Mon.Apr 17, 2017

article thumbnail

Is Business Intelligence (BI) Market Finally Maturing? Forrester Three Big BI Market Predictions

Forrester IT

No. The buy side market is nowhere near maturity and will continue to be a greenfield opportunity to many BI vendors. Our research still shows that homegrown shadow IT BI applications based on spreadsheets and desktop databases dominate the enterprises. And only somewhere between 20% and 50% of enterprise structured data is being curated and available to enterprise BI tools and applications.

article thumbnail

Six Ways to Make ERP More Employee-Friendly

IT Toolbox

ERP systems are foundational for many businesses, but they aren’t typically sexy or easy to use, even for firms that have chosen web-based systems. That can be a problem. If employees find their ERP system clunky and hard to use, they will avoid it whenever possible.

System 165
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A One-Year I&O Transformation

Forrester IT

Back when I worked in I&O we weren't very popular. Not personally, mind you, but as a team. Why? Because we seldom satisfied user requests quickly, and sometimes not at all. We were the defenders of stability, resistant to change. Just maintaining the technology every day - "keeping the lights on" - took a lot of manual effort. We chased down a lot of defects, and then we struggled to get fixes created and put into production.

Agile 189
article thumbnail

Defining Your Agile Release Management Strategy

Social, Agile and Transformation

In my last post, I asked whether continuous deployment is right for all businesses and suggested a number of business criteria and technology capabilities to help determine whether organizations should go beyond continuous integration and continuous delivery to a full continuous deployment operation. I recommended in an earlier post that release management strategies are important to agile.

Agile 150
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Move to the Cloud, but Mitigate Risk

Data Center Knowledge

Cloud providers can’t help enterprises with data security and that’s what enterprises need to think about. Read More.

Cloud 175
article thumbnail

Five of the Newest (and Best) ERP Features and Trends

IT Toolbox

With new technologies on the horizon, enterprise resource planning (ERP) software is swiftly moving into a more advanced stage of development. Its next-generation model promises to offer high-tech features such as expanded, more-powerful cloud platforms and innovative, high-performance artificial intelligence (AI) applications.

More Trending

article thumbnail

Virtual assistants hear everything, so watch what you say. I’m not kidding

Network World

The law of unintended consequences is once again rearing it’s ugly head: Google, Apple, Amazon and others now make virtual assitants that respond to commands, and recordings can trigger them. Burger King found out how, via a radio commercial, it could get Google’s attention. It produced an ad designed to trigger Google Home to advertise the Whopper.

article thumbnail

5 New ERP Software Features All Business Owners Need to Know About

IT Toolbox

Rapid innovations in technology are challenging the traditional model of ERP delivery. With the shifting trends in how we do business and the pressing demands of a constantly changing marketplace, the once-monolithic nature of ERP is becoming obsolete.

Software 113
article thumbnail

Phishing Attack Results in $400,000 HIPAA Breach Fine

Data Center Knowledge

First settlement since new HIPAA enforcement leadership took charge this year Read More.

164
164
article thumbnail

How to overcome organizational resistance to change

IT Toolbox

Lets go back to the topic of change. Its a delightful topic and something generally worth pursuing, if you are strong and have a vision for another future. But as I've been writing of late, change is a tough put because moe times than not, your organization is against it. Most organizations are status-quo advocates of what they are doing today.

How To 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Oracle Targets Developers with Wercker Acquisition

Data Center Knowledge

Platform enables continuous integration and delivery using containers, microservices Read More.

Oracle 135
article thumbnail

Top 5 Reporting Tools for Enterprises in 2017

IT Toolbox

IT Central Station is a crowdsourced software reviews community where enterprise tech users publish their rankings, reviews and expert feedback on the technologies they use.

article thumbnail

Microsoft patches Shadow Broker exploits: Make sure you apply these updates

Tech Republic Security

Last Friday, Microsoft announced that it had already patched most of the exploits released by Shadow Brokers. Here's what that means for your business.

Microsoft 116
article thumbnail

Facebook Messenger not getting connected properly on an Android device

IT Toolbox

This post takes a look at a common FB Messenger problem

150
150
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How sms monitoring technology can secure your business?

Galido

Monitoring technology has become an integral part of a business. Given the positivity it brings through surveillance, companies are opting for. monitoring tools and techniques to ensure better employee management. The basic need of an organization is to safeguard its workplace and protect its assets. Entrepreneurs are increasingly concerned about issues including employee misconduct, data security, lower productivity, wastage of valuable time, etc.

Security 100
article thumbnail

31 tech pros share favorite IT products

Network World

What's to like? Image by Vicki Lyons, Prakash Kota, Julie Ulrich and David LeDoux Every year we ask IT pros to share their favorite enterprise products, and every year we learn what it takes to win them over — including gear that saves time and money, bolsters security, and streamlines digital transformations. Read on to learn what 31 tech pros like best, in their own words.

article thumbnail

Report: Despite privacy concerns, 43% of consumers offer personal data in exchange for discounts

Tech Republic Big Data

A recent study from [24]7 found that consumer willingness to share personal data with companies was tied to opportunities to save money or resolve problems faster. Here's what your business can learn.

Data 82
article thumbnail

IoT malware clashes in a botnet territory battle

Network World

Mirai -- a notorious malware that's been enslaving IoT devices -- has competition. A rival piece of programming has been infecting some of the same easy-to-hack internet-of-things products, with a resiliency that surpasses Mirai, according to security researchers. "You can almost call it Mirai on steroids," said Marshal Webb, CTO at BackConnect , a provider of services to protect against distributed denial-of-service (DDoS) attacks.

Malware 76
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

On the Verge of VR Gaming; Are we ready?

IT Toolbox

This post takes a detailed look at VR gaming.

100
100
article thumbnail

5 must-have security tools

Network World

New York’s Montgomery County, located at the foot of the Adirondacks, consists of 10 towns, one city and 50,000 residents. To protect the data that pertains to its citizens and operations, Montgomery County added DatAdvantage from Varonis to its arsenal of security wares. The data security platform is designed to show organizations where sensitive data exists, who is accessing it, and how to keep it safe.

article thumbnail

DockerCon 2017 Black Belt Session: Cilium for Network and Application Security

Scott Lowe

This is a liveblog of the DockerCon 2017 Black Belt session led by Thomas Graf on Cilium , a new startup that focuses on using eBPF and XDP for network and application security. Graf starts by talking about how BPF (specifically, extended BPF or eBPF) can be used to rethink how the Linux kernel handles network traffic. Graf points out that there is another session by Brendan Gregg on using BPF to do analysis performance and profiling.

article thumbnail

The rising security risk of the citizen developer

Network World

While shadow IT was always a challenge for enterprise IT teams, it rapidly started to accelerate with the growth of the smartphone, and then cloud computing with the incredible expansion of public cloud infrastructure and software as a service offerings that made it as easy as providing a credit card to access a cloud service. Today, shadow IT has spread beyond smartphones, tablets, and cloud services and is rapidly extending into the domain of the enterprise developer.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The human side of the data revolution

ComputerWorld IT Management

For over a decade, data has been at or near the top of the enterprise agenda. A robust ecosystem has emerged around all aspects of data (collection, management, storage, exploitation and disposition). And yet in my discussions with Global 2000 executives, I find many are dissatisfied with their data investments and capabilities. This is not a technology problem.

Data 67
article thumbnail

What it takes to be a security consultant

Network World

IT security consultants tend to be busy people. Given the widespread shortage of professionals with skills in many different aspects of cyber security, organizations frequently need help from outside experts. Like many others who work in information security, Kevin Beaver, did not initially set out to pursue a career in the field—or to eventually become an independent IT security consultant.

article thumbnail

IDG Contributor Network: Mirror, mirror on the wall, will you leave me any shoppers at all?

ComputerWorld IT Management

The interplay between store associates and in-store technology has always been a delicate balancing act. When the tech helps the associate be an all-knowing partner to the shopper, it's a great thing. But when the tech is deployed so that the associate seems to just get in the way, it can ultimately undermine the in-store experience. Enter the HiMirror.

Retail 48
article thumbnail

Cybercrime—from inside an Ohio prison

Network World

Plenty of companies have smart, resourceful IT teams that diligently support their organization’s computers and networking operations. But I’m not sure how many of them could pull off the technological tricks that a group of inmates at Ohio’s Marion Correctional Institution did. From e-waste to identity theft. According to local news reports that blew up over the internet last week, at least five prisoners built a pair of working PC out of parts scavenged from e-waste as part of a program design

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Big Data 101: Intro To Probabilistic Data Structures

Dataconomy

Oftentimes while analyzing big data we have a need to make checks on pieces of data like number of items in the dataset, number of unique items, and their occurrence frequency. Hash tables or Hash sets are usually employed for this purpose. But when the dataset becomes so enormous that. The post Big Data 101: Intro To Probabilistic Data Structures appeared first on Dataconomy.

article thumbnail

Cyber-sleuth boots 15 cheaters from today’s Boston Marathon

Network World

Here in Hopkinton, Mass., this morning, 15 fewer runners – cheaters, actually -- are gathering for the start of the Boston Marathon than would have otherwise, thanks to the cyber-sleuthing efforts of an Ohio business analyst. Derek Murphy has made it his business to purge marathoning and, in particular, the Boston competition, of those who by hook, crook – or writing a check – seek to run as official entrants without having done the training to produce a legitimate qualifying time.

article thumbnail

The Monthly Foresight: Building Ultra-Modern Digital Organizations

Future of CIO

Digital transformation is rarely a straight line. It is all about interaction, incrementalism, and innovation. The effects of an increasingly digitalized world are now reaching into every corner of businesses and every aspect of organizations. Digital is the age of creativity and innovation, creativity is the most wanted trait for digital leaders and professionals today, and innovation is the light every organization is pursuing.

How To 40
article thumbnail

Facebook yanks video of cold-blooded murder, responds to ‘horrific crime’

Network World

In the age of livestreaming, you never know what you might see. Such was the case yesterday, on Easter Sunday, when 37-year-old Steve Stephens took an innocent man’s life and caused panic in Ohio. Stephens, who claimed to be mad at his girlfriend, was driving around until he spotted a random stranger walking on the sidewalk. He said it was her fault that he was about to murder him.

Video 60
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.