Wed.Mar 06, 2019

article thumbnail

Think Privacy’s Just A Cost Center? Think Again.

Forrester IT

Over and over, clients tell us they just don’t get enough funding for the kind of privacy programs they want to create. In fact, many privacy budgets shrank in 2019, after firms were forced to spend more than they expected on GDPR compliance in 2018. But what if we told you that customer-centric privacy programs […].

Budget 348
article thumbnail

Artificial Intelligence Regulation May Be Impossible

CTOvision

Read why Michael Spencer says that artificial intelligence regulation is nearly impossible on Forbes : Artificial intelligence is a tool humanity is wielding with increasing recklessness. We say it’s for our common good with machine learning hype equal to business profits. But what happens when we don’t have the code of ethics, laws, government accountability, corporate transparency […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Attendee Journey Highs And Lows At MWC19 Barcelona

Forrester IT

I just returned from MWC19 Barcelona, for which I was a judge of the GLOMO Awards. As a Forrester analyst whose research includes service design, I paid extra attention to the attendee journey. I’d like to share the top stand-out elements in its design, which did a nice job of considering the three phases — […].

Research 331
article thumbnail

The Value Of Ethics And Trust In Business. With Artificial Intelligence

CTOvision

Read why Stephen Ibaraki says that ethics and trust are very important issues while dealing with artificial intelligence on Forbes : The 128 most ethical companies for 2019 were announced this week from the Ethisphere Institute. The timing is fortuitous with the upcoming AI for Good, which I founded, global artificial intelligence dialogue including accountability, responsibility, […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Forrester Wave: Information Archiving Cloud Providers, Q1 2019

Forrester IT

(Caleb Ewald contributed to this blog.) The archiving market may be mature, but it is far from stagnant. In recent years, there has been active consolidation among cloud archiving providers. Smaller vendors have been acquired to inject innovation and modernization to traditional platforms, enabling scalability, enhanced discovery capabilities, and advanced analytics.

Cloud 308
article thumbnail

NSA Makes Reverse Engineering Tool Freely Available

CTOvision

The United States National Security Agency (NSA) this week released its in-house reverse engineering tool Ghidra to the public, for free. Initially announced in January, the release was accompanied by a demonstration of the tool at the RSA Conference 2019, which is taking place this week in San Francisco. Ghidra, the NSA explains, is a software reverse […].

More Trending

article thumbnail

10 enterprise network mistakes that open the door to hackers

CTOvision

Taking certain common shortcuts when it comes to network and infrastructure security can leave your organization wide open to hackers, according to a Tuesday RSA 2019 session from Paula Januszkiewicz, CEO of CQURE. “Technology and security as we all know is not always about the techie stuff and solutions—it’s also about people,” Januszkiewicz said in the […].

Network 196
article thumbnail

Cisco uncorks 26 security patches for switches, firewalls

Network World

Cisco has bundled 25 security advisories that describe 26 vulnerabilities in Cisco NX-OS switch and Firepower FXOS firewall software. While the 26 alerts describe vulnerabilities that have a Security Impact Rating of “High,” most –23 – affect Cisco NX-OS software, and the remaining three involve both software packages. [ Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ].

Firewall 126
article thumbnail

To protect us from the risks of advanced artificial intelligence, we need to act now

CTOvision

Read Paul Salmon, Peter Hancock and Tony Carden’s commentary on why we should worry about the risks of advanced artificial intelligence on GCN Blog : Artificial intelligence can play chess, drive a car and diagnose medical issues. Examples include Google DeepMind’s AlphaGo, Tesla’s self-driving vehicles, and IBM’s Watson. This type of artificial intelligence is referred to as […].

article thumbnail

CIOs Are Racing To Deal With The Next Big Security Threat

The Accidental Successful CIO

Quantum computing may allow unstoppable future attacks on corporate networks Image Credit: Brookhaven National Laboratory. One of the most important jobs that the person with the CIO job has is to keep the company’s networks and data secure because of the importance of information technology. This means that they are responsible for implementing systems and procedures that will keep the bad guys out.

Security 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AI vs. machine learning: What’s the difference?

CTOvision

Artificial intelligence and machine learning get lumped together so often these days that it’d be easy for people to mistake them as synonymous. That’s not quite accurate, though: They’re most certainly connected but not actually interchangeable. “Artificial intelligence and machine learning are closely related, so it’s no surprise that the terms are used loosely and interchangeably,” […].

article thumbnail

Sonic Soak: The Ultimate Ultrasonic Cleaning Tool

Galido

Information Technology Blog - - Sonic Soak: The Ultimate Ultrasonic Cleaning Tool - Information Technology Blog. “The best system to clean up practically anything” The Company defines this new invention, a device the size of a mobile phone that puts the ultrasound technology, so far used primarily in medical and industrial applications, at the service of cleaning clothes, baby accessories, jewelry, Personal hygiene products or fruits and vegetables, among others.

Tools 92
article thumbnail

Should Companies Terminate Third Party Vendors That Cause a Data Breach?

CTOvision

Read why Joseph J. Lazzarotti says that third-party vendors pose a definitive data breach risk on Lexology : According to reports, bank customers in Australia (yes, data breach notification requirements exist down under) have been affected by “an industry-wide” data breach experienced by a third-party service provider to the banks – property valuation firm, LandMark […].

Data 194
article thumbnail

Q&A: DevOps Institute's Jayne Groll on the Future of DevOps

Information Week

The Interop 2019 speaker discusses ways that enterprises explore DevOps, the skills gap, and the rise of security as code.

Devops 111
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Forty percent of ‘AI startups’ in Europe don’t actually use AI, claims report

CTOvision

Artificial intelligence is one of the most misused terms in tech today, and a new study apparently confirms how hyped technology has become. According to the survey from London venture capital firm MMC, only 40 percent of European startups that are classified as AI companies actually use artificial intelligence in a way that is “material” to […].

article thumbnail

How CIOs Can Influence the Board

Information Week

Technology has become a strategic asset in business. Here's how to get your board to focus on technology's value.

How To 113
article thumbnail

A Look at the 2018 Ranking Changes & How They Will Impact 2019

Galido

Information Technology Blog - - A Look at the 2018 Ranking Changes & How They Will Impact 2019 - Information Technology Blog. We’re already a couple of months into the New Year, and it’s the perfect time to assess current search and SEO trends, and speculate the direction the industry will take in 2019. It’s common knowledge that Google currently uses more than 200 ranking signals , and keeps on refreshing and tweaking its algorithm, changing priorities and adding new ranking signals every

article thumbnail

The Days After ServerlessDays ATX

Linux Academy

I recently spent the day at Serverless Days in Austin, Texas, and it was interesting for a lot of reasons. The first was that it was in a movie theater. There was no running around to different conference halls — it was just sit in your big, comfy theater chair and enjoy the show. It was nice. There was no FOMO on the other talks — everything was very simple and singularly focused.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

FlexDeploy Loves E-Business Suite: Running!

Flexagon

In the final blog article in the FlexDeploy Loves E-Business Suite series I will incorporate Continuous Integration and Automated Testing, enabling DevOps at a powerful scale. Incorporating the key elements of DevOps enables rapid and high-quality software delivery to customers, placing more focus on IT’s greatest value – innovation! FlexDeploy Loves Oracle E-Business Suite: Series.

Devops 60
article thumbnail

Can Femtech deliver radically personalized care to women

Dataconomy

Patient privacy and safety have always been cornerstones of the U.S. healthcare system. But in today’s digital era, there are apps tracking the most sensitive information such as the female menstrual cycle and fertility window. The collection of this data might be valuable for the future of healthcare – the. The post Can Femtech deliver radically personalized care to women appeared first on Dataconomy.

article thumbnail

Running IT as the Business Growth Engine

Future of CIO

IT organizations are at the crossroad, either continue to be a commodity IT service provider or reinvent itself to become a business growth engine. IT should help the company achieve its business objectives in any way possible. IT has to learn the business; be the business and become the business. Then, you can run IT as the growth engine of the business, suggest and implement IT-enable solutions that move the business forward.

article thumbnail

8 ways to hire a developer [Actionable tips]

Hacker Earth

Whether you are an employer or an employee, you need to think beyond résumés to stay ahead of the game. From hackathons to automated evaluation tools, semantic analysis to personality tests, social hiring to web scraping, recruiting is being reinvented and how. A “one-size-fits-all” strategy certainly doesn’t cut it. Résumés will take you only so far.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Digital Interconnectivity - Focusing on Relationships between Things rather than Characteristics of Things

Future of CIO

With rapid change, continuous disruptions, hyperconnected and always on business new normal, the emergence of potential opportunities for exploring digital transformation is likely to follow a nonlinear pattern as the pervasiveness of an organization's digitization journey increases. Everything is interconnected and the business ecosystem becomes more interdependent and dynamic than ever.

System 40
article thumbnail

8 ways to hire a developer [Actionable tips]

Hacker Earth

Whether you are an employer or an employee, you need to think beyond résumés to stay ahead of the game. From hackathons to automated evaluation tools, semantic analysis to personality tests, social hiring to web scraping, recruiting is being reinvented and how. A “one-size-fits-all” strategy certainly doesn’t cut it. Résumés will take you only so far.

article thumbnail

The Monthly “100 Digital Pitfalls” Book Tuning: Be Cautious of Classic Management Pitfalls Mar. 2019

Future of CIO

Digital makes a significant impact on how we think, live, and work. There is a mix of old and new, physical and virtual, order and chaos. We are in a time of tremendous change, the dawn of the digital age, the path to the next level of digital maturity, also in the era of confusion and information overload. Therefore, it’s critical to identify, understand, and avoid pitfalls, discover strategic and predictive pathways to change, increase confidence, position a brand and leverage resources to mak

System 40