May, 2020

The Problem with Artificial Intelligence in Security


Read Dr. Leila Powell take a look at the security issues associated with artificial intelligence on Dark Reading: If you believed everything you read, artificial intelligence (AI) is the savior […].

How Technology Can Curb the Spread of COVID-19


As governments explore different options for reducing the spread of COVID-19 after lifting some shelter-in-place and essential-only orders, gamification may be an answer. People are familiar with gamification principles used to inspire behaviors like weight loss or increased movement, but they also can be used to encourage many other behaviors by focusing on helping people achieve their individual goals.

Social 232

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

COVID-19 pandemic ratchets up threats to medical IoT

Network World

The mere fact of the COVID pandemic’s existence has pushed the American healthcare system to capacity, but another threat to that system has reared its ugly head – cyberattacks, particularly those based on ransomware, have become more common as the disease spread, targeting medical IoT devices and healthcare networks. According to Forrester Research analyst Chris Sherman, two U.S.

5 artificial intelligence (AI) types, defined


Read Stephanie Overby define five types of artificial intelligence on Enterprisers Project : Artificial intelligence (AI) is redefining the enterprise’s notions about extracting insight from data. Indeed, the vast majority […].

Building Evolvable Architectures

Speaker: Dr. Rebecca Parsons, CTO of ThoughtWorks

The software development ecosystem exists in a state of dynamic equilibrium, where any new tool, framework, or technique leads to disruption and the establishment of a new equilibrium. Predictability is impossible when the foundation architects plan against is constantly changing in unexpected ways. It’s no surprise many CIOs and CTOs are struggling to adapt, in part because their architecture isn’t equipped to evolve. This webinar will discuss what’s at stake if companies continue to use long term architecture plans.

8 Helpful Everyday Examples of Artificial Intelligence


If you looked up the term “artificial intelligence” on Google and somehow ended up on this article, or commuted to work using Uber, you made use of AI. There are countless […].

Technology Due Diligence Services: There is no substitute for experience


I’ve spent a career evaluating the business impact of technology and building strategies that optimize the contribution technology makes to enterprise missions. In my first career as a naval intelligence […]. CTO News The Boardroom Due Diligence OODA

More Trending

A Security Researcher’s Dream: Free version of Recorded Future Available In Your Browser


Today Recorded Future announced a free version of their solution, called Recorded Future Express. This is accessible by a browser plugin and overlays on top of any webpage or web […]. CTO News Recorded Future

Security Experts Must Connect Cybersecurity to Business Outcomes


Cybersecurity has been on board agendas for at least a decade, but the recent coronavirus outbreak puts a spotlight on the disconnect between executive understanding of cybersecurity and their organization’s actual capabilities. “The stories that we’ve seen during the COVID-19 outbreak are the latest example highlighting the failed approach to cybersecurity that many organizations take,” says Paul Proctor , Distinguished VP Analyst, Gartner.

Common Sense Comes Closer to Computers


Read John Pavlus explain how researchers are working to build AI with common-sense reasoning, such as the COMET system, which combines symbolic reasoning and neural language modeling on Quanta : […].

The Problem with Artificial Intelligence in Security

Dr. Leila Powell

Any notion that AI is going to solve the cyber skills crisis is very wide of the mark. Here's why

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

You've finally done it: You've won over C-Suite and your DevSecOps team is up and running. You feel ready to take on rising security threats while continuously delivering quality software updates. But how do you monitor your new program? Are you truly able to gauge the state of your projects? To ensure the success of this new breed of a team, you need to know the metrics to look at and how to advocate these metrics to C-Suite and stakeholders. Join Shannon Lietz, Leader and Director of DevsecOps at Intuit, and learn to lead your DevSecOps team to the top.

The Internet of things in 2020: More vital than ever

Network World

If you work in IT, you’re probably safely ensconced at home right now, clinging to your laptop at the edge of your company’s network. The shift from office to home has been momentous. But it’s also symbolic of a larger trend: The network edge has become as important as the network core. Remote workers aside, the IoT (internet of things) is the biggest reason why the edge has become so crucial.

Cloud Strategies Aren't Just About Digital Transformation Anymore

Information Week

Cloud migrations are accelerating in the wake of the pandemic. The new normal is even more virtual

ConfigMgr 2002 Production Version is Generally Available | SCCM


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Microsoft Endpoint Configuration Manager (MEMCM) 2002 is generally available now. Microsoft released the opt-in version of MECM 2002 on April 1, 2020. I have already explained and shown most of these new features in the video tutorial. New Features of Configuration Manager (A.K.A SCCM) 2002 version is given in the following post [link] SCCM 2002 Feature Update is […].

Master a Distributed Workforce for Digital Transformation


Whether through new product lines, a fully remote workforce or a whole new online business, COVID-19 will continue to change the way organizations operate. But in the chaos exists an opportunity to transform the future business. “Executive leaders will have to become more agile to deal with the demands of a highly distributed and potentially inconsistent workforce,” says Leigh McMullen , Distinguished VP Analyst, Gartner.

Agile 239

The Pro’s Guide To Getting The Best ROI From Your New LMS

You need a Learning Management System when your courses and training programs need to be accessible online. Quickly build the perfect business case and easily determine which LMS will provide the best return on investment you need with this how-to eBook!

5 questions to ask about your AI or IoT project


Whenever usability is used in an IT context, it usually refers to the user-friendliness of a Web portal or an application user interface and the ease of getting up to […].

Artificial intelligence is hopelessly biased - and that's how it will stay


The issue is mired in complexity

Use of cloud collaboration tools surges and so do attacks

Network World

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began

Tools 113

4 Machine Learning Challenges for Threat Detection

Information Week

While ML can dramatically enhance an organization's security posture, it is critical to understand some of its challenges when designing security strategies

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Learn How to Collect SCCM Client Logs Using ConfigMgr Console


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Let’s learn how to collect SCCM client logs using the ConfigMgr Console. This log collection feature got introduced in the Configuration Manager version 2002. Client logs feature is part of Client Diagnostics features of Configuration Manager. Client diagnostic feature helps SCCM admins to enable and disable verbose logging. So, you don’t need to have admin […].

How To 117

A Framework for Executive Decision Making During COVID-19


Fashion designers creating face masks. 3D printer enthusiasts printing protective gear for hospitals. Car manufacturers creating ventilators. Regardless of what they were doing four months ago, organizations and businesses around the world have revisited core competencies and reimagined what they can create to help in the fight against coronavirus. Decisions are creating stress for executives, as they make difficult trade-offs.

3D 239

Edge computing and AI: 7 things to know


Read Stephanie Overby explain how Edge computing and Artificial Intelligence can work together on The Enterprisers Project : For decades, artificial intelligence (AI) lived in data centers, where there was […].

Artificial intelligence (AI) vs. machine learning (ML): 8 common misunderstandings

Stephanie Overby

IT and business leaders will run into some false notions about artificial intelligence and machine learning and what each one can do. Here's how to explain the truth on AI vs. ML

How Embedding AI-Powered Analytics Can Give You a Competitive Advantage

Embedding dashboards and reports aren’t enough. Futureproof your application by offering instant, actionable insights that will give you and your customers a competitive advantage.

Digital Transformation is Absolutely Important in a Volatile COVID-19 World

Social, Agile and Transformation

Should COVID-19 start, slow down, or pivot your digital transformation strategy? The answer is yes, but it depends on how your organization defines digital transformation and where it is in its journey. There's a running joke floating on social media, "What started your organization's digital transformation," and the answer circled is "COVID-19." Hopefully, your organization started it's. cio citizen development crisis management digital transformation enterprise 2.0

Media 156

Why Everyone's Data and Analytics Strategy Just Blew Up

Information Week

The COVID-19 pandemic is impacting data and analytics strategies in profound ways. Experts explain what your company should be doing right now

Intune Advanced Peer to Peer Content Delivery Solution | Adaptiva OneSite


Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. link]. Today Adaptiva announced a new solution to help organizations to move to Modern Device Management. The Adaptiva OneSite Intune Edition provides Advanced Peer to Peer content delivery Solution enterprise network connected Windows 10 devices. Let’s see more details about the solution. Introduction Have you been trying to work with Delivery Optimization or Connected Cache Servers […].

Use COVID-19 Downtime to Upskill for Digital


Due to COVID-19 business shifts, one organization experienced an imbalance of resources across the company. With underutilized employees in customer service roles and overextended employees in remote service delivery, the executive team created an internal job board to match employees in slow parts of the business with experienced employees in other parts of the business that required more digital skills.

Why Distributed Tracing is Essential for Performance and Reliability

Speaker: Daniel "spoons" Spoonhower, CTO and Co-Founder at Lightstep

Many engineering organizations have now adopted microservices or other loosely coupled architectures, often alongside DevOps practices. Together these have enabled individual service teams to become more independent and, as a result, have boosted developer velocity. However, this increased velocity often comes at the cost of overall application performance or reliability. Worse, teams often don’t understand what’s affecting performance or reliability – or even who to ask to learn more. Distributed tracing was developed at organizations like Google and Twitter to address these problems and has also come a long way in the decade since then. By the end of this presentation, you’ll understand why distributed tracing is necessary and how it can bring performance and reliability back under control.

How underwater Internet of Things will work


Read Patrick Nelson explain how the underwater Internet of Things will work using lasers on Network World : More than two-thirds of the world’s surface is covered by water. It […].

The Escape Artist’s Guide to Quitting VIM

Linux Academy

Have you or a loved one ever had to reboot your computer to get out of a read-only file in VIM? Are you responsible for a Linux system or set of systems where a graphical editor or adding new editors is prohibited? Are you taking an online training course where all the labs use the VIM editor, and it’s driving you crazy? Do other Open Source Pros tease you about not knowing VIM? This short tutorial will help you get past the main issues you might encounter in quitting VIM.

Course 101

What is Driving Digital Transformation Change?

Social, Agile and Transformation

After I posted my last 5 Minutes with @NYIke video on the #1 Reason Why Digital Transformation fail, a small discussion ensued on LinkedIn about transformation and change management. Is digital transformation a new name for business transformation? And regardless of what we call it, how can leaders help the resulting change management easier for employees and less difficult for leaders? cio digital transformation enterprise 2.0

Your Roadmap to AI and ML Deployments

Information Week

Don't adopt artificial intelligence and machine learning without having a real business problem to solve. Here are some ways to help build the right use cases

Nine Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.