Wed.Feb 05, 2020

article thumbnail

Three Sacred Myths Of The Hong Kong Digital Life Insurance Market

Forrester IT

Hong Kong (China) is one of the most sophisticated life insurance markets in the world which has attracted hundreds and thousands of customers from mainland China and many other places. In recent years, the emergence of digital-only insurers and tech giants brought new elements to the insurance fertile land and challenges much old thinking. Let […].

Insurance 469
article thumbnail

How to Leverage AI to Upskill Employees

CTOvision

Read Milena Marinova’s article about how to upskill employees with the help of artificial intelligence on Entrepreneur : One of the largest economic revolutions of our time is unfolding around us. Technology, innovation and automation are redrawing the career paths of millions of people. Most headlines focus on the negative, i.e. machines taking our jobs. […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Marketers, You Might Hate Abiding By New Data Restrictions, But Doing Nothing Isn’t An Option

Forrester IT

(coauthored with David Novitzky) Marketers use a wealth of consumer data for digital media buying, audience insights, targeting, measurement, and personalization. Unfortunately, this data dependency has put them in a precarious situation: The once abundant pool of consumer data is drying up thanks to privacy regulations, browser protections, and walled gardens’ unwillingness to share data […].

Data 446
article thumbnail

UK urged to regulate how tech giants like Facebook and Google target you with content

CTOvision

The U.K. should regulate internet platforms like Facebook and Google over their use of online targeting algorithms and force them to share data with researchers, an advisor to the government has said. The Centre for Data Ethics and Innovation (CDEI), an advisory body set up by the government in 2018, released a 121-page report on Tuesday […].

Google 235
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

If You Need Somebody – Not Just Anybody – Data Literacy Help Is Here

Forrester IT

Some organizations need a little help with data literacy – getting their feet on the ground. Maybe they can’t seem to move the bar in terms of using data to make decisions. Or they sense their employees struggle to understand; they’re not so self-assured when it comes to data. Others lack resources and talent needed […].

Data 364
article thumbnail

Intel dumps its Nervana neural network processors for Habana’s AI chips

CTOvision

Intel Corp. has decided to end development work on its Nervana neural network processors and will instead focus its efforts on the artificial intelligence chip architecture it acquired when it bought out Habana Labs Ltd. for $2 billion in December. The news was revealed Friday by Moor Insights & Strategy analyst Karl Freund in an article […].

Intel 250

More Trending

article thumbnail

Artificial Intelligence Will Do What We Ask. That’s a Problem.

CTOvision

Read Natalie Wolchover’s commentary on why artificial intelligence is an ethical minefield on Quanta Magazine : The danger of having artificially intelligent machines do our bidding is that we might not be careful enough about what we wish for. The lines of code that animate these machines will inevitably lack nuance, forget to spell out […].

article thumbnail

Adaptive Enterprises Have The Need For Speed

Forrester IT

CIOs and CMOs who successfully position their teams as customer experience drivers and digital transformers are successfully accelerating their investments with agility. In many of these same firms, however, they often face challenges from other business units who don’t see agile methods fitting their business processes. Pushing for agility with them doesn’t prove successful.

article thumbnail

How AI is shaping financial services

CTOvision

Artificial intelligence (AI) is in the process of transforming a variety of models in the global financial services industry, a global survey jointly conducted by the Cambridge Centre for Alternative Finance (CCAF) at the University of Cambridge Judge Business School and the World Economic Forum suggests. The study, supported by EY and Invesco, demonstrates that AI […].

Financial 182
article thumbnail

The Evolution Of Enterprise Detection And Response

Forrester IT

When the endpoint detection and response (EDR, which was also referred to as endpoint threat detection and response, or ETDR, at the time) market was getting started, there was a lot of pushback, ranging from privacy concerns to what the acceptance of a second security agent on endpoints would be (apparently, it was never going […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ConfigMgr 1910 Out of Band Hotfix KB4538166 Client Fix|SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Microsoft released Out of Band Hotfix KB4538166 for Configuration Manager 1910 version. As per the KB article this hotfix fixes three (3) known issues. More details about the fixes are explained in the below post. NOTE! – I would recommend reading ConfigMgr 1910 Known issues & video tutorial for SCCM 1910.

Windows 173
article thumbnail

Report: Smart bulbs have a major security problem

Tech Republic Security

Many Philips Hue smart light bulbs have a firmware flaw that leads hackers into an entire network, Check Point Research found.

Report 188
article thumbnail

How CIOs Can Help To Get More People To Take Cruises

The Accidental Successful CIO

Getting more people on the boat is going to take technology Image Credit: chumlee10. So the people with the CIO job who work for the big cruise lines have a bit of a problem on their hands. It turns out that when people are planning on traveling, they generally don’t plan on taking a cruise. Right now less than 4% of Americans take a cruise each year.

Travel 130
article thumbnail

Vertical AI is the New Black

Information Week

The reality of AI adoption is out of sync with the hype that AI has generated. However, where artificial intelligence is prepared to prove itself is in vertical market applications.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Cisco patches a security glitch affecting routers, switches and phones

Network World

Cisco has issued fixes for five security glitches that can be found in a wealth of its networked enterprise products – from switches and routers to web cameras and desktop VoIP phones. The problems center around vulnerabilities in the implementation of the Cisco Discovery Protocol (CDP) that could let remote attackers take over the products without any user interaction.

VOIP 138
article thumbnail

New Decade, New You: The Evolution of the CIO

Information Week

Differentiate your enterprise by going more in-depth with cloud, leveraging data and analytics, embedding AI, and putting security at the center of the business.

article thumbnail

How to defend your organization against the latest malware, botnets and security exploits

Tech Republic Security

Though the fourth quarter of 2019 saw a decrease in malicious activity, threats such as the Emotet malware continued to thrive, says Nuspire.

Malware 134
article thumbnail

How to Know When a Cloud Computing Trend Has Come to Its End

Information Week

Even the best cloud computing trend must end: Why PaaS, serverless, OpenStack and multicloud have already seen their best days.

Trends 135
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to protect your organization from infrastructure as code security risks

Tech Republic Security

Infrastructure as code offers advantages in automating your data center management but also carries certain risks, says Unit 42, the global threat intelligence team at Palo Alto Networks.

article thumbnail

How to check your vulnerability to credential dumping

Network World

Use these techniques to see if attackers have harvested authentication credentials from your Windows network.

article thumbnail

Why certain companies are more heavily targeted by DDoS attacks

Tech Republic Security

Most of the targets in 2019 were in the gaming and gambling industries, says security company Imperva.

Company 120
article thumbnail

How Continuous Intelligence Enhances Observability in DevOps

Information Week

The escalation of data and workloads in the cloud calls for continuous intelligence to maintain order.

Devops 147
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Tips on keeping a Google Photos-type video bug from impacting cloud-based files

Tech Republic Security

The private videos of some Google Photos users were accidentally shared with other people. Here's how to secure online files to protect them from exposure.

Video 81
article thumbnail

Learner Spotlight: Jeff Sikala

Linux Academy

At re:Invent 2019, we sat down with Jeff Sikala, DevOps Engineer and friendly advocate and resource to his fellow Linux Academy learners. Jeff created his DevOps career through his own discipline and passion for learning. Read on to learn how he built his skills- outside of college and outside of the traditional IT route. Q: Where did your training with Linux Academy start?

Linux 72
article thumbnail

The Best “Zest” Quotes of “Digital Master” Feb, 2020

Future of CIO

" Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.” It perceives the emergent trends of digital leadership, provides advice on how to run a digital organization to unleash its full potential and improve agility, maturity, and provide insight about Change Management.

Agile 52
article thumbnail

Episode 2: How to get your recruiting metrics right in 2020 ft. The Crown

Hacker Earth

Welcome to the second episode of #NetflixandHire where we learn some great ways on how you can get your recruiting metrics right! For this, we’ve chosen a TV show we LOVE and we can all learn from— The Crown. Why? Because Queen Elizabeth sums it right— “In an increasingly complex world, we all need certainty.”. Source: Pop Culture Times. The show delivers an important message on how, as a leader, you are responsible not only for the well-being of yourself but everyone else around you, and that i

How To 12
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Monthly “Digitizing Boardroom” Book Tuning: "Accelerator" Corporate Boardroom Feb. 2020

Future of CIO

Modern corporate boards play significant roles in guiding businesses in the right direction and achieve expected business results. Due to the “VUCA” characteristics -Complexity, Uncertainty, Ambiguity, and Velocity of the Digital Era, the directorship in any organization must have the agility to adapt to changes and build abilities to advise, inspire and motivate a group of people toward accomplishing shared visions and goals.

article thumbnail

Building an Isolated Kubernetes Cluster on AWS

Scott Lowe

In this post, I’m going to explore what’s required in order to build an isolated—or Internet-restricted— Kubernetes cluster on AWS with full AWS cloud provider integration. Here the term “isolated” means “no Internet access.” I initially was using the term “air-gapped,” but these aren’t technically air-gapped so I thought isolated (or Internet-restricted) may be a better descriptor.

article thumbnail

Intrapreneurship Perception and Performance

Future of CIO

Corporate intrapreneurship has been recognized as a potentially viable, it is about creating new ventures from within established organizations to leverage the startup culture for catalyzing changes and inspiring innovation. It means promoting and sustaining organizational performance, renewal and corporate competitiveness. Intrapreneurship is about balancing innovation with other organizational priorities: With continuous disruptions and fierce competition, innovation is the “must-have” unique