Fri.Sep 22, 2017

article thumbnail

Operational Intelligence: The Next Generation of Business Intelligence

CTOvision

Today, enterprise software is more than a transactional system - it is a decision support tool that enables senior management to effectively run the business. But, given the various technologies available on the market now, it can be difficult for managers to figure out which data analytics tools are needed to optimize their business operations. […].

article thumbnail

Why AI success depends on IT picking the low-hanging fruit

Computer Weekly

General-purpose artificial intelligence is probably a long way off, but the rapid rate of innovation means off-the-shelf AI can kick-start many projects

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Time For A Fourth Law of Robotics

CTOvision

Science fiction fans recognize Asimov’s prescient thoughts on robot programming, captured in his three laws of robotics. In Asimov’s sci-fi world, robots were all programmed to protect their humans (the first law), to obey their humans (the second law) and to protect themselves (the third law). These laws laid the foundation for many fantastic, futuristic […].

article thumbnail

Cyber security improves business opportunities and customer loyalty, survey shows

Computer Weekly

Businesses view cyber security as a way to provide new opportunities and improve customer loyalty, according to a Vodafone report

Survey 231
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cyber at the Crossroads: A one day symposium on the critical cyber events of 1997 and 1998 that shaped our response to cyber war

CTOvision

There are many challenges in cybersecurity. Most challenges are due to adversaries that continue to innovate and create new means of breaking into systems. But other challenges come from leaders who do not learn the lessons from history. We have called that problem cyber threat amnesia, the observed tendency of any organization to forget the […].

System 169
article thumbnail

Malware hidden in CCleaner targeted tech firms

Computer Weekly

Major tech firms were targeted by malware hidden in Avast’s Piriform CCleaner software, researchers have found, leading to speculation that it may have been state-sponsored espionage attack

Malware 185

More Trending

article thumbnail

NetApp privacy chief warns enterprises off investing in GDPR snake-oil tech

Computer Weekly

Speaking at the inaugural Datacloud Ireland event in Dublin, NetApp chief privacy officer, Sheila FitzPatrick, outlined her concerns over tech suppliers cashing in on the enterprise rush for GDPR compliance

article thumbnail

RFUN: The Recorded Future Annual Threat Intelligence Conference Oct 4-5 2017

CTOvision

The 6th Annual Recorded Future Threat Intelligence Conference will be held 4-5 Oct at the Newseum in Washington DC. This event should be of interest to any threat intelligence professional, specially those in the disciplines of cyber threat intelligence and business risk. From their info site: Recorded Future customers, partners, and threat intelligence experts will […].

article thumbnail

European banks getting rid of human interaction in retail services

Computer Weekly

Traditional banks know they need to modernise IT to retain market share, but replacing legacy systems is like defusing a bomb

Banking 197
article thumbnail

Striking the Right Balance for Automation when using Chatbots

IT Toolbox

This series began by addressing the rationale for using chatbots in business, either to support collaboration or the contact center – and ideally, both.

124
124
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Equifax faces small business class action over data breach

Computer Weekly

Small businesses in the US have filed a class-action lawsuit against credit rating firm Equifax, representing millions of others affected by a breach of personal data

article thumbnail

New VoIP partnership lowers security costs for professional services

IT Toolbox

Cyber security as a preoccupation is surging within the VoIP industry, largely because of its standing as a central concern. Without addressing the potential security failings in VoIP services, the industry risks losing the confidence of business and the public.

VOIP 113
article thumbnail

Movie maker shuns cloud, gets Spectra Logic Black Pearl tape NAS

Computer Weekly

Hat Trick ditches industry-specific hardware and deploys Black Pearl, which gives NAS-like file access from tape

Hardware 174
article thumbnail

Epicor ERP smooths manufacturer's transition to fully integrated systems

IT Toolbox

After a decade of using home-grown processes to manage its back-end infrastructure, interior furnishings and manufacturing firm Havelock AHI of Bahrain decided it was time to bring in professional-grade enterprise resource planning.

System 113
article thumbnail

GEP Procurement & Supply Chain Tech Trends Report

The technological landscape is dynamic and changes quickly. And for procurement and supply chain leaders looking to harness the power of technology to navigate complex challenges and an uncertain business environment, keeping up with the latest trends can be its own obstacle. So, what’s on the technological horizon for procurement and supply chain for the year ahead?

article thumbnail

CIO interview: Russell Harte, group technology director, DFS

Computer Weekly

The furniture store’s group head of IT speaks to Computer Weekly about how customer experience can be used internally

Groups 169
article thumbnail

Big Data Comes of Age: What's Next? - Part 6

IT Toolbox

Part 6: Options for Unstructured Data

Big Data 113
article thumbnail

High percentage of education organisations were victims of DNS attacks in 2016, survey finds

Computer Weekly

The majority of worldwide education organisations were hit with a DNS attack in 2016, according to a survey from EfficientIP

Survey 139
article thumbnail

4 data-driven ways to digitize your business

Dataconomy

In today’s digital landscape, customers expect you to deliver products and services in a fast and efficient manner. Heavyweights like Amazon and Google have set a bar in terms of operations, and they’ve set it high. An increasing need for more streamlined and efficient processes, combined with advancing technologies has. The post 4 data-driven ways to digitize your business appeared first on Dataconomy.

Data 78
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Uber fails to get licence to operate in London renewed

Computer Weekly

Transport for London has rejected Uber's application for its licence renewal, citing a lack of corporate responsibility as the reason

article thumbnail

Technology Short Take #87

Scott Lowe

Welcome to Technology Short Take #87! I have a mix of newer and older items for you this time around. While I’m a bit short on links in some areas, hopefully this is outweighed by some good content in other areas. Here’s hoping you find something useful! Networking. Vincent Bernat has a really in-depth article on IPv4 route lookup on Linux (and one on IPv6 route lookup as well).

Storage 60
article thumbnail

Three “W” Factors in Innovators

Future of CIO

Creativity is infused with an inner cohesiveness and comes from a vision of uniqueness. Creativity is everything that people dream, see, feel, touch. All our experiences are completely reconfigured in a way that mixes up all of the important elements to spark creativity. Creativity is as much defined by the problem as by the capacity of the individual to connect things to resolve that problem in new and sometimes unexpected ways.

System 45
article thumbnail

Three Aspects to Groom a Unique CIO

Future of CIO

Digital CIOs should have unique mindsets, skillsets, and even a unique title, become the top business leader to lead digital transformation smoothly. CIO is the leadership role, every leader is unique, and thus, every CIO is unique. The leadership roles such as CIO need to share the unique point of view, to break down conventional wisdom and lead their organization up toward the next growth cycle and catalyze digital transformation with faster speed.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

The New Book “Digital Fit: Manifest Future of Business with Multidimensional Fit” Chapter 5 Introduction: Talent Fit

Future of CIO

The right people with digital talent fit are the ones who possess the right mind with high mature thinking ability, updated knowledge, unique skills, differentiated capabilities, and good behaviors. “Hiring the right person with the right capability for the right position at the right time,” is the mantra of many forward-thinking organizations. The question is how would you define the right people and what does the "Digital Fit" mean.