Mon.Feb 25, 2019

article thumbnail

Just Published: The Forrester Retailer Wave™ On US Mobile Apps

Forrester IT

Today’s Retail Apps Meet mCommerce Purpose, but Fail To Inspire Omnichannel Shopping Brendan Miller and Madeline King The Forrester Industry Wave evaluates digital experiences of firms; they highlight digital best practices from leading firms and help our clients better understand what digital strategies will best win, serve and retain customers.

Retail 353
article thumbnail

How AI Enabled Chatbots Can Help Your Business

CTOvision

AI enabled chatbots are rapidly becoming part of our every day lives. They are being adopted by many different industries and being used on the front line of customer engagement. Chatbots can be integrated into customer support service teams to answer common or basic questions. They can also suggest products or services based on customer preferences […].

Industry 243
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Forrester’s Top Customer Experience Research Findings Of 2018

Forrester IT

Forrester’s customer experience (CX) research team published more than 100 reports in 2018. I just released a report that pulls together our most important CX findings from those publications and highlights them in one place. The report is called “Forrester’s Top Customer Experience Research Findings Of 2018.

Research 343
article thumbnail

Facebook expands its internet infrastructure projects

CTOvision

Like every year, Facebook is using MWC Barcelona to focus on its infrastructure projects. While you may mostly think of Facebook as a social network, the company started launching infrastructure projects for connecting bringing more people online (and onto its network) many years ago. These projects include things like the (now-canceled) solar-powered Aquila drone and plenty […].

Internet 213
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FORRward: A Weekly Read For Tech and Marketing Execs

Forrester IT

Are we running out of ideas? As the pace of disruption accelerates, there is an increasingly important focus being put on innovation. Now along comes some work published in the MIT Technology Review by economists from MIT, Harvard, and Boston University, AI is reinventing the way we invent, that highlights how the increasing amount […].

339
339
article thumbnail

Airline seats now equipped with cameras

CTOvision

The traveling public should pay attention to this one. Is this a violation of your privacy? Not in any legal sense, you are pretty much in a public place when on commercial air. But still it could be so creepy and such a violation of what we believe should be a private time that it […].

Airlines 209

More Trending

article thumbnail

Why Do I Need Blockchain If I Have A Database?

CTOvision

Read Chris Murphy’s article about how to use blockchain technology to unleash the true power of a database on Forbes : Because there’s so much excitement about the potential of the blockchain, there’s a risk that project planners will start throwing this emerging technology at problems that don’t fit. This article is meant to help you […].

How To 196
article thumbnail

Understanding AI - 3 Must Read AI Books for CIO and IT Leaders

Social, Agile and Transformation

s Last year I keynoted several talks on AI in the Enterprise: Finding Quick Wins and Avoiding Speed Bumps???. This talk is on the practical side of getting started with machine learning. Among my recommendation, I suggest IT leaders invest in data quality and other data governance efforts, perform POCs with some of the more mature AI areas, and find partners that can educate and validate.

Education 151
article thumbnail

Microsoft shrinks Kinect into a $399 cloud-powered PC peripheral

CTOvision

Kinect originally debuted as an Xbox 360 accessory for motion sensing so you could control games with your hands or body. While it was a successful console accessory initially, its bundling and lack of games with the Xbox One forced Microsoft to rethink its entire approach to Kinect. Microsoft is now packaging up all of […].

Microsoft 196
article thumbnail

SCCM IBCM Vs CMG Changes – Revolutions – Really?

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Isn’t a revolution (really?) happening with Digital Transformation? Let’s check the SCCM internet client management revolutions. In this post, I will try to give a quick SCCM IBCM Vs CMG comparison. What is SCCM Internet Client Management? Managing SCCM clients from the internet is called Internet client management.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

IoT And The New Digital Pollution

CTOvision

Read why Sam Curry says that the surge in the Internet of Things products could lead to digital pollution on Forbes : We have many forms of pollution that plague Humanity and our world. From noise pollution where we can’t escape the sounds of the Anthropocene to water pollution choking up our rivers, lakes, and oceans. […].

Internet 194
article thumbnail

ICANN urges adopting DNSSEC now

Network World

Powerful malicious actors continue to be a substantial risk to key parts of the Internet and its Domain Name System security infrastructure, so much so that The Internet Corporation for Assigned Names and Numbers is calling for an intensified community effort to install stronger DNS security technology. Specifically ICANN is calling for full deployment of the Domain Name System Security Extensions ( DNSSEC ) across all unsecured domain names.

Internet 132
article thumbnail

microSD Express unlocks hyper-fast data speeds for mobile devices

CTOvision

The SD Association has unveiled microSD Express, a new format that will bring speeds of up to 985 Mb/s to the tiny memory cards used in smartphones and other devices. Like SD Express, it exploits the NVMe 1.3 and PCIe 3.1 interfaces used in PCs to power high-speed SSDs. The tech is incorporated into the […].

Mobile 194
article thumbnail

It's up to Smart Humans to Stop Being Stupid About AI

Information Week

As AI becomes a bigger and perhaps transformative technological force, it's crucial to recognize that artificial intelligence is only as good as the genuine human thinking that goes into it.

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

ICANN urges adopting DNSSEC now

Network World

Powerful malicious actors continue to be a substantial risk to key parts of the Internet and its Domain Name System security infrastructure, so much so that The Internet Corporation for Assigned Names and Numbers is calling for an intensified community effort to install stronger DNS security technology. Specifically ICANN is calling for full deployment of the Domain Name System Security Extensions ( DNSSEC ) across all unsecured domain names.

Internet 113
article thumbnail

Planning a Trustworthy Citizen Data Science Initiative

Information Week

Once organizations accept that citizen data science is inevitable, it's time to ensure that it's implemented responsibly.

Data 99
article thumbnail

Modern Technology Can Help You Save Time and Money: 5 Reasons to Hire an IT Consultant

Galido

Information Technology Blog - - Modern Technology Can Help You Save Time and Money: 5 Reasons to Hire an IT Consultant - Information Technology Blog. One of the biggest mistakes businesses can make it handing responsibilities to existing employees without the experience and specialist knowledge required to perform the jobs effectively. Businesses do this in the belief that by using an existing employee, they can save money on the payroll.

Data 77
article thumbnail

Announcing My New Book Data Infrastructure Management Insight Strategies

Storage IO Blog

Announcing My New Book Data Infrastructure Management Insight Strategies Announcing my new book Data Infrastructure Management Insight Strategies published via Auerbach/CRC Press is now available via CRC Press and Amazon.com among other global venues. My Fifth Solo Book Project – Data Infrastructure Management Data Infrastructure Management Insight Strategies (e.g. the white book) is my fifth […].

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Enter to Win Free IT Team Training | Birthday Invitation

Linux Academy

You’re invited to join us in celebrating our 7th birthday and we’re giving YOU the gifts! It’s your chance to win a team account with 7 free seats,* a limited edition sticker, and claim 30 free gems! *Winner of the team account will receive one year of free membership for a team account, which must be used for a company-affiliated account for new members only (cannot be applied as a discount for existing team members).

article thumbnail

Share and share alike?

ComputerWorld IT Management

Small but busy database group shares a network volume with this company’s CAD group, which of course has a gluttonous appetite for disk space. And in fact the database group keeps running out of room on the volume for new projects, which holds them up for hours every time until the network admins find ways to free up some space. One day while everyone in the database group is waiting, fish on the team jokingly suggests to the supervisor that he could create a huge database of random characters,

Groups 45
article thumbnail

Patch Management | Roadmap to Securing Your Infrastructure

Linux Academy

In the last post, we discussed vulnerability scanning, which will lead directly to patching most of the time. When we think of patching, we most often think of patching our servers and workstations operating systems, but we can’t stop there. What do you mean we can’t stop there? What else is there? Well, there’s all of your network devices, IoT devices, hypervisors, and let’s not forget about all of those wonderful applications!

article thumbnail

Shaping IT from a Change Laggard to Digital Trendsetter

Future of CIO

Traditional IT organizations are often inside-out operation-driven, mechanical and monolithic, it’s perceived by business as a controller and change laggard. Because in many cases, the business continues to evolve faster in grasping the market share and winning new customers, but sometimes failed due to lack of real-time information to capture customer insight.

Trends 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Decentralized Identifiers

Phil Windley

Summary: Decentralized identifiers are one of the foundational ideas for supporting self-sovereign identity. This post describes how decentralized identifiers work. Decentralized identifiers are one of several foundational technologies for building a metasystem for self-sovereign identity. I wrote about verifiable credentials and their exchange previously.

article thumbnail

The Best “Creativity Quotes of “Digital Master” Feb. 2019

Future of CIO

"Digital Master ” is the series of guidebooks (25+ books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.” It perceives the emergent trends of digital leadership, advises on how to run a digital IT organization to unleash its full potential and improve agility, maturity, and provide insight about Change Management.

Trends 40
article thumbnail

The Monthly “Performance Master’ Book Tuning: Performance Measurement and Metrics Feb. 2019

Future of CIO

Corporate Performance Management is a management control from strategy till shop floor. "If you can't measure, you can't manage," legendary management guru Peter Drucker once asserted. Managing performance means understanding results, setting metrics, fixing plans, and making decisions to ensure it happens. It takes multifaceted approaches from multidimensional perspectives to unlock digital performance and catalyze change.