Thu.Apr 11, 2019

article thumbnail

Get Sirius About Customer Engagement Marketing

Forrester IT

In 2003, Fred Reichheld, who was by then a partner at Bain & Company, introduced a way of measuring how well an organization treats its customers. This metric also assessed how well a firm generates relationships worthy of loyalty. Sixteen years later, most business people recognize this metric as the Net Promoter Score™. Mr. Reichheld […].

.Net 351
article thumbnail

Yahoo data breach settlement effort reaches $117.5 million

CTOvision

Yahoo has once again attempted to settle a class-action lawsuit involving millions of users following one of the largest data breaches in history with a revised settlement figure of $117.5 million. On Tuesday, the proposed resolution to the lawsuit was made public. The revised figure of $117.5 million has been made in response to criticism made […].

Data 243
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Introducing Forrester’s Consumer Energy Index: A Formula For Consumer Innovation Readiness

Forrester IT

CMOs’ ability to impress and influence consumers becomes more difficult with each new technology and experience that enters the market. Despite a myriad of headlines about the awe-inspiring potential of AI or the wave of entrepreneurs dreaming up the next moonshot, consumers contend with more glitter than gold. The reality today is that: Businesses struggle […].

Energy 309
article thumbnail

Web threats affecting SMBs in 2019

CTOvision

How safe is my business online? This question goes through our minds quite a bit as we click around our emails, scroll various web pages, and consent to cookies that track our data. With a robust internet audience of over 4 billion active users, the web has turned into a playground full of data for cybercriminals. […].

Internet 222
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Marketing Cloud Vendors Pick Up Where CDPs Left Off

Forrester IT

The last couple weeks have been an exciting time for the customer data platform (CDP) category. At long last, major marketing technology vendors formally declared their intentions to get serious about managing and activating data for marketing. For the CDP community, the entry of marketing clouds is a big deal, carrying equal parts excitement over […].

Cloud 290
article thumbnail

Mozilla adds fingerprinting and cryptocurrency mining protection to Firefox

CTOvision

Mozilla is adding a new feature to protect you against web annoyances in future releases of Firefox. The new feature is currently available in the beta version of Firefox 67, and the nightly version of Firefox 68. They will be available in the stable release of Firefox in a few weeks. The cryptomining and fingerprinting blocks […].

Security 213

More Trending

article thumbnail

As the connectivity of trucking fleets grows, so do cybersecurity risks

CTOvision

Connectivity is changing commercial truck fleet operations. While the development of autonomous heavy vehicles is still in early stages, fleet owners have been increasingly relying on “connected” trucks to improve their uptime, safety, fuel efficiency and tracking, among other things. But every connected technology — from telematics and remote diagnostics to in-cab software and on-board […].

Software 207
article thumbnail

The Security Snapshot: 10-Year Challenge

Forrester IT

At the start of the new year, a meme called the 10-Year Challenge went viral. The premise is simple: Post a photo of yourself in 2009 and a photo of yourself in 2019 to highlight certain changes that may have taken place in that time. Besides the security concerns of social media sites potentially mining […].

Security 275
article thumbnail

Anatomy of a Cloud-Native Data Breach

CTOvision

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a result, cloud-native data breaches frequently have different characteristics and follow a different progression than physical data breaches. Here is a real-life example of a cloud-native data breach, how it evolved and how it […].

Cloud 197
article thumbnail

The Good, The Bad, And The Ugly Of Office Design

Forrester IT

Much of my research on Agile team working, developer spaces, and innovation labs is guided by my strong belief that even in the face of seemingly insurmountable problems, there are small changes within your control that you can make to just get started (whoever you are, whatever role you’re in). Part of those changes can […].

Agile 249
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ensuring Compliance When Deploying a Self-Updating Application

Mick's IT Blog

In my list of recent security projects, I needed to ensure certain applications are present on systems by using SCCM application deployment. One of those applications was Dell Command | Configure. The issue with this application is the Dell Command | Update will update the application which in turn would register it as not installed to SCCM, thereby kicking off the installation again.

article thumbnail

Are You “Fit” Enough To Be Future Fit?

Forrester IT

We released Forrester Future Fitness just over a week ago and the good questions keep rolling in. People are intrigued, many of them for the reasons that motivated us in the first place to create the future fitness concept and tool. First things first, if you need an overview of what future fit is, I […].

Tools 236
article thumbnail

How to Deliver Workplace Safety Training on Mobile Devices

Kitaboo

Why Is Workplace Safety Training Important? Safety training is an important part of the employee onboarding process. If there’s a mishap at your workplace and an employee gets hurt, s/he could file a lawsuit against you. In such a scenario, if your organization is found to be non-compliant with the safety norms, it will not only affect your company reputation, but will also cost you money.

Training 113
article thumbnail

Digital Reality is Ready to Roll

Information Week

If years of hype have left you skeptical, all signs now point toward reasons to believe that digital reality is ready for its transformative moment.

114
114
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How can you be AI ready?

Dataconomy

Organizations implementing AI have increased by 270 per cent over the last four years, according to a recent survey by Gartner. Even though the implementation of AI is a growing trend, 63 per cent of organizations haven’t deployed this technology. What is holding them back: cost, talent shortage? For many. The post How can you be AI ready? appeared first on Dataconomy.

Survey 78
article thumbnail

How Cloud Shifts Security Balance of Power to the Good Guys

Information Week

Cloud providers have the resources to fortify their data centers and hire armies of security pros, but they wield other powerful weapons to protect customer data.

Cloud 100
article thumbnail

Cloud Playground Challenge

Linux Academy

Here at Linux Academy, we not only want to help you learn but also to see what you can do with your knowledge! That’s why we are introducing the Cloud Playground Challenge. This challenge is a way to show your skills while gaining between 2,000 to 10,000 gems to spend on special swag from our Swag Store ! So, what’s the challenge? We want to see you create your own Cloud Playground Project!

Cloud 60
article thumbnail

8 Challenges DevOps Faces Today

Information Week

DevOps adoption is growing - and facing some growing pains.

Devops 113
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Executive dashboard best practices: 7 rules to follow

mrc's Cup of Joe Blog

Summary: Executive dashboards help business leaders get a clear view of their organizations at a glance. But, not all dashboards are created equal. How can you create effective dashboards for your executives? In this article, we explore a few best practices to follow when creating dashboards. photo credit: Negativespace via pixabay cc Let’s talk about dashboards.

Data 45
article thumbnail

Google Unveils Hybrid Cloud Platform Anthos

Information Week

The reveal at the Google Cloud Next conference opened the door for Google to play a bigger role in cloud transformation.

Google 78
article thumbnail

The “Soul” of Digital Organization

Future of CIO

We are experiencing the major societal transformation from the industrial machine age with information scarcity to the digital era with knowledge abundance. Consider digital organizations as the self-organized but interlaced environment, going digital is the fundamental shift from the mindset to behavior. It is the movement from static to flow, silo to holistic, and mechanical to organic.

Social 40
article thumbnail

Hannover Messe 2019 – Notes from a First-Timer

Nutanix

I’m no conference newbie; I’ve been to some pretty major shows. CES is probably the largest, with over 185,000 attendees. But Hannover Messe is even bigger—with over 220,000 attendees—and is almost a city in itself.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Best “Progress” Quotes of “Digital Master” Apr. 2019

Future of CIO

" Digital Master ” is the series of guidebooks (27+ books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.” It perceives the emergent trends of digital leadership, advises on how to run a digital organization to unleash its full potential and improve agility, maturity, and provide insight about Change Management.

Agile 40
article thumbnail

5 Ways to Improve your IT Infrastructure

Nutanix

No matter how up-to-date your datacenter may seem, there’s always room for improvement.

20
article thumbnail

The Monthly “Unpuzzling Innovation” Book Tuning: Digital Innovation Pillars & Driving Forces Apr 2019

Future of CIO

Digital is the age of innovation. And innovation is what leads to differentiation. There are many ways to differentiate and, therefore, there are many ways to pursue innovation. Digital Master refers to those high-performing, highly innovative and high-mature (less than 15%) digital organizations; at the individual level, Digital Masters are those cross-generational digital professionals who are equipped with the advanced digital minds and build a unique set of digital capabilities.

article thumbnail

How to Avoid the Potential Security Risks Associated with Online Gaming?

Galido

Information Technology Blog - - How to Avoid the Potential Security Risks Associated with Online Gaming? - Information Technology Blog. An online duel with your buddies always sounds fun. Even as a single player, you can find exciting virtual games. It is easy to pick your favorite one from a wide spectrum and jump into the field right away. While doing so, the last thing on your mind is to think about security threats.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Domains of Cybersecurity : A Brief Overview | Hacking into Cybersecurity

Linux Academy

Welcome back to the Hacking into Cybersecurity series. In our previous posts, we’ve focused more on helping you land a cybersecurity position. Here, we’re going to talk about one of the major topics we previously mentioned in passing: the domains of cybersecurity. Something we see happen in most organizations is that the domains are split into different departments under the security umbrella.