Mon.Feb 10, 2020

How To Fight Bias In ML-Based Experiences

Forrester IT

Recently, I interviewed Carol Smith about AI and ethics — she’s a Senior Research Scientist at Carnegie Mellon’s Software Engineering Institute, and she told me: “You’re bringing yourself to the projects you do at work, and we’re all biased and flawed.

Worldwide Country AI Strategies and Competitiveness 2020


The race for competitive advantage in artificial intelligence (AI) is not just the domain of companies and organizations.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Three Ways Companies Value Customer Success Programs

Forrester IT

In the three years since publishing our first report on the customer success discipline’s relationship to customer experience management, I’ve had many conversations with Forrester clients about bringing customer success management into a business.

Government Leaders And Influencers Are Prioritizing AI


Read Kathleen Walch’s article on various AI leaders and influencers in the US Federal Government. In February of 2019 President Trump signed an executive order promoting Artificial Intelligence. This order was meant to spur interest, development and regulation of AI.

How AI Can Radically Change Your Business

AI is quickly becoming mainstream, thanks to its value-driving capabilities. Yet, even with such widespread attention, it still is one of the most misunderstood technologies out there. Here's how to make the most out of it and bring a positive change to your company.

Marketers, Make CX Your Valentine This Year

Forrester IT

This blog was co-authored by Cole Walsh. Although flowers and chocolates won’t be enough to embrace customer experience, prioritizing CX has never been more important in order to advance your firm’s marketing maturity.

Survey 118

More Trending

No matter how different your business is, you are in CX

Forrester IT

GetWhen I describe what customer experience management requires to be able to transform a CX vision into reality, I often hear from my audience: “this is interesting, but we are different“ The nature of that difference is then often stated as: we are operating in B2B, not B2C; or we operate in a heavily regulated […]. age of the customer customer experience Customer Experience (CX) CX cx culture

B2C 111

How Strong Enterprise Interest In 2020 Is Pushing Blockchain Technology Further


Read Biser Dimitrov explains how strong enterprise interest is pushing the growth of blockchain technology in 2020 on Forbes : We’re already one month into 2020 and it’s clear that this will be an exciting year for the enterprise blockchain space.

FORRward: A Weekly Read For Tech And Marketing Execs

Forrester IT

It’s Time To Treat The Discipline Of Software With Respect This isn’t another dig into an already told story about Iowa’s failed app.

Delight Employees and Empower IT to Shine at ITSM

Social, Agile and Transformation

Wake up! No one likes opening service desk tickets or using ITSM tools. Employees expect self-service capabilities and easy to use technologies.

Tools 141

Business Agile: A Roadmap for Transforming Your Management & Adapting to the VUCA Environment

Speaker: Peter Taylor, Speaker/Author, The Lazy Project Manager

Businesses everywhere are trying to “get business agile”—but it’s not easy to adapt to becoming this adaptive. How can conventional organizations succeed in this transformation? In this webinar, Peter Taylor will walk through the change process step by step, and look at a tried and tested transformation roadmap: benefits are outlined, solutions to common challenges offered, and tried and tested methods and tools provided. It will be a guide towards a decentralized and management style that offers more successful decision making through collaboration.

Learn How to Install a New Distribution Point Role|SCCM|ConfigMgr


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Configuration Manager Distribution Point is the content location for client devices. In this post, you shall learn how to install a New Distribution Point Role. – What is Distribution Point ?

What is vendor privileged access management?


Read Tony Howlett explain what vendor privileged access management means on Secure Link : Most security and identity and access management (IAM) managers have heard of Privileged Access Management or PAM by now. This technology applies additional controls and processes to the management of top-level or privileged credentials in order to prevent them from being […].

Bridge the IT Skills Gap With Data and Analytics

Information Week

Enterprises can benefit in many ways from internal and external data analysis. One of the most obvious is using data analytics to help close your IT team's skills gap

Four common challenges in public and private sector Cloud – Navigate the landscape for success


Moving into 2020, there are a number of Cloud computing challenges that both public and private sectors continue to wrestle with, namely: resourcing, data sovereignty and choice of Cloud provider. As with many aspects of IT they are related and, in some cases, will need to be solved together. Many Cloud and IT professionals choose […].

More Effective Agile Leadership

Speaker: Steve McConnell, CEO, Construx Software

In this talk, Steve McConnell, CEO of Construx Software, distills hundreds of companies’-worth of real-world experience into the proven Agile leadership practices that work best. Steve will seamlessly thread together traditional approaches, early Agile approaches, modern Agile approaches, and the principles and context that underlie them all—creating an invaluable resource for Agile leaders, their teams, and their organizations.

Data Architecture: 2.5 Types of Modern Data Integration Tools

Perficient - Digital Transformation

As we move into the modern cloud data architecture era, enterprises are deploying 2 primary classes of data integration tools to handle the traditional ETL and ELT use cases. The first type of Data integration tools are GUI-Based Data Integration solutions.

How New Security and Encryption Layers Strengthen Cloud Databases


Read Pierre-Yves Lanneau Saint Leger explain how new security and encryption layers will strengthen cloud databases on Toolbox : Protecting database management systems in the cloud is becoming steadily more difficult. Even large systems with sophisticated defenses run by Big Tech companies have been compromised. While hackers have breached cloud-based systems that store and retrieve data […].

SAP Gives Enterprise IT Customers an Extension

Information Week

ERP giant SAP wants all its customers to migrate to its new platform S/4HANA, but it's a time consuming and expensive process. So the company is extending maintenance on its earlier platform

SAP 58

Global shipping industry attacked by coronavirus-themed malware

Tech Republic Security

Hackers are using malicious emails about the coronavirus to trick people with a malware called AZORult

Architect Your Organization for Effectiveness, Productivity, and Joy

Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.

As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. Yet, structuring our teams and organizations is a critical factor for success. In fact, the impact of software architecture parallels the impact of organizational structure. We are excited to welcome Ron Lichty, co-author of a seminal book on managing software teams and a well-known speaker, he’ll speak to organizing for effectiveness, productivity and joy.

Webinar Review: The 2020 State of DevOps for Oracle Cloud


The Importance of DevOps for Oracle Cloud More and more businesses are adopting DevOps and Oracle Cloud. And for very understandable reasons!

Top 5 infrastructure trends to know about in 2020

Tech Republic Data Center

Updating disaster recovery plans, protecting data, and implementing automation are some infrastructure trends businesses should focus on in 2020, according to Gartner. Tom Merritt offers more details

Recognize Behavioral Tracking's Opportunities and Pitfalls

Information Week

Understanding the details of customer behavior can increase sales and marketing ROI, but misusing that data can be expensive and unnecessary

Data 49

Who should lead the push for IoT security?

Network World

The ease with which internet of things devices can be compromised, coupled with the potentially extreme consequences of breaches, have prompted action from legislatures and regulators, but what group is best to decide? Both the makers of IoT devices and governments are aware of the security issues, but so far they haven’t come up with standardized ways to address them. Get regularly scheduled insights by signing up for Network World newsletters.].

An Adult Conversation About Estimates

Speaker: Beekey Cheung, Software Consultant, Professor Beekums, LLC

Estimates are a contentious topic in software development. Most of our development teams hate providing estimates and many managers are starting to view them as unnecessary. As senior software leaders, how can we determine whether estimates are helpful or harmful to our teams? We are excited to be joined by Beekey Cheung, a software consultant and blogger known as Professor Beekums, who has helped many leaders and teams go from fearing estimates to using them appropriately. He'll walk us through the value of estimates, how to overcome the hesitancy many have in giving them, and how to provide better estimates.

Top 5 infrastructure trends to know about in 2020

Tech Republic Data Center

Updating disaster recovery plans, protecting data, and implementing automation are some infrastructure trends businesses should focus on in 2020, according to Gartner. Tom Merritt offers more details

13 tips to avoid Valentine's Day online romance scams

Tech Republic Security

Scammers use dating sites to try to build relationships with people to get money or personal information. Here are 13 tips to protect yourself


The biggest challenges faced by recruiters in university hiring (+ perfect solutions)

Hacker Earth

My name is Mark and I am an HR Generalist by profession. I have recently joined a SaaS company and I have been asked to hire fresh graduates for various roles from different universities.

Media 62

How some presidential campaigns use DMARC to protect their domains from being spoofed

Tech Republic Security

DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail

The Six Principles of Persuasion

Speaker: Michael Carducci, CTO, Mago:Tech

As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard. Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.