June, 2018

Five Best Practices To Scale Data Science Across The Enterprise

Forrester IT

Nearly all firms want to do more with data science. However, executives and data scientists alike are frustrated by the difficulty of turning new initiatives into business impact at scale.

Machine learning risks are real. Do you know what they are? 

Eric D. Brown

Machine Learning Risks are real and can be very dangerous if not managed / mitigated. Everyone wants to ‘do’ machine learning and lots of people are talking about it, blogging about it and selling services and products to help with it.

When Cyberattacked, Should CIOs Share Information About The Experience?

The Accidental Successful CIO

When they are attacked, CIOs have to decide how much they want to share Image Credit: Blogtrepreneur. The person with the CIO job, you, is the person who is responsible for securing the company against attacks from outside.

Report 163

Not all Machine Learning (ML) Is Artificial Intelligence (AI): Part II

CTOvision

No two companies define Artificial Intelligence (AI) the same way, but they all insist they are doing it. Or at least some version of it. However, if AI is to mean something and be a useful term to help delineate different technologies and approaches from others, then it has to be meaningful. A term that [.]. Artificial Intelligence CTO News ai artificial intelligence definitions Machine learning ml

Serverless cloud computing is the next big thing

David Linthicum

Serverless computing in the cloud is a good idea— serverless computing is not just for the datacenter. Serverless cloud computing means the ability to get out of the business of provisioning cloud-based servers, such as storage and compute, to support your workloads, and instead use autiation at the cloud provider to allocate and deallocate resources automatically. Although there are cost advantages of serverless cloud computing, the real advantage is simplicity.

5 Tips to Start a Lucrative Career in Cyber Security

Doctor Chaos

Information Security professionals are akin to our policemen. They are equipped with advanced firewalls and porn filters, secure email and web traffic gateways, encryption keys, IPS signatures, security policies, and intrusion detection systems.

More Trending

12 Warning Signs of Bad Application Architecture

Social, Agile and Transformation

At a #CIOChat this weekend we were asked about warning signs for bad architecture. Here was my quick response capturing just a tweet-sized summary of architecture that "smells bad" - Too slow making biz needs. Too difficult/complex to explain to new technologists. Lack of defined integration process (closed system). Can’t be deployed to the cloud. Performance or stability issues. #. cio cloud computing it management software development software qa

How Should CIOs Handle Data From Employee’s Wearables?

The Accidental Successful CIO

More data is always better, but what if it’s personal data? Image Credit: Timo Newton-Syms Follow. As the person with the CIO job, you are the one who is responsible for managing all of the data that the company collects. We are all pretty used to what this means.

Sports 170

The commercial impact of IoT insecurity

CTOvision

Introduction A hacker recently shut down Bycyklen, Copenhagen’s public city bikes system, forcing employees to hunt down and manually reboot the Android tablet attached to every bike. The company said that restoring all bikes to working order would "take some time". Naturally, the costs of restoration will be significant. This is just one example of [.]. CTO Internet of Things News

How to get the most cloud security

David Linthicum

One of the leading causes of data breaches is internal negligence due to poor training, according to the Ponemon Institute. But when the staff is educated and instructed on the proper practices, the risk of cyberattacks or data leaks can be reduced. Infact, you can reduce your risk more this way than with just the use of modern cloud security software and best security practices. What is cloud computing? Everything you need to know now.

How To 157

3 Major Ways to Defend Your Business from Cyber Attacks

Doctor Chaos

The way we do business as a society has evolved over the years mainly due in part to technology like the internet. We can communicate instantaneously, complete transactions in record time, and almost everything we can think of can be attained with a few clicks.

Customer Experience Trends In China, 2018

Forrester IT

What are the CX trends that will impact customer loyalty and help you build competitive advantage? Look at what China reveals about the future of customer experiences. Until only a few years ago, most CX pros would have scoffed at talks of China as an innovator.

Trends 151

What Drives Agile Teams to Become Agile Organizations

Social, Agile and Transformation

Last week I moderated a panel at nGage's Enterprise Transformation Exchange on Developing an Agile IT Organization: Concepts, Culture and Concerns. The message from panelists was clear. Organizations looking to transform need to go beyond scrum practices and improving IT project execution.

Agile 118

CIOs Need To Learn How To Become Futurists

The Accidental Successful CIO

Futurist keep their eyes fixed on what may be coming our way Image Credit: ADiamondFellFromTheSky. I’ve got a quick question for you: how good is your ability to predict the future?

How To 151

World War T: What does it mean for your current decision-making?

CTOvision

The ongoing trade wars, World War T, are heating up. World War T is not just about steel and aluminum and tariffs on autos. It will soon stretch into just about every sector of the economy. Other nations all want a piece of this war. Some democracies have leaders that need to show their voters [.]. Blockchain and Cryptocurrency Cloud Computing CTO Cyber War News World War T

Cloud 154

3 common machine learning mistakes to avoid

David Linthicum

I’m a big fan of cloud-based machine learning and deep learning, and AI in general. After all, you can’t be a geek without imagining having a conversation with an artificially intelligent being that can answer questions and carry out your bidding! That’s said, I’m also seeing cloud-based machine learning and deep learning misapplied over and over again. All have easy fixes for the most part, and certainly cloud-based machine learning is here to stay. But use it wisely and appropriately. [

How to Spot and Avoid Cryptocurrency Ponzi Schemes

Doctor Chaos

If you’re thinking about investing in cryptocurrency, it’s essential to be aware of potential Ponzi schemes that relate to the sector. Knowing about some common characteristics of Ponzi schemes can help you avoid them, whether they’re associated with cryptocurrency opportunities or other industries.

How To 130

Are You Modernizing Your B2B Go-To-Market Strategies?

Forrester IT

Last week I had the opportunity to speak at a dinner event with 20+ senior marketers and business partners that InsideView sponsored. We wanted to explore how well marketing and sales are facing up to new go-to-market challenges associated with buyer behavior change in general, ABM specifically.

B2B 147

SEO for Small Businesses

Galido

It can be difficult for small businesses to fully utilize technological marketing means due to a lack of knowledge or a lack of funds. Either way, this puts small businesses at a distinct disadvantage from larger companies with deeper pockets.

What Do CIOs Need To Know About Status Battles At Work?

The Accidental Successful CIO

CIOs need to understand that status at work does not follow a formal hierarchy Image Credit: Eugene Kim. When a member of your department does a good job, all of a sudden you find yourself in a difficult position. You’d like to show this individual that they did a good job and that you appreciate it.

Groups 141

HBO’s Westworld: The Man In Black is a special kind of Twitter user

CTOvision

HBO’s Westworld is a modern take on the Michael Crichton SciFi tale of a robotic amusement park. The HBO version has a new twist. The creators/writers were all exposed to years of Twitter, which has influenced every episode and the entire arch of two seasons of the show. Now that season two is wrapping up, [.]. Artificial Intelligence CTO News Robots SciFi

3 major cloud migration mistakes to avoid

David Linthicum

Migrating workloads to the public cloud is taking most enterprise IT organization’s time these days. Although analyst predictions vary, I would say we’re at about 20 percent migrated in the Global 2000, including PaaS , IaaS , and SaaS. To read this article in full, please click here (Insider Story

How Different Cryptocurrencies stack up

Doctor Chaos

If you’re thinking about investing in cryptocurrencies, you probably already know that there are lots of different kinds. Bitcoin is obviously the most famous, and it remains the most popular. However, numerous other cryptocurrency types exist, and each of them boasts a devoted following whose members will swear by their value to anyone within earshot. […]. Crypto Currency crypto currency

100

Alexa, How Do I Fix Healthcare?

Forrester IT

Disruption is Bringing Much Needed Innovation to Healthcare Disruption is not new to healthcare, but the entrance of established brands from other industries signals a level of disruption that hasn’t been seen before. Healthcare Organizations take note, innovate now or become irrelevant tomorrow.

IM is No Substitute for P2P

Perficient - Digital Transformation

Let’s face it, in today’s world we have about a zillion different electronic means of communicating. I feel justified in making that assessment because I am of an age where I recall when email was a new-fangled thing.

What The World Of High Speed Trading Can Teach CIOs

The Accidental Successful CIO

High speed trading is all about having a very fast IT infrastructure Image Credit: Epic Fireworks. At most firms, the person with the CIO job plays a supporting role to the rest of the company.

Why Cybersecurity is Looking to AI to Mitigate Business Risks

CTOvision

Malicious cyber attacks against government and private businesses have increased in frequency and severity over past years. Microsoft estimates the potential cost of cyber-crime to the global community at $500 billion and that breaches of data will cost the average company around $3.8 million. The unfortunate truth is that the cybersecurity industry is largely unprepared [.]. Artificial Intelligence CTO Cyber Security News

How the cloud will kill your business

David Linthicum

One of the benefits of cloud computing is that it lets you punch above your weight. A business can quickly enable computing resources at a fraction of the cost it once paid, so cloud computing helps level the field for smaller businesses. This is good news for the smaller businesses. But it’s not such great news for larger companies that now face a smaller business that’s disrupting their market.

Why web application development projects fail (and what IT can do about it)

mrc's Cup of Joe Blog

Summary: Depending on the survey you read, anywhere from 25% – 68% of development projects fail. These failures often cost hundreds of thousands of dollars, waste months (or years) of time, and usually lead to people losing their jobs. Why do these projects fail, and what can you do about it?

Cyber Conferences, It Shouldn’t Be This Way.

Forrester IT

I recently saw another posting/photo from a friend in the industry that showed what amounts to “booth babes” at yet another conference, this time it wasn’t in Vegas, it was in Europe.