
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Microsoft Endpoint Manager Configuration Manager PowerShell Upgrade Script

Mick's IT Blog

With the advent of Microsoft Endpoint Manager Configuration Manager 1910, I started researching the upgrade requirements. I happened to run into a great blog post by fellow MVP Martin Bengtsson on what should be done before the upgrade takes place. That got me to thinking that most of the tasks he listed can be automated with PowerShell. The script below will automate the following tasks from his list of prerequisites: Backs up the cd.latest directory to the specified UNC path Disables the follo

Backup 153
article thumbnail

3 security tips to protect yourself from skimming attacks

Tech Republic Security

E-commerce sites are trying to keep up with sophisticated skimming schemes, but chances are your credit card information will still be compromised. A security expert offers advice.

Security 125

More Trending

article thumbnail

10 Tips for the Localization of Your Content in 2020

Galido

Information Technology Blog - - 10 Tips for the Localization of Your Content in 2020 - Information Technology Blog. Modern business has the best chance of growing to a global level. Never before has it been so easy to connect people from all over the world with leading brands using online technologies, and never before has it been so easy to give them the experience they want – with the help of developed logistics and delivery systems.

article thumbnail

How to gather feedback with a Google Site

Tech Republic Cloud

Learn five ways to assemble information via a Google Site in this tutorial.

Google 156
article thumbnail

9 Ways to Improve IT and Operational Efficiencies in 2020

Information Week

Facing economic uncertainty, many IT leaders are looking to become more efficient while also investing in the latest technology.

109
109
article thumbnail

3 security tips to protect yourself from skimming attacks

Tech Republic Security

E-commerce sites are trying to keep up with sophisticated skimming schemes, but chances are your credit card information will still be compromised. A security expert offers advice.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How the Humanities Can Help Us See What's Next in Tech

Information Week

Skills like communication, observation, empathy and logical thinking are key for developing the next-gen of leadership and equipping employees for the future.

article thumbnail

Alert overload is burning out security analysts

Tech Republic Security

Survey suggests overall volume and high rate of false problems are changing priority lists in security operations centers.

Security 103
article thumbnail

How to install the Kubernetes package manager Helm

Tech Republic Cloud

Want to make your Kubernetes life a bit easier? Try adding the Helm application manager.

How To 107
article thumbnail

How to install and use git-secret

Tech Republic Security

Learn how to gain more security in your git repository with the help of the git-secret tool.

How To 98
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to install the Kubernetes package manager Helm

Tech Republic Cloud

Want to make your Kubernetes life a bit easier? Try adding the Helm application manager.

How To 107
article thumbnail

How to get maximum protection from MFA in Office 365

Network World

Follow these steps to ensure your multi-factor authentication for Office 365 is effective.

article thumbnail

How to install and use git-secret

Tech Republic Security

Learn how to gain more security in your git repository with the help of the git-secret tool.

How To 78
article thumbnail

SQL UPDATE Statement: A Complete Guide

Database Star

Have you ever needed to update data that was already in a table? Learn how to do this with the SQL UPDATE Statement. This post applies to Oracle, SQL Server, MySQL, and PostgreSQL. What Is the SQL UPDATE Statement? The SQL UPDATE statement allows you to change data that is already in a table in […].

Oracle 52
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The Reflection and Resolution of Digital Transformation

Future of CIO

It’s the end of the new year, it’s also the time for change review, recognition, reflection, and resolution. The digital paradigm arises out of new knowledge and the emerging trends to reinforce the very characteristics of the digital business such as enlightenment, innovativeness, and people-centricity. Business transformation is the change on a grand level.

article thumbnail

10 most popular articles of 2019

mrc's Cup of Joe Blog

Summary: As we start 2020, let’s take a look back at the most popular articles published on this blog over the last year. Learn about dashboard best practices, CIO challenges, low-code development, and much more. As we say goodbye to 2019, let’s take a look back at the last year. Over the last 12 months, we’ve explored topics surrounding a few common themes: Emerging technologies, low-code development, trends, analytics, and IT challenges.

Trends 40
article thumbnail

The Monthly “Digitizing Boardroom” Book Tuning: The Corporate Board’s Digital Playbook in the New Year Jan. 2020

Future of CIO

Modern corporate boards play significant roles in guiding businesses in the right direction and achieve expected business results. Due to the “VUCA” characteristics -Complexity, Uncertainty, Ambiguity, and Velocity of the Digital Era, the directorship in any organization must have the agility to adapt to changes and build abilities to advise, inspire and motivate a group of people toward accomplishing shared visions and goals.

article thumbnail

AI in 2020: How use cases will drive artificial intelligence deployments

CTOvision

Read Mary Shacklett explain how artificial intelligence fared in 2020 on Tech Republic : As more businesses realize the benefits of artificial intelligence (AI) in their daily operations, the demand for use cases will increase and drive the AI market. The leaps forward in AI will continue, as we see this young technology blossom into […].

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Best “Digital Ecosystem Quotes of “Digital Master” Nov. 2019

Future of CIO

“ Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.” It perceives the emergent trends of digital leadership, provides advice on how to run a digital organization to unleash its full potential and improve agility, maturity, and provide insight about Change Management.

article thumbnail

10 AI trends to watch in 2020

CTOvision

Read Stephanie Overby list top 10 artificial trends to watch out for in 2020 on The Enterprisers Project : Artificial intelligence: Everybody’s doing it. Few are doing it well, however. In fact, nine out of ten companies have made some investment in AI, but 70 percent said they have seen minimal or no impact from AI […].

Trends 40
article thumbnail

FlexDeploy Integration with CyberArk AAM

Flexagon

In this previous blog entry we discussed FlexDeploy integration with external credential stores. Now let’s explore specifics of integration with CyberArk AAM. FlexDeploy provides two out of box options for integration with CyberArk AAM: Command line option with Agent and HTTP call to AIM webservice. Here are high level integration steps for either type of.

Devops 15
article thumbnail

2019 Data Breach Hall of Shame: These were the biggest data breaches of the year

CTOvision

The biggest recurrent motif among the major data breaches of 2019 wasn’t the black-hooded hacker in a dark room, digging into a screen full of green text. It was a faceless set of executives and security professionals under the fluorescent lights of an office somewhere, frantically dialing their attorneys and drafting public relations apologies after […].

Data 30
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

A Decade Of Advancements As We Enter A New Age Of AI

CTOvision

Read Daniel Pitchford take a look at the advancements in Artificial Intelligence in the last decade and how it will far in future on Forbes : The 2010s will be known for the advent of one of the most powerful technologies on the planet – Artificial Intelligence. Over the next decade, as more funding is […].

article thumbnail

Are We Overly Infatuated With Deep Learning?

CTOvision

Read why Ron Schmelzer says that we are overly infatuated by deep learning on Forbes : One of the factors often credited for this latest boom in artificial intelligence (AI) investment, research, and related cognitive technologies, is the emergence of deep learning neural networks as an evolution of machine algorithms, as well as the corresponding […].

article thumbnail

Data Breach at Wyze Labs Exposes Information of 2.4 Million Customers

CTOvision

Choosing to gift the budget-friendly, internet-connected home-security camera from Wyze Labs was an easy decision for holiday shoppers after the gadget landed on several top tech gift guides. But on Monday, Wyze executives said that the information of 2.4 million of their customers had been exposed to the public. Camera information, Wi-Fi network details and email […].

Budget 30