June, 2018

Five Best Practices To Scale Data Science Across The Enterprise

Forrester IT

Nearly all firms want to do more with data science. However, executives and data scientists alike are frustrated by the difficulty of turning new initiatives into business impact at scale.

Machine learning risks are real. Do you know what they are? 

Eric D. Brown

Machine Learning Risks are real and can be very dangerous if not managed / mitigated. Everyone wants to ‘do’ machine learning and lots of people are talking about it, blogging about it and selling services and products to help with it.

When Cyberattacked, Should CIOs Share Information About The Experience?

The Accidental Successful CIO

When they are attacked, CIOs have to decide how much they want to share Image Credit: Blogtrepreneur. The person with the CIO job, you, is the person who is responsible for securing the company against attacks from outside.

Report 163

Serverless cloud computing is the next big thing

David Linthicum

Serverless computing in the cloud is a good idea— serverless computing is not just for the datacenter. Serverless cloud computing means the ability to get out of the business of provisioning cloud-based servers, such as storage and compute, to support your workloads, and instead use autiation at the cloud provider to allocate and deallocate resources automatically. Although there are cost advantages of serverless cloud computing, the real advantage is simplicity.

More Trending

12 Warning Signs of Bad Application Architecture

Social, Agile and Transformation

At a #CIOChat this weekend we were asked about warning signs for bad architecture. Here was my quick response capturing just a tweet-sized summary of architecture that "smells bad" - Too slow making biz needs. Too difficult/complex to explain to new technologists. Lack of defined integration process (closed system). Can’t be deployed to the cloud. Performance or stability issues. #. cio cloud computing it management software development software qa

How Should CIOs Handle Data From Employee’s Wearables?

The Accidental Successful CIO

More data is always better, but what if it’s personal data? Image Credit: Timo Newton-Syms Follow. As the person with the CIO job, you are the one who is responsible for managing all of the data that the company collects. We are all pretty used to what this means.

Sports 170

How to get the most cloud security

David Linthicum

One of the leading causes of data breaches is internal negligence due to poor training, according to the Ponemon Institute. But when the staff is educated and instructed on the proper practices, the risk of cyberattacks or data leaks can be reduced. Infact, you can reduce your risk more this way than with just the use of modern cloud security software and best security practices. What is cloud computing? Everything you need to know now.

How To 172

The commercial impact of IoT insecurity

CTOvision

Introduction A hacker recently shut down Bycyklen, Copenhagen’s public city bikes system, forcing employees to hunt down and manually reboot the Android tablet attached to every bike. The company said that restoring all bikes to working order would "take some time". Naturally, the costs of restoration will be significant. This is just one example of [.]. CTO Internet of Things News

3 Major Ways to Defend Your Business from Cyber Attacks

Doctor Chaos

The way we do business as a society has evolved over the years mainly due in part to technology like the internet. We can communicate instantaneously, complete transactions in record time, and almost everything we can think of can be attained with a few clicks.

Alexa, How Do I Fix Healthcare?

Forrester IT

Disruption is Bringing Much Needed Innovation to Healthcare Disruption is not new to healthcare, but the entrance of established brands from other industries signals a level of disruption that hasn’t been seen before. Healthcare Organizations take note, innovate now or become irrelevant tomorrow.

How to Remove Bulk Facebook Profile Content

Mick's IT Blog

Here is a video guide on how to remove bulk Facebook content from your Facebook profile. Some will just say to delete the profile and create a new one. That can be rather troublesome, especially if you have a lot of Facebook contacts and/or are well known in certain areas of expertise.

Video 150

CIOs Need To Learn How To Become Futurists

The Accidental Successful CIO

Futurist keep their eyes fixed on what may be coming our way Image Credit: ADiamondFellFromTheSky. I’ve got a quick question for you: how good is your ability to predict the future?

How To 151

How the cloud will kill your business

David Linthicum

One of the benefits of cloud computing is that it lets you punch above your weight. A business can quickly enable computing resources at a fraction of the cost it once paid, so cloud computing helps level the field for smaller businesses. This is good news for the smaller businesses. But it’s not such great news for larger companies that now face a smaller business that’s disrupting their market.

HBO’s Westworld: The Man In Black is a special kind of Twitter user

CTOvision

HBO’s Westworld is a modern take on the Michael Crichton SciFi tale of a robotic amusement park. The HBO version has a new twist. The creators/writers were all exposed to years of Twitter, which has influenced every episode and the entire arch of two seasons of the show. Now that season two is wrapping up, [.]. Artificial Intelligence CTO News Robots SciFi

How to Spot and Avoid Cryptocurrency Ponzi Schemes

Doctor Chaos

If you’re thinking about investing in cryptocurrency, it’s essential to be aware of potential Ponzi schemes that relate to the sector. Knowing about some common characteristics of Ponzi schemes can help you avoid them, whether they’re associated with cryptocurrency opportunities or other industries.

How To 130

Are You Modernizing Your B2B Go-To-Market Strategies?

Forrester IT

Last week I had the opportunity to speak at a dinner event with 20+ senior marketers and business partners that InsideView sponsored. We wanted to explore how well marketing and sales are facing up to new go-to-market challenges associated with buyer behavior change in general, ABM specifically.

B2B 160

Four Data Analytics Pitfalls and How to Avoid Them

Datacponomy

Data science has gone through a rapid evolution, fueled by powerful open source software and more affordable and faster data storage solutions. Universities have adapted to the increasing demand as well and are graduating analytically trained students at an unprecedented pace.

What Do CIOs Need To Know About Status Battles At Work?

The Accidental Successful CIO

CIOs need to understand that status at work does not follow a formal hierarchy Image Credit: Eugene Kim. When a member of your department does a good job, all of a sudden you find yourself in a difficult position. You’d like to show this individual that they did a good job and that you appreciate it.

Groups 141

3 common machine learning mistakes to avoid

David Linthicum

I’m a big fan of cloud-based machine learning and deep learning, and AI in general. After all, you can’t be a geek without imagining having a conversation with an artificially intelligent being that can answer questions and carry out your bidding! That’s said, I’m also seeing cloud-based machine learning and deep learning misapplied over and over again. All have easy fixes for the most part, and certainly cloud-based machine learning is here to stay. But use it wisely and appropriately. [

World War T: What does it mean for your current decision-making?

CTOvision

The ongoing trade wars, World War T, are heating up. World War T is not just about steel and aluminum and tariffs on autos. It will soon stretch into just about every sector of the economy. Other nations all want a piece of this war. Some democracies have leaders that need to show their voters [.]. Blockchain and Cryptocurrency Cloud Computing CTO Cyber War News World War T

Cloud 157

Shortcut GPO for Root Network Share

Mick's IT Blog

If you have tried adding a GPO to create a shortcut to the root network share, contoso for instance, then you have probably seen that it is not working. The solution is to not use Shell Object and not File System Object.

Cyber Conferences, It Shouldn’t Be This Way.

Forrester IT

I recently saw another posting/photo from a friend in the industry that showed what amounts to “booth babes” at yet another conference, this time it wasn’t in Vegas, it was in Europe.

Blockchain Found a Shortcut to the Universal Sharing Economy

Datacponomy

Today, we have the liberty to source an apartment space globally, with AirBnB, or to find a qualified person for manual labor via TaskRabbit. In spite of this accessibility, there are still gaping inefficiencies for users of these systems.

System 100

What The World Of High Speed Trading Can Teach CIOs

The Accidental Successful CIO

High speed trading is all about having a very fast IT infrastructure Image Credit: Epic Fireworks. At most firms, the person with the CIO job plays a supporting role to the rest of the company.

Cloud costs too high? It’s your own fault

David Linthicum

CFOs seem to be fainting at the sight of the cloud bills these days. For many, unpredictable costs are a major issue. Another is the lack of visibility into cloud resource usage. This is so frustrating to me. I’ve been preaching the value of cloud cost monitoring and governance for years. However, it’s really fallen off the radar screen for a lot of enterprises in their rush to move to the cloud.

Why Cybersecurity is Looking to AI to Mitigate Business Risks

CTOvision

Malicious cyber attacks against government and private businesses have increased in frequency and severity over past years. Microsoft estimates the potential cost of cyber-crime to the global community at $500 billion and that breaches of data will cost the average company around $3.8 million. The unfortunate truth is that the cybersecurity industry is largely unprepared [.]. Artificial Intelligence CTO Cyber Security News

How Different Cryptocurrencies stack up

Doctor Chaos

If you’re thinking about investing in cryptocurrencies, you probably already know that there are lots of different kinds. Bitcoin is obviously the most famous, and it remains the most popular. However, numerous other cryptocurrency types exist, and each of them boasts a devoted following whose members will swear by their value to anyone within earshot. […]. Crypto Currency crypto currency

100

Platform Economy Myth #4: If You Build A Platform, Developers And Customers Will Come

Forrester IT

We’ve been analyzing the sacred myths of the platform economy and revealing the real practices that platform businesses have mastered. This is work from our report, “Earn Your Place In The Platform Economy.” ” Myth #4: If you build a platform, developers and customers will come.