January, 2020

article thumbnail

What are Seven Types of Big Data Debt

Social, Agile and Transformation

As more organizations have embarked on agile software development over the last five years as part of digital transformation programs, the term technical debt is more widely understood. Teams that develop code leave artifacts behind that require improvements, reengineering, refactoring, or wholesale rewriting. Some technical debt is done purposefully to deliver applications faster, while.

Big Data 272
article thumbnail

The Future Of The CISO – Six Types Of Security Leaders

Forrester IT

When starting a project like the Future of the CISO – it’s a daunting exercise. While we don’t always share the background inspiration for our research, this time it’s quite important and will shed some light on how we arrived here. When we started planning this research in 2018 and working on it in 2019, […].

Exercises 321
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This One Little Configuration Change Will Make It Harder For People To Steal Your Information

CTOvision

Editor’s note: We are aiming this tutorial at the non-technical person. Please share with anyone in your life who could benefit from this. -bg Cyberspace is a complex domain and our adversaries are always seeking new ways to steal information or spread their malicious code or hold our data for ransom. This is the big reason […].

Data 376
article thumbnail

IIS Troubleshooting Tips for SCCM Admins|MP DP IIS Error Codes

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Really quick one to segregate the IIS HTTP Error Codes which will be useful at time of troubleshooting SCCM/ConfigMgr/MEMCM Management Point and Distribution Point – server related communication issues. In this post you will more IIS Troubleshooting Tips. IIS is integration part of SCCM/Configuration Manager server roles like MP, DP, and SUP.

Windows 218
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How Amazon is solving big-data challenges with data lakes

All Things Distributed

Back when Jeff Bezos filled orders in his garage and drove packages to the post office himself, crunching the numbers on costs, tracking inventory, and forecasting future demand was relatively simple. Fast-forward 25 years, Amazon's retail business has more than 175 fulfillment centers (FC) worldwide with over 250,000 full-time associates shipping millions of items per day.

Big Data 209
article thumbnail

Windows 7 remains an albatross at many large organizations

Tech Republic Security

Among 60,000 large companies analyzed by security ratings company BitSight, almost 90% still have Windows 7 PCs in their environment.

Windows 207

More Trending

article thumbnail

Guess what? GDPR enforcement is on fire!

Forrester IT

Yes, you read the title of this blog well: GDPR enforcement is on fire! Fines might not always be particularly high, but our analysis shows that – at least in terms of volume – Data Protection Authorities (DPAs) are rapidly increasing their GDPR enforcement activities. And, some interesting trends are also emerging, such as: As […].

Analysis 536
article thumbnail

Cloudera: Extract Benefit From All Your Data And Work Across Clouds

CTOvision

We have tracked Cloudera from the very beginning and have watched as it has continually innovated in ways that help both enterprises and the open source community deliver more value. They started off on a mission to make Hadoop safe for the enterprise and then built upon that solid foundation to create full spectrum solutions […].

article thumbnail

Deploy Microsoft Edge Patches with SCCM Software Updates|ConfigMgr Part 1

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Let’s see how you can enable and deploy Microsoft Edge patches with Configuration Manager Software Updates. I have already published a post that explains how to Deploy Microsoft Edge Browser (client installation) to Windows 10 devices. Introduction Microsoft released the stable version of Microsoft Edge (Chromium version) on 15th Jan 2020.

Microsoft 212
article thumbnail

Microsoft Endpoint Manager Configuration Manager PowerShell Upgrade Script

Mick's IT Blog

With the advent of Microsoft Endpoint Manager Configuration Manager 1910, I started researching the upgrade requirements. I happened to run into a great blog post by fellow MVP Martin Bengtsson on what should be done before the upgrade takes place. That got me to thinking that most of the tasks he listed can be automated with PowerShell. The script below will automate the following tasks from his list of prerequisites: Backs up the cd.latest directory to the specified UNC path Disables the follo

Backup 153
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Data Privacy: Top trends to watch in 2020

Tech Republic Security

Data privacy is an increasing concern for companies and individuals. Learn more about what's on the landscape for 2020.

Trends 213
article thumbnail

The Facial Recognition Debate

Information Week

One small step for tech, one giant leap for privacy? It is up to our society to create clear boundaries that will enhance the positive and control the negative.

164
164
article thumbnail

What I See Coming For The Channel In 2020

Forrester IT

Preparing for this years list of future channel trends has been an immersive experience to say the least. In 2019, I was able to talk to 497 companies one-on-one about their channel strategy and programs, including 130 of those face-to-face. I received 78 briefings from the technology companies who are inventing new ways to […].

article thumbnail

Internet of Things presents the next frontier of cyberattacks

CTOvision

Read why Asaf Ashkenazi says that the risk of cyberattacks on the Internet of Things has increased on ITProPortal : Today’s rapidly growing global network of internet of things (IoT) devices brings with it new levels of convenience to the lives of everyday consumers. In late 2019, one survey conducted by Parks Associates found that […].

Internet 285
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ConfigMgr 1910 Known Issues Bugs Fixes|SCCM

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. ConfigMgr 1910 is in slow ring now (GA’d) and 1910 update will be available for all SCCM infrastructure with online Service Connection Point. Also, you should have any of the following versions of ConfigMgr 1810 or 1902, or 1906. In this post, you will learn more about SCCM 1910 known issues.

Windows 199
article thumbnail

Why Kubernetes job searches grew by 2,125% in 4 years

Tech Republic Cloud

The most popular Kubernetes-related tech roles include DevOps engineer, software engineer, and cloud engineer. Find out how to kick off your career.

Devops 164
article thumbnail

Why blockchain-based cybersecurity may be the answer for vulnerable IoT networks

Tech Republic Security

CES 2020: A "hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats.

article thumbnail

How to Create a Culture of Innovation

Information Week

Here are five key techniques to support and encourage entrepreneurship in your employees -- while simultaneously keeping everyone moving in the right direction.

How To 160
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Shatter The Seven Myths Of Machine Learning

Forrester IT

The best New Year’s resolution? Become machine-learning-literate! It’s good for your organization, your career, and the sanity of your data scientists. See the new “Shatter The Seven Myths Of Machine Learning” report below for a mini course on machine-learning fundamentals and terminology.

Course 463
article thumbnail

Don’t Make These 14 Common Big-Data Mistakes At Your Business

CTOvision

Thanks to modern technology, businesses of all sizes have access to rich, granular data about their customers and operations. However, understanding what to do with these massive amounts of data can be difficult and costly, and even with the right tools, it can be overwhelming. With so much complexity around big data, businesses can easily make […].

Big Data 280
article thumbnail

Get Knowledge about Unpredictable Network Internet Outages

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Have you heard about network and internet outages? Do you follow internet outage news? Here is the opportunity to learn more interesting facts about network and internet outages via quiz from Martello Technologies (Savision). Try ⏬⏬ out [link] Introduction Can you guess which of the 12 statements are TRUE or FALSE?

Internet 156
article thumbnail

7 lessons learned from 20 years of professional speaking

Trends in the Living Networks

It is exactly two decades since I became a professional speaker. I had paid my dues over the previous four years speaking frequently for free at conferences. My breakthrough from ‘free to fee’ came from the publication of my first book, Developing Knowledge-Based Client Relationships , which gave me the credibility and visibility to be invited for my first professional engagement in late January 2000.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

How a researcher exploited the Windows 10 bug patched by Microsoft

Tech Republic Security

Security researcher Saleem Rashid "rickrolled" himself to show that the bug could be exploited in the real world to spoof security certificates on machines without Microsoft's patch.

Research 169
article thumbnail

Digital Innovation is Everywhere

Information Week

Here are 6 digital innovation technologies and how they could be deployed in various markets. It's not just about the customers.

181
181
article thumbnail

With Good Foundations, Augmented Reality Offers A Great Way To Engage With IoT Data

Forrester IT

Augmented reality (AR) and the internet of things (IoT). In principle these two hot technologies are a great match, with data streaming from IoT-connected machines to be used by AR-wielding engineers on the factory floor. My latest report, “Combine Augmented And Mixed Reality With IoT To Deliver Insight At The Point Of Need,” began with […].

Data 402
article thumbnail

Spy Sites of New York: A Guide to the Region’s Secret History

CTOvision

Bob Wallace and Keith Melton are a power pair of writers and researchers who have produced high quality, fact-based, enjoyable books for decades. The latest in their long string of fantastic books provides a guide to the secret history of spies and counter spies in and around New York. Their book, Spy Sites of New […].

Research 251
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Feedspot Top 20 SCCM Blogs to Follow in 2020

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Great to start the year 2020 by announcing that this blog (www.anoopcnair.com) is part of Feedspot Top 20 SCCM blogs to follow in the year 2020. 😍😍😍👌👌 Subscribe to this blog NOTE! – Feedspot published this list of blogs in SCCM category even though Microsoft changed the name of SCCM to MEMCM.

Windows 148
article thumbnail

11 popular IT certifications that make the most money

Tech Republic Cloud

Find out which are in demand worldwide, and which IT cross-certifications are beneficial.

205
205
article thumbnail

How AI, ML, and automation can improve cybersecurity protection

Tech Republic Security

Read insights from industry experts on how artificial intelligence and machine learning will help prevent cybersecurity breaches.

article thumbnail

How to Manage the Human-Machine Workforce

Information Week

Today's managers and executives need to oversee humans and machines in this age of AI and RPA, but should machines be managed as humans in a way that some suggest?

How To 143
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.